All processes connected to the detected units (typically recording, checking or detection of video clip/audio/community streams) also are recognized and might be stopped because of the operator. By deleting or manipulating recordings the operator is aided in producing pretend or destroying actual evidence on the intrusion Procedure.Analysts called