All processes related to the detected equipment (generally recording, monitoring or detection of video/audio/network streams) are also determined and will be stopped via the operator. By deleting or manipulating recordings the operator is aided in generating bogus or destroying actual evidence on the intrusion operation.The 'menu' also asks for fac