Thanks william, is a good read
I personally like this bit
Regulators will often find themselves in a position where they can identify a person with inside information on a particular security, a person who traded in that security, a relationship between the two persons and even evidence of communications between them (such as telephone records).