Mechanisms exist to continuously monitor inbound and outbound communications traffic for unusual or unauthorized activities or conditions.