Phone Log
   HOME
*





Phone Log
A phone log is metadata collected from telephone or mobile phones for the purpose of surveillance or espionage. This metadata may include: length of calls, phone numbers of both parties, phone-specific identification information, Global Positioning System, GPS location, call proximity, and/or computer converted voice-to-text transcripts of the phone call conversation. The advantage of converting audio to ASCII text metadata is that this makes it easy to search for keywords and phrases, and ASCII text metadata can be easily stored on conventional database systems for several years. Phone logs are not limited to governmental collection. For example, some private sector companies, such as banks, are known to collect phone log data on their internal phone network of all calls within and between the company and outside parties. DICE (DEA database), DICE is a known governmental phone log database maintained by the Drug Enforcement Administration, DEA consisting largely of phone log and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Metadata
Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive information about a resource. It is used for discovery and identification. It includes elements such as title, abstract, author, and keywords. * Structural metadata – metadata about containers of data and indicates how compound objects are put together, for example, how pages are ordered to form chapters. It describes the types, versions, relationships, and other characteristics of digital materials. * Administrative metadata – the information to help manage a resource, like resource type, permissions, and when and how it was created. * Reference metadata – the information about the contents and quality of statistical data. * Statistical metadata – also called process data, may describe processes that collect, process, or produce st ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Global Positioning System
The Global Positioning System (GPS), originally Navstar GPS, is a satellite-based radionavigation system owned by the United States government and operated by the United States Space Force. It is one of the global navigation satellite systems (GNSS) that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. It does not require the user to transmit any data, and operates independently of any telephonic or Internet reception, though these technologies can enhance the usefulness of the GPS positioning information. It provides critical positioning capabilities to military, civil, and commercial users around the world. Although the United States government created, controls and maintains the GPS system, it is freely accessible to anyone with a GPS receiver. The GPS project was started by the U.S. Department of Defense in 1973. The first prototype spacecraft was lau ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


DICE (DEA Database)
DICE is a DEA database that consists largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests, and search warrants A search warrant is a court order that a magistrate or judge issues to authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate any evidence they find. In most countries, ... nationwide. DICE includes about 1 billion records, and they are kept for about a year and then purged.Exclusive: IRS manual detailed DEA's use of hidden intel evidence
Reuters, John Shiffman and David Ingram, 8/8/2013


References


[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Drug Enforcement Administration
The Drug Enforcement Administration (DEA; ) is a Federal law enforcement in the United States, United States federal law enforcement agency under the U.S. Department of Justice tasked with combating drug trafficking and distribution within the U.S. It is the lead agency for domestic enforcement of the Controlled Substances Act, sharing concurrent jurisdiction with the Federal Bureau of Investigation, the U.S. Immigration and Customs Enforcement, and U.S. Customs and Border Protection although the DEA has sole responsibility for coordinating and pursuing U.S. drug investigations both domestically and abroad. The DEA has an DEA Office of National Security Intelligence, intelligence unit that is also a member of the United States Intelligence Community, U.S. Intelligence Community. While the unit is part of the DEA chain-of-command, it also reports to the Director of National Intelligence. History and mandate The Drug Enforcement Administration was established on July 1, 1973, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing. The origins of the Internet date back to the development of packet switching and research commissioned by the United States Department of Defense in the 1960s to enable time-sharing of computers. The primary precursor network, the ARPANET, initially served as a backbone for interconnection of regional academic and military networks in the 1970s to enable resource shari ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Subpoenas
A subpoena (; also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure. There are two common types of subpoenas: # ''subpoena ad testificandum'' orders a person to testify before the ordering authority or face punishment. The subpoena can also request the testimony to be given by phone or in person. # ''subpoena duces tecum'' orders a person or organization to bring physical evidence before the ordering authority or face punishment. This is often used for requests to mail copies of documents to requesting party or directly to court. Etymology The term ''subpoena'' is from the Middle English ''suppena'' and the Latin phrase ''sub poena'' meaning "under penalty". It is also spelled "subpena".See, e.g., ; ; ; and . The subpoena has its source in English common law and it is now used almost with universal application throughout the English co ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Search Warrants
A search warrant is a court order that a magistrate or judge issues to authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate any evidence they find. In most countries, a search warrant cannot be issued in aid of civil process. Jurisdictions that respect the rule of law and a right to privacy constrain police powers, and typically require search warrants or an equivalent procedure for searches police conducted in the course of a criminal investigation. The laws usually make an exception for hot pursuit: a police officer following a criminal who has fled the scene of a crime has the right to enter a property where the criminal has sought shelter. The necessity for a search warrant and its abilities vary from country to country. In certain authoritarian nations, police officers may be allowed to search individuals and property without having to obtain court permission or provide justification for their act ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Pen Register
A pen register, or dialed number recorder (DNR), is an electronic device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, including programs monitoring Internet communications. The United States statutes governing pen registers are codified unde18 U.S.C., Chapter 206 Definitions The term ''pen register'' originally referred to a device for recording telegraph signals on a strip of paper. Samuel F. B. Morse's 1840 telegraph patent described such a register as consisting of a lever holding an armature on one end, opposite an electromagnet, with a fountain pen, pencil or other marking instrument on the other end, and a clockwork mechanism to advance a paper recording tape under the marker. The term ''telegraph register'' came to be a generic term for such a recording device in the later 19th century. Where the record was made in ink with a pen, the term ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Hampton Roads Telephone Analysis Sharing Network
The Hampton Roads Telephone Analysis Sharing Network was a program through which law enforcement agencies in five Virginia cities access a shared database containing phone records and contents of seized mobile devices. The program was active from 2012 to 2015. Participating cities * Hampton * Newport News * Norfolk * Chesapeake * Suffolk Sharing Participating agencies have, through a memorandum of understanding, agreed to "share telephone intelligence information derived from any source with the (task force) including: subpoenaed telephone call detail records, subpoenaed telephone subscriber information, and seized mobile devices." Controversy Rob Poggenklass, an ACLU staff attorney, stated that the program violates Virginia's Government Data Collection and Dissemination Practices Act. The Virginia State Police stated that they declined to join, citing the same statute. Termination In 2015, Chesapeake asked Virginia Attorney General Mark Herring Mark Rankin Herrin ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Counterterrorism In The United States
Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that governments, law enforcement, business, and intelligence agencies use to combat or eliminate terrorism. Counterterrorism strategies are a government's motivation to use the instruments of national power to defeat terrorists, the organizations they maintain, and the networks they contain. If definitions of terrorism are part of a broader insurgency, counterterrorism may employ counterinsurgency measures. The United States Armed Forces uses the term foreign internal defense for programs that support other countries' attempts to suppress insurgency, lawlessness, or subversion, or to reduce the conditions under which threats to national security may develop. History The first counter-terrorism body formed was the Special Irish Branch of the Metropolitan Police, later renamed the Special Branch after it expanded its sc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Privacy Of Telecommunications
__NOTOC__ The secrecy of correspondence (german: Briefgeheimnis, french: secret de la correspondance) or literally translated as secrecy of letters, is a fundamental legal principle enshrined in the constitutions of several European countries. It guarantees that the content of sealed letters is never revealed, and that letters in transit are not opened by government officials, or any other third party. The right of privacy to one's own letters is the main legal basis for the assumption of privacy of correspondence. The principle has been naturally extended to other forms of communication, including telephony and electronic communications on the Internet, as the constitutional guarantees are generally thought to also cover these forms of communication. However, national telecommunications privacy laws may allow lawful interception, i.e. wiretapping and monitoring of electronic communications in cases of suspicion of crime. Paper letters have, in most jurisdictions, remained outside ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Privacy In The United States
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of bodily integrity. The right not to be subjected to unsanctioned invasions of privacy by the government, corporations, or individuals is part of many countries' privacy laws, and in some cases, constitutions. The concept of universal individual privacy is a modern concept primarily associated with Western culture, particularly British and North American, and remained virtually unknown in some cultures until recent times. Now, most cultures recognize the ability of individuals to withhold certain parts of personal information from wider society. With the rise of technology, the debate regarding privacy has shifted from a bodily sense to a digital sense. As the wo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]