Call detail record

Last updated

A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through that facility or device. The record contains various attributes of the call, such as time, duration, completion status, source number, and destination number. [1] [2] [3] It is the automated equivalent of the paper toll tickets that were written and timed by operators for long-distance calls in a manual telephone exchange.

Contents

CDR contents

A call detail record contains data fields that describe a specific instance of a telecommunication transaction, but does not include the content of that transaction. By way of simplistic example, a call detail record describing a particular phone call might include the phone numbers of both the calling and receiving parties, the start time, and duration of that call. In actual modern practice, call detail records are much more detailed, and contain attributes such as: [2] [3]

Each exchange manufacturer decides which information is emitted on the tickets and how it is formatted. Examples:

In some corporate private branch exchange (PBX) systems, a call detail record is termed a station messaging detail record (SMDR). [4]

Uses

Call detail records serve a variety of functions. For telephone service providers, they are critical to the production of revenue, in that they provide the basis for the generation of telephone bills. For law enforcement, call detail records provide a wealth of information that can help to identify suspects, in that they can reveal details as to an individual's relationships with associates, communication and behavior patterns, and even location data that can establish the whereabouts of an individual during the entirety of the call. For companies with PBX telephone systems, call detail records provide a means of tracking long-distance access, can monitor telephone usage by department or office, and can create listing of incoming and outgoing calls.

Privacy

The U.S. Supreme Court has held the records of numbers called are not protected by the Fourth Amendment to the Constitution of the United States because the caller "voluntarily conveyed numerical information to the telephone company." [5] But there is limited protection under the Electronic Communications Privacy Act. The revelation that call metadata records are being universally collected and stored in the U.S. and elsewhere has generated considerable controversy.

In June 2013, a top secret order of the United States Foreign Intelligence Surveillance Court was leaked to the public. That order referenced and defined call detail records as follows:

"IT IS HEREBY ORDERED that, the Custodian of Records shall produce to the National Security Agency (NSA) upon service of this Order, and continue production on an ongoing daily basis thereafter for the duration of this Order, unless ordered by the Court, an electronic copy of the following tangible things: all call detail records or "telephony metadata" created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls.... "Telephony metadata includes comprehensive communications routing information, including but not limited to session identifying information (e.g., originating and terminating telephone number, International Mobile Subscriber Identity (IMSI) number, International Mobile station Equipment Identity (IMEI) number, etc.), trunk identifier, telephone calling card numbers, and time and duration of call. Telephony metadata does not include the substantive content of any communication, as defined by 18 U.S.C.   § 2510(8), or the name, address, or financial information of a subscriber or customer." [6]

Usage in research

CDRs have found various uses in academic research, with topics ranging from social networks to human mobility. [7]

See also

Related Research Articles

The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications. SIP is used in Internet telephony, in private IP telephone systems, as well as mobile phone calling over LTE (VoLTE).

Telephony is the field of technology involving the development, application, and deployment of telecommunication services for the purpose of electronic transmission of voice, fax, or data, between distant parties. The history of telephony is intimately linked to the invention and development of the telephone.

Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for voice calls, the delivery of voice communication sessions over Internet Protocol (IP) networks, such as the Internet.

Enhanced 911 is a system used in North America to automatically provide the caller's location to 911 dispatchers. 911 is the universal emergency telephone number in the region. In the European Union, a similar system exists known as E112 and known as eCall when called by a vehicle.

Computer telephony integration, also called computer–telephone integration or CTI, is a common name for any technology that allows interactions on a telephone and a computer to be coordinated. The term is predominantly used to describe desktop-based interaction for helping users be more efficient, though it can also refer to server-based functionality such as automatic call routing.

Caller identification is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits a caller's telephone number to the called party's telephone equipment when the call is being set up. The caller ID service may include the transmission of a name associated with the calling telephone number, in a service called Calling Name Presentation (CNAM). The service was first defined in 1993 in International Telecommunication Union – Telecommunication Standardization Sector (ITU-T) Recommendation Q.731.3.

<span class="mw-page-title-main">Voicemail</span> Voice message storage and retrieval

A voicemail system is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to individuals, organizations, products, and services, using an ordinary phone. The term is also used more broadly to denote any system of conveying a stored telecommunications voice messages, including using an answering machine. Most cell phone services offer voicemail as a basic feature; many corporate private branch exchanges include versatile internal voice-messaging services, and *98 vertical service code subscription is available to most individual and small business landline subscribers.

The public switched telephone network (PSTN) is the aggregate of the world's telephone networks that are operated by national, regional, or local telephony operators. It provides infrastructure and services for public telecommunication. The network consists of telephone lines, fiber optic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables interconnected by switching centers, such as central offices, network tandems, and international gateways, which allow telephone users to communicate with each other.

