Also, the predicate not(remote-login(A, U, H2)) of action. Fig. 2. Modelling the Mitnick scenario Fig. 3. Counter measures for the Mitnick scenario Fig. 5..