A driver uses a cell phone while behind the wheel in Evanston, Ill. | Alex Garcia/Chicago Tribune/MCT

By Lindsay Wise and Jonathan S. Landay | McClatchy Washington Bureau

If you tweet a picture from your living room using your smartphone, you’re sharing far more than your new hairdo or the color of the wallpaper. You’re potentially revealing the exact coordinates of your house to anyone on the Internet.

The GPS location information embedded in a digital photo is an example of so-called metadata, a once-obscure technical term that’s become one of Washington’s hottest new buzzwords.

The word first sprang from the lips of pundits and politicians earlier this month, after reports disclosed that the government has been secretly accessing the telephone metadata of Verizon customers, as well as online videos, emails, photos and other data collected by nine Internet companies. President Barack Obama hastened to reassure Americans that “nobody is listening to your phone calls,” while other government officials likened the collection of metadata to reading information on the outside of an envelope, which doesn’t require a warrant.

But privacy experts warn that to those who know how to mine it, metadata discloses much more about us and our daily lives than the content of our communications.

So what is metadata? Simply put, it’s data about data. An early example is the Dewey Decimal System card catalogs that libraries use to organize books by title, author, genre and other information. In the digital age, metadata is coded into our electronic transmissions.

“Metadata is information about what communications you send and receive, who you talk to, where you are when you talk to them, the lengths of your conversations, what kind of device you were using and potentially other information, like the subject line of your emails,” said Peter Eckersley, the technology projects director at the Electronic Frontier Foundation, a digital civil liberties group.

Powerful computer algorithms can analyze the metadata to expose patterns and to profile individuals and their associates, Eckersley said.

“Metadata is the perfect place to start if you want to troll through millions of people’s communications to find patterns and to single out smaller groups for closer scrutiny,” he said. “It will tell you which groups of people go to political meetings together, which groups of people go to church together, which groups of people go to nightclubs together or sleep with each other.”

Metadata records of search terms and webpage visits also can reveal a log of your thoughts by documenting what you’ve been reading and researching, Eckersley said.

“That’s certainly enough to know if you’re pregnant or not, what diseases you have, whether you’re looking for a new job, whether you’re trying to figure out if the NSA is watching you or not,” he said, referring to the National Security Agency. Such information provides “a deeply intimate window into a person’s psyche,” he added.

The more Americans rely on their smartphones and the Internet, the more metadata is generated

Metadata with GPS locations, for example, can trace a teenage girl to an abortion clinic or a patient to a psychiatrist’s office, said Karen Reilly, the development director for The Tor Project, a U.S.-based nonprofit that produces technology to provide online anonymity and circumvent censorship.

Metadata can even identify a likely gun owner, she said.

“Never mind background checks, if you bring your cellphone to the gun range you probably have a gun,” Reilly said.

Views: 217

Reply to This

Replies to This Discussion

This is a new feature. Why on earth would they QUIETLY add geolocation metadata to the file headers of images or video, EXCEPT solely for the government to spy on us. I've parsed images bit by bit many times, but not in the last 10 years. I would guess this is another fantastic new feature from Patriot Act.

This is one of the biggest security breaches in the 21st century. So many millions are exposed. I can't even fathom how fucking retarded these people are, who develop and deploy this shit. Its like mass producing a skeleton key that opens everyones backdoor.

I mean fucking think for 1 second here. Some random teenage girl has a photo online with her address attached to it, but she didn't put the address there, she just created a facebook profile like everyone else does. Or some person writes something on line that some psycho reads and dislikes and now that psycho has that persons address.

This is very bad, very bad on so many levels.

Damage is already done too, we just haven't seen the consequences yet. We could mitigate the damage by closing the security breech and preventing further damage, but they aint gonna do that now are they

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
yesterday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I was wrong Emperor Penguins are big and powerful but still alive but this,  A size…"
yesterday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"Cheeki kea here's another that they say there have been modern sightings of!  The name of…"
yesterday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea, did you ever hear of the giant Imperial Penguins? They were about 6 feet tall and could…"
yesterday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I do not think these giant two legged birds would need to have a bad attitude as long as…"
yesterday
Olivia Brooks updated their profile
yesterday
John Miller was featured
yesterday
tjdavis's 2 blog posts were featured
yesterday
Zfort Group's blog post was featured
yesterday
Doc Vega's 6 blog posts were featured
yesterday
Burbia commented on tjdavis's video
Thumbnail

“What’s His Motive?” - Inside The Mind of George Soros

"Trump calls for George Soros and son to face federal…"
Tuesday
Burbia commented on tjdavis's photo
Tuesday
Profile IconSeeta Sathe and Olivia Brooks joined 12160 Social Network
Tuesday
tjdavis posted a video

Mossad, Terrifying CIA Technology, Blackwater & The Most Secret CIA Unit | John Kiriakou

John Kiriakou served 15 years in the CIA as a Case Officer (Spy) and as CIA's Head of Counterterrorism Operations in Pakistan where he lead the raid that cap...
Monday
tjdavis posted a photo
Monday
tjdavis posted a video

A Critique of the Tavistock Institute - The Mother Of All Conspiracy Theories

An examination of the Tavistock Institute, a theory which seeks to explain how Western societies have been brainwashed by a cabal of social scientists and th...
Sunday
tjdavis posted a video

“What’s His Motive?” - Inside The Mind of George Soros

In this short clip, Patrick Bet-David, Sebastian Gorka Adam Sosnick, and Tom Ellsworth George Soros and what motivates him to do the things he does. FaceTime...
Aug 27
Doc Vega posted blog posts
Aug 27
cheeki kea favorited Bob of the Family Renner's photo
Aug 26
cheeki kea commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"If you're ever out there Doc V and notice giant two legged birds roaming the wilderness be…"
Aug 26

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted