If you’re not concerned about government surveillance of your phone because the National Security Agency (NSA) only collects metadata, think again.
A study from Stanford University shows that connecting “anonymous” metadata to compromising personal information is trivially easy.
Documents leaked in June by former NSA contractor Edward Snowden revealed that the organization was collecting metadata about calls placed to and from Verizon telephone lines. Although this revelation was potentially troubling, metadata collection is, in theory, not cause for concern.
The metadata about your phone calls does not reveal your name or identity, or the content of your conversations, but it does track the numbers you call, how long the calls last, and which other companies have your phone number in their directories.
Although the specific documents leaked in June concerned Verizon landlines, the NSA has since admitted that it collects metadata about mobile telephone calls and text messages as well.
Sen. Dianne Feinstein (D-Calif.), who heads the Senate Intelligence Committee, has said that collecting metadata is “not surveillance.” Because the information, by itself, cannot identify individuals, Feinstein and the NSA hold that it is practically harmless for the government to collect it.
A research team operating out of Stanford University disagrees, and hopes to prove its point with a new Android app called MetaPhone. By accessing your phone number and your Facebook page, this app does what any NSA program could do: It acquires your metadata, then correlates it with your social-media information to see how much it can learn about you.
“Phone metadata is inherently revealing,” wrote Jonathan Mayer and Patrick Mutchler, the app’s designers, on a Stanford Law School blog. By using MetaPhone, you can submit your information to a Stanford research project so that Mayer and Mutchler can determine how easy it is for organizations to glean personal information from your supposedly non-revealing metadata.
When Tom’s Guide tried the app, we found that the results supported Stanford’s assertion: Dozens of different organizations had the phone number we tried on file. The NSA — or worse, a cybercriminal — would be able to find our name, our geographic location, our bank, our medical facilities and even our eating habits with just a simple cross-check online.
The Latest on: Metadata
via Google News
The Latest on: Metadata
- Congress abuses temporary funding bills to quietly reauthorize the awful Patriot Acton November 22, 2019 at 8:39 am
Since 2001, a provision of the Patriot Act has allowed the National Security Agency to collect and store telephone metadata without warrants. Lawmakers exploited the fear generated by the 9/11 attacks ...
- Punt on Patriot Act Sets Up New Push by Opponentson November 22, 2019 at 7:30 am
PUNT ON PATRIOT ACT RENEWAL sets up focused effort to strip the National Security Agency of its metadata collection program, a controversial surveillance law that allows the NSA to collect records of ...
- This Week In Security: More WhatsApp, Nextcry, Hover To Crash, And Android Permissions Bypasson November 22, 2019 at 7:23 am
An update has been released, so first go make sure WhatsApp is updated. Facebook’s advisory is a bit light on the details, simply saying that a “stack-based buffer overflow” was possible as a result ...
- AutoRABIT Announces Partnership with nCino for DevOps Productivity, Release Management, and Complianceon November 22, 2019 at 5:00 am
SAN RAMON, Calif., Nov. 22, 2019 /PRNewswire-PRWeb/ -- AutoRABIT, a leading provider of enterprise-class, metadata-aware DevOps solutions for Salesforce, today announced a partnership with nCino, Inc.
- BigHand Looks to Push Into Corporate Legal with PayneGroup Acquisitionon November 22, 2019 at 4:44 am
On Tuesday, software provider BigHand announced that it had acquired PayneGroup, Inc., a company known for its metadata extraction solutions. The acquisition comes as BigHand looks to capitalize on a ...
- Arabidopsis proteome and the mass spectral assay libraryon November 22, 2019 at 2:44 am
Machine-accessible metadata file describing the reported data: https://doi.org/10.6084/m9.figshare.9959036 In both data-dependent acquisition (DDA) and DIA analysis, an Orbitrap Fusion Lumos mass ...
- Patriot Act extension concealed in funding bill passed by House Democratson November 21, 2019 at 10:23 pm
The renewal in the House spending bill extends the law for an additional three months, until March 15, 2020. It includes Section 215, which allows the government to collect metadata without court ...
- Egnyte’s new capabilities accelerate data discovery and boost securityon November 21, 2019 at 6:19 pm
This is the latest development to the Egnyte platform as the company continues to augment its industry-leading content intelligence engine. With metadata intelligence enhancements, users can implement ...
- Congress extends NSA call records collection powers to Marchon November 21, 2019 at 2:42 pm
Buried in a funding bill passed by the House this week was a clause that extended the government's so-called Section 215 powers, which allow the National Security Agency to compel phone providers to ...
- BigHand boosts template management and metadata management offerings by acquiring PayneGroupon November 21, 2019 at 9:20 am
CHICAGO, Nov. 21, 2019 /PRNewswire-PRWeb/ -- BigHand announces the acquisition of PayneGroup, to further strengthen its template management and metadata management offering in North America. The ...
via Bing News