Communications Data
   HOME
*





Communications Data
Communications data (sometimes referred to as traffic data or metadata) concerns information about communication. Communications data is a part of a message that should be distinguished from the content of the message. It contains data on the communication's origin, destination, route, time, date, size, duration, or type of underlying service.Convention on Cybercrime
Artikel 1(d): "traffic data" means any computer data relating to a communication by means of a computer system, generated by a computer system that formed a part in the chain of communication, indicating the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.


References

{{reflist


See also

*
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Metadata
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive information about a resource. It is used for discovery and identification. It includes elements such as title, abstract, author, and keywords. * Structural metadata – metadata about containers of data and indicates how compound objects are put together, for example, how pages are ordered to form chapters. It describes the types, versions, relationships, and other characteristics of digital materials. * Administrative metadata – the information to help manage a resource, like resource type, permissions, and when and how it was created. * Reference metadata – the information about the contents and quality of statistical data. * Statistical metadata – also called process data, may describe processes that collect, process, or produce s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Call Detail Record
A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through that facility or device. The record contains various attributes of the call, such as time, duration, completion status, source number, and destination number. It is the automated equivalent of the paper toll tickets that were written and timed by operators for long-distance calls in a manual telephone exchange. CDR contents A call detail record contains data fields that describe a specific instance of a telecommunication transaction, but does not include the content of that transaction. By way of simplistic example, a call detail record describing a particular phone call might include the phone numbers of both the calling and receiving parties, the start time, and duration of that call. In actual modern practice, call detail records are ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Internet Protocol Detail Record
In telecommunications, an IP Detail Record (IPDR) provides information about Internet Protocol (IP)-based service usage and other activities that can be used by operations support systems (OSSes) and business support systems (BSSes). The content of the IPDR is determined by the service provider, network/service element vendor, or any other community of users with authority for specifying the particulars of IP-based services in a given context. The IPDR specifications were originally produced by the Internet Protocol Detail Record Organization, Inc. (aka IPDR.org). In 2007, the IPDR.org organization was acquired by the TM Forum, an industry association of more than 900 global members in over 160 countries from across the converging industries of telecom, cable, media and the Internet. The IPDR specifications include requirements for IPDR collection, encoding and transport protocols to exchange IPDR records, the IPDR service specification design guidance, and several sample IPDR Servic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Pen Register
A pen register, or dialed number recorder (DNR), is an electronic device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, including programs monitoring Internet communications. The United States statutes governing pen registers are codified unde18 U.S.C., Chapter 206 Definitions The term ''pen register'' originally referred to a device for recording telegraph signals on a strip of paper. Samuel F. B. Morse's 1840 telegraph patent described such a register as consisting of a lever holding an armature on one end, opposite an electromagnet, with a fountain pen, pencil or other marking instrument on the other end, and a clockwork mechanism to advance a paper recording tape under the marker. The term ''telegraph register'' came to be a generic term for such a recording device in the later 19th century. Where the record was made in ink with a pen, the t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Retention Directive
The Data Retention Directive (Directive 2006/24/EC), a directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks. It amended the Directive on Privacy and Electronic Communications. According to the Data Retention Directive, EU member states had to store information on all citizens' telecommunications data (phone and internet connections) for a minimum of six months and at most twenty-four months, to be delivered on demand to police authorities. Under the directive, the police and security agencies would have been able to request access to details such as IP addresses and time of use of every email, phone call and text message sent or received. There was no provision in the directive that permission to access the data must be confir ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Interception Modernization Programme
The Interception Modernisation Programme (IMP) was a UK government initiative to extend the government's capabilities for lawful interception and storage of communications data. It was widely reported that the IMP's eventual goal was to store details of all UK communications data in a central database. The proposal was similar to the NSA Call Database ( MAINWAY) established by GCHQ's American counterpart NSA and the Titan traffic database established by the Swedish National Defence Radio Establishment. In 2008 plans were being made to collect data on all phone calls, emails, chatroom discussions and web-browsing habits as part of the IMP, thought likely to require the insertion of 'thousands' of black box probes into the country’s computer and telephone networks. The proposals were expected to be included in the Communications Data Bill 2008. The "giant database" would include telephone numbers dialled, the websites visited and addresses to which e-mails are sent "but not the c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Mastering The Internet
Mastering the Internet (MTI) is a mass surveillance project led by the British communications intelligence agency Government Communications Headquarters (GCHQ) budgeted at over £1 billion. According to reports in ''The Register'' and ''The Sunday Times'' in early May 2009, contracts with a total value of £200m had already been awarded to suppliers. Responding to these reports, GCHQ issued a press release countering these claims of mass surveillance, stating that "GCHQ is not developing technology to enable the monitoring of all internet use and phone calls in Britain, or to target everyone in the UK." However, the 2013 mass surveillance disclosures revealed that the GCHQ gathers "raw" information (without filtering out the communications of British citizens) from the web as part of its "Mastering the Internet" programme. Background "Mastering the Internet" (MTI) is a project by the British government and part of the Interception Modernisation Programme (IMP). The system wa ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


NSA Call Database
MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and T-Mobile. The existence of this database and the NSA program that compiled it was unknown to the general public until ''USA Today'' broke the story on May 10, 2006. It is estimated that the database contains over 1.9 trillion call-detail records. The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in traffic analysis "And, by the way, I hate the term 'metadata.' What's wrong with 'traffic analysis,' which is what we've always called that sort of thing?" and social network analysis, "The data are used for 'social network analysis,' the official said, meaning to study how terrorist networks contact each other and how they are tied together." but do not include audio informati ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Communications Security Establishment Canada
The Communications Security Establishment (CSE; french: Centre de la sécurité des télécommunications, ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signals intelligence (SIGINT) and communications security (COMSEC), protecting federal government electronic information and communication networks, and is the technical authority for cyber security and information assurance. Administered under the Department of National Defence (DND), the CSE is accountable to the Minister of National Defence through its deputy head, the Chief of CSE. The National Defence Minister is in turn accountable to the Cabinet and Parliament. The current Chief of the CSE is Caroline Xavier, who assumed the office on 31 August 2022. The Agency recently built a new headquarters and campus encompassing . The new headquarters totals a little over and is adjacent ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Titan Traffic Database
The Titan traffic database is a database allegedly in use by the Swedish signals intelligence agency, the National Defence Radio Establishment The National Defence Radio Establishment ( sv, Försvarets radioanstalt, FRA) is a Swedish government agency organised under the Ministry of Defence. The two main tasks of FRA are signals intelligence (SIGINT), and support to government authorit ... (FRA), according to a news report by '' Rapport'' on SVT in June 2008, based on an account from an anonymous source. The source alleged the agency had been storing "massive amounts of information" about "who have been talking to whom, but no content"; leading to a private citizen lodging a complaint with the police. Ultimately, a prosecutor did not launch a full-scale investigation, as it was deemed not illegal at the time. See also * Echelon * MAINWAY References {{Reflist Military intelligence Signals intelligence Privacy of telecommunications Surveillance scandals Mass surve ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Law Enforcement Equipment
Law is a set of rules that are created and are enforceable by social or governmental institutions to regulate behavior,Robertson, ''Crimes against humanity'', 90. with its precise definition a matter of longstanding debate. It has been variously described as a science and as the art of justice. State-enforced laws can be made by a group legislature or by a single legislator, resulting in statutes; by the executive through decrees and regulations; or established by judges through precedent, usually in common law jurisdictions. Private individuals may create legally binding contracts, including arbitration agreements that adopt alternative ways of resolving disputes to standard court litigation. The creation of laws themselves may be influenced by a constitution, written or tacit, and the rights encoded therein. The law shapes politics, economics, history and society in various ways and serves as a mediator of relations between people. Legal systems vary between jurisdictions, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception. Surveillance is used by citizens for protecting their neighborhoods. And by governments for intelligence gathering - including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organisations charged with detecting heresy and heterodoxy may also carry out surveillance. Auditors ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]