{"guid":"import-88b547b1ad8db477bd","title":"Understanding Telecommunication Interception: Intelligence Support Systems","subtitle":"The Big Brother Services Industry and their tools","slug":"26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems","link":"http://events.ccc.de/congress/2009/Fahrplan/events/3706.en.html","description":"\"Intelligence Support Systems\" stand for a wide range of hard- and softwareproducts made to intercept and analyze data from telecommunication- and other datastreams as well as data from surveillance technology. The talk will give a brief overview of how this industry works, to whom these products are available and what the capabilities are.\n","original_language":"eng","persons":["Andy Müller-Maguhn"],"tags":["26c3"," Making"],"view_count":89,"promoted":false,"date":"2009-12-30T01:00:00.000+01:00","release_date":"2010-01-02T01:00:00.000+01:00","updated_at":"2025-12-20T20:30:07.238+01:00","length":3214,"duration":3214,"thumb_url":"https://static.media.ccc.de/media/congress/2009/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.jpg","poster_url":"https://static.media.ccc.de/media/congress/2009/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2009/import-88b547b1ad8db477bd-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2009/import-88b547b1ad8db477bd-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems","url":"https://api.media.ccc.de/public/events/import-88b547b1ad8db477bd","conference_title":"26C3: Here be Dragons","conference_url":"https://api.media.ccc.de/public/conferences/26c3","related":[{"event_id":791,"event_guid":"import-233dfe79ff211f03a1","weight":1},{"event_id":1004,"event_guid":"import-33271665ad7b91afd1","weight":1},{"event_id":1113,"event_guid":"import-28470ad4e077177a78","weight":1},{"event_id":1221,"event_guid":"import-28f2251a0a4fa316f6","weight":1},{"event_id":1411,"event_guid":"import-c6222a12f8ee22d1e4","weight":1},{"event_id":1434,"event_guid":"import-b2c5a28cf60629b052","weight":1},{"event_id":1605,"event_guid":"import-37c1600436b10d0770","weight":1},{"event_id":1617,"event_guid":"import-20f1fedfeff9274553","weight":1},{"event_id":1640,"event_guid":"import-97f89b47751cce2a41","weight":1},{"event_id":1671,"event_guid":"import-873dcb9212006c08b8","weight":1},{"event_id":1685,"event_guid":"import-3e4a92a7169b065ca1","weight":1},{"event_id":1704,"event_guid":"import-a9812440f38232930c","weight":1},{"event_id":1746,"event_guid":"il4lmTSfWPAY3ks_KW7SHg","weight":1},{"event_id":1763,"event_guid":"WbqegbTKG5YheKse8X4ZUw","weight":1},{"event_id":1809,"event_guid":"tbP0pE8M3Do-9jVyC04sXg","weight":1},{"event_id":2133,"event_guid":"fWBa8osTdsuFZVPynRx5JA","weight":1},{"event_id":2142,"event_guid":"1ec34f5b-5dfb-4cdf-bce7-8b73dde4a995","weight":1},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":1},{"event_id":3707,"event_guid":"c19012c9-71de-4272-a6f4-898f5c48b8d9","weight":1},{"event_id":3742,"event_guid":"7a5971c8-746b-4450-ba89-6569667f77c2","weight":1},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":1},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":1},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":1}],"recordings":[{"size":600,"length":3214,"mime_type":"audio/ogg","language":"eng","filename":"26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.ogg","state":"downloaded","folder":"ogg","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:49.057+02:00","recording_url":"https://cdn.media.ccc.de/congress/2009/ogg/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.ogg","url":"https://api.media.ccc.de/public/recordings/2516","event_url":"https://api.media.ccc.de/public/events/import-88b547b1ad8db477bd","conference_url":"https://api.media.ccc.de/public/conferences/26c3"},{"size":600,"length":3214,"mime_type":"video/mp4","language":"eng","filename":"26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:37.595+01:00","recording_url":"https://cdn.media.ccc.de/congress/2009/mp4/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.mp4","url":"https://api.media.ccc.de/public/recordings/2515","event_url":"https://api.media.ccc.de/public/events/import-88b547b1ad8db477bd","conference_url":"https://api.media.ccc.de/public/conferences/26c3"},{"size":600,"length":3214,"mime_type":"video/webm","language":"eng","filename":"26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:37.623+01:00","recording_url":"https://cdn.media.ccc.de/congress/2009/webm/26c3-3706-en-understanding_telecommunication_interception_intelligence_support_systems.webm","url":"https://api.media.ccc.de/public/recordings/2514","event_url":"https://api.media.ccc.de/public/events/import-88b547b1ad8db477bd","conference_url":"https://api.media.ccc.de/public/conferences/26c3"}]}