All procedures related to the detected gadgets (usually recording, monitoring or detection of video/audio/network streams) can also be determined and can be stopped with the operator. By deleting or manipulating recordings the operator is aided in generating phony or destroying actual proof on the intrusion operation.The source code exhibits that M