All processes relevant to the detected units (generally recording, monitoring or detection of online video/audio/community streams) may also be determined and will be stopped by the operator. By deleting or manipulating recordings the operator is aided in producing faux or destroying actual proof from the intrusion operation.General, the selection