Intego Logo
  • Buy Now

Menu ☰

  • Home Products

    Intego Home Products

    Compatible with macOS Mojave!

    Upgrade Renew
    • Intego Mac Internet Security X9
    • Best Buy!
      Intego Mac Premium Bundle X9
    • Intego ContentBarrier Secure X9
    • Mac Washing Machine Secure X9
  • Business Products
  • Renew
  • Support
    • Customer Support
    • Knowledge Base
    • Downloads
    • Submit Malware
    • Contact Support
    • Check Your Requests
    • Upgrade
    • Renew
    • Request A Quote
  • Company
    • News
    • Careers
    • Awards
    • Partners
    • Privacy Policy
    • Terms of Use
    • Submission Policy
    • Contact Us
  • Blog
  • Buy Now
The Mac Security Blog

Share

Shares
Tweets
Shares
Pins
Print
​

How To

Unpacking the NSA Scandal: What is Metadata?

Posted on June 12th, 2013 by Lysa Myers

metadata

First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