. . . . . . "Avlyssning \u00E4r att i hemlighet ta del av andras samtal, ofta med dolda mikrofoner eller andra tekniska hj\u00E4lpmedel. En vanlig form som ofta n\u00E4mns \u00E4r telefonavlyssningen som kan ske antingen vid en av telefonerna eller n\u00E5gonstans p\u00E5 v\u00E4gen, till exempel i en telefonv\u00E4xel, i en telestation eller hos teleoperat\u00F6ren. \u00C4ven internettrafik kan avlyssnas, inklusive e-post och chat. Hemlig teleavlyssning, numera kallat hemlig avlyssning av elektronisk kommunikation inneb\u00E4r att telefonsamtal eller meddelanden till eller fr\u00E5n ett telefonnummer, en kod eller annan teleadress, i hemlighet avlyssnas eller tas upp genom ett tekniskt hj\u00E4lpmedel f\u00F6r \u00E5tergivning av inneh\u00E5llet i meddelandet."@sv . . . . . . . . . . "\u041F\u0456\u0434\u0441\u043B\u0443\u0445\u043E\u0432\u0443\u0432\u0430\u043D\u043D\u044F \u2014 \u0446\u0435 \u0430\u043A\u0442 \u0442\u0430\u0454\u043C\u043D\u043E\u0433\u043E \u043F\u0440\u043E\u0441\u043B\u0443\u0445\u043E\u0432\u0443\u0432\u0430\u043D\u043D\u044F \u043F\u0440\u0438\u0432\u0430\u0442\u043D\u043E\u0457 \u0440\u043E\u0437\u043C\u043E\u0432\u0438 \u0447\u0438 \u0441\u043F\u0456\u043B\u043A\u0443\u0432\u0430\u043D\u043D\u044F \u0441\u0442\u043E\u0440\u043E\u043D\u043D\u0456\u0445 \u043E\u0441\u0456\u0431 \u0431\u0435\u0437 \u0457\u0445\u043D\u044C\u043E\u0457 \u0437\u0433\u043E\u0434\u0438 \u0437 \u043C\u0435\u0442\u043E\u044E \u0437\u0431\u043E\u0440\u0443 \u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0456\u0457."@uk . . . . . . "\u0397 \u039B\u03B1\u03B8\u03C1\u03B1\u03BA\u03C1\u03CC\u03B1\u03C3\u03B7 (eavesdropping) \u03B5\u03AF\u03BD\u03B1\u03B9 \u03B7 \u03C0\u03C1\u03AC\u03BE\u03B7 \u03C4\u03B7\u03C2 \u03BA\u03C1\u03C5\u03C6\u03AE\u03C2 \u03AE \u03BB\u03B1\u03B8\u03C1\u03B1\u03AF\u03B1\u03C2 \u03B1\u03BA\u03C1\u03CC\u03B1\u03C3\u03B7\u03C2 \u03C4\u03B7\u03C2 \u03B9\u03B4\u03B9\u03C9\u03C4\u03B9\u03BA\u03AE\u03C2 \u03C3\u03C5\u03BD\u03BF\u03BC\u03B9\u03BB\u03AF\u03B1\u03C2 \u03AE \u03C4\u03C9\u03BD \u03B5\u03C0\u03B9\u03BA\u03BF\u03B9\u03BD\u03C9\u03BD\u03B9\u03CE\u03BD \u03AC\u03BB\u03BB\u03C9\u03BD \u03C7\u03C9\u03C1\u03AF\u03C2 \u03C4\u03B7 \u03C3\u03C5\u03B3\u03BA\u03B1\u03C4\u03AC\u03B8\u03B5\u03C3\u03AE \u03C4\u03BF\u03C5\u03C2. \u03A3\u03C5\u03BD\u03CE\u03BD\u03C5\u03BC\u03BF \u03C1\u03AE\u03BC\u03B1, \u03C4\u03BF \u03BF\u03C0\u03BF\u03AF\u03BF \u03C0\u03B5\u03C1\u03B9\u03B3\u03C1\u03AC\u03C6\u03B5\u03B9 \u03C4\u03B7\u03BD \u03AF\u03B4\u03B9\u03B1 \u03C0\u03C1\u03B1\u03BA\u03C4\u03B9\u03BA\u03AE, \u03B5\u03AF\u03BD\u03B1\u03B9 \u03C4\u03BF \"\u03BA\u03C1\u03C5\u03C6\u03B1\u03BA\u03BF\u03CD\u03C9\". \u0397 \u03C0\u03C1\u03B1\u03BA\u03C4\u03B9\u03BA\u03AE \u03B1\u03C5\u03C4\u03AE \u03B8\u03B5\u03C9\u03C1\u03B5\u03AF\u03C4\u03B1\u03B9 \u03B5\u03C5\u03C1\u03AD\u03C9\u03C2 \u03B1\u03BD\u03AE\u03B8\u03B9\u03BA\u03B7 \u03BA\u03B1\u03B9 \u03C3\u03B5 \u03C0\u03BF\u03BB\u03BB\u03AC \u03C0\u03B5\u03B4\u03AF\u03B1 \u03B4\u03B9\u03BA\u03B1\u03B9\u03BF\u03B4\u03BF\u03C3\u03AF\u03B1\u03C2 \u03B5\u03AF\u03BD\u03B1\u03B9 \u03C0\u03B1\u03C1\u03AC\u03BD\u03BF\u03BC\u03B7."