Data Retention

©2015 kcomputerco.com.au

What data ISP's collect

back
Internet Service Provider’s (ISP) are constantly collecting data not only for their use but also to sell it. Clickstream data is valuable and many businesses want it. Insurance companies, credit agencies, financial institutions, governments both in the country you reside and other countries, security agencies and business that want to target their product.

robot Acxiom is one of the largest data-brokering firms in the world. It is just one of hundreds of companies who are mining your information to know more about your personal life. They collect data that is generated from everything you do online, and much of what you do in the real world.

This is the data ISP's collect both to sell and now because governments are regulating it so they have access to your whereabouts, your communications, your associations and your online usage.

Account Details

Account Details

 As registered with you ISP

nametag Full Name  
Date of Birth  
Ph Number  
Email Address  
Other Ph numbers associated with account
As registered with you ISP

Phone Call Details

Call from
Call to
Date
Time
Duration Seconds
0415211 ***
07 3256 ****
02/11/15
10:25:51
180
0415 211 ***
0452 693 ***
02/11/15
11:19:23
255

IMEI
Cell location
3651459865234896
Alendra Hills
2145698632547825
Vienna Woods


ph IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets. Cell location recorded when using mobile phones. Fixed line phones (also called landline phone or home phone) do not use cell towers.

SMS Details

Call from
Call to
Date
Time
Duration Seconds
0415211 ***
0410 256 ***
02/11/15
10:25:51
SMS
0415 211 ***
0452 693 ***
02/11/15
11:19:23
SMS

IMEI
Cell location
3651459865234896
Alendra Hills
2145698632547825
Vienna Woods

sms
IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets.

Email Details

This only applys to email that is using the ISP's email. For example: user@bigpond.com user@virgin.com user@iprimus.com user@origin.com

emailIf you use gmail, yahoo, apple etc. then these companies collect the data. However they do not come under the data retention laws.

Details of who you emailed

Date and time you sent the email

Size of any attachments (this could be used as an indicator of what the attachment was)

Internet Usage

Your IP
Website Visited
Time Spent
Data downloaded
Data Upload
178.168.126.***
154.168.176.***
03:10:15
325kbs
500kbs
178.168.156.***
165.175.142.***
23:10:15
498Kbs
892Kbs

Your Internet Protocol (IP) is a unique identifier for your computer.

Cell tower location

Call from
Call to
Date
Time
Duration Seconds
0415211 ***
0410 256 ***
02/11/15
10:25:51
25
0415 211 ***
0452 693 ***
02/11/15
11:19:23
540


IMEI
CGI Cell Global ID
Cell Location
Antenna Latitude
Antenna Longitude
0415 213 ***
50501 2458695
Alenandra Hills
-27.529662
153,22274*
0415 213 ***
50501 2458695
Coopers Plains
-27.565467
153.038891


tower Cell Global Identity (CGI) is a standard identifier for mobile phones cells, providing means to geographically locate connected mobile phones. If a cell phone is connected to a GSM network then the position of that particular cell phone can be determined using CGI of the cell which is covering that cell phone.

Type of Connection

Type
Definition
Cell Tower
Cell tower is a cellular telephone site where antennae and electronic communications equipment are placed.
Wifi Hotspot
A Wifi hotspot is a physical location that offers Internet access over a wireless local area network.
Base Station
A fixed point of communication.
ADSL
Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line.
Wireless
Wireless broadband is technology that provides wireless Internet access a wide area.
Satelite
Satellite Internet is the ability to transmit and receive data from a relatively small satellite dish.
Cable
Internet access via cable usually provide by TV companies and may include cable TV.

How the contact was made

How contact was made
Definition
Voice
Contact made via phone call
SMS
Contact made via text including MMS
IP telephony
Skype
Social media
Facebook, Twitter etc


Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from mobile phones over a cellular network.

Home Contact Us

©2015 https://www.kcomputerco.com.au

Aus Data Retention

back
justice

Australia data retention laws are the strictest in the world.

