What's the best way to capture any illegal activities? Can we "install" small "agents" and detect the leakages activities?