Guide to Your Metadata
SPECIAL FEATURE, ANGLO AMERICA, MEDIA, WHISTLEBLOWING - SURVEILLANCE, 17 Jun 2013
The Guardian – TRANSCEND Media Service
Metadata is information generated as you use technology, and its use has been the subject of cotroversy since NSA’s secret surveillance program was revealed. Examples include the date and time you called somebody or the location from which you last accessed your email. The data collected generally does not contain personal or content-specific details, but rather transactional information about the user, the device and activities taking place. In some cases you can limit the information that is collected – by turning off location services on your cell phone for instance – but many times you cannot. Below, explore some of the data collected through activities you do every day.
- Choose the services you use in a day
- What metadata looks like
What you can tell using metadata – A case study of the Petraeus scandal:
1. To communicate, Paula Broadwell and David Petraeus shared an anonymous email account.
2. Instead of sending emails, both would login to the account, edit and save drafts.
3. Broadwell logged in from various hotels’ public Wi-Fi, leaving a trail of metadata that included times and locations.
4. The FBI crossed-referenced hotel guests with login times and locations leading to the identification of Broadwell.
Sources: Microsoft, IPTC, Verizon telephone data court order, Photo Metadata, Facebook, Beyond the Wire, Google, ACLU
PLEASE GO TO ORIGINAL TO ANALYSE YOUR DATA, GRAPHS AND LINKS – guardian.co.uk
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Read more
Click here to go to the current weekly digest or pick another article:
SPECIAL FEATURE:
- Genocide in Pictures: Worth a Trillion Words
- Genocide in Pictures: Worth a Trillion Words
- Genocide in Pictures: Worth a Trillion Words
ANGLO AMERICA:
MEDIA:
- Scandal Deepens around CNN’s Clarissa Ward Staging Syria Prison Scene
- From ‘Terrorist’ to ‘Freedom Fighter’: How the West Rebranded Al-Qaeda’s Jolani as Syria’s ‘Woke’ New Leader
- The Day the Media Decided Militant Jihadism Was Respectable
WHISTLEBLOWING - SURVEILLANCE: