Phone Log
A phone log is metadata collected from telephone or mobile phones for the purpose of surveillance or espionage. This metadata may include: length of calls, phone numbers of both parties, phone-specific identification information, GPS location, call proximity, and/or computer converted voice-to-text transcripts of the phone call conversation. The advantage of converting audio to ASCII text metadata is that this makes it easy to search for keywords and phrases, and ASCII text metadata can be easily stored on conventional database systems for several years. Phone logs are not limited to governmental collection. For example, some private sector companies, such as banks, are known to collect phone log data on their internal phone network of all calls within and between the company and outside parties. DICE is a known governmental phone log database maintained by the DEA consisting largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Metadata
Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive information about a resource. It is used for discovery and identification. It includes elements such as title, abstract, author, and keywords. * Structural metadata – metadata about containers of data and indicates how compound objects are put together, for example, how pages are ordered to form chapters. It describes the types, versions, relationships, and other characteristics of digital materials. * Administrative metadata – the information to help manage a resource, like resource type, and permissions, and when and how it was created. * Reference metadata – the information about the contents and quality of Statistical data type, statistical data. * Statistical metadata – also called process data, may ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Global Positioning System
The Global Positioning System (GPS) is a satellite-based hyperbolic navigation system owned by the United States Space Force and operated by Mission Delta 31. It is one of the global navigation satellite systems (GNSS) that provide geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. It does not require the user to transmit any data, and operates independently of any telephone or Internet reception, though these technologies can enhance the usefulness of the GPS positioning information. It provides critical positioning capabilities to military, civil, and commercial users around the world. Although the United States government created, controls, and maintains the GPS system, it is freely accessible to anyone with a GPS receiver. Overview The GPS project was started by the U.S. Department of Defense in 1973. The first prototype spacecraft was launched in 1978 an ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
DICE (DEA Database)
The DEA Internet Connectivity Endeavor or DICE is a Drug Enforcement Administration database that consists largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests, and search warrants A search warrant is a court order that a magistrate or judge issues to authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate any evidence they find. In most countries, ... nationwide. DICE includes about 1 billion records, and they are kept for about a year and then purged. Reuters, John Shiffman and David Ingram, 8/8/2013 References [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Drug Enforcement Administration
The Drug Enforcement Administration (DEA) is a Federal law enforcement in the United States, United States federal law enforcement agency under the U.S. Department of Justice tasked with combating illicit Illegal drug trade, drug trafficking and distribution within the U.S. It is the lead agency for domestic enforcement of the Controlled Substances Act, sharing concurrent jurisdiction with the Federal Bureau of Investigation and U.S. Customs and Border Protection. The DEA is responsible for coordinating and pursuing U.S. drug investigations both domestically and internationally. It was established in 1973 as part of the U.S. government's War on Drugs, war on drugs. The DEA has an DEA Office of National Security Intelligence, intelligence unit that is also a member of the U.S. Intelligence Community. While the unit is part of the DEA chain-of-command, it also reports to the Director of National Intelligence, director of national intelligence. The DEA has been criticized for sche ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks that consists of Private network, private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, Wireless network, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and Web application, applications of the World Wide Web (WWW), email, electronic mail, internet telephony, streaming media and file sharing. The origins of the Internet date back to research that enabled the time-sharing of computer resources, the development of packet switching in the 1960s and the design of computer networks for data communication. The set of rules (communication protocols) to enable i ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Subpoenas
A subpoena (; also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure. There are two common types of subpoenas: # '' subpoena ad testificandum'' orders a person to testify before the ordering authority or face punishment. The subpoena can also request that the testimony be given by phone or in person. # '' subpoena duces tecum'' orders a person or organization to bring physical evidence before the ordering authority or face punishment. This is often used for requests to mail copies of documents to a requesting party or directly to a court. Etymology The term ''subpoena'' is from the Middle English ''suppena'' and the Latin phrase ''sub poena'' meaning "under penalty". It is also spelled "subpena".See, e.g., ; ; ; and . The subpoena has its source in English common law and it is now used almost with universal application throughout the E ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Search Warrants
