528:
36:
151:, such as accessing computing and mobile devices for various nefarious reasons (e.g. theft of financial, personal or corporate data). More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance is different from
196:
Sweeping is not foolproof. Advanced bugs can be remotely operated to switch on and off, and some may even rapidly switch frequencies according to a predetermined pattern in order to make location with sweepers more difficult. A bug that has run out of power may not show up during a sweep, which means
467:
The timing of detection surveys and location scans is critical to success, and varies with the type of location being scanned. For permanent facilities, scans and surveys must take place during working hours to detect remotely switchable devices that are turned off during non-working hours to defeat
434:
However, this definition lacks some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow
430:
devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual,
514:
A method does exist to find hidden recorders, as these typically use a well known frequency for the clock which can never be totally shielded. A combination of existing techniques and resonance sweeps can often pick up even a defunct or "dead" bug in this way by measuring recent changes in the
438:
Technical
Surveillance Countermeasures (TSCM) can best be defined as The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses.
185:. The standard counter-measure for bugs is, therefore, to "sweep" for them with a receiver, looking for the radio emissions. Professional sweeping devices are very expensive. Low-tech sweeping devices are available through amateur electrical
687:
Transparent Lives is a prominent
Canadian organization that aims to "demonstrate dramatically just how visible we have all become to myriad organizations and what this means—for better or for worse—for how we conduct our everyday lives."
897:
302:
Such activities make it harder to track surveillance subjects. Following steady, easy-to-predict schedules before employing aforementioned countermeasures may make the surveillance detail complacent and thus easier to lose.
274:
Most surveillance, and most countersurveillance, involves human methods rather than electronic methods since people are generally more vulnerable and more capable of reacting creatively to surveillance situations.
510:
to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling. The device is found by locating a hot spot the device generates that can be detected by the thermal camera.
943:
1078:
503:
installed, it may become very difficult. Items such as audio recorders can be very difficult to detect using electronic equipment. Most of these items will be discovered through a physical search.
452:
Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a
644:
for manual disassembling of objects and walls in order to visually check their content. This is the most important, most laborious, least glamorous and hence most neglected part of a check.
1396:
476:
Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect, though there are a number of options for detecting such bugs.
1609:
456:(RF) receiver. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively. Counter-measures like
1160:
143:. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is the process of detecting surveillance devices. It can also include
1406:
664:
Many companies create the hardware and software necessary to engage in modern countersurveillance including
Kestrel TSCM, SignalHound, 3dB Labs, Arcale, and many others.
676:
authorized a program to search telephone and internet usage for suspicious activities. This program searches for and collects meta-data of
Canadians across the country.
940:
660:
Electromagnetic pulse generators and directed energy uses high voltage and high current surges to temporarily disrupt or permanently disable electronic equipment.
1539:
1203:
1086:
1186:
1153:
1602:
1243:
376:
632:
to help find hot spots and areas higher in temperature than the ambient area temperature. Finds heat generated from active electronic components.
1431:
1401:
1146:
982:
704:
927:
1584:
435:
huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.
1233:
757:
53:
767:
423:
218:
197:
that the sweeper will not be alerted to the surveillance. Also, some devices have no active parts, such as the Great Seal given to the
699:
runs a campaign called #UnfollowMe that "calls on governments to ban mass surveillance and unlawful intelligence sharing", inspired by
1177:
236:
1650:
1041:
838:
752:
119:
100:
1534:
1526:
198:
72:
1544:
1475:
1300:
1215:
762:
57:
857:, presented by Daniel Wietzner, Director MIT Computer Science and Artificial Intelligence Laboratory, uploaded July 16, 2013
79:
1635:
1169:
217:
countermeasures have emerged to prevent cyber-intrusion, which is the unauthorized act of spying, snooping, and stealing
1630:
247:
1592:
787:
607:
86:
416:
1100:
867:
772:
635:
339:
178:
68:
1507:
1238:
583:
396:
292:
Leaving the area without being seen or followed e.g. getting "lost in the crowd" so that followers lose contact
256:
244:
202:
1559:
1549:
1497:
1228:
777:
722:
404:
174:
144:
46:
1574:
1512:
1492:
1441:
1198:
623:
320:
253:
Cyber crook who captured nude photos of Miss Teen USA 2013 by infiltrating through the webcam in her home.