In the EU the Data retention directive has been declared invalid by the European Court of Justice. This means the retention of data by ISP's is not allowed in the EU, however Australian Privacy Principals do not adheare the this ruling and the government has ruled ISP's must keep peoples data for 2 years.


Click to view a country data law comparison chart. https://www.efa.org.au/2015/07/29/european-data-retention-laws-update/

Click to view OECD Privacy Principals.
http://oecdprivacy.org/#collection

The Data Retention Law in Australia

On 30 October 2014, the government introduced the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014. The Bill will require Australian telecommunications companies to keep a limited set of telecommunications data (‘metadata’) for two years, which will be defined in regulations. The Bill passed the Parliament on 26 March 2015 and received Royal Assent on 13 April 2015.

Metadata is information about the circumstances of a communication (the who, when and where)—not the content or substance of a communication (the what).

For phone calls, metadata is information like the phone numbers of the people talking to each other and how long they talked to each other—not what they said.

For internet activity, metadata is information such as an email address and when it was sent—not the subject line of an email or its content.

Currently no laws are in place to specify the security requirements to ensure the safety of the data.

Account Details

Account Details

 As registered with you ISP

nametag Full Name  
Date of Birth  
Ph Number  
Email Address  
Other Ph numbers associated with account
As registered with you ISP

Phone Call Details

Call from
Call to
Date
Time
Duration Seconds
0415211 ***
07 3256 ****
02/11/15
10:25:51
180
0415 211 ***
0452 693 ***
02/11/15
11:19:23
255

IMEI
Cell location
3651459865234896
Alendra Hills
2145698632547825
Vienna Woods


ph IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets. Cell location recorded when using mobile phones. Fixed line phones (also called landline phone or home phone) do not use cell towers.

SMS Details

Call from
Call to
Date
Time
Duration Seconds
0415211 ***
0410 256 ***
02/11/15
10:25:51
SMS
0415 211 ***
0452 693 ***
02/11/15
11:19:23
SMS

IMEI
Cell location
3651459865234896
Alendra Hills
2145698632547825
Vienna Woods


sms IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets.

Email Details

This only applys to email that is using the ISP's email. For example: user@bigpond.com user@virgin.com user@iprimus.com user@origin.com

emailIf you use gmail, yahoo, apple etc. then these companies collect the data. However they do not come under the data retention laws.

Details of who you emailed

Date and time you sent the email

Size of any attachments (this could be used as an indicator of what the attachment was)

Internet Usage

Your IP
Time Spent Connected
Data downloaded
Data Upload
178.168.126.***
03:10:15
325kbs
500kbs
178.168.156.***
23:10:15
498Kbs
892Kbs

Your Internet Protocol (IP) is a unique identifier for your computer.

Cell tower location

Call from
Call to
Date
Time
Duration Seconds
0415211 ***
0410 256 ***
02/11/15
10:25:51
25
0415 211 ***
0452 693 ***
02/11/15
11:19:23
540


IMEI
CGI Cell Global ID
Cell Location
Antenna Latitude
Antenna Longitude
0415 213 ***
50501 2458695
Alenandra Hills
-27.529662
153,22274*
0415 213 ***
50501 2458695
Coopers Plains
-27.565467
153.038891


tower Cell Global Identity (CGI) is a standard identifier for mobile phones cells, providing means to geographically locate connected mobile phones. If a cell phone is connected to a GSM network then the position of that particular cell phone can be determined using CGI of the cell which is covering that cell phone.

Type of Connection

Type
Definition
Cell Tower
Cell tower is a cellular telephone site where antennae and electronic communications equipment are placed.
Wifi Hotspot
A Wifi hotspot is a physical location that offers Internet access over a wireless local area network.
Base Station
A fixed point of communication.
ADSL
Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line.
Wireless
Wireless broadband is technology that provides wireless Internet access a wide area.
Satelite
Satellite Internet is the ability to transmit and receive data from a relatively small satellite dish.
Cable
Internet access via cable usually provide by TV companies and may include cable TV.

How the contact was made

How contact was made
Definition
Voice
Contact made via phone call
SMS
Contact made via text including MMS
IP telephony
Skype
Social media
Facebook, Twitter etc


Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from mobile phones over a cellular network.

