Combating online leaks

  1.  Search for and elimination of possible information leakage channels
  2. Online monitoring and control for mission-critical information leaks
  3. Building a file archive of leaks for further analysis