All procedures associated with the detected units (ordinarily recording, monitoring or detection of video clip/audio/network streams) will also be determined and will be stopped by the operator. By deleting or manipulating recordings the operator is aided in making bogus or destroying genuine proof with the intrusion Procedure.The source code revea