All processes connected with the detected devices (commonly recording, checking or detection of video/audio/community streams) can also be identified and may be stopped with the operator. By deleting or manipulating recordings the operator is aided in building faux or destroying precise proof in the intrusion Procedure.It follows an introductory di