@el . "\u00C9coute clandestine"@fr . . . . "Abh\u00F6ren bezeichnet das Ausspionieren einer Kommunikationsverbindung, um ihren Informationsgehalt zu erfassen. Dies kann mit Abh\u00F6rger\u00E4ten erfolgen und muss nicht unbedingt akustisch geschehen. Elektrische und elektromagnetische Telekommunikationsverbindungen k\u00F6nnen mithilfe von Funkabh\u00F6rstationen abgeh\u00F6rt werden. Meistens wird das Wort \u201EAbh\u00F6ren\u201C f\u00FCr die unbemerkte, oft auch illegale Form des Lauschens an einer Daten- oder Telefonverbindung benutzt, diesen Vorgang bezeichnen Fachleute auch als \u201EAusleiten\u201C eines Gespr\u00E4chs. Das Abh\u00F6ren von Gespr\u00E4chen in fremden R\u00E4umen wird auch als Eavesdropping (engl. f\u00FCr Abhorchen, Lauschen) bezeichnet. Gegen das Abh\u00F6ren kann man Abh\u00F6rschutz-Einrichtungen einsetzen."@de . . "Menguping"@in . "1107948361"^^ . . "\u7ACA\u807D\uFF08\u82F1\u8A9E\uFF1AEavesdropping\uFF09\uFF0C\u53C8\u7A31\u76DC\u807D\u3001\u76E3\u807D\uFF0C\u5728\u672A\u7D93\u540C\u610F\u7684\u524D\u63D0\u4E0B\uFF0C\u7B2C\u4E09\u65B9\u4EE5\u96B1\u5BC6\u7684\u65B9\u5F0F\uFF0C\u807D\u53D6\u4E0D\u5C0D\u5916\u516C\u958B\u7684\u79C1\u4EBA\u5C0D\u8A71\u3002\u73FE\u4EE3\u53EF\u4EE5\u5229\u7528\u7ACA\u807D\u5DE5\u5177\uFF0C\u5982\u9304\u97F3\u6A5F\u3001\u7ACA\u807D\u5668\u7B49\u5E36\u6709\u9304\u97F3\u529F\u80FD\u7684\u5DE5\u5177\uFF0C\u5728\u88AB\u7ACA\u807D\u8005\u4E0D\u77E5\u60C5\u7684\u60C5\u6CC1\u4E0B\u9304\u53D6\u5176\u767C\u51FA\u7684\u4EFB\u4F55\u8072\u97F3\u3002\u4E00\u822C\u4F86\u8AAA\uFF0C\u9019\u7A2E\u505A\u6CD5\u662F\u9055\u53CD\u9053\u5FB7\u3001\u751A\u81F3\u9055\u53CD\u6CD5\u5F8B\u7684\u3002"@zh . . . . . "\u76D7\u8074\uFF08\u3068\u3046\u3061\u3087\u3046\uFF09\u3068\u306F\u3001\u4F1A\u8A71\u3084\u901A\u4FE1\u306A\u3069\u3092\u3001\u5F53\u4EBA\u3089\u306B\u77E5\u3089\u308C\u306A\u3044\u3088\u3046\u306B\u305D\u308C\u3089\u304C\u767A\u3059\u308B\u97F3\u3084\u58F0\u3092\u3072\u305D\u304B\u306B\u8074\u53D6\u30FB\u9332\u97F3\u3059\u308B\u72AF\u7F6A\u884C\u70BA\u3067\u3042\u308B\u3002\u8074\u53D6\u3057\u305F\u97F3\u58F0\u304B\u3089\u69D8\u3005\u306A\u60C5\u5831\u3092\u53CE\u96C6\u3057\u3001\u95A2\u4FC2\u8005\u7B49\u306E\u52D5\u5411\u3092\u63A2\u308B\u76EE\u7684\u3067\u7528\u3044\u3089\u308C\u308B\u3053\u3068\u3082\u3042\u308B\u3002"@ja . "\u7ACA\u807D\uFF08\u82F1\u8A9E\uFF1AEavesdropping\uFF09\uFF0C\u53C8\u7A31\u76DC\u807D\u3001\u76E3\u807D\uFF0C\u5728\u672A\u7D93\u540C\u610F\u7684\u524D\u63D0\u4E0B\uFF0C\u7B2C\u4E09\u65B9\u4EE5\u96B1\u5BC6\u7684\u65B9\u5F0F\uFF0C\u807D\u53D6\u4E0D\u5C0D\u5916\u516C\u958B\u7684\u79C1\u4EBA\u5C0D\u8A71\u3002\u73FE\u4EE3\u53EF\u4EE5\u5229\u7528\u7ACA\u807D\u5DE5\u5177\uFF0C\u5982\u9304\u97F3\u6A5F\u3001\u7ACA\u807D\u5668\u7B49\u5E36\u6709\u9304\u97F3\u529F\u80FD\u7684\u5DE5\u5177\uFF0C\u5728\u88AB\u7ACA\u807D\u8005\u4E0D\u77E5\u60C5\u7684\u60C5\u6CC1\u4E0B\u9304\u53D6\u5176\u767C\u51FA\u7684\u4EFB\u4F55\u8072\u97F3\u3002\u4E00\u822C\u4F86\u8AAA\uFF0C\u9019\u7A2E\u505A\u6CD5\u662F\u9055\u53CD\u9053\u5FB7\u3001\u751A\u81F3\u9055\u53CD\u6CD5\u5F8B\u7684\u3002"@zh . . . . . . "\u041F\u0456\u0434\u0441\u043B\u0443\u0445\u043E\u0432\u0443\u0432\u0430\u043D\u043D\u044F \u2014 \u0446\u0435 \u0430\u043A\u0442 \u0442\u0430\u0454\u043C\u043D\u043E\u0433\u043E \u043F\u0440\u043E\u0441\u043B\u0443\u0445\u043E\u0432\u0443\u0432\u0430\u043D\u043D\u044F \u043F\u0440\u0438\u0432\u0430\u0442\u043D\u043E\u0457 \u0440\u043E\u0437\u043C\u043E\u0432\u0438 \u0447\u0438 \u0441\u043F\u0456\u043B\u043A\u0443\u0432\u0430\u043D\u043D\u044F \u0441\u0442\u043E\u0440\u043E\u043D\u043D\u0456\u0445 \u043E\u0441\u0456\u0431 \u0431\u0435\u0437 \u0457\u0445\u043D\u044C\u043E\u0457 \u0437\u0433\u043E\u0434\u0438 \u0437 \u043C\u0435\u0442\u043E\u044E \u0437\u0431\u043E\u0440\u0443 \u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0456\u0457."@uk . . . . . . "Eavesdropping (computadores) \u00E9 uma t\u00E9cnica de hacking que se baseia na viola\u00E7\u00E3o da confidencialidade, onde um atacante atrav\u00E9s de recursos tecnol\u00F3gicos, aproveitando de vulnerabilidades nas comunica\u00E7\u00F5es de poss\u00EDveis vitimas, faz um monitoramento sem autoriza\u00E7\u00E3o nesta comunica\u00E7\u00E3o, podendo roubar dados e informa\u00E7\u00F5es que poder\u00E3o ser usadas posteriormente. O monitoramento e a intercepta\u00E7\u00E3o das informa\u00E7\u00F5es por parte do atacante, pode ser feito em diversos sistemas, entre eles est\u00E3o os sistemas de telefonia, e-mail, mensagens instant\u00E2neas e v\u00E1rios outros servi\u00E7os da internet, onde v\u00E1rias informa\u00E7\u00F5es sens\u00EDveis ao atacado podem ser roubados, como senhas, n\u00FAmeros de contas, h\u00E1bitos de navega\u00E7\u00E3o, conte\u00FAdo de emails, entre v\u00E1rios outros. Como diferentemente do man-in-the-middle ataque, o ataque por eavesdropping s\u00F3 intercepta e armazena as informa\u00E7\u00F5es, n\u00E3o sendo poss\u00EDvel modificar tais informa\u00E7\u00F5es e depois envi\u00E1-las para o destinat\u00E1rio original, o que dificulta aos atacados, identificarem que est\u00E3o sendo atacados e que suas informa\u00E7\u00F5es est\u00E3o sendo roubadas. Este tipo de ataque geralmente funciona com protocolos de transmiss\u00E3o somente-texto, como transfer\u00EAncias Telnet, FTP e HTTP."@pt . . . . . . "Eavesdropping"@es . . "Avlyssning \u00E4r att i hemlighet ta del av andras samtal, ofta med dolda mikrofoner eller andra tekniska hj\u00E4lpmedel. En vanlig form som ofta n\u00E4mns \u00E4r telefonavlyssningen som kan ske antingen vid en av telefonerna eller n\u00E5gonstans p\u00E5 v\u00E4gen, till exempel i en telefonv\u00E4xel, i en telestation eller hos teleoperat\u00F6ren. \u00C4ven internettrafik kan avlyssnas, inklusive e-post och chat."@sv . "Eavesdropping"@en . . "L'\u00E9coute clandestine d\u00E9signe une surveillance non autoris\u00E9e, pouvant intervenir sur tout r\u00E9seau de t\u00E9l\u00E9communications, que ce soit le t\u00E9l\u00E9phone, les courriels ou tout mode de communication priv\u00E9e. \u00CAtre t\u00E9moin d'une conversation publique n'entre pas dans le cadre des \u00E9coutes clandestines. Les communications, quel que soit leur support, peuvent \u00EAtre prot\u00E9g\u00E9es des \u00E9coutes ind\u00E9sirables. Cette protection passe souvent par le chiffrement des messages."@fr . . . "Abh\u00F6ren bezeichnet das Ausspionieren einer Kommunikationsverbindung, um ihren Informationsgehalt zu erfassen. Dies kann mit Abh\u00F6rger\u00E4ten erfolgen und muss nicht unbedingt akustisch geschehen. Elektrische und elektromagnetische Telekommunikationsverbindungen k\u00F6nnen mithilfe von Funkabh\u00F6rstationen abgeh\u00F6rt werden. Gegen das Abh\u00F6ren kann man Abh\u00F6rschutz-Einrichtungen einsetzen."@de . "\u0397 \u039B\u03B1\u03B8\u03C1\u03B1\u03BA\u03C1\u03CC\u03B1\u03C3\u03B7 (eavesdropping) \u03B5\u03AF\u03BD\u03B1\u03B9 \u03B7 \u03C0\u03C1\u03AC\u03BE\u03B7 \u03C4\u03B7\u03C2 \u03BA\u03C1\u03C5\u03C6\u03AE\u03C2 \u03AE \u03BB\u03B1\u03B8\u03C1\u03B1\u03AF\u03B1\u03C2 \u03B1\u03BA\u03C1\u03CC\u03B1\u03C3\u03B7\u03C2 \u03C4\u03B7\u03C2 \u03B9\u03B4\u03B9\u03C9\u03C4\u03B9\u03BA\u03AE\u03C2 \u03C3\u03C5\u03BD\u03BF\u03BC\u03B9\u03BB\u03AF\u03B1\u03C2 \u03AE \u03C4\u03C9\u03BD \u03B5\u03C0\u03B9\u03BA\u03BF\u03B9\u03BD\u03C9\u03BD\u03B9\u03CE\u03BD \u03AC\u03BB\u03BB\u03C9\u03BD \u03C7\u03C9\u03C1\u03AF\u03C2 \u03C4\u03B7 \u03C3\u03C5\u03B3\u03BA\u03B1\u03C4\u03AC\u03B8\u03B5\u03C3\u03AE \u03C4\u03BF\u03C5\u03C2. \u03A3\u03C5\u03BD\u03CE\u03BD\u03C5\u03BC\u03BF \u03C1\u03AE\u03BC\u03B1, \u03C4\u03BF \u03BF\u03C0\u03BF\u03AF\u03BF \u03C0\u03B5\u03C1\u03B9\u03B3\u03C1\u03AC\u03C6\u03B5\u03B9 \u03C4\u03B7\u03BD \u03AF\u03B4\u03B9\u03B1 \u03C0\u03C1\u03B1\u03BA\u03C4\u03B9\u03BA\u03AE, \u03B5\u03AF\u03BD\u03B1\u03B9 \u03C4\u03BF \"\u03BA\u03C1\u03C5\u03C6\u03B1\u03BA\u03BF\u03CD\u03C9\". \u0397 \u03C0\u03C1\u03B1\u03BA\u03C4\u03B9\u03BA\u03AE \u03B1\u03C5\u03C4\u03AE \u03B8\u03B5\u03C9\u03C1\u03B5\u03AF\u03C4\u03B1\u03B9 \u03B5\u03C5\u03C1\u03AD\u03C9\u03C2 \u03B1\u03BD\u03AE\u03B8\u03B9\u03BA\u03B7 \u03BA\u03B1\u03B9 \u03C3\u03B5 \u03C0\u03BF\u03BB\u03BB\u03AC \u03C0\u03B5\u03B4\u03AF\u03B1 \u03B4\u03B9\u03BA\u03B1\u03B9\u03BF\u03B4\u03BF\u03C3\u03AF\u03B1\u03C2 \u03B5\u03AF\u03BD\u03B1\u03B9 \u03C0\u03B1\u03C1\u03AC\u03BD\u03BF\u03BC\u03B7."@el . "\u76D7\u8074"@ja . "\u7ACA\u807D"@zh . . "372656"^^ . . . . . "\u0627\u0644\u062A\u0646\u0635\u062A (\u0645\u0627 \u064A\u0633\u0645\u0649 \u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629 Eavesdropping): \u0639\u0628\u0627\u0631\u0629 \u0639\u0646 \u0627\u0644\u0627\u0633\u062A\u0645\u0627\u0639 \u0633\u0631\u0627 \u0625\u0644\u0649 \u0627\u0644\u0645\u062D\u0627\u062F\u062B\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 \u0644\u0644\u0627\u062E\u0631\u064A\u0646 \u0628\u062F\u0648\u0646 \u0645\u0648\u0627\u0641\u0642\u062A\u0647\u0645 \u0648 \u0639\u0627\u062F\u0629 \u0645\u0646 \u062F\u0648\u0646 \u0639\u0644\u0645\u0647\u0645. \u0648\u0647\u0630\u0647 \u0627\u0644\u0639\u0627\u062F\u0629 \u0633\u064A\u0626\u0629 \u0648\u062A\u0639\u0628\u0631 \u0639\u0646 \u0642\u0644\u0629 \u0627\u0644\u0623\u062E\u0644\u0627\u0642."@ar . . . . . "Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information."@en . "Menguping adalah tindakan mendengarkan percakapan pribadi orang lain secara rahasia tanpa persetujuannya, seperti yang didefinisikan oleh . Ini biasanya dianggap tidak etis dan ada pepatah mengatakan \"penguping jarang mendengar sesuatu yang bagus dari dirinya sendiri... penguping selalu mencoba mendengar pada hal-hal yang menyangkut dia.\""@in . . . . "L'\u00E9coute clandestine d\u00E9signe une surveillance non autoris\u00E9e, pouvant intervenir sur tout r\u00E9seau de t\u00E9l\u00E9communications, que ce soit le t\u00E9l\u00E9phone, les courriels ou tout mode de communication priv\u00E9e. \u00CAtre t\u00E9moin d'une conversation publique n'entre pas dans le cadre des \u00E9coutes clandestines. Les communications, quel que soit leur support, peuvent \u00EAtre prot\u00E9g\u00E9es des \u00E9coutes ind\u00E9sirables. Cette protection passe souvent par le chiffrement des messages."@fr . . "Eavesdropping, t\u00E9rmino ingl\u00E9s que traducido al espa\u00F1ol significa escuchar secretamente, es el acto de escuchar en secreto o sigilosamente conversaciones privadas o comunicaciones de otros sin su consentimiento.