Document Incrementing Evidence
Intruder’s metadata is collected and emailed to you!
Remotely play an intruder’s video and audio.
It’s a lot like how security cameras catch shoplifters. You get to record what an
intruder does. And then watch the hacker fumble and get frustrated as they type in
the wrong passwords and get denied.