Big data, metadata, and traffic analysis:
What are these big companies (facebook, google) actually selling the NSA. What NSA actually does with your private data
It's one of the most remarkable hubbub around and a matter of absolute curiousity over the people both online and offline to noise about the NSA spying in your private life.
It's one of the most remarkable hubbub around and a matter of absolute curiousity over the people both online and offline to noise about the NSA spying in your private life.
NSA afterall, was founded in 1952 for this code breaking and
intercepting communications as its mission.
It's possible, of course, that the NSA is doing something
technically interesting, like intercepting
and breaking SSL-protected Internet communications. But the NSA doesn't
have to bother with deciphering your PGP-protected love notes to your sweetie
to know what you're up to. No, they can combine their age old techniques of
working with metadata and traffic analysis with 21st century big data analysis
to have a darn good idea of what you, along with everyone else, are doing.
It's not just the NSA, though. Big Internet businesses like
google and others have been using the same techniques to deliver customized Web
experiences to you for almost twenty years.
Metadata
It's metadata that gives anyone with access to your data,
not just the NSA, the ability to work out what you're up to even if your data is
locked up and encrypted.Unless you're a serious photography,
video, or music collector, you may not know about metadata. It's "data
about data" -- or, more properly in this context, it's data about content.
When you look at a Web page, a photo, or an e-mail message, what you see is the
human-readable content. Hiding underneath that picture of a kitten, the ITworld
Web page, or a note from your mom, is all kinds of data about what you see.
With a digital photograph, there can be dozens of data fields. There are
multiple formats for this data. The most popular are Exchangeable Image File
Format (EIFF), International Press Telecommunications Council (IPTC), and
Adobe's Extensible Metadata Platform (EMP).
A photograph's metadata can record the camera that was used
to take it, and the date and time it was taken -- along with the location, if
the camera has a GPS. If you edit your photograph, the metadata can also be
used to record what software and operating system you used. And with the right
software, or even a Website like exifdata,
you can read any image's metadata.
Web pages are the same way. You probably know about cookies and
your Web
browser history, but there's far more data available out there about your
Web interactions than you might think.
MIT media lab immersion program
If you think that's bad, consider all the information that
the MIT Media Lab Immersion
programcan pull up about you from just the From:,
To:, CC: and Timestamp fields of the messages in your Gmail account.
Stunning isn't it? When you take a closer look at in the traffic analysis,
you'll see it's actually far more revealing than it looks at a casual glance.
![]() |
| I don't need to be a traffic analysis expert to figure out who you interact with -- I just need four fields from my Gmail messages |
Not worried? Think you can dodge around e-mail tracking with
a few simple tricks? That's what former
CIA director David Petraeus thought -- and he was wrong, wrong, wrong.
Petraeus and his mistress Paula Broadwell used Gmail to communicate, but never
actually sent messages to each other. Instead, they used anonymous email
accounts to leave drafts of messages for the other to read. Safe? Anything
but.
While they did avoid the common mistake of using their home
Internet accounts, Broadwell, at least, logged into the various mail accounts
from public hotel Wi-Fi networks. From there, it was simply a matter of
collating guest lists from various hotels, IP login records, and, eventually,
it appears, access to the actual drafts.
So it was that the head
of the CIA itself was brought down by an FBI investigation of anonymous e-mails.
Do you think you can do better? I doubt it.
- Source itworld.com. Compiled by Harshvardhan Pandey.

No comments:
Post a Comment