Phone log

Last updated

A phone log is metadata collected from telephone or mobile phones for the purpose of surveillance or espionage. This metadata may include: length of calls, phone numbers of both parties, phone-specific identification information, GPS location, call proximity, and/or computer converted voice-to-text transcripts of the phone call conversation. [1] The advantage of converting audio to ASCII text metadata is that this makes it easy to search for keywords and phrases, and ASCII text metadata can be easily stored on conventional database systems for several years. Phone logs are not limited to governmental collection. For example, some private sector companies, such as banks, are known to collect phone log data on their internal phone network of all calls within and between the company and outside parties.

DICE is a known governmental phone log database maintained by the DEA consisting largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. DICE includes about 1 billion records, and records are kept for about a year and then purged. [2]

The Phone Log also refers to a program or app that allows people to manually log their interactions from different sources (such as phone, SMS, email, face to face). [3]

Related Research Articles

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Wiretapping also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Enhanced 911 is a system used in North America to automatically provide the caller's location to 911 dispatchers. 911 is the universal emergency telephone number in the region. In the European Union, a similar system exists known as E112 and known as eCall when called by a vehicle.

<span class="mw-page-title-main">Telecommunications device for the deaf</span> Electronic text communication device

A telecommunications device for the deaf (TDD) is a teleprinter, an electronic device for text communication over a telephone line, that is designed for use by persons with hearing or speech difficulties. Other names for the device include teletypewriter (TTY), textphone, and minicom.

A pen register, or dialed number recorder (DNR), is a device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, including programs monitoring Internet communications.

Enterprise content management (ECM) extends the concept of content management by adding a timeline for each content item and, possibly, enforcing processes for its creation, approval, and distribution. Systems using ECM generally provide a secure repository for managed items, analog or digital. They also include one methods for importing content to bring manage new items, and several presentation methods to make items available for use. Although ECM content may be protected by digital rights management (DRM), it is not required. ECM is distinguished from general content management by its cognizance of the processes and procedures of the enterprise for which it is created.

<span class="mw-page-title-main">MAINWAY</span> NSA database of US telephone calls

MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and T-Mobile.

Smith v. Maryland, 442 U.S. 735 (1979), was a Supreme Court case holding that the installation and use of a pen register by the police to obtain information on a suspect's telephone calls was not a "search" within the meaning of the Fourth Amendment to the United States Constitution, and hence no search warrant was required. In the majority opinion, Justice Harry Blackmun rejected the idea that the installation and use of a pen register constitutes a violation of the suspect's reasonable expectation of privacy since the telephone numbers would be available to and recorded by the phone company anyway.

<span class="mw-page-title-main">Metadata</span> Data about data

Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including:

A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions that passes through that facility or device. The record contains various attributes of the call, such as time, duration, completion status, source number, and destination number. It is the automated equivalent of the paper toll tickets that were written and timed by operators for long-distance calls in a manual telephone exchange.

<span class="mw-page-title-main">Boundless Informant</span> Big data analysis and visualization tool used by the NSA

Boundless Informant is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by counting metadata. The existence of this tool was disclosed by documents leaked by Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton. Those disclosed documents were in a direct contradiction to the NSA's assurance to United States Congress that it does not collect any type of data on millions of Americans.

DICE is a DEA database that consists largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests, and search warrants nationwide. DICE includes about 1 billion records, and they are kept for about a year and then purged.

<span class="mw-page-title-main">Hemisphere Project</span>

The Hemisphere Project, also called simply Hemisphere, is a mass surveillance program conducted by US telephone company AT&T and paid for by the White House Office of National Drug Control Policy and the Drug Enforcement Administration (DEA).

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">Global surveillance disclosures (2013–present)</span> Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

This is a category of disclosures related to global surveillance.

<i>Klayman v. Obama</i> American federal court case

Klayman v. Obama, 957 F.Supp.2d 1, was a decision by the United States District Court for District of Columbia finding that the National Security Agency's (NSA) bulk phone metadata collection program was unconstitutional under the Fourth Amendment. The ruling was later overturned on jurisdictional grounds, leaving the constitutional implications of NSA surveillance unaddressed.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

Mass surveillance in Australia takes place in several network media, including telephone, internet, and other communications networks, financial systems, vehicle and transit networks, international travel, utilities, and government schemes and services including those asking citizens to report on themselves or other citizens.

References

  1. What the NSA phone-records grab means — and doesn't mean, The Week,June 6, 2013
  2. Exclusive: IRS manual detailed DEA's use of hidden intel evidence, Reuters, John Shiffman and David Ingram, 8/8/2013
  3. The Phone Log - About, The Week,March 1, 2023

See also