All procedures connected with the detected products (commonly recording, checking or detection of movie/audio/community streams) can also be recognized and can be stopped via the operator. By deleting or manipulating recordings the operator is aided in building phony or destroying actual evidence on the intrusion Procedure.While CIA property are so