A search warrant is a court order that a magistrate or judge issues to authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate any evidence they find. In most countries, a search warrant cannot be issued in aid of civil process. Jurisdictions that respect the rule of law and a right to privacy constrain police powers, and typically require search warrants or an equivalent procedure for searches police conducted in the course of a criminal investigation. The laws usually make an exception for hot pursuit: a police officer following a criminal who has fled the scene of a crime has the right to enter a property where the criminal has sought shelter. The necessity for a search warrant and its abilities vary from country to country. In certain authoritarian nations, police officers may be allowed to search individuals and property without having to obtain court permission or provide justification for their ac ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Pen Register
A pen register, or dialed number recorder (DNR), is a device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, including programs monitoring Internet communications. The United States statutes governing pen registers are codified unde18 U.S.C., Chapter 206 Definitions The term ''pen register'' originally referred to a device for recording telegraph signals on a strip of paper. Samuel F. B. Morse's 1840 telegraph patent described such a register as consisting of a lever holding an armature on one end, opposite an electromagnet, with a fountain pen, pencil or other marking instrument on the other end, and a clockwork mechanism to advance a paper recording tape under the marker. The term ''telegraph register'' came to be a generic term for such a recording device in the later 19th century. Where the record was made in ink with a pen, the term ''pen re ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Hampton Roads Telephone Analysis Sharing Network
The Hampton Roads Telephone Analysis Sharing Network was a program through which law enforcement agencies in five Virginia cities access a shared database containing phone records and contents of seized mobile devices. The program was active from 2012 to 2015. Participating cities * Hampton * Newport News * Norfolk * Chesapeake * Suffolk Sharing Participating agencies have, through a memorandum of understanding, agreed to "share telephone intelligence information derived from any source with the (task force) including: subpoenaed telephone call detail records, subpoenaed telephone subscriber information, and seized mobile devices." Controversy Rob Poggenklass, an ACLU staff attorney, stated that the program violates Virginia's Government Data Collection and Dissemination Practices Act. The Virginia State Police stated that they declined to join, citing the same statute. Termination In 2015, Chesapeake asked Virginia Attorney General Mark Herring Mark Rankin Herr ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Counterterrorism In The United States
Counterterrorism (alternatively spelled: counter-terrorism), also known as anti-terrorism, relates to the practices, military tactics, techniques, and strategies that governments, law enforcement, businesses, and intelligence agencies use to combat or eliminate terrorism and violent extremism. If an act of terrorism occurs as part of a broader insurgency (and insurgency is included in the definition of terrorism) then counterterrorism may additionally employ counterinsurgency measures. The United States Armed Forces uses the term "foreign internal defense" for programs that support other countries' attempts to suppress insurgency, lawlessness, or subversion, or to reduce the conditions under which threats to national security may develop. History The first counterterrorism body to be formed was the Special Irish Branch of the Metropolitan Police, later renamed the Special Branch after it expanded its scope beyond its original focus on Fenian terrorism. Various law enforcement ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Privacy Of Telecommunications
__NOTOC__ The secrecy of correspondence (, ) or literally translated as secrecy of letters, is a fundamental legal principle enshrined in the constitutions of several European countries. It guarantees that the content of sealed Letter (message), letters is never revealed, and that letters in transit are not opened by government officials, or any other third party. The right of privacy to one's own letters is the main legal basis for the assumption of privacy of correspondence. The principle has been naturally extended to other forms of telecommunication, communication, including telephony and electronic communications on the Internet, as the constitutional guarantees are generally thought to also cover these forms of communication. However, national telecommunications privacy laws may allow lawful interception, i.e. wiretapping and monitoring of electronic communications in cases of Suspect, suspicion of crime. Paper letters have, in most jurisdictions, remained outside the legal ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Privacy In The United States
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of bodily integrity. Throughout history, there have been various conceptions of privacy. Most cultures acknowledge the right of individuals to keep aspects of their personal lives out of the public domain. The right to be free from unauthorized invasions of privacy by governments, corporations, or individuals is enshrined in the privacy laws of many countries and, in some instances, their constitutions. With the rise of technology, the debate regarding privacy has expanded from a bodily sense to include a digital sense. In most countries, the right to digital privacy is considered an extension of the original right to privacy, and many countries have passed acts ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |