Dear Colleagues,
Having the Initial Review document now in its publication phase, it is time to draw on the work there to start work towards a recommendation. To that end I attach a draft recommendation document for your consideration. Comments are particularly welcome on:
Regards
Matthew West
Technical Lead – National Digital Twin programme
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/DD895EDB-B15B-46FE-B668-5C12F76A4319%40bodvoc.com.
Thanks Derwen,
Yes I agree. Quantification is not an easy topic to address in groups like this, but certainly needs to be considered.
Regards,
Hugh
——————————————
Hugh Boyes CEng FIET CISSP
Director
for and on behalf of Bodvoc Ltd
(M) 07970 703082
Cyber Essentials Plus Certificate Number CEP-4SE-09388
This email and any attachments to it may be confidential and are intended solely for the use of the individual to whom it is addressed. If you are not the intended recipient of this email, you must neither take any action based upon its contents, nor copy or show
it to anyone. Please contact the sender if you believe you have received this email in error.
From: <uk-nd...@googlegroups.com> on behalf of Derwen Hinds FIET <dmh.f...@gmail.com>
Reply to: "uk-nd...@googlegroups.com" <uk-nd...@googlegroups.com>
Date: Tuesday, 18 August 2020 at 17:27
To: "uk-nd...@googlegroups.com" <uk-nd...@googlegroups.com>
Subject: Re: [FDM] Draft Recommendation Document
Hugh,
Valuable addition however, "sensitive" should be defined (maybe quantified?) as the readership may not fully understand the extent & types of sensitivity.
Examples of types of sensitivity could be 'commercial', 'financial', 'personal', 'identification', 'security (national, cyber & personal)' & 'safety' - any of which could lead to one or more outcomes of compromise, exploitation, deanonymisation (organisation, group or individual), disclosure, harm or damage.
Regards,
Derwen.
Derwen M. Hinds FIET
Independent Strategic Technical Advisor in Future and Emerging Technologies,
Em. Tech. Futures
Honorary Professor, STEaPP, UCL
Honorary Principal Research Fellow, ISST, Imperial College
Email: dmh.f...@gmail.com
Mobile: 07453 964 179
Sent from a Desktop Error! Filename not specified.
To view this discussion on the web, visit
https://groups.google.com/d/msgid/uk-ndt-fdm/CABr_4ucG6p81QoUcaghtj%2BdCJfH2Tn8hmu_8EVLO56Up_NzGUQ%40mail.gmail.com.
Regards,
Chris Partridge
Chris Partridge |
Chief Ontologist | BORO Solutions Limited | www.BOROSolutions.co.uk
M: +44 790 5167263 | e: partr...@borogroup.co.uk
BORO Solutions Limited | Registered Office: 2 West Street, Henley on Thames, Oxfordshire RG9 2DU
Registered in England & Wales | Company No: 06025010 | VAT No. GB 905 6100 58
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/2E9E472D-0BC2-4ACF-895F-E19261DFBD25%40bodvoc.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/000401d67590%24dce73a50%2496b5aef0%24%40informationjunction.co.uk.
Andrew Mitchell | Ontologist | BORO Solutions Limited | www.BOROSolutions.net
Hi Chris,
Whilst I accept Matthew’s point that there will be aspects of aggregation that are business process related. As such there is a need to be able to model sensitivity and where applicable any associated issues/concepts related to aggregation, confidentiality, etc.
For many organisations there is a requirement to for the capability to identify and protect valuable information assets and thus we need to have a common language to describe and design the business process to allow use of the data/information in specified ways. This is potentially a modelling requirement in all science and engineering disciplines as organisations and individuals seek to protect intellectual property, trade secrets and in medicine the confidentiality and/or anonymity of patient data. Our current challenge is the lack of a standardised way of describing the ‘classification’ of data and information, organisations use different terms/labels which makes sharing and reuse complex.
There is much work to do to get this right if the NDT concept is to operate in a security-minded way. The suggestion is simply to have a placeholder in the Appendix so that we acknowledge that this issue sits alongside questions related to versioning, ownership and the kinds of roles or actors.
