SlideShare ist ein Scribd-Unternehmen logo
1 von 86
Electronic Countermeasures What is involved in a TSCM Sweep? Recommendations for Stake Holders
Minimum Computer Security Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Viruses and Trojan Horses ,[object Object],[object Object],[object Object],[object Object]
Employee Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Destroying Media ,[object Object],[object Object],[object Object]
Personal Equipment Onsite ,[object Object],[object Object],[object Object],[object Object]
Suggestions – Policy is Important! ,[object Object],[object Object],[object Object],[object Object]
Who are the spies? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What does an audio surveillance operation consist of? ,[object Object]
The Target ,[object Object],[object Object],[object Object]
The Target ,[object Object],[object Object]
The Target ,[object Object],[object Object]
Targets ,[object Object]
Typical Audio Surveillance ,[object Object],[object Object]
High Profile Targets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stages of an Attack – Information Gathering on the Target ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Issues Encountered by the Bugger ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic Communication Intercepts – Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object],[object Object]
Legal Issues ,[object Object],[object Object]
Legal Issues ,[object Object],[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues ,[object Object]
Legal Issues - Reading ,[object Object],[object Object],[object Object]
Legal Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Some History on Bugs ,[object Object]
History ,[object Object],Homebuilt RF Detector
History ,[object Object]
History ,[object Object]
History ,[object Object],Sinn Fein President Gerry Adams displays an  electronic tracking and listening device, found  in a car used by Sinn Fein leaders, during a  press conference in Belfast, Northern Ireland  in 1999.
History – A Key Point ,[object Object],[object Object]
History ,[object Object]
History ,[object Object]
History ,[object Object],[object Object]
History ,[object Object]
History ,[object Object],[object Object]
History ,[object Object],[object Object]
Domestic Intelligence ,[object Object]
Domestic Intelligence ,[object Object]
Domestic Intelligence ,[object Object]
Domestic Intelligence ,[object Object]
Domestic Intelligence ,[object Object]
Domestic Intelligence ,[object Object]
Additional Reading ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Tracking ,[object Object]
Internet Tracking ,[object Object]
Internet Tracking ,[object Object]
Internet Tracking ,[object Object],[object Object]
Internet Tracking ,[object Object],[object Object]
Internet Tracking ,[object Object]
Internet Tracking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Tracking ,[object Object]
Internet Tracking ,[object Object]
Internet Tracking ,[object Object]
Internet Tracking ,[object Object],[object Object]
Internet Tracking ,[object Object]
Internet Tracking ,[object Object],[object Object]
Internet Tracking ,[object Object]
Additional Reading ,[object Object],[object Object],[object Object]
Operational Issues of the Bugger Continued ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Bugging Types ,[object Object]
Microphone Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Microphone Advantages ,[object Object],[object Object],[object Object],[object Object]
Microphone Disadvantages ,[object Object]
Energy Transmitters RF Advantages ,[object Object],[object Object],[object Object],[object Object]
Energy Transmitters RF Disadvantages ,[object Object],[object Object]
Energy Transmitters Carrier Current Advantages ,[object Object],[object Object],Picture of an actual carrier current Transmitter disguised as an adapter.
Energy Transmitters Carrier Current Disadvantages ,[object Object],[object Object],[object Object],[object Object]
Telephone Taps ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hot or Compromised Phone ,[object Object],[object Object],[object Object]
Telephone Run ,[object Object],[object Object],[object Object]
Instrument Compromise ,[object Object],[object Object],[object Object]
Types of Targets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Opposition Structures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of TSCM Threats (Buggers)‏ ,[object Object],[object Object],[object Object]
A Note on Security ,[object Object],[object Object],[object Object]
Types of Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SLC Security – Contact Info ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Dimension Data - Company Profile
Dimension Data - Company ProfileDimension Data - Company Profile
Dimension Data - Company Profilekojoboy
 
A Brief about IT Managed Services
A Brief about IT Managed ServicesA Brief about IT Managed Services
A Brief about IT Managed ServicesFlightcase1
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
 
Gap Survey, Assessment and Analysis for DevSecOps
Gap Survey, Assessment and Analysis for DevSecOpsGap Survey, Assessment and Analysis for DevSecOps
Gap Survey, Assessment and Analysis for DevSecOpsMarc Hornbeek
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
 
Customer case - Dynatrace Monitoring Redefined
Customer case - Dynatrace Monitoring RedefinedCustomer case - Dynatrace Monitoring Redefined
Customer case - Dynatrace Monitoring RedefinedMichel Duruel
 
Managed it services
Managed it servicesManaged it services
Managed it servicesGss America
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Capt. Shahid Maqsood Consultant LNG CV 2015
Capt. Shahid Maqsood  Consultant LNG  CV 2015Capt. Shahid Maqsood  Consultant LNG  CV 2015
Capt. Shahid Maqsood Consultant LNG CV 2015Capt. Shahid Maqsood
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...Michael Allen
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentationLen Moncrieffe
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services PresentationIISGL
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Cloud Native Engineering with SRE and GitOps
Cloud Native Engineering with SRE and GitOpsCloud Native Engineering with SRE and GitOps
Cloud Native Engineering with SRE and GitOpsWeaveworks
 

Was ist angesagt? (20)

Dimension Data - Company Profile
Dimension Data - Company ProfileDimension Data - Company Profile
Dimension Data - Company Profile
 
A Brief about IT Managed Services
A Brief about IT Managed ServicesA Brief about IT Managed Services
A Brief about IT Managed Services
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Gap Survey, Assessment and Analysis for DevSecOps
Gap Survey, Assessment and Analysis for DevSecOpsGap Survey, Assessment and Analysis for DevSecOps
Gap Survey, Assessment and Analysis for DevSecOps
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
Customer case - Dynatrace Monitoring Redefined
Customer case - Dynatrace Monitoring RedefinedCustomer case - Dynatrace Monitoring Redefined
Customer case - Dynatrace Monitoring Redefined
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Data security
Data securityData security
Data security
 
Linux 101
Linux 101Linux 101
Linux 101
 
Capt. Shahid Maqsood Consultant LNG CV 2015
Capt. Shahid Maqsood  Consultant LNG  CV 2015Capt. Shahid Maqsood  Consultant LNG  CV 2015
Capt. Shahid Maqsood Consultant LNG CV 2015
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentation
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Cloud Native Engineering with SRE and GitOps
Cloud Native Engineering with SRE and GitOpsCloud Native Engineering with SRE and GitOps
Cloud Native Engineering with SRE and GitOps
 

Andere mochten auch

Tscm Risk Management Presentation June 2012
Tscm Risk Management Presentation   June 2012Tscm Risk Management Presentation   June 2012
Tscm Risk Management Presentation June 2012knowtel
 
TSCM products presentation
TSCM products presentationTSCM products presentation
TSCM products presentationtscm
 
Plan fuerza nacional
Plan fuerza nacionalPlan fuerza nacional
Plan fuerza nacionalPeruDG
 
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei Miguel Angel Cintas
 
Teoría del idioma indoeuropeo
Teoría del idioma indoeuropeoTeoría del idioma indoeuropeo
Teoría del idioma indoeuropeoNeil Sulca Taipe
 
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS..."PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...Academia de Ingeniería de México
 
Artistas renacentistas (2)
Artistas renacentistas (2)Artistas renacentistas (2)
Artistas renacentistas (2)Carolina Bello
 
New from Bittner Audio- 4 channels DANTE enabled amplifiers
New from Bittner Audio- 4 channels DANTE enabled amplifiersNew from Bittner Audio- 4 channels DANTE enabled amplifiers
New from Bittner Audio- 4 channels DANTE enabled amplifiersSound Directions Ltd
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationOpenText Information Exchange
 
10. St. Galler Management-Kongress vom 21. September 2012
10. St. Galler Management-Kongress vom 21. September 201210. St. Galler Management-Kongress vom 21. September 2012
10. St. Galler Management-Kongress vom 21. September 2012St.Galler Business School
 
092012 programa residentes_anestesiologia_reanimacion_v1
092012 programa residentes_anestesiologia_reanimacion_v1092012 programa residentes_anestesiologia_reanimacion_v1
092012 programa residentes_anestesiologia_reanimacion_v1Facultad de Medicina
 
Buenas acciones que representan a algunos cantantes
Buenas acciones que representan a algunos cantantesBuenas acciones que representan a algunos cantantes
Buenas acciones que representan a algunos cantantescrusjack
 
02 Deloitte SFIC 2009
02 Deloitte SFIC 200902 Deloitte SFIC 2009
02 Deloitte SFIC 2009Pepe
 
Intermediate Financial Accounting I Financial Statement Analysis Project
Intermediate Financial Accounting I Financial Statement Analysis ProjectIntermediate Financial Accounting I Financial Statement Analysis Project
Intermediate Financial Accounting I Financial Statement Analysis ProjectMelissa Blackman
 
thesis booklet edited for issuu
thesis booklet edited for issuuthesis booklet edited for issuu
thesis booklet edited for issuuCharlotte Choo
 

Andere mochten auch (20)

Tscm Risk Management Presentation June 2012
Tscm Risk Management Presentation   June 2012Tscm Risk Management Presentation   June 2012
Tscm Risk Management Presentation June 2012
 
TSCM products presentation
TSCM products presentationTSCM products presentation
TSCM products presentation
 
Plan fuerza nacional
Plan fuerza nacionalPlan fuerza nacional
Plan fuerza nacional
 
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
Ponencia Tu Estrategia de Marketing en #Enredate Xátiva #ceei
 
Guia digital edicion 54
Guia digital edicion 54Guia digital edicion 54
Guia digital edicion 54
 
Teoría del idioma indoeuropeo
Teoría del idioma indoeuropeoTeoría del idioma indoeuropeo
Teoría del idioma indoeuropeo
 
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS..."PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
"PERSPECTIVA SOCIAL DE LA INGENIERÍA HIDRAÚLICA EN EL DESARROLLO URBANO JALIS...
 
Artistas renacentistas (2)
Artistas renacentistas (2)Artistas renacentistas (2)
Artistas renacentistas (2)
 
Catalogo marimon
Catalogo marimonCatalogo marimon
Catalogo marimon
 
Fraude en la investigación científica
Fraude en la investigación científicaFraude en la investigación científica
Fraude en la investigación científica
 
New from Bittner Audio- 4 channels DANTE enabled amplifiers
New from Bittner Audio- 4 channels DANTE enabled amplifiersNew from Bittner Audio- 4 channels DANTE enabled amplifiers
New from Bittner Audio- 4 channels DANTE enabled amplifiers
 
La web bdbb 11.1
La web bdbb 11.1La web bdbb 11.1
La web bdbb 11.1
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
Plagio en la_academia_2011
Plagio en la_academia_2011Plagio en la_academia_2011
Plagio en la_academia_2011
 
10. St. Galler Management-Kongress vom 21. September 2012
10. St. Galler Management-Kongress vom 21. September 201210. St. Galler Management-Kongress vom 21. September 2012
10. St. Galler Management-Kongress vom 21. September 2012
 
092012 programa residentes_anestesiologia_reanimacion_v1
092012 programa residentes_anestesiologia_reanimacion_v1092012 programa residentes_anestesiologia_reanimacion_v1
092012 programa residentes_anestesiologia_reanimacion_v1
 
Buenas acciones que representan a algunos cantantes
Buenas acciones que representan a algunos cantantesBuenas acciones que representan a algunos cantantes
Buenas acciones que representan a algunos cantantes
 
02 Deloitte SFIC 2009
02 Deloitte SFIC 200902 Deloitte SFIC 2009
02 Deloitte SFIC 2009
 
Intermediate Financial Accounting I Financial Statement Analysis Project
Intermediate Financial Accounting I Financial Statement Analysis ProjectIntermediate Financial Accounting I Financial Statement Analysis Project
Intermediate Financial Accounting I Financial Statement Analysis Project
 
thesis booklet edited for issuu
thesis booklet edited for issuuthesis booklet edited for issuu
thesis booklet edited for issuu
 

Ähnlich wie TSCM Overview for Stakeholders

EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...London Metropolitan - UK
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxmckerliejonelle
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptxaratibhavsar
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 

Ähnlich wie TSCM Overview for Stakeholders (20)

EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
File000154
File000154File000154
File000154
 
Computer
ComputerComputer
Computer
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
C018131821
C018131821C018131821
C018131821
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 

TSCM Overview for Stakeholders

  • 1. Electronic Countermeasures What is involved in a TSCM Sweep? Recommendations for Stake Holders
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.