\u200B La pr\u00E1ctica es ampliamente considerada como poco \u00E9tica, y en muchas jurisdicciones es ilegal. Por otro lado, esta pr\u00E1ctica se ha utilizado tradicionalmente en \u00E1mbitos relacionados con la seguridad, como escuchar llamadas telef\u00F3nicas. Se ha convertido en parte de la jerga habitual en criptograf\u00EDa."@es . . . "Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information."@en . . . . . "Menguping adalah tindakan mendengarkan percakapan pribadi orang lain secara rahasia tanpa persetujuannya, seperti yang didefinisikan oleh . Ini biasanya dianggap tidak etis dan ada pepatah mengatakan \"penguping jarang mendengar sesuatu yang bagus dari dirinya sendiri... penguping selalu mencoba mendengar pada hal-hal yang menyangkut dia.\""@in . . "Eavesdropping, t\u00E9rmino ingl\u00E9s que traducido al espa\u00F1ol significa escuchar secretamente, es el acto de escuchar en secreto o sigilosamente conversaciones privadas o comunicaciones de otros sin su consentimiento.\u200B La pr\u00E1ctica es ampliamente considerada como poco \u00E9tica, y en muchas jurisdicciones es ilegal. Por otro lado, esta pr\u00E1ctica se ha utilizado tradicionalmente en \u00E1mbitos relacionados con la seguridad, como escuchar llamadas telef\u00F3nicas. Se ha convertido en parte de la jerga habitual en criptograf\u00EDa."@es . "Eavesdropping (computadores) \u00E9 uma t\u00E9cnica de hacking que se baseia na viola\u00E7\u00E3o da confidencialidade, onde um atacante atrav\u00E9s de recursos tecnol\u00F3gicos, aproveitando de vulnerabilidades nas comunica\u00E7\u00F5es de poss\u00EDveis vitimas, faz um monitoramento sem autoriza\u00E7\u00E3o nesta comunica\u00E7\u00E3o, podendo roubar dados e informa\u00E7\u00F5es que poder\u00E3o ser usadas posteriormente. Este tipo de ataque geralmente funciona com protocolos de transmiss\u00E3o somente-texto, como transfer\u00EAncias Telnet, FTP e HTTP."@pt . . "\u041F\u0456\u0434\u0441\u043B\u0443\u0445\u043E\u0432\u0443\u0432\u0430\u043D\u043D\u044F"@uk . . . . "\u039B\u03B1\u03B8\u03C1\u03B1\u03BA\u03C1\u03CC\u03B1\u03C3\u03B7"@el . . "Abh\u00F6ren"@de . . . "\u0627\u0644\u062A\u0646\u0635\u062A (\u0645\u0627 \u064A\u0633\u0645\u0649 \u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629 Eavesdropping): \u0639\u0628\u0627\u0631\u0629 \u0639\u0646 \u0627\u0644\u0627\u0633\u062A\u0645\u0627\u0639 \u0633\u0631\u0627 \u0625\u0644\u0649 \u0627\u0644\u0645\u062D\u0627\u062F\u062B\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 \u0644\u0644\u0627\u062E\u0631\u064A\u0646 \u0628\u062F\u0648\u0646 \u0645\u0648\u0627\u0641\u0642\u062A\u0647\u0645 \u0648 \u0639\u0627\u062F\u0629 \u0645\u0646 \u062F\u0648\u0646 \u0639\u0644\u0645\u0647\u0645. \u0648\u0647\u0630\u0647 \u0627\u0644\u0639\u0627\u062F\u0629 \u0633\u064A\u0626\u0629 \u0648\u062A\u0639\u0628\u0631 \u0639\u0646 \u0642\u0644\u0629 \u0627\u0644\u0623\u062E\u0644\u0627\u0642."