Known Vulnerabilities in Siveillance Control