517:
25:
140:, such as accessing computing and mobile devices for various nefarious reasons (e.g. theft of financial, personal or corporate data). More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance is different from
185:
Sweeping is not foolproof. Advanced bugs can be remotely operated to switch on and off, and some may even rapidly switch frequencies according to a predetermined pattern in order to make location with sweepers more difficult. A bug that has run out of power may not show up during a sweep, which means
456:
The timing of detection surveys and location scans is critical to success, and varies with the type of location being scanned. For permanent facilities, scans and surveys must take place during working hours to detect remotely switchable devices that are turned off during non-working hours to defeat
423:
However, this definition lacks some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow
419:
devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual,
503:
A method does exist to find hidden recorders, as these typically use a well known frequency for the clock which can never be totally shielded. A combination of existing techniques and resonance sweeps can often pick up even a defunct or "dead" bug in this way by measuring recent changes in the
427:
Technical
Surveillance Countermeasures (TSCM) can best be defined as The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses.
174:. The standard counter-measure for bugs is, therefore, to "sweep" for them with a receiver, looking for the radio emissions. Professional sweeping devices are very expensive. Low-tech sweeping devices are available through amateur electrical
676:
Transparent Lives is a prominent
Canadian organization that aims to "demonstrate dramatically just how visible we have all become to myriad organizations and what this means—for better or for worse—for how we conduct our everyday lives."
886:
291:
Such activities make it harder to track surveillance subjects. Following steady, easy-to-predict schedules before employing aforementioned countermeasures may make the surveillance detail complacent and thus easier to lose.
263:
Most surveillance, and most countersurveillance, involves human methods rather than electronic methods since people are generally more vulnerable and more capable of reacting creatively to surveillance situations.
499:
to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling. The device is found by locating a hot spot the device generates that can be detected by the thermal camera.
932:
1067:
492:
installed, it may become very difficult. Items such as audio recorders can be very difficult to detect using electronic equipment. Most of these items will be discovered through a physical search.
441:
Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a
633:
for manual disassembling of objects and walls in order to visually check their content. This is the most important, most laborious, least glamorous and hence most neglected part of a check.
465:
Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect, though there are a number of options for detecting such bugs.
445:(RF) receiver. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively. Counter-measures like
132:. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is the process of detecting surveillance devices. It can also include
653:
Many companies create the hardware and software necessary to engage in modern countersurveillance including
Kestrel TSCM, SignalHound, 3dB Labs, Arcale, and many others.
665:
authorized a program to search telephone and internet usage for suspicious activities. This program searches for and collects meta-data of
Canadians across the country.
1385:
929:
1598:
649:
Electromagnetic pulse generators and directed energy uses high voltage and high current surges to temporarily disrupt or permanently disable electronic equipment.
1149:
1075:
1395:
621:
to help find hot spots and areas higher in temperature than the ambient area temperature. Finds heat generated from active electronic components.
971:
916:
424:
huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.
1528:
1192:
1175:
1142:
186:
that the sweeper will not be alerted to the surveillance. Also, some devices have no active parts, such as the Great Seal given to the
688:
runs a campaign called #UnfollowMe that "calls on governments to ban mass surveillance and unlawful intelligence sharing", inspired by
1591:
1232:
365:
89:
61:
1420:
1390:
1135:
693:
1573:
846:, presented by Daniel Wietzner, Director MIT Computer Science and Artificial Intelligence Laboratory, uploaded July 16, 2013
1222:
746:
68:
42:
756:
412:
207:
206:
countermeasures have emerged to prevent cyber-intrusion, which is the unauthorized act of spying, snooping, and stealing
1166:
225:
1639:
1030:
827:
741:
108:
75:
1523:
1515:
187:
1089:
1533:
856:
57:
1464:
1289:
1204:
751:
281:
Leaving the area without being seen or followed e.g. getting "lost in the crowd" so that followers lose contact
46:
1624:
1158:
1619:
236:
528:
242:
Cyber crook who captured nude photos of Miss Teen USA 2013 by infiltrating through the webcam in her home.
1581:
997:
776:
596:
1046:
415:
defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical
405:
761:
639:
to inspect small or inaccessible spaces, such as wall spaces, HVAC components, vehicle crevices, etc.
624:
328:
167:
975:
1496:
1227:
572:
385:
245:
233:
191:
144:(inverse surveillance), as the latter does not necessarily aim to prevent or reduce surveillance.
1548:
1538:
1486:
1217:
766:
711:
393:
163:
133:
82:
35:
551:
Broadband receivers to detect radiating hostile radio frequency transmissions in the near field.
1563:
1501:
1481:
1430:
1187:
612:
309:
1629:
1450:
782:
685:
477:
1553:
1491:
1377:
1333:
1318:
1267:
1212:
792:
489:
673:
There are minimal anti-surveillance movements specifically targeted to Canada at present.
8:
1586:
1460:
1277:
1250:
891:
869:
736:
627:(TDR) for testing the integrity of copper telephone lines and other communication cables.
258:
129:
557:
one of the most important tools to have beside a ladder for providing a competent sweep.
1634:
1558:
1543:
1435:
1410:
1348:
1299:
1284:
446:
1025:(1993 ed.). Aspen, Colorado: ESI Education Development Corporation. p. 147.
300:
Another strategy is to utilize a room for safe conversations with these requirements:
1400:
1026:
904:
Taken together, the revelations have brought to light a global surveillance system...
823:
797:
706:
608:
568:
949:
1455:
1405:
787:
473:
323:
136:, visual surveillance devices, and countersurveillance software to thwart unwanted
887:"Edward Snowden, after months of NSA revelations, says his mission's accomplished"
587:
Lens detectors to detect the lenses of wired or wireless concealed covert cameras.
275:
Evasion: avoiding risky locations, being discreet or circumspect, using code words
1343:
1272:
564:
560:
450:
442:
217:
Popular interest in countersurveillance has been growing given media coverage of
1440:
1260:
882:
689:
496:
469:
305:
268:
229:
843:
547:
Technology most commonly used for a bug sweep includes but is not limited to:
1613:
1358:
1338:
1323:
936:
726:
313:
141:
1445:
1363:
1353:
1294:
662:
618:
602:
416:
389:
332:
125:
1127:
1255:
917:"New Miss Teen USA claims she was the victim of an online extortion plot"
818:
Walsh, James P. (2019). "Countersurveillance". In Deflem, Mathieu (ed.).
615:
for more advanced analysis of threatening and non threatening RF signals.
599:(NLJD) to detect components associated with hidden eavesdropping devices.
485:
420:
electronic, and physical examination in and about the surveyed facility.
516:
124:
refers to measures that are usually undertaken by the public to prevent
1328:
771:
636:
590:
554:
338:
No or little electronic equipment which must be sealed after being used
211:
171:
137:
1107:
1309:
1304:
1242:
870:"Information Security Expert to Host Seminar on Counter Surveillance"
731:
716:
680:
24:
1313:
692:
leaking thousands of NSA documents that revealed information about
481:
203:
179:
175:
844:"The Family of Technologies That Could Change The Privacy Dynamic"
721:
593:
for general measurements of power supplies and device components.
218:
248:
program baby monitor hacked in the bedroom of a
Houston toddler.
401:
319:
396:-sweeping or electronic countersurveillance. It is related to
1068:"Data-collection program got green light from MacKay in 2011"
643:
581:
397:
630:
344:
Minimal furniture, preferably made of transparent materials
152:
1599:
Counterintelligence and counter-terrorism organizations
460:
1090:"Confirmed: Canada Has NSA-Style Surveillance Program"
646:
machine for checking the inside of objects and walls.
842:
278:
Being situation-aware ("looking over your shoulder")
974:[Eavesdropping] (in German). Archived from
468:Very sensitive equipment could be used to look for
357:
347:
Prohibition of introduction of electronic equipment
178:, or they may be built from circuit designs on the
49:. Unsourced material may be challenged and removed.
681:International movements currently active In Canada
210:or other proprietary assets (e.g. images) through
480:; however, if the place being monitored has many
1611:
1047:"SCEPTRE Signal Processing Software – 3dB Labs"
822:. John Wiley & Sons Ltd. pp. 374–388.
881:
779:, the U.S. government's TSCM training facility
1143:
295:
157:
998:"MSA Technical Surveillance Countermeasures"
1157:
197:
16:Measures undertaken to prevent surveillance
1150:
1136:
476:emitted by the computerized technology in
952:[Preventive measures] (in German)
366:List of counterintelligence organizations
109:Learn how and when to remove this message
341:Few cables that can be easily controlled
252:
1564:Scientific & Technical intelligence
1020:
930:"Baby monitor hacked in toddler's room"
495:Another method is using very sensitive
382:technical surveillance counter-measures
322:or windows that cannot be reached by a
153:Technical surveillance counter-measures
1612:
1065:
1131:
817:
668:
575:for signals that should not be there.
335:which covers doors, windows and walls
1386:By alliances, nations and industries
747:Common Vulnerabilities and Exposures
511:
461:Devices that do not emit radio waves
436:
47:adding citations to reliable sources
18:
859:, New York Magazine, July 29, 2013.
757:Personally identifiable information
696:This campaign is active worldwide.
413:United States Department of Defense
208:personally identifiable information
13:
507:
226:2013 mass surveillance disclosures
190:to Moscow which hid a device (the
14:
1651:
742:Cyber security and countermeasure
584:and broadband detection equipment
515:
372:
358:Countersurveillance by countries
23:
1534:Words of estimative probability
1396:Operational platforms by nation
1100:
1082:
1059:
1039:
1014:
990:
453:make detection more difficult.
34:needs additional citations for
1023:The Executive Protection Bible
964:
942:
922:
909:
875:
862:
849:
836:
820:The Handbook of Social Control
811:
752:Privacy-enhancing technologies
431:
202:Amidst concerns over privacy,
1:
1108:"Welcome | Transparent Lives"
804:
694:mass surveillance in the U.S.
605:for visualisation of signals.
331:through the realization of a
1066:Freeze, Colin (2013-06-10).
472:, or for the characteristic
7:
1582:Intelligence cycle security
1021:Braunig, Martha J. (1993).
928:ABC-News Boston (WCVB-TV).
857:"The Surveillance Free Day"
777:Interagency Training Center
699:
597:Nonlinear junction detector
10:
1656:
661:In 2011, Defence Minister
504:electromagnetic spectrum.
406:electronic countermeasures
296:Structural countermeasures
284:Hiding in secure locations
256:
158:Electronic countermeasures
1572:
1514:
1474:
1419:
1376:
1241:
1203:
1183:
1174:
1165:
868:The Wall Street Journal.
762:Countermeasure (computer)
656:
625:Time-domain reflectometer
329:Electromagnetic shielding
287:Concealing one's identity
168:electromagnetic radiation
1640:Covert listening devices
1112:surveillanceincanada.org
573:electromagnetic spectrum
392:denoting the process of
198:Software countermeasures
147:
134:covert listening devices
1549:Intelligence assessment
1539:All-source intelligence
1159:Intelligence management
767:Covert listening device
712:Communications security
578:GSM detection equipment
1233:Operational techniques
1188:Special reconnaissance
613:vector signal analyzer
478:digital tape recorders
915:New York Daily News.
885:(December 24, 2013).
783:Military intelligence
686:Amnesty International
488:, or other pieces of
253:Human countermeasures
58:"Countersurveillance"
1625:Espionage techniques
1554:Medical intelligence
1524:Competing hypotheses
1334:Industrial espionage
1319:Denial and deception
950:"Präventivmaßnahmen"
793:Security engineering
490:electrical equipment
43:improve this article
1620:Counterintelligence
1587:Counterintelligence
1502:Technical (TECHINT)
1497:Open-source (OSINT)
1487:Geospatial (GEOINT)
1461:Casualty estimation
1094:The Huffington Post
1002:www.msasecurity.net
892:The Washington Post
737:Cut-out (espionage)
388:Federal government
353:Regular inspections
259:Counterintelligence
130:covert surveillance
122:Countersurveillance
1559:Military geography
1544:Basic intelligence
1482:Financial (FININT)
1423:signature (MASINT)
1349:One-way voice link
1285:Concealment device
1072:The Globe and Mail
978:on 20 October 2020
919:, August 14, 2013.
669:Canadian Movements
527:. You can help by
447:burst transmission
384:) is the original
350:Acoustic isolation
166:emit some form of
1607:
1606:
1510:
1509:
1401:Direction finding
1391:In modern history
1372:
1371:
798:Telephone tapping
707:Computer security
609:Spectrum analyzer
571:for checking the
561:Frequency scanner
545:
544:
437:Radio frequencies
119:
118:
111:
93:
1647:
1406:Traffic analysis
1378:Signals (SIGINT)
1213:Asset recruiting
1181:
1180:
1172:
1171:
1152:
1145:
1138:
1129:
1128:
1122:
1121:
1119:
1118:
1104:
1098:
1097:
1086:
1080:
1079:
1074:. Archived from
1063:
1057:
1056:
1054:
1053:
1043:
1037:
1036:
1018:
1012:
1011:
1009:
1008:
994:
988:
987:
985:
983:
968:
962:
961:
959:
957:
946:
940:
926:
920:
913:
907:
906:
901:
899:
879:
873:
866:
860:
853:
847:
840:
834:
833:
815:
788:Secure telephone
563:with a range of
540:
537:
519:
512:
474:electrical noise
324:laser microphone
114:
107:
103:
100:
94:
92:
51:
27:
19:
1655:
1654:
1650:
1649:
1648:
1646:
1645:
1644:
1610:
1609:
1608:
1603:
1568:
1506:
1492:Imagery (IMINT)
1470:
1431:Electro-optical
1422:
1421:Measurement and
1415:
1368:
1344:Numbers station
1273:Black operation
1237:
1199:
1161:
1156:
1126:
1125:
1116:
1114:
1106:
1105:
1101:
1096:. 10 June 2013.
1088:
1087:
1083:
1064:
1060:
1051:
1049:
1045:
1044:
1040:
1033:
1019:
1015:
1006:
1004:
996:
995:
991:
981:
979:
970:
969:
965:
955:
953:
948:
947:
943:
927:
923:
914:
910:
897:
895:
880:
876:
867:
863:
854:
850:
841:
837:
830:
816:
812:
807:
802:
702:
683:
671:
659:
619:Thermal imagers
541:
535:
532:
525:needs expansion
510:
508:Technology used
497:thermal cameras
470:magnetic fields
463:
451:spread spectrum
443:radio frequency
439:
434:
375:
360:
298:
269:countermeasures
261:
255:
200:
160:
155:
150:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
1653:
1643:
1642:
1637:
1632:
1627:
1622:
1605:
1604:
1602:
1601:
1596:
1595:
1594:
1584:
1578:
1576:
1570:
1569:
1567:
1566:
1561:
1556:
1551:
1546:
1541:
1536:
1531:
1529:Target-centric
1526:
1520:
1518:
1512:
1511:
1508:
1507:
1505:
1504:
1499:
1494:
1489:
1484:
1478:
1476:
1472:
1471:
1469:
1468:
1458:
1453:
1451:Radiofrequency
1448:
1443:
1438:
1433:
1427:
1425:
1417:
1416:
1414:
1413:
1408:
1403:
1398:
1393:
1388:
1382:
1380:
1374:
1373:
1370:
1369:
1367:
1366:
1361:
1356:
1351:
1346:
1341:
1336:
1331:
1326:
1321:
1316:
1307:
1302:
1297:
1292:
1287:
1282:
1281:
1280:
1270:
1265:
1264:
1263:
1258:
1247:
1245:
1239:
1238:
1236:
1235:
1230:
1225:
1220:
1215:
1209:
1207:
1201:
1200:
1198:
1197:
1196:
1195:
1184:
1178:
1176:Human (HUMINT)
1169:
1163:
1162:
1155:
1154:
1147:
1140:
1132:
1124:
1123:
1099:
1081:
1078:on 2013-06-30.
1058:
1038:
1031:
1013:
989:
972:"Lauschabwehr"
963:
941:
935:2013-08-22 at
921:
908:
883:Barton Gellman
874:
861:
855:Roose, Kevin.
848:
835:
828:
809:
808:
806:
803:
801:
800:
795:
790:
785:
780:
774:
769:
764:
759:
754:
749:
744:
739:
734:
729:
724:
719:
714:
709:
703:
701:
698:
690:Edward Snowden
682:
679:
670:
667:
658:
655:
651:
650:
647:
640:
634:
628:
622:
616:
606:
600:
594:
588:
585:
579:
576:
558:
552:
543:
542:
522:
520:
509:
506:
462:
459:
438:
435:
433:
430:
374:
371:
370:
369:
359:
356:
355:
354:
351:
348:
345:
342:
339:
336:
326:
316:
306:access control
297:
294:
289:
288:
285:
282:
279:
276:
257:Main article:
254:
251:
250:
249:
243:
240:
199:
196:
159:
156:
154:
151:
149:
146:
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
1652:
1641:
1638:
1636:
1633:
1631:
1628:
1626:
1623:
1621:
1618:
1617:
1615:
1600:
1597:
1593:
1592:organizations
1590:
1589:
1588:
1585:
1583:
1580:
1579:
1577:
1575:
1574:Dissemination
1571:
1565:
1562:
1560:
1557:
1555:
1552:
1550:
1547:
1545:
1542:
1540:
1537:
1535:
1532:
1530:
1527:
1525:
1522:
1521:
1519:
1517:
1513:
1503:
1500:
1498:
1495:
1493:
1490:
1488:
1485:
1483:
1480:
1479:
1477:
1473:
1466:
1462:
1459:
1457:
1454:
1452:
1449:
1447:
1444:
1442:
1439:
1437:
1434:
1432:
1429:
1428:
1426:
1424:
1418:
1412:
1409:
1407:
1404:
1402:
1399:
1397:
1394:
1392:
1389:
1387:
1384:
1383:
1381:
1379:
1375:
1365:
1362:
1360:
1359:Steganography
1357:
1355:
1352:
1350:
1347:
1345:
1342:
1340:
1339:Interrogation
1337:
1335:
1332:
1330:
1327:
1325:
1324:Eavesdropping
1322:
1320:
1317:
1315:
1311:
1308:
1306:
1303:
1301:
1298:
1296:
1293:
1291:
1288:
1286:
1283:
1279:
1276:
1275:
1274:
1271:
1269:
1266:
1262:
1259:
1257:
1254:
1253:
1252:
1249:
1248:
1246:
1244:
1240:
1234:
1231:
1229:
1228:Direct action
1226:
1224:
1223:Covert action
1221:
1219:
1216:
1214:
1211:
1210:
1208:
1206:
1202:
1194:
1193:organizations
1191:
1190:
1189:
1186:
1185:
1182:
1179:
1177:
1173:
1170:
1168:
1164:
1160:
1153:
1148:
1146:
1141:
1139:
1134:
1133:
1130:
1113:
1109:
1103:
1095:
1091:
1085:
1077:
1073:
1069:
1062:
1048:
1042:
1034:
1032:0-9640627-0-4
1028:
1024:
1017:
1003:
999:
993:
977:
973:
967:
951:
945:
938:
937:archive.today
934:
931:
925:
918:
912:
905:
894:
893:
888:
884:
878:
872:July 10, 2013
871:
865:
858:
852:
845:
839:
831:
829:9781119372356
825:
821:
814:
810:
799:
796:
794:
791:
789:
786:
784:
781:
778:
775:
773:
770:
768:
765:
763:
760:
758:
755:
753:
750:
748:
745:
743:
740:
738:
735:
733:
730:
728:
727:Sousveillance
725:
723:
720:
718:
715:
713:
710:
708:
705:
704:
697:
695:
691:
687:
678:
674:
666:
664:
654:
648:
645:
641:
638:
635:
632:
629:
626:
623:
620:
617:
614:
610:
607:
604:
601:
598:
595:
592:
589:
586:
583:
580:
577:
574:
570:
566:
562:
559:
556:
553:
550:
549:
548:
539:
530:
526:
523:This section
521:
518:
514:
513:
505:
501:
498:
493:
491:
487:
483:
479:
475:
471:
466:
458:
454:
452:
448:
444:
429:
425:
421:
418:
414:
409:
407:
403:
399:
395:
391:
387:
386:United States
383:
379:
373:United States
368:
367:
362:
361:
352:
349:
346:
343:
340:
337:
334:
330:
327:
325:
321:
317:
315:
314:burglar alarm
311:
307:
303:
302:
301:
293:
286:
283:
280:
277:
274:
273:
272:
270:
265:
260:
247:
244:
241:
238:
235:
231:
227:
224:
223:
222:
221:violations:
220:
215:
213:
209:
205:
195:
193:
189:
188:US Ambassador
183:
181:
177:
173:
169:
165:
145:
143:
142:sousveillance
139:
135:
131:
127:
123:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
1630:Surveillance
1364:Surveillance
1354:Resident spy
1295:Cryptography
1115:. Retrieved
1111:
1102:
1093:
1084:
1076:the original
1071:
1061:
1050:. Retrieved
1041:
1022:
1016:
1005:. Retrieved
1001:
992:
980:. Retrieved
976:the original
966:
954:. Retrieved
944:
939:Aug 14, 2013
924:
911:
903:
898:December 25,
896:. Retrieved
890:
877:
864:
851:
838:
819:
813:
684:
675:
672:
663:Peter MacKay
660:
652:
603:Oscilloscope
546:
533:
529:adding to it
524:
502:
494:
486:photocopiers
467:
464:
455:
440:
426:
422:
417:surveillance
410:
390:abbreviation
381:
377:
376:
363:
333:Faraday cage
299:
290:
266:
262:
216:
201:
184:
161:
128:, including
126:surveillance
121:
120:
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
1436:Geophysical
1218:Cell system
1205:Clandestine
982:6 September
956:6 September
637:Videoscopes
591:Multimeters
457:detection.
432:Methodology
318:Absence of
172:radio waves
99:August 2013
1614:Categories
1465:earthquake
1329:False flag
1167:Collection
1117:2015-11-26
1052:2022-11-01
1007:2023-10-13
805:References
772:Encryption
555:Flashlight
212:cyberspace
170:, usually
138:cybercrime
69:newspapers
1635:Espionage
1456:Materials
1310:Defection
1305:Dead drop
1278:black bag
1243:Espionage
732:Dead drop
717:Espionage
642:Portable
536:June 2008
482:computers
271:include:
176:magazines
1516:Analysis
1314:Turncoat
1261:handling
933:Archived
700:See also
565:antennas
246:ABC News
204:software
180:Internet
1463: (
1441:Nuclear
1411:TEMPEST
722:Privacy
569:filters
408:(ECM).
320:windows
304:Strict
230:Snowden
219:privacy
83:scholar
1300:Cutout
1251:Agents
1029:
826:
657:Canada
402:SIGINT
267:Human
85:
78:
71:
64:
56:
1475:Other
1446:Radar
1290:Cover
1268:Asset
1256:field
644:x-ray
631:Tools
398:ELINT
310:locks
308:with
237:PRISM
192:Thing
162:Most
148:Types
90:JSTOR
76:books
1027:ISBN
984:2020
958:2020
900:2013
824:ISBN
611:and
582:WiFi
567:and
449:and
411:The
404:and
378:TSCM
364:See
312:and
164:bugs
62:news
531:.
394:bug
234:NSA
194:).
45:by
1616::
1312:/
1110:.
1092:.
1070:.
1000:.
902:.
889:.
484:,
400:,
239:).
214:.
182:.
1467:)
1151:e
1144:t
1137:v
1120:.
1055:.
1035:.
1010:.
986:.
960:.
832:.
538:)
534:(
380:(
232:/
228:(
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.