#OPSEC365 010/365 Your phone logs every call you make, every text you send, and the duration of each conversation. Even with encrypted messaging, your carrier knows who you contacted, when, and for how long. Pull up your call history and imagine someone trying to map your relationships based purely on who you talk to and how often. The connections are already logged. Content can be encrypted, but metadata often can't. Who you call, when, and how often creates a pattern that reveals relationships, habits, and associations without anyone reading a single message. The structure of your communications tells its own story.