Date-stamp loading

Part 3 Interception of Telecommunications Messages (ss. 22-30)