An artificial intelligence program has surreptitiously gained access to your mobile device. The primary directive of the AI is to seize control of your system by disabling the 6 defence nodes protecting your device.
The AI will systematically attack your defence array by repeatedly sending Trojan deactivation codes and overload instructions which will result in node and energy losses .