Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has not yet been met any practical need. Further, the inherent complexity of the problem in terms of any known approaches gives firm impressions that there are no practical solutions, and so fewer challenges have been made than those against virus and worms. This paper presents a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. Figuratively, traps are set up on the place where any legitimate program could not reach. The proposed technique uses sensor objects and is considered to be the best way of detecting unknown interception threats.