Vulnerabilities in Siveillance Control