American researchers say they were shocked by how much information they were able to unearth about people by simply looking at the phone numbers they called.
The Stanford University study encouraged volunteers to install a tracking application called MetaPhone onto their phones.
Researchers collected information for several months, and say they were able to predict people’s medical conditions, hobbies and relationships by only looking at the metadata.
Graduate student Jonathan Mayer, who led the study, says the results show a significant amount of personal information can be discovered through metadata.
“One of the things which is most concerning about the privacy properties we’ve uncovered is how easy it is to make inferences about the metadata on a large scale,” he said.
“We had a participant who… had calls with a lumber yard and a locksmith and a hydroponics dealer and a bong shop.
“[You] don’t need a PHD in computer science to have some sense of what could be going on there.”
Mr Mayer says his team’s original hypothesis was that with only a few months of collection data and only a handful of users, the metadata would not be very revealing.
But he says he was surprised.
“For some individuals, the fact that they have a particular medical condition is quite private, for others are the fact that they own a gun is quite private,” he said.
“For others, their religious beliefs are quite private. And yet we were able to find many of these sorts of traits using just telephone metadata.”
MetaPhone study gathered same data as NSA
MetaPhone has been described as a slimmed-down version of the United States National Security Agency (NSA), because it has been collecting the same type of data which is collected by intelligence organisations.
Last year, documents from former NSA-contractor Edward Snowden showed Australia’s intelligence organisations had offered to provide raw metadata to overseas allies.
But often in the electronic surveillance debate, a distinction is made between what you say versus the metadata.
“The material that I understand was referred to in the Guardian story related to essentially the billing data, now that has been available – but there is a big difference between billing data and the actual content of calls,” Prime Minister Tony Abbott said in December, when asked about the Snowden leaks.
The Latest on: Metadata mining
via Google News
The Latest on: Metadata mining
- RPT-PRECIOUS-Gold firms as U.S.-China trade uncertainty persistson December 5, 2019 at 11:38 am
Palladium marks fresh high of $1,876.54/oz * U.S. trade deficit falls 7.6% to $47.2 bln in October * U.S. weekly jobless claims decline 10,000 to 203,000 * GRAPHIC-2019 asset returns: ...
- Cybersecurity Must Do More Than Prevention, Real-Time Metadata Is the First Stepon November 11, 2019 at 1:31 am
You can apply new threat intelligence and indicators of compromise (IOC) to all metadata from the network sensor that gathered the traffic. Storing this data over time facilitates retrospective ...
- Blockstream Mining: A Grassroots Vision for Redistributing Hashrateon August 12, 2019 at 6:31 pm
Once set up, they can either join Blockstream’s pool or any other they like. Customers will also have complete access to other mining metadata through what Mow called a “very transparent” user ...
- Cryptojackers Making Secondary Income Off Security Data Seizures: Reporton August 7, 2019 at 6:07 pm
In the wake of lower cryptocurrency prices, ghost mining hackers are turning to metadata seizures. In a report issued today, cybersecurity firm Carbon Black says a well-known 2018 monero crypto mining ...
- We Found “Jeopardy!” Kingslayer Emma Boettcher’s Thesis on Data Miningon June 3, 2019 at 5:00 pm
And to do so, she set out to evaluate two factors: So, Boettcher wrote a text-mining program to evaluate these two factors ... which was then stored as metadata), phrasing (how convoluted the phrasing ...
- Could Facebook Start Mining Decrypted WhatsApp Messages For Ads And Counter-Terrorism?on March 23, 2019 at 7:56 pm
The most likely scenario is a combination of behavioral affinity inference through unencrypted metadata and on-device content mining. In the end, as end-to-end encryption meets the ad-supported ...
- Meta-mining of copy number profiles of high-risk neuroblastoma tumorson October 29, 2018 at 5:00 pm
Machine-accessible metadata file describing the reported data (ISA-Tab format) Neuroblastoma is a rare disease, therefore it is challenging to collect enough tumor material and data for a sufficiently ...
- Crypto mining runs rampant in higher education: Is it students?on March 29, 2018 at 11:15 pm
By analyzing this metadata, Vectra detected hidden attacker behaviors and ... with detection and response tools to stop threats faster. Considered opportunistic, mining surged with the rising price of ...
- Report: Cryptocurrency Mining Runs Rampant in Higher Educationon March 29, 2018 at 6:19 am
Cryptocurrency mining involves converting electricity to monetary value ... The data in this report is based on anonymized metadata from Vectra customers who have opted to share detection metrics. The ...
- Unrestricted Text and Data Mining with allofPLOSon November 28, 2017 at 9:31 am
text and data mining (TDM) and data analytics all refer to the process of obtaining information through machine-read material. Faster than a human possibly could, machine-learning approaches can ...
via Bing News