I can speak back even further than the last 10 years. I can go back more than a decade to almost two decades ago. Again, in terms of looking at what is the actual privacy invasion, we're focusing a lot on the tool and the methodology, but the privacy invasion is listening to the conversation and seeing what people are physically doing. We've installed for years; I've gone through the full Special “I” training program that is to install listening devices, hardware devices and cameras hidden discreetly in a particular location where criminal behaviour is occurring. This is a new method of invading privacy but invading privacy at the same level that it had been previously, whether it be through using those other techniques or through covert entry where you then extract all the data off of a computer—again, adhering to the terms and conditions of the court order.
So when you ask us when—about when we get to the point that we are actually seeing a level of privacy invasion that's different from what we have done before—that's really where the triggers come in for us. For those of us who have lived and done this work for two decades, you are seeing a slow evolution. There are times when we do need the checks and balances that come in and say that it's time to reflect and have new people come in. People like Sergeant Dave Cobey have come in. He is a strong advocate of being more public about what we're doing. He writes articles for the different journals and newspapers, etc., to try to bring visibility to this. That's really what the trigger is.