Regards,
Hugh
——————————————
Hugh Boyes CEng FIET CISSP
Director
for and on behalf of Bodvoc Ltd
(M) 07970 703082
Cyber Essentials Plus Certificate Number CEP-4SE-09388
This email and any attachments to it may be confidential and are intended solely for the use of the individual to whom it is addressed. If you are not the intended recipient of this email, you must neither take any action based upon its contents, nor copy or show
it to anyone. Please contact the sender if you believe you have received this email in error.
From: <uk-nd...@googlegroups.com> on behalf of Chris Partridge <partr...@borogroup.co.uk>
Reply to: "uk-nd...@googlegroups.com" <uk-nd...@googlegroups.com>
Date: Tuesday, 18 August 2020 at 18:44
To: fdm ndt <uk-nd...@googlegroups.com>
Subject: Re: [FDM] Draft Recommendation Document
Hi Hugh,
Excellent point.
Matthew and I (and I think some others, maybe Al) discussed this requirement in the early stages.
The question I asked was whether we needed to include modelling of things like the sensitivity types and levels in the FDM itself. As you expect I/we have come across these requirements quite a few times, including issues about aggregation
One of the questions that always comes up is whether these types of issues should be relegated to a separate (standard?) model or included under the TLO in the FDM.
There are good arguments for both approaches - and no need to decide now. But useful to know there are options.
Regards,
Chris Partridge
To view this discussion on the web, visit
https://groups.google.com/d/msgid/uk-ndt-fdm/CA%2B8EkRpABeV7yCwT_jw%3DYA0U88m938UV-c6D_86y-cnos_mZUQ%40mail.gmail.com.
Regards,
Chris Partridge
Chris Partridge |
Chief Ontologist | BORO Solutions Limited | www.BOROSolutions.co.uk
M: +44 790 5167263 | e: partr...@borogroup.co.uk
BORO Solutions Limited | Registered Office: 2 West Street, Henley on Thames, Oxfordshire RG9 2DU
Registered in England & Wales | Company No: 06025010 | VAT No. GB 905 6100 58
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/C9188E6E-1077-4355-A2DA-8140B31B37BE%40bodvoc.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/CA%2B8EkRrSnBFLPuf9rE4hTcP%2BqUDA9PQJVv_4FCE_ROO8dF9dsw%40mail.gmail.com.
Hi Matthew,
I think the document overall reads clearly and is well-structured. The rationale for adopting as seeds the four 4D ontologies mentioned is sound with a good explanation of the requirements and scope.
I attach the document with tracked changes mainly for a few typos found.
Just one question. In the document the distinction between real-world versus linguistic ontologies uses the terms foundational/linguistic. Is this terminological distinction found in the literature? I ask because DOLCE (an example of a TLO based on linguistics) is also referred to as a foundational ontology in the literature.
Regards,
Sergio
Andrew Mitchell | Ontologist | BORO Solutions Limited | www.BOROSolutions.net
M: +44 7596 267 310 | e: mitc...@borogroup.co.uk
BORO Solutions Limited | Registered Office: 2 West Street, Henley on Thames, Oxfordshire RG9 2DU
Registered in England & Wales | Company No: 06025010 | VAT No. GB 905 6100 58
--
You received this message because you are subscribed to the Google Groups "UK NDT FDM" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
uk-ndt-fdm+...@googlegroups.com.
To view this discussion on the web, visit
https://groups.google.com/d/msgid/uk-ndt-fdm/CAF2%2Bs0WFbitAXoCXwXhuAHZdoX4rNMsNdd9UEo08va1wzUSWPw%40mail.gmail.com.
The University of Westminster is a charity and a company limited by guarantee. Registration number: 977818 England. Registered Office: 309 Regent Street, London W1B 2HW.
This message and its attachments are private and confidential. If you have received this message in error, please notify the sender and remove it and its attachments from your system.
Dear Andrew,
Thank you. I have had a quick look and there seems to be a pattern in the comments people are making, which is helpful.
I’m on holiday this week, so I will try to respond to the comments through an updated version starting work on it next week.
