Advertisement

HindustanTimes Tue,23 Sep 2014

Technology

Don’t underestimate the extraordinary power of metadata
John Naughton, Hindustan Times
London, June 27, 2013
First Published: 01:15 IST(27/6/2013)
Last Updated: 01:20 IST(27/6/2013)

‘To be remembered after we are dead,” wrote Hazlitt, “is but poor recompense for being treated with contempt while we are living.”

Cue president “George W” Obama in the matter of telephone surveillance by his National Security Agency. The fact that for the past seven years the agency has been collecting details of every telephone call placed in the United States without a warrant was, he intoned, no reason for Americans to be alarmed.

“Nobody is listening to your telephone calls,” he cooed. The torch was then passed to Dianne Feinstein, chair of the senate intelligence committee, who was likewise on bromide-dispensing duty. “This is just metadata,” she burbled, “there is no content involved.”

At which point the thought uppermost in one’s mind is: what kind of idiots do they take us for? Of course there’s no content involved, for the simple reason that content is a pain in the butt from the point of view of modern surveillance.

First, you have to listen to the damned recordings, and that requires people (because even today, computers are not great at understanding everyday conversation) and time. And although Senator Feinstein let slip that the FBI already employs 10,000 people “doing intelligence on counter-terrorism”, even that Stasi-scale mob isn’t a match for the torrent of voice recordings that Verizon and co could cough up daily for the spooks.

So in this business at least, content isn’t king. It’s the metadata – the call logs showing who called whom, from which location and for how long – that you want.

Why? Because that’s the stuff that is machine-readable, and therefore searchable. Imagine, for a moment, that you’re an NSA operative in Fort Meade, Maryland. You have a telephone number of someone you regard as potentially “interesting”. Type the number into a search box and up comes a list of every handset that has ever called, or been called by, it.

After that, it’s a matter of seconds before you have a network graph of second-, third- or fourth-degree connections to that original number. Map those on to electronic directories to get names and addresses, obtain a secret authorisation from the Fisa court (which has 11 federal judges so that it can sit round the clock, seven days a week), then dispatch a Prism subpoena to Facebook and co and make some coffee while waiting for the results.

Repeat the process with the resulting email contact lists and – bingo! – you have a mass surveillance programme as good as anything Vladimir Putin could put together.

And you’ve never had to sully your hands – or your conscience – with that precious “content” that civil libertarians get so worked up about.


Advertisement
Copyright © 2014 HT Media Limited. All Rights Reserved