A telephone numbering plan is a type of numbering scheme used in telecommunication to assign telephone numbers to subscriber telephones or other telephony endpoints. Telephone numbers are the addresses of participants in a telephone network, reachable by a system of destination code routing. Telephone numbering plans are defined in each of the administrative regions of the public switched telephone network (PSTN) and in private telephone networks.

<span class="mw-page-title-main">Director telephone system</span> Telephone switching system used in the UK

The director telephone system was a development of the Strowger or step-by-step (SXS) switching system used in London and five other large cities in the UK from the 1920s to the 1980s.

Phone fraud, or more generally communications fraud, is the use of telecommunications products or services with the intention of illegally acquiring money from, or failing to pay, a telecommunication company or its customers.

Last-call return, automatic recall, or camp-on, is a telecommunication feature offered by telephony service providers to subscribers to provide the subscriber with the telephone number, and sometimes the time, of the last caller. The service may also offer the facility to place a call to the calling party.

In telephony, an automated attendant allows callers to be automatically transferred to an extension without the intervention of an operator/receptionist. Many AAs will also offer a simple menu system. An auto attendant may also allow a caller to reach a live operator by dialing a number, usually "0". Typically the auto attendant is included in a business's phone system such as a PBX, but some services allow businesses to use an AA without such a system. Modern AA services can route calls to mobile phones, VoIP virtual phones, other AAs/IVRs, or other locations using traditional land-line phones or voice message machines.

<span class="mw-page-title-main">Business telephone system</span> Multiline telephone system typically used in business environments

A business telephone system is a multiline telephone system typically used in business environments, encompassing systems ranging in technology from the key telephone system (KTS) to the private branch exchange (PBX).

Customer proprietary network information (CPNI) is the data collected by telecommunications companies about a consumer's telephone calls. It includes the time, date, duration and destination number of each call, the type of network a consumer subscribes to, and certain other information that appears on the consumer's telephone bill.

Call logging is the collection, evaluation, and reporting of technical and statistical data about telephone calls. It does not encompass phone tapping or call recording.

<span class="mw-page-title-main">MAINWAY</span> NSA database of US telephone calls

MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and T-Mobile.

<span class="mw-page-title-main">Telephone exchange</span> Interconnects telephones for calls

A telephone exchange, telephone switch, or central office is a telecommunications system used in the public switched telephone network (PSTN) or in large enterprises. It interconnects telephone subscriber lines or virtual circuits of digital systems to establish telephone calls between subscribers.

In Re Electronic Privacy Information Center, 134 S.Ct. 638 (2013), was a direct petition to the Supreme Court of the United States regarding the National Security Agency's (NSA) telephony metadata collection program. On July 8, 2013, the Electronic Privacy Information Center (EPIC) filed a petition for a writ of mandamus and prohibition, or a writ of certiorari, to vacate an order of the Foreign Intelligence Surveillance Court (FISC) in which the court compelled Verizon to produce telephony metadata records from all of its subscribers' calls and deliver those records to the NSA. On November 18, 2013, the Supreme Court denied EPIC's petition.

STIR/SHAKEN, or SHAKEN/STIR, is a suite of protocols and procedures intended to combat caller ID spoofing on public telephone networks. Caller ID spoofing is used by robocallers to mask their identity or to make it appear the call is from a legitimate source, often a nearby phone number with the same area code and exchange, or from well-known agencies like the Internal Revenue Service or Ontario Provincial Police. This sort of spoofing is common for calls originating from voice-over-IP (VoIP) systems, which can be located anywhere in the world.

References

  1. Horak, Ray (2007). Telecommunications and data communications handbook. Hoboken, N.J.: WWiley-Interscience. pp. 110–111. ISBN   978-0-470-12722-3.
  2. 1 2 Peterson, Kerstin Day (2000). Business telecom systems: a guide to choosing the best technologies and services. New York, NY: CMP Books. p. 412. ISBN   1-57820-041-5.
  3. 1 2 Petersen, Julie K. (2002). The Telecommunications Illustrated Dictionary (2nd ed.). Hoboken: CRC Press. p. 147. ISBN   1-4200-4067-7.
  4. Peterson (2000), pp. 80–1, 87, 93, 118, 213–4, 218, 410–1, 433, 436.
  5. Smith v. Maryland, 442 U.S. 735, 744 (1979)
  6. Vinson, Judge Roger (April 25, 2013). "In re Application of the Federal Bureau of Investigation for an Order Requiring the production of tangible things from Verizon Business Network Services, Inc. on behalf of MCI Communication Services, Inc. d/b/a Verizon Business Services" (PDF). Top Secret order of the Foreign Intelligence Surveillance Court. Electronic Privacy Information Center . Retrieved June 20, 2013.
  7. Blondel, V.D., Decuyper, A. & Krings G. "A survey of results on mobile phone datasets analysis"