Active source identification consists of three parts: prominent source identification, secondary source identification, and source verification (as denoted by blocks G.1, G.2, G.3, respectively in Fig. 1). Prominent source identification identifies the most likely leak locations through an iterative likelihood maximization. After identifying the most likely leak locations, secondary source identification (under the assumption that the most likely leak locations actually contain leaks) identifies the leak locations which must also