@ar . . "( \uC0C9\uC0C1\uC5D0 \uB300\uD574\uC11C\uB294 \uAC10\uCCAD\uC0C9 \uBB38\uC11C\uB97C \uCC38\uACE0\uD558\uC2ED\uC2DC\uC624.) \uAC10\uCCAD(\u76E3\u807D)\uC774\uB780 \uC804\uAE30\uD1B5\uC2E0\uC744 \uD1B5\uD558\uC5EC \uADF8 \uB2F9\uC0AC\uC790\uC778 \uC1A1\uC2E0\uC778\uACFC \uC218\uC2E0\uC778\uC774 \uC544\uB2CC \uC81C3\uC790\uAC00 \uB2F9\uC0AC\uC790\uC758 \uB3D9\uC758\uB97C \uBC1B\uC9C0 \uC54A\uACE0 \uC804\uC790\uC7A5\uCE58\uB4F1\uC744 \uC774\uC6A9\uD558\uC5EC \uD1B5\uC2E0\uC758 \uC74C\uD5A5, \uBB38\uC5B8, \uBD80\uD638, \uC601\uC0C1\uC744 \uCCAD\uCDE8, \uACF5\uB3C5\uD558\uC5EC \uADF8 \uB0B4\uC6A9\uC744 \uC9C0\uB4DD\uD558\uB294 \uB4F1\uC758 \uD589\uC704\uB97C \uB73B\uD55C\uB2E4. \uB300\uD654\uC758 \uD55C \uB2F9\uC0AC\uC790\uAC00 \uADF8 \uB0B4\uC6A9\uC744 \uB179\uC74C\uD558\uB294 \uACBD\uC6B0\uB294 \uD1B5\uC2E0\uBE44\uBC00\uBCF4\uD638\uBC95 \uC81C3\uC870\uC758 \uAC10\uCCAD\uC5D0 \uD574\uB2F9\uD558\uC9C0 \uC54A\uB294\uB2E4."@ko . . . "\uAC10\uCCAD"@ko . . . . "\u76D7\u8074\uFF08\u3068\u3046\u3061\u3087\u3046\uFF09\u3068\u306F\u3001\u4F1A\u8A71\u3084\u901A\u4FE1\u306A\u3069\u3092\u3001\u5F53\u4EBA\u3089\u306B\u77E5\u3089\u308C\u306A\u3044\u3088\u3046\u306B\u305D\u308C\u3089\u304C\u767A\u3059\u308B\u97F3\u3084\u58F0\u3092\u3072\u305D\u304B\u306B\u8074\u53D6\u30FB\u9332\u97F3\u3059\u308B\u72AF\u7F6A\u884C\u70BA\u3067\u3042\u308B\u3002\u8074\u53D6\u3057\u305F\u97F3\u58F0\u304B\u3089\u69D8\u3005\u306A\u60C5\u5831\u3092\u53CE\u96C6\u3057\u3001\u95A2\u4FC2\u8005\u7B49\u306E\u52D5\u5411\u3092\u63A2\u308B\u76EE\u7684\u3067\u7528\u3044\u3089\u308C\u308B\u3053\u3068\u3082\u3042\u308B\u3002"@ja . "Avlyssning"@sv . . "4437"^^ . . . . "( \uC0C9\uC0C1\uC5D0 \uB300\uD574\uC11C\uB294 \uAC10\uCCAD\uC0C9 \uBB38\uC11C\uB97C \uCC38\uACE0\uD558\uC2ED\uC2DC\uC624.) \uAC10\uCCAD(\u76E3\u807D)\uC774\uB780 \uC804\uAE30\uD1B5\uC2E0\uC744 \uD1B5\uD558\uC5EC \uADF8 \uB2F9\uC0AC\uC790\uC778 \uC1A1\uC2E0\uC778\uACFC \uC218\uC2E0\uC778\uC774 \uC544\uB2CC \uC81C3\uC790\uAC00 \uB2F9\uC0AC\uC790\uC758 \uB3D9\uC758\uB97C \uBC1B\uC9C0 \uC54A\uACE0 \uC804\uC790\uC7A5\uCE58\uB4F1\uC744 \uC774\uC6A9\uD558\uC5EC \uD1B5\uC2E0\uC758 \uC74C\uD5A5, \uBB38\uC5B8, \uBD80\uD638, \uC601\uC0C1\uC744 \uCCAD\uCDE8, \uACF5\uB3C5\uD558\uC5EC \uADF8 \uB0B4\uC6A9\uC744 \uC9C0\uB4DD\uD558\uB294 \uB4F1\uC758 \uD589\uC704\uB97C \uB73B\uD55C\uB2E4. \uB300\uD654\uC758 \uD55C \uB2F9\uC0AC\uC790\uAC00 \uADF8 \uB0B4\uC6A9\uC744 \uB179\uC74C\uD558\uB294 \uACBD\uC6B0\uB294 \uD1B5\uC2E0\uBE44\uBC00\uBCF4\uD638\uBC95 \uC81C3\uC870\uC758 \uAC10\uCCAD\uC5D0 \uD574\uB2F9\uD558\uC9C0 \uC54A\uB294\uB2E4."@ko . . "Eavesdropping"@pt . "\u062A\u0646\u0635\u062A"@ar . . . . . .