1008:
1640:
1461:
793:
696:
488:
1057:
426:
defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical
17:
1564:
1502:
1388:
1344:
1329:
1278:
1223:
803:
650:
to inspect small or inaccessible spaces, such as wall spaces, HVAC components, vehicle crevices, etc.
500:
986:
1597:
1471:
1288:
902:
747:
269:
140:
155:(inverse surveillance), as the latter does not necessarily aim to prevent or reduce surveillance.
1645:
1569:
1554:
1446:
1421:
1359:
1310:
1295:
457:
93:
562:
Broadband receivers to detect radiating hostile radio frequency transmissions in the near field.
1411:
1037:
834:
808:
717:
619:
579:
1466:
1416:
798:
484:
334:
1354:
1283:
684:
There are minimal anti-surveillance movements specifically targeted to Canada at present.
575:
571:
461:
453:
880:
638:(TDR) for testing the integrity of copper telephone lines and other communication cables.
568:
one of the most important tools to have beside a ladder for providing a competent sweep.
1451:
1271:
893:
700:
507:
480:
316:
279:
240:
1036:(1993 ed.). Aspen, Colorado: ESI Education Development Corporation. p. 147.
527:
311:
Another strategy is to utilize a room for safe conversations with these requirements:
1624:
1369:
1349:
1334:
947:
915:
Taken together, the revelations have brought to light a global surveillance system...
737:
324:
152:
960:
1456:
1374:
1364:
1305:
673:
629:
613:
427:
400:
343:
147:, visual surveillance devices, and countersurveillance software to thwart unwanted
136:
898:"Edward Snowden, after months of NSA revelations, says his mission's accomplished"
598:
Lens detectors to detect the lenses of wired or wireless concealed covert cameras.
286:
Evasion: avoiding risky locations, being discreet or circumspect, using code words
228:
Popular interest in countersurveillance has been growing given media coverage of
1266:
496:
35:
1339:
854:
782:
647:
601:
565:
558:
Technology most commonly used for a bug sweep includes but is not limited to:
222:
182:
148:
1320:
1315:
1261:
1253:
742:
727:
1138:
1324:
928:"New Miss Teen USA claims she was the victim of an online extortion plot"
829:
Walsh, James P. (2019). "Countersurveillance". In Deflem, Mathieu (ed.).
626:
for more advanced analysis of threatening and non threatening RF signals.
610:(NLJD) to detect components associated with hidden eavesdropping devices.
492:
431:
electronic, and physical examination in and about the surveyed facility.
214:
190:
186:
135:
refers to measures that are usually undertaken by the public to prevent
732:
349:
No or little electronic equipment which must be sealed after being used
229:
1118:
881:"Information Security Expert to Host Seminar on Counter Surveillance"
412:
330:
703:
leaking thousands of NSA documents that revealed information about
855:"The Family of Technologies That Could Change The Privacy Dynamic"
654:
592:
408:
604:
for general measurements of power supplies and device components.
641:
259:
program baby monitor hacked in the bedroom of a
Houston toddler.
1142:
522:
407:-sweeping or electronic countersurveillance. It is related to
29:
1079:"Data-collection program got green light from MacKay in 2011"
355:
Minimal furniture, preferably made of transparent materials
1610:
Counterintelligence and counter-terrorism organizations
539:
1101:"Confirmed: Canada Has NSA-Style Surveillance Program"
657:
machine for checking the inside of objects and walls.
853:
289:
Being situation-aware ("looking over your shoulder")
1583:
1525:
1485:
1430:
1387:
1252:
1214:
1185:
1176:
985:[Eavesdropping] (in German). Archived from
479:Very sensitive equipment could be used to look for
358:
Prohibition of introduction of electronic equipment
189:, or they may be built from circuit designs on the
60:. Unsourced material may be challenged and removed.
