Basically, we have profiles that we work with. We look at a file, and based on our experience and knowledge, we determine which files are potentially risks and which ones aren't.
When there are potential risks, we are in contact with our partners, with CBSA and with CSIS, and we do screening of these applications to ensure that these are not individuals for whom we have concerns.