All procedures related to the detected units (generally recording, monitoring or detection of video/audio/network streams) will also be identified and might be stopped through the operator. By deleting or manipulating recordings the operator is aided in producing bogus or destroying actual evidence on the intrusion Procedure.challenge allows the cu