Methods used to detect threats without infringing on privacy