... part of the tools that they use, and then they can access ...
... or terminate or override. When some bad guy hijacks this, they can do things to your computer ...