Who can access the data

Australian Customs and Border Protection Service
Major crime and anti-corruption commissions
All state and territory police forces    
Internet Service Provider
Enforcement Agencies
Australian Federal Police
Australian Security Intelligence Organisation (ASIO)
Australian Securities and Investments Commission (ASIC)
Australian Competition and Consumer Commission (ACCC)
NSW Crime Commission
NSW Independent Commission Against Corruption
NSW Police Integrity Commission
Queensland Crime and Corruption Commission
West Australian Corruption and Crime Commission
South Australian Independent Commission Against Corruption
Any other agency (public or private) the Attorney General publicly declares Law enforcement and Intelligence agencies will have immediate, warrantless and accumulating access to all of this information.

What is not collected

Passwords
PIN
Web Browser History
IP of www address you visit
The law does not require carriers to retain 'destination ' IP addresses (your web browsing history), but a ISP may do so.

Home Contact Us

©2015 kcomputerco.com.au

UK Data Retention

back

Data Retention in the UK

July 2015 High court ruled data retention and surveillance legislation unlawful. The UK government now has to pass new legislation that must come into effect before the end of March 2016.

As of 4 November 2015 an investigatory powers parliamentary bill was being drafted providing new surveillance powers, requiring records to be kept by Internet Service Providers tracking use of the internet from the UK, accessible by the police and security services without judicial oversight.

For more information and to stay up to date go to:

http://www.legislation.gov.uk/ukpga/2014/27/crossheading/retention-of-relevant-communications-data

https://en.wikipedia.org/wiki/Data_Retention_and_Investigatory_Powers_Act_2014

Home Contact Us

©2015 kcomputerco.com.au

Data Retention around the World

back

Data Retention in other countries

Data Retention and Investigatory Powers Act 2014

https://en.wikipedia.org/wiki/Data_Retention_and_Investigatory_Powers_Act_2014

Telecommunications data retention

https://en.wikipedia.org/wiki/Telecommunications_data_retention#Australia

Country comparison chart

https://www.efa.org.au/2015/07/29/european-data-retention-laws-update/

Home Contact Us

©2015 kcomputerco.com.au

Protecting yourself online

back
How the Australia Prime Minister protects himself.

Limit what goes on Social Media and other sites

sm Ensure you social media setting are set to private so that only your friends can see your information. By default privacy setting are turned off on the majority of social media sites.

Limit the information you put on social media such as holiday destinations, photo's that have been taken when geotagging is turned on can assist in keeping your information private.

Information that should never go online:
Travel plans
Your full address and birthdate
Your childrens name, school and birthdates
Location information
Your daily schedule
Work hours
Photo's geotagged
Bank account information
Sexualised or Explict chat, pictures or videos

Things to be mindful of:
Privacy settings
Turn of Location Based Services
Use strong passwords
Keep pictures to a minimum
Remember nothing is private online even when privacy settings are turned on
Don't click on advertising links as these are often malware. If you are interested in the ad search the heading or site and find more information that way.
Keep your security up to date
Configure your security setting in the web browser you are using. To do this search turn on [safari, Internet Explorer, Firefox, Chrome, etc] security settings

For more information of the threats when using social media go to

Use a Virtual Private Network (VPN)

Virtual Private Network creates a secure link between your device and the websites you are visit. This means your ISP cannot see what sites your are connecting to, thus it hides your movements online.

To use a VPN you need to buy an account with a VPN service. Most services are less than $10 per month. (check the latest reviews for up to date information) Once you have an account you install the software that they supply and before going online you start the software which connects the device to a location specified and creates the VPN.

Use Tor a secure browser

Tor is a web browser designed for anonymous web surfing. It was originally developed by and for the US Navy to protect sensitive government communications.

Using Tor can help you remain anonymous while Web browsing, instant messaging, using IRC, SSH, or other applications online. When you use Tor as a browser you are routed (moved) through several different randomly selected servers before exiting Tor and arriving at your destination. This prevents your ISP and others monitoring what your are doing and from knowing your IP address. The down side of Tor is that it can be a little slower to get around.

You can download the Tor browser here

PGP is a Pretty Good Privacy Email program

Pretty Good Privacy (PGP) is a program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. A private and public key must be created to encrypt and decrypt the email. This can take a little time to get used to for those who aren't falmiliar with encryption.

For a greater understanding of PGP and to find out the latest information go to youtube.com and search 'PGP tutorial'.

Turn off Location Based Services when not in use

tower Turning off Location Based Services (LBS) when not in use not only protects you it can assist in saving battery life. To turn of your service check your settings on your device, usually under privacy.

To get exact instructions for your specific device search 'turn off LBS [device name]'.

LBS is now on many devices including phones, tablets, laptops, smart watches, all mobile devices and some desktops.

Use secure mobile voice/video apps

There are many voice and video apps coming onto the market that are using encryption to protect the informamtion that is being sent. Search online for the latest reviews. Search 'secure mobile apps for [device name]'

Please note the list of apps is a small guide to some security apps currently available. There are many other security apps and it maybe worthwhile checking security reviews prior to downing to get the most up to date information. Kerry's Computer Company is not associate or affiliated with any or the apps include in the list.

apgAPG Android Privacy Guard lets you encrypt and decrypt single files or emails, for personal use or to share with others, using either public key cryptography or a passphrase.

k9 K-9 Mail and APG K-9 Mail is a mail client that integrates with APG to allow you easily send and receive GnuPG (GNU is an operating system that is free software PG Privacy Guard) encrypted emails.

keepassdroid KeePassDroidis a secure and easy-to-use password management tool which will store your passwords in an encrypted database on your phone. Also available on other devices.

chatsecure ChatSecure is an Instant Messaging client that lets you organize and manage your different Instant Messaging (IM) accounts using a single interface. It will also attempt to encrypt your conversations using OTR when chatting with contacts who also use IM clients that support OTR. (Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations.)

obscuracamObscuracam is a free camera application for Android devices that has the ability to recognize and hide faces. It allows you to blur or delete the faces of those you photograph in order to protect their identities.

textsecure is an app to send encrypted text messages (SMS) via your phone provider and encrypted messages over WiFi and your phones internet connection as well as storing all SMS and messages in an encrypted container on your phone.

redphone-smallRedPhone allows you to make encrypted phone calls over the internet. A valid phone number is required to register.

Ph Call encryption services are available

ph There are some voice apps coming onto the market that are using encryption to protect the informamtion that is being sent. Search online for the latest reviews. Search 'secure mobile voice apps for [device name]' or 'secure voice app'

Check your browser history location is turned off

For those with a gmail account you may want to check that your location is not being recorded by google. To do this click the link below and log into you account.
Check your location history is turned of at Google.

Home Contact Us

©2015 https://www.kcomputerco.com.au.com

How data is mined

back

Some of the ways data can be mined

Data has become big business. Governments want it, businesses wants it, criminals want it and every day we are giving more and more information away. So why do they want it and what are they doing with it?

Data Mining - What is it and why you should care? Data mining is the sorting and ordering of information into a format that identifies patterns and thus can illustrate behaviours. It is organising information into a format that then can be used to influence and guide planning, marketing and future directions of businesses or governments.

It can also be used to track and trace individuals and identify who they have had contact with. Individual information on it owns is not always useful, however, when information is collected and collated on mass it is extremely valuable.

So what is it we are giving away and how is it used?
Online all transitions and interactions leave a data signature or some kind of evidence identifying that you have been there. Internet Service Providers, webhosting companies, search engines, websites and others are capturing this data. ISP’s (Internet Service Providers) around the world are openly selling ‘click stream data’, data that shows every page you have visited, how long you stayed there and what you clicked on.

There are several main types of pattern detection commonly being used and experts around the world are scrambling to write more algorithms and design different techniques to extract as many patterns and cross match as much information as possible.

Common patterns of detection that are being used and a few examples of its usage are:

Anomaly Detection

one of these things is not like the other Large data sets enables data mining to get a picture of trends and find common cases. This also highlights the odd one thing or someone out by identifying information that looks different and stands out from the rest of the data. Governments would use this type of detection to see whose tax return stands out. Banks could use this to identify who is receiving large, small or different incomes or to detect any usual spending patterns.

Association Learning

association This type of data mining is used by big businesses online to create a recommendation system. This provides users with feedback about other shoppers and online users. Things such as, the person who bought this cook book, also bought a frying pans and cooking utensils. Association learning provides movie recommendations, by knowing what movies people have watched. It can then associate the information and group people. For example out of 100 000 people who watched ‘James Bond’ 950 000 also watched ‘Terminator’, 607 000 watched ‘Bridget Jones Diary’. Slowly an association is built as more and more data is collected. These types of findings are then used by business to target advertising, deals and coupons.

Cluster Detection

these like this This can also be used to examine the purchasing habits or movements of groups. Let’s look at the purchasing habits of sports fans or hobbyists. What golfers are buying and the amounts they are spending, would be very different to model aeroplane enthusiasts. Thus the targeting and the advertising strategies would vary according to seasons. When the Football finals are televised all the things that influence spending can be analysed and then used to target groups and where they hang out.

Buying habits captured
Movement where they came from
Willingness to travel
Cross sports interest
Parking and public transport needs

Classification Detection

all these things mean this This is often used when an existing structure is already known. Data mining can be used to classify new cases and put them into pre-determined categories or highlight the need for a new category. Learning from a large set of pre-classified examples, data mining can detect persistent systemic differences between items in each group and apply these rules to new classification problems.

Spam filters are an example of this. Large sets of emails that have been identified as spam have enabled filters to notice differences in word usage between legitimate messages and spam messages, and classify incoming messages according to these rules.







Who wants the information

cross match Governments and businesses are all gathering this information and attempting to gleam insights from human movements and behaviour. This is not always negative.

Flu outbreaks, traffic analysis and eating habits are just a few things that can be examined.

Home Contact Us

©2015 https://www.kcomputerco.com.au.com

Data Retention can harm you

back

Videos on how things can go wrong

Tom's Story

Hypothetical Robbery

ISP’s can store your data overseas much cheaper than they can in Australia. This storage often comes with a lot less security.

Currently in Australia there are not regulations as to the security needs of our data, therefore leaving it up to individual companies to secure the data in any way it chooses. There is no mandatory data breach notification law in Australia, so companies do not have to reveal the breach or the theft of your details.

If your data is then posted online as hackers usually do, all your details will be available for anybody to search.

For example:
Ex/partners wanting to know who you call and where you are.
Parents checking up on children. Children checking up on parents.
Bosses checking where staff are and how they spend there weekends.
Stalkers
Evidence in custody cases
and the list goes on……………………….

Home Contact Us

©2015 https://www.kcomputerco.com.au.com

Definitions

back

ISP Internet Service Provide

The company that provides you internet connection and collects the data on behave of the government.

Preliminary discovery

Used to obtain your details.
In summary, under Rule 7.22 of the Australian Federal Court Rules, where a person: may have a right to obtain relief against a prospective respondent; is unable to identify who the prospective respondent is; and some third party is likely to know who the prospective respondent is, or have documents which would help ascertain their identity.

Geotagging

An electronic tag that assigns a geographical location to a photograph or video, a posting on a social media website.

Click stream data

Information about every time you click on a link, page or anywhere online.

Five Eyes

Often abbreviated as "FVEY", refer to an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are bound by the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.

https://en.wikipedia.org/wiki/Five_Eyes

Untag

When you are tagged in a photo, the tag reveals that you are in the photo, it also links to your Facebook or other social media profile. This means everyone who has access to the photo can see who you are and learn more about you via your profile.

On many social media sites you can tag someone and anyone can tag you without your knowledge or consent. For privacy and security it is recommended you disable tagging and remove tags when you find them.

Home Contact Us

©2015 https://www.kcomputerco.com.au.com

Contact Us

back

https://www.kcomputerco.com.au

For more infomation about online safety and security including bullying, grooming online and protecting yourself.
Visit our website https://www.kcomputerco.com.au

Home

©2015 kcomputerco.com.au