Undercover routinely checks with the Undercover server. In case of theft, the Mac's unique Undercover ID is added to the list on the Undercover server, initiating the recovery process. During the recovery phase, Undercover transmits its current location on the internet, enabling the Undercover team to identify the computer's exact physical location. Moreover, Undercover also sends screenshots of the stolen Mac, revealing details of the thief's identity. The Undercover recovery center will then work with law enforcement to recover the Mac.