Explain how covert activity is accomplished in communications and discuss security measures that have been taken, such as legislation, to address the problem. Suggest other ways to prevent the intrusions besides those ways that have been undertaken thus far.