692:International movements currently active In Canada
221:or other proprietary assets (e.g. images) through
491:; however, if the place being monitored has many
1058:"SCEPTRE Signal Processing Software – 3dB Labs"
833:. John Wiley & Sons Ltd. pp. 374–388.
790:, the U.S. government's TSCM training facility
1154:
8:
1009:"MSA Technical Surveillance Countermeasures"
27:Measures undertaken to prevent surveillance
1191:
1182:
1161:
1147:
1139:
487:emitted by the computerized technology in
963:[Preventive measures] (in German)
377:List of counterintelligence organizations
120:Learn how and when to remove this message
352:Few cables that can be easily controlled
1575:Scientific & Technical intelligence
941:"Baby monitor hacked in toddler's room"
821:
506:Another method is using very sensitive
393:technical surveillance counter-measures
333:or windows that cannot be reached by a
164:Technical surveillance counter-measures
18:Technical surveillance counter-measures
586:for signals that should not be there.
346:which covers doors, windows and walls
7:
1397:By alliances, nations and industries
758:Common Vulnerabilities and Exposures
472:Devices that do not emit radio waves
58:adding citations to reliable sources
870:, New York Magazine, July 29, 2013.
768:Personally identifiable information
707:This campaign is active worldwide.
424:United States Department of Defense
219:personally identifiable information
237:2013 mass surveillance disclosures
201:to Moscow which hid a device (the
25:
753:Cyber security and countermeasure
595:and broadband detection equipment
526:
369:Countersurveillance by countries
34:
1545:Words of estimative probability
1407:Operational platforms by nation
464:make detection more difficult.
45:needs additional citations for
1034:The Executive Protection Bible
831:The Handbook of Social Control
763:Privacy-enhancing technologies
213:Amidst concerns over privacy,
1:
1119:"Welcome | Transparent Lives"
705:mass surveillance in the U.S.
616:for visualisation of signals.
342:through the realization of a
1077:Freeze, Colin (2013-06-10).
483:, or for the characteristic
1593:Intelligence cycle security
1032:Braunig, Martha J. (1993).
939:ABC-News Boston (WCVB-TV).
868:"The Surveillance Free Day"
788:Interagency Training Center
608:Nonlinear junction detector
1667:
672:In 2011, Defence Minister
515:electromagnetic spectrum.
417:electronic countermeasures
307:Structural countermeasures
295:Hiding in secure locations
267:
169:Electronic countermeasures
1194:
879:The Wall Street Journal.
773:Countermeasure (computer)
636:Time-domain reflectometer
340:Electromagnetic shielding
298:Concealing one's identity
179:electromagnetic radiation
1651:Covert listening devices
1123:surveillanceincanada.org
584:electromagnetic spectrum
403:denoting the process of
209:Software countermeasures
145:covert listening devices
1560:Intelligence assessment
1550:All-source intelligence
1170:Intelligence management
778:Covert listening device
723:Communications security
589:GSM detection equipment
1244:Operational techniques
1199:Special reconnaissance
624:vector signal analyzer
489:digital tape recorders
926:New York Daily News.
896:(December 24, 2013).
794:Military intelligence
697:Amnesty International
499:, or other pieces of
264:Human countermeasures
69:"Countersurveillance"
1636:Espionage techniques
1565:Medical intelligence
1535:Competing hypotheses
1345:Industrial espionage
1330:Denial and deception
961:"Präventivmaßnahmen"
804:Security engineering
501:electrical equipment
54:improve this article
1631:Counterintelligence
1598:Counterintelligence
1513:Technical (TECHINT)
1508:Open-source (OSINT)
1498:Geospatial (GEOINT)
1472:Casualty estimation
1105:The Huffington Post
1013:www.msasecurity.net
903:The Washington Post
748:Cut-out (espionage)
399:Federal government
364:Regular inspections
270:Counterintelligence
141:covert surveillance
133:Countersurveillance
1570:Military geography
1555:Basic intelligence
1493:Financial (FININT)
1434:signature (MASINT)
1360:One-way voice link
1296:Concealment device
1083:The Globe and Mail
989:on 20 October 2020
930:, August 14, 2013.
680:Canadian Movements
538:. You can help by
458:burst transmission
395:) is the original
361:Acoustic isolation
177:emit some form of
1618:
1617:
1521:
1520:
1412:Direction finding
1402:In modern history
1383:
1382:
809:Telephone tapping
718:Computer security
620:Spectrum analyzer
582:for checking the
572:Frequency scanner
556:
555:
448:Radio frequencies
130:
129:
122:
104:
16:(Redirected from
1658:
1417:Traffic analysis
1389:Signals (SIGINT)
1224:Asset recruiting
1192:
1183:
1163:
1156:
1149:
1140:
1133:
1132:
1130:
1129:
1115:
1109:
1108:
1097:
1091:
1090:
1085:. Archived from
1074:
1068:
1067:
1065:
1064:
1054:
1048:
1047:
1029:
1023:
1022:
1020:
1019:
1005:
999:
998:
996:
994:
979:
973:
972:
970:
968:
957:
951:
937:
931:
924:
918:
917:
912:
910:
890:
884:
877:
871:
864:
858:
851:
845:
844:
826:
799:Secure telephone
574:with a range of
551:
548:
530:
523:
485:electrical noise
335:laser microphone
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
1666:
1665:
1661:
1660:
1659:
1657:
1656:
1655:
1621:
1620:
1619:
1614:
1579:
1517:
1503:Imagery (IMINT)
1481:
1442:Electro-optical
1433:
1432:Measurement and
1426:
1379:
1355:Numbers station
1284:Black operation
1248:
1210:
1172:
1167:
1137:
1136:
1127:
1125:
1117:
1116:
1112:
1107:. 10 June 2013.
1099:
1098:
1094:
1076:
1075:
1071:
1062:
1060:
1056:
1055:
1051:
1044:
1031:
1030:
1026:
1017:
1015:
1007:
1006:
1002:
992:
990:
981:
980:
976:
966:
964:
959:
958:
954:
938:
934:
925:
921:
908:
906:
892:
891:
887:
878:
874:
865:
861:
852:
848:
841:
828:
827:
823:
818:
813:
713:
694:
682:
670:
630:Thermal imagers
552:
546:
543:
536:needs expansion
521:
519:Technology used
508:thermal cameras
481:magnetic fields
474:
462:spread spectrum
454:radio frequency
450:
445:
386:
371:
309:
280:countermeasures
272:
266:
211:
171:
166:
161:
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
1664:
1662:
1654:
1653:
1648:
1643:
1638:
1633:
1623:
1622:
1616:
1615:
1613:
1612:
1607:
1606:
1605:
1595:
1589:
1587:
1581:
1580:
1578:
1577:
1572:
1567:
1562:
1557:
1552:
1547:
1542:
1540:Target-centric
1537:
1531:
1529:
1523:
1522:
1519:
1518:
1516:
1515:
1510:
1505:
1500:
1495:
1489:
1487:
1483:
1482:
1480:
1479:
1469:
1464:
1462:Radiofrequency
1459:
1454:
1449:
1444:
1438:
1436:
1428:
1427:
1425:
1424:
1419:
1414:
1409:
1404:
1399:
1393:
1391:
1385:
1384:
1381:
1380:
1378:
1377:
1372:
1367:
1362:
1357:
1352:
1347:
1342:
1337:
1332:
1327:
1318:
1313:
1308:
1303:
1298:
1293:
1292:
1291:
1281:
1276:
1275:
1274:
1269:
1258:
1256:
1250:
1249:
1247:
1246:
1241:
1236:
1231:
1226:
1220:
1218:
1212:
1211:
1209:
1208:
1207:
1206:
1195:
1189:
1187:Human (HUMINT)
1180:
1174:
1173:
1168:
1166:
1165:
1158:
1151:
1143:
1135:
1134:
1110:
1092:
1089:on 2013-06-30.
1069:
1049:
1042:
1024:
1000:
983:"Lauschabwehr"
974:
952:
946:2013-08-22 at
932:
919:
894:Barton Gellman
885:
872:
866:Roose, Kevin.
