Vulnerabilities in Siveillance Identity