I. Introduction
Monitoring and encryption are essential to secure today's computer networks. As identified in analyses of recent cyber-attacks, broader application of practical exfiltration monitoring technologies could aid to better protect sensitive information [1] from being stolen from sensitive data stores. For example, the perpetrators of the APT1 attacks exfiltrated vast amounts of sensitive information and there were few safe-guards in place to prevent this exfiltration once adversaries obtained inside control of their target networks. Strong encryption technologies could partially address data exfiltration concerns by preventing adversaries from being able to use any exfiltrated encrypted information. However, strong encryption is not a panacea and encryption could be used as a cover to prevent the practical monitoring of information flows [2]. Monitoring requires visibility into data, while encryption restricts visibility.