859:
846:
839:
820:
819:
817:
814:
812:
811:
806:
801:
796:
791:
785:
780:
775:
770:
765:
760:
755:
750:
745:
740:
735:
730:
725:
720:
714:
712:
709:
701:Edward Snowden
693:
690:
681:
678:
669:
666:
662:
661:
658:
651:
645:
639:
633:
627:
617:
611:
605:
599:
596:
590:
587:
569:
563:
554:
553:
533:
531:
520:
517:
473:
470:
449:
446:
444:
441:
385:
382:
381:
380:
370:
367:
366:
365:
362:
359:
356:
353:
350:
347:
337:
327:
317:access control
308:
305:
300:
299:
296:
293:
290:
287:
268:Main article:
265:
262:
261:
260:
254:
251:
210:
207:
170:
167:
165:
162:
160:
157:
128:
127:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1663:
1652:
1649:
1647:
1644:
1642:
1639:
1637:
1634:
1632:
1629:
1628:
1626:
1611:
1608:
1604:
1603:organizations
1601:
1600:
1599:
1596:
1594:
1591:
1590:
1588:
1586:
1585:Dissemination
1582:
1576:
1573:
1571:
1568:
1566:
1563:
1561:
1558:
1556:
1553:
1551:
1548:
1546:
1543:
1541:
1538:
1536:
1533:
1532:
1530:
1528:
1524:
1514:
1511:
1509:
1506:
1504:
1501:
1499:
1496:
1494:
1491:
1490:
1488:
1484:
1477:
1473:
1470:
1468:
1465:
1463:
1460:
1458:
1455:
1453:
1450:
1448:
1445:
1443:
1440:
1439:
1437:
1435:
1429:
1423:
1420:
1418:
1415:
1413:
1410:
1408:
1405:
1403:
1400:
1398:
1395:
1394:
1392:
1390:
1386:
1376:
1373:
1371:
1370:Steganography
1368:
1366:
1363:
1361:
1358:
1356:
1353:
1351:
1350:Interrogation
1348:
1346:
1343:
1341:
1338:
1336:
1335:Eavesdropping
1333:
1331:
1328:
1326:
1322:
1319:
1317:
1314:
1312:
1309:
1307:
1304:
1302:
1299:
1297:
1294:
1290:
1287:
1286:
1285:
1282:
1280:
1277:
1273:
1270:
1268:
1265:
1264:
1263:
1260:
1259:
1257:
1255:
1251:
1245:
1242:
1240:
1239:Direct action
1237:
1235:
1234:Covert action
1232:
1230:
1227:
1225:
1222:
1221:
1219:
1217:
1213:
1205:
1204:organizations
1202:
1201:
1200:
1197:
1196:
1193:
1190:
1188:
1184:
1181:
1179:
1175:
1171:
1164:
1159:
1157:
1152:
1150:
1145:
1144:
1141:
1124:
1120:
1114:
1111:
1106:
1102:
1096:
1093:
1088:
1084:
1080:
1073:
1070:
1059:
1053:
1050:
1045:
1043:0-9640627-0-4
1039:
1035:
1028:
1025:
1014:
1010:
1004:
1001:
988:
984:
978:
975:
962:
956:
953:
949:
948:archive.today
945:
942:
936:
933:
929:
923:
920:
916:
905:
904:
899:
895:
889:
886:
883:July 10, 2013
882:
876:
873:
869:
863:
860:
856:
850:
847:
842:
840:9781119372356
836:
832:
825:
822:
815:
810:
807:
805:
802:
800:
797:
795:
792:
789:
786:
784:
781:
779:
776:
774:
771:
769:
766:
764:
761:
759:
756:
754:
751:
749:
746:
744:
741:
739:
738:Sousveillance
736:
734:
731:
729:
726:
724:
721:
719:
716:
715:
710:
708:
706:
702:
698:
691:
689:
685:
679:
677:
675:
667:
665:
659:
656:
652:
649:
646:
643:
640:
637:
634:
631:
628:
625:
621:
618:
615:
612:
609:
606:
603:
600:
597:
594:
591:
588:
585:
581:
577:
573:
570:
567:
564:
561:
560:
559:
550:
541:
537:
534:This section
532:
529:
525:
524:
518:
516:
512:
509:
504:
502:
498:
494:
490:
486:
482:
477:
471:
469:
465:
463:
459:
455:
447:
442:
440:
436:
432:
429:
425:
420:
418:
414:
410:
406:
402:
398:
397:United States
394:
390:
384:United States
383:
379:
378:
373:
372:
368:
363:
360:
357:
354:
351:
348:
345:
341:
338:
336:
332:
328:
326:
325:burglar alarm
322:
318:
314:
313:
312:
306:
304:
297:
294:
291:
288:
285:
284:
283:
281:
276:
271:
263:
258:
255:
252:
249:
246:
242:
238:
235:
234:
233:
232:violations:
231:
226:
224:
220:
216:
208:
206:
204:
200:
199:US Ambassador
194:
192:
188:
184:
180:
176:
168:
163:
158:
156:
154:
153:sousveillance
150:
146:
142:
138:
134:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
1641:Surveillance
1375:Surveillance
1365:Resident spy
1306:Cryptography
1126:. Retrieved
1122:
1113:
1104:
1095:
1087:the original
1082:
1072:
1061:. Retrieved
1052:
1033:
1027:
1016:. Retrieved
1012:
1003:
991:. Retrieved
987:the original
977:
965:. Retrieved
955:
950:Aug 14, 2013
935:
922:
914:
909:December 25,
907:. Retrieved
901:
888:
875:
862:
849:
830:
824:
695:
686:
683:
674:Peter MacKay
671:
663:
614:Oscilloscope
557:
544:
540:adding to it
535:
513:
505:
497:photocopiers
478:
475:
466:
451:
437:
433:
428:surveillance
421:
401:abbreviation
392:
388:
387:
374:
344:Faraday cage
310:
301:
277:
273:
227:
212:
195:
172:
139:, including
137:surveillance
132:
131:
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
1447:Geophysical
1229:Cell system
1216:Clandestine
993:6 September
967:6 September
648:Videoscopes
602:Multimeters
468:detection.
443:Methodology
329:Absence of
183:radio waves
110:August 2013
1625:Categories
1476:earthquake
1340:False flag
1178:Collection
1128:2015-11-26
1063:2022-11-01
1018:2023-10-13
816:References
783:Encryption
566:Flashlight
223:cyberspace
181:, usually
149:cybercrime
80:newspapers
1646:Espionage
1467:Materials
1321:Defection
1316:Dead drop
1289:black bag
1254:Espionage
743:Dead drop
728:Espionage
653:Portable
547:June 2008
493:computers
282:include:
187:magazines
1527:Analysis
1325:Turncoat
1272:handling
944:Archived
711:See also
576:antennas
257:ABC News
215:software
191:Internet
1474: (
1452:Nuclear
1422:TEMPEST
733:Privacy
580:filters
419:(ECM).
331:windows
315:Strict
241:Snowden
230:privacy
94:scholar
1311:Cutout
1262:Agents
1040:
837:
668:Canada
413:SIGINT
278:Human
96:
89:
82:
75:
67:
1486:Other
1457:Radar
1301:Cover
1279:Asset
1267:field
655:x-ray
642:Tools
409:ELINT
321:locks
319:with
248:PRISM
203:Thing
173:Most
159:Types
101:JSTOR
87:books
1038:ISBN
995:2020
969:2020
911:2013
835:ISBN
622:and
593:WiFi
578:and
460:and
422:The
415:and
389:TSCM
375:See
323:and
175:bugs
73:news
542:.
405:bug
245:NSA
205:).
56:by
1627::
1323:/
1121:.
1103:.
1081:.
1011:.
913:.
900:.
495:,
411:,
250:).
225:.
193:.
1478:)
1162:e
1155:t
1148:v
1131:.
1066:.
1046:.
1021:.
997:.
971:.
843:.
549:)
545:(
391:(
243:/
239:(
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.