She activates viral programs and a proxy interceptor, and dives straight into the security labyrinth of the phantom system.