{"guid":"import-369383af4e5cdd7892","title":"Terrorists Win - Exploiting Telecommunications Data Retention?","subtitle":null,"slug":"27c3-4055-en-terrorists_win_exploiting_telecommunications_data","link":"http://events.ccc.de/congress/2010/Fahrplan/events/4055.en.html","description":"Telecommunications data retention (TDR) has become a reality in most\nWestern countries. Protagonists claim that the collection of massive\namounts of data on the communication behavior of all individuals\nwithin a country would enable law enforcement agencies to exploit\npatterns in the stored data to uncover connections between suspects.\n","original_language":"eng","persons":["Kay Hamacher","Stefan Katzenbeisser"],"view_count":59,"promoted":false,"date":"2010-12-29T01:00:00.000+01:00","release_date":"2011-01-04T01:00:00.000+01:00","updated_at":"2026-04-13T18:00:06.273+02:00","tags":["27c3"," Science"],"length":3854,"duration":3854,"thumb_url":"https://static.media.ccc.de/media/congress/2010/27c3-4055-en-terrorists_win_exploiting_telecommunications_data.jpg","poster_url":"https://static.media.ccc.de/media/congress/2010/27c3-4055-en-terrorists_win_exploiting_telecommunications_data_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2010/import-369383af4e5cdd7892-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2010/import-369383af4e5cdd7892-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/27c3-4055-en-terrorists_win_exploiting_telecommunications_data","url":"https://api.media.ccc.de/public/events/import-369383af4e5cdd7892","conference_title":"27C3: We Come In Peace","conference_url":"https://api.media.ccc.de/public/conferences/27c3","related":[{"event_id":658,"event_guid":"import-e8c6d414f23a3f454d","weight":1},{"event_id":1340,"event_guid":"import-e52e7b7421e23b969c","weight":1},{"event_id":1398,"event_guid":"import-4cd820d77b40b4b492","weight":1},{"event_id":1400,"event_guid":"import-9e294baeb1da0041c3","weight":1},{"event_id":1442,"event_guid":"import-ac2d78310990a8f3ff","weight":1},{"event_id":1447,"event_guid":"import-6b22151f92f9683519","weight":1},{"event_id":1462,"event_guid":"import-b9197fb95bae24cee3","weight":1},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":1},{"event_id":1475,"event_guid":"import-6494b3c268a64f31b0","weight":1},{"event_id":1486,"event_guid":"import-6145ee63fb127b4c7e","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1497,"event_guid":"import-a5a3c656f8d4822ab9","weight":1},{"event_id":1499,"event_guid":"import-96cc1f42578abdb340","weight":1},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":1},{"event_id":1523,"event_guid":"import-831af8d32e6e76f52c","weight":1},{"event_id":1526,"event_guid":"import-8f741823f0d689a05e","weight":1},{"event_id":1541,"event_guid":"import-8fd39363e733cd1101","weight":1},{"event_id":1543,"event_guid":"import-a17dc159cb6895d8cd","weight":2},{"event_id":1551,"event_guid":"import-6a3a996a7bf3732340","weight":1},{"event_id":1565,"event_guid":"import-c3facc3aa246520845","weight":1},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":4},{"event_id":1663,"event_guid":"import-82881c96ab640740a1","weight":1},{"event_id":1667,"event_guid":"import-a5a5dd91ef7a9120d5","weight":1},{"event_id":1703,"event_guid":"import-e95f100fd02db00a64","weight":2},{"event_id":1720,"event_guid":"import-036d2b788e48b482d6","weight":1},{"event_id":2332,"event_guid":"c8fe75dc-bc24-4bf7-8b6d-a5ac76c48d0e","weight":1},{"event_id":2508,"event_guid":"ed4bcb3b-fe2d-4728-812d-a45dbd4d01db","weight":1},{"event_id":2888,"event_guid":"018148c1-62c9-4796-8443-2a8c8b8e3a01","weight":1},{"event_id":3316,"event_guid":"424860b0-8a98-5304-8e9a-928d41f38284","weight":1},{"event_id":3517,"event_guid":"f7ae6cb1-a660-59a3-9e86-e61f8b903c1c","weight":1},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":1}],"recordings":[{"size":766,"length":3854,"mime_type":"audio/ogg","language":"eng","filename":"27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:54.502+02:00","recording_url":"https://cdn.media.ccc.de/congress/2010/ogg-audio-only/27c3-4055-en-terrorists_win_exploiting_telecommunications_data.ogg","url":"https://api.media.ccc.de/public/recordings/2955","event_url":"https://api.media.ccc.de/public/events/import-369383af4e5cdd7892","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":766,"length":3854,"mime_type":"video/mp4","language":"eng","filename":"27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4","state":"downloaded","folder":"mp4-h264-HQ","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:46.511+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/mp4-h264-HQ/27c3-4055-en-terrorists_win_exploiting_telecommunications_data.mp4","url":"https://api.media.ccc.de/public/recordings/2954","event_url":"https://api.media.ccc.de/public/events/import-369383af4e5cdd7892","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":766,"length":3854,"mime_type":"video/webm","language":"eng","filename":"27c3-4055-en-terrorists_win_exploiting_telecommunications_data.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:46.548+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/webm/27c3-4055-en-terrorists_win_exploiting_telecommunications_data.webm","url":"https://api.media.ccc.de/public/recordings/2953","event_url":"https://api.media.ccc.de/public/events/import-369383af4e5cdd7892","conference_url":"https://api.media.ccc.de/public/conferences/27c3"}]}