1. First, monitor and investigate pirated music and use network search and monitoring tools.
2. Secondly, professionals classify and summarize the collected pirated music.
3. Finally, use data analysis methods and technologies to count the number and sources of pirated music.