Regards
Matthew
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/CAF2%2Bs0WFbitAXoCXwXhuAHZdoX4rNMsNdd9UEo08va1wzUSWPw%40mail.gmail.com.
Dear Hugh,
Hi Chris,
Whilst I accept Matthew’s point that there will be aspects of aggregation that are business process related. As such there is a need to be able to model sensitivity and where applicable any associated issues/concepts related to aggregation, confidentiality, etc.
[MW] I agree.
For many organisations there is a requirement to for the capability to identify and protect valuable information assets and thus we need to have a common language to describe and design the business process to allow use of the data/information in specified ways. This is potentially a modelling requirement in all science and engineering disciplines as organisations and individuals seek to protect intellectual property, trade secrets and in medicine the confidentiality and/or anonymity of patient data. Our current challenge is the lack of a standardised way of describing the ‘classification’ of data and information, organisations use different terms/labels which makes sharing and reuse complex.
[MW] I also agree with this. It is just a matter of where it turns up.
There is much work to do to get this right if the NDT concept is to operate in a security-minded way. The suggestion is simply to have a placeholder in the Appendix so that we acknowledge that this issue sits alongside questions related to versioning, ownership and the kinds of roles or actors.
[MW] This is the key bit from the Pathway Document. The question I have for your is whether this is sufficient to cover what you are looking for?
Task 2B: Assessment of security threats and approaches
In this task, we will review security approaches, (considering PAS 185 and ISO 19650-5) and threat models. Although security-related information will be embodied throughout the resulting work, the security significance of the NDT means this will need to be considered upfront, and the results shared with those carrying out the remainder of the tasks, to ensure their awareness of the security context. Threat models will vary considerably depending on the types of application and digital twin involved.
In considering the security issues, it is necessary to look beyond the traditional concepts of confidentiality, integrity and availability to assess and understand the implications in respect of:
• authenticity – is the data/information being used of known and acceptable provenance and how can this be verified?
• utility – the asset will change over its life cycle, through maintenance or replacement or components or augmentation to change its capability or capacity. How will one establish that the historic telemetry data is comparable and consistent with that currently being used, and if not, how are long term trends monitored and managed?
• safety – what effect do changes to the physical and digital elements of the twin have on the safety case for the asset, its use or outputs?
• resilience – of the digital twin, how will it transform, renew and/or recover, in a timely manner in response to adverse events?
• control – will access to the digital twin enable unauthorised control or modification of the physical asset, or enable hostile reconnaissance?
• sensitive information – how will the infrastructure prevent transfer and release of personally identifiable and commercially sensitive information, and how will the intellectual property of twins be protected?
We will be required to handle situations where a query requires access to data that the user is not authorised to use.
We must consider how to respond to an authorisation failure in circumstances where it would be inappropriate to inform the user of the authorisation failure, as this would acknowledge the presence of information that they are not authorised to access: proposals on how to respond to this challenge should be made here. (For example, one common choice is to return the “wrong” error code, returning “not found” where the “correct” response is “forbidden”.)
Deliverable: A limited distribution paper discussing the threat modelling and security architecture of the proposed approach.
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/C9188E6E-1077-4355-A2DA-8140B31B37BE%40bodvoc.com.
Dear Matthew,
Task 2B as drafted covers the generic set of security issues that we will need to address at single model level. Whilst it does not explicitly address the question of aggregation, that is a consideration that a model designer/developer should take into account and may be delivered thought varying levels of access and display.
What I think is missing from Task 2B is the handling of the data aggregation arising from assimilation, processing and display of data from multiple models. In this scenario we could be faced by two or more models, which when viewed or used in isolation do not result in any increased risk, as the designers/owners have taken into account the potential damage or harm. However, the combination of data which in isolation may have seemed relatively innocuous but results in patterns or enable deductions that are or could if misused be harmful. To model and write business rules to mitigate such combinations I foresee the need for the TLO to incorporate entities that provide a basis for a mechanism that can limit access/use on a context sensitive basis, e.g. when combining data sets that facilitate the reidentification of anonymised assets, persons, etc. This problem is not addressed by the Task 2B text regarding sensitive information.
To answer your question – no 2B is not sufficient given aggregation issues we are currently seeking to address.
Regards,
Hugh
——————————————
Hugh Boyes CEng FIET CISSP
Director
for and on behalf of Bodvoc Ltd
To view this discussion on the web, visit
https://groups.google.com/d/msgid/uk-ndt-fdm/014201d676d2%2473e86c70%245bb94550%24%40informationjunction.co.uk.
Dear Sergio,
Thank you for this review. As with other comments I’ll try to look at them next week.
See below.
Hi Matthew,
I think the document overall reads clearly and is well-structured. The rationale for adopting as seeds the four 4D ontologies mentioned is sound with a good explanation of the requirements and scope.
I attach the document with tracked changes mainly for a few typos found.
Just one question. In the document the distinction between real-world versus linguistic ontologies uses the terms foundational/linguistic. Is this terminological distinction found in the literature? I ask because DOLCE (an example of a TLO based on linguistics) is also referred to as a foundational ontology in the literature.
[MW] That is one for Chris I think (it is his classification that makes it not foundational). Of course one of the problems is that just because we use a term with a particular meaning, does not mean others are required to do the same. I hope I was clear what we mean here by foundational.
Here is just one place where it is described as Foundational:
http://www.loa.istc.cnr.it/dolce/overview.html
and this:
Foundational choices in DOLCE Stefano Borgo Claudio Masolo February 20, 2008
“DOLCE, the Descriptive Ontology for Linguistic and Cognitive Engineering [15], is a foundational ontology…”
Regards
Matthew West
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/C020AA6B-D7E1-4DDF-9020-875427FBA8EF%40westminster.ac.uk.
Dear Hugh,
Thanks for this more detailed analysis.
Task 2B as drafted covers the generic set of security issues that we will need to address at single model level. Whilst it does not explicitly address the question of aggregation, that is a consideration that a model designer/developer should take into account and may be delivered thought varying levels of access and display.
[MW] OK. Well that is something at least.
What I think is missing from Task 2B is the handling of the data aggregation arising from assimilation, processing and display of data from multiple models. In this scenario we could be faced by two or more models, which when viewed or used in isolation do not result in any increased risk, as the designers/owners have taken into account the potential damage or harm. However, the combination of data which in isolation may have seemed relatively innocuous but results in patterns or enable deductions that are or could if misused be harmful. To model and write business rules to mitigate such combinations I foresee the need for the TLO to incorporate entities that provide a basis for a mechanism that can limit access/use on a context sensitive basis, e.g. when combining data sets that facilitate the reidentification of anonymised assets, persons, etc. This problem is not addressed by the Task 2B text regarding sensitive information.
[MW] I’m struggling to see how this is going to work. How do you expect to prevent two data sets being used together? What would stop me from getting one of them myself, and the other through a friend or colleague, and then putting them together. I expect I could prevent both of them being used together within the NDT, but what is to stop them being taken separately outside the NDT and then used together?
It seems to me that the only way to be truly sure of not being able to deduce patterns is to make sure that the level of aggregation is sufficient that there is not another data set that could make a significant impact on privacy in combination.
To answer your question – no 2B is not sufficient given aggregation issues we are currently seeking to address.
[MW] OK. But how do you think you can make data sets available at all and prevent their use in combination (especially since the underlying idea behind the NDT is to make data sets available for use together so you can learn more from combining them.
Regards
Matthew
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/87701F1F-10C2-4D81-A816-5FDF79374690%40bodvoc.com.
Regards,
Chris Partridge
Chris Partridge |
Chief Ontologist | BORO Solutions Limited | www.BOROSolutions.co.uk
M: +44 790 5167263 | e: partr...@borogroup.co.uk
BORO Solutions Limited | Registered Office: 2 West Street, Henley on Thames, Oxfordshire RG9 2DU
Registered in England & Wales | Company No: 06025010 | VAT No. GB 905 6100 58
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/000c01d67728%24657c2400%2430746c00%24%40informationjunction.co.uk.
Dear Matthew,
I am conscious that you have a specific task to complete and don’t wish to divert attention from completing the recommendation paper. The detail of how we might solve the problem is something we can address once the recommendation is accepted and the FDM development work is funded. It is likely to include specific measures will be required in all of the components shown in your Figure 1, as well as business process and governance arrangements for the deployment and operation of models as part of the NDT. Your point about data sets being extracted and shared is well made, but that is an information security issue that we already have to address through policies, security operating procedures, user training and ultimately disciplinary/legal action.
Regarding your point about making data sets available to all – that is unlikely to be acceptable on a number of grounds. The experience we are gaining from some currently live projects demonstrates that asset owners/operators have legitimate concerns about access to some of their data. To address these concerns and others regarding security, sensitivity, intellectual property, etc. the discovery protocol and authorisation layer will have to accommodate varying levels of visibility of and access to models and data.
An acknowledgement in the Appendix that there are questions to be addressed regarding the aggregation of data would suffice at this stage of the programme, we can work on the detail once your recommendation has been accepted.
Regards,
Hugh
——————————————
Hugh Boyes CEng FIET CISSP
Director
for and on behalf of Bodvoc Ltd
(M) 07970 703082
Cyber Essentials Plus Certificate Number CEP-4SE-09388
This email and any attachments to it may be confidential and are intended solely for the use of the individual to whom it is addressed. If you are not the intended recipient of this email, you must neither take any action based upon its contents, nor copy or show
it to anyone. Please contact the sender if you believe you have received this email in error.
To view this discussion on the web, visit
https://groups.google.com/d/msgid/uk-ndt-fdm/000c01d67728%24657c2400%2430746c00%24%40informationjunction.co.uk.
Hi Chris,
Yes the use of markings is likely to be part of the solution, hence the suggestion that the TLO needs to accommodate data that represents security, sensitivity and/or handling restrictions.
As I have just suggested in my response to Matthew we do not need to solve it now, just have a suitable reference in the recommendation document that allows us to refer back to the issue during subsequent design and development.
Regards,
Hugh
——————————————
Hugh Boyes CEng FIET CISSP
Director
for and on behalf of Bodvoc Ltd
(M) 07970 703082

Cyber Essentials Plus Certificate Number CEP-4SE-09388
This email and any attachments to it may be confidential and are intended solely for the use of the individual to whom it is addressed. If you are not the intended recipient of this email, you must neither take any action based upon its contents, nor copy or show
it to anyone. Please contact the sender if you believe you have received this email in error.
From: <uk-nd...@googlegroups.com> on behalf of Chris Partridge <partr...@borogroup.co.uk>
Reply to: "uk-nd...@googlegroups.com" <uk-nd...@googlegroups.com>
Date: Friday, 21 August 2020 at 00:01
To: fdm ndt <uk-nd...@googlegroups.com>
Subject: Re: [FDM] Draft Recommendation Document
Hi Matthew,
I think what is envisaged is that data would get markings. And when the certain data (of whatever type) is aggregated, then there is a process for determining the new markings. Of course, the worrying case is where the aggregated data is more sensitive, but presumably there would be cases when it would be less sensitive.
Your point about people getting the datasets and aggregating for themselves is well made.
However, I think this is just part of a more general issue. This is how markers like sensitivity and provenance are handled when mapping to the FDM formats. While the FDM may only consume the transformed data - it might be worth sensitising
people who are doing the mapping (including any aggregation) to the concern.
Regards,
Chris Partridge
Regards,
Chris PartridgeError! Filename not specified.
To view this discussion on the web, visit
https://groups.google.com/d/msgid/uk-ndt-fdm/CA%2B8EkRq%3DfL-UqFXfKp4DDmDH4nJ9vfDo__7BpmpXhR%3DMo4SqYQ%40mail.gmail.com.
Regards,
Chris Partridge
Chris Partridge |
Chief Ontologist | BORO Solutions Limited | www.BOROSolutions.co.uk
M: +44 790 5167263 | e: partr...@borogroup.co.uk
BORO Solutions Limited | Registered Office: 2 West Street, Henley on Thames, Oxfordshire RG9 2DU
Registered in England & Wales | Company No: 06025010 | VAT No. GB 905 6100 58
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/92d7ea8d-690f-8ffb-6680-a51fb96a5d57%40kraines.net.
Regards,
Chris Partridge
Chris Partridge |
Chief Ontologist | BORO Solutions Limited | www.BOROSolutions.co.uk
BORO Solutions Limited | Registered Office: 2 West Street, Henley on Thames, Oxfordshire RG9 2DU
Registered in England & Wales | Company No: 06025010 | VAT No. GB 905 6100 58
To unsubscribe from this group and stop receiving emails from it, send an email to uk-ndt-fdm+...@googlegroups.com.
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/38d63740-8ed3-91b1-c3e9-4b2d5f18ce2a%40criticalinsight.co.uk.
Dear Hugh,
There are really two separate points here:
I am conscious that you have a specific task to complete and don’t wish to divert attention from completing the recommendation paper.
[MW] We need to take the time to get it right (as far as possible).
The detail of how we might solve the problem is something we can address once the recommendation is accepted and the FDM development work is funded.
[MW] Agreed.
It is likely to include specific measures will be required in all of the components shown in your Figure 1, as well as business process and governance arrangements for the deployment and operation of models as part of the NDT. Your point about data sets being extracted and shared is well made, but that is an information security issue that we already have to address through policies, security operating procedures, user training and ultimately disciplinary/legal action.
[MW] I agree. This works fine for data not made publicly available, but if it is not publicly available I wonder about the value of obscuring sensitive data in the first place since you have other effective controls, and the data is likely to be more useful with more detail available.
Regarding your point about making data sets available to all – that is unlikely to be acceptable on a number of grounds.
[MW] I’m sure there will be some data that is publicly available, even if it is only tube maps, road networks, train punctuality etc. The point is that such data must be such that it cannot be combined to reveal sensitive data. On the other hand, if it is not public, and access is controlled, I don’t see the point in obscuring sensitive data.
The experience we are gaining from some currently live projects demonstrates that asset owners/operators have legitimate concerns about access to some of their data.
[MW] Yes. That is recognised in the structure of the integration architecture already. We need to pick up the data requirements that implies. The appendix you refer to wanting an addition is supposed to be requirements from the Pathway document, so I am just trying to work out whether what you are talking about can be considered as part of that, or whether I have to restructure the appendix to include requirements that the Pathway document missed.
To address these concerns and others regarding security, sensitivity, intellectual property, etc. the discovery protocol and authorisation layer will have to accommodate varying levels of visibility of and access to models and data.
[MW] I think that is already in the Pathway document, so we just need to fish it out and add it. If it is there I will do it, if not add it as implicit requirements.
An acknowledgement in the Appendix that there are questions to be addressed regarding the aggregation of data would suffice at this stage of the programme, we can work on the detail once your recommendation has been accepted.
[MW] That would be new, and additional to the requirements stated/implicit in the Pathway document, which is why I am questioning whether there is any substance there. As far as I can see if a data set was capable of revealing sensitive information in conjunction with another data set, though neither alone would reveal it, then it has to be treated as if it did reveal it (this could be tricky to determine with data sets from different organizations). However, in the end it seems to me it is still just a matter of how you classify the sensitivity of information (together with the procedures for handling information with that sensitivity), which we will have to do anyway.
Thanks for sticking with this.
Regards
Matthew West
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/76B4F065-6F4D-440F-B1C8-A6EEEBE0CD38%40bodvoc.com.
Dear Chris,
I thought I had covered this.
I do have one niggle with Matthew's formulation - the use of say. Natural language is really flexible. The grammar does not stop us saying that is a round square or two plus two equals six. Also, even when what we say is not obviously inconsistent, we often have not worked out how to formalise it - and formalise it in a way that is consistent with the rest of the model. So, I'd suggest caveating 'said' - with 'provided we formalise it'.
[MW] The document says “say anything that is valid". The “valid” is supposed to cover your point.
Regards
Matthew
To view this discussion on the web, visit https://groups.google.com/d/msgid/uk-ndt-fdm/CA%2B8EkRq%2Bd7%3D1Zsf5RWcLvXVKptWCwdqFigk0HAWYHUw92yUnug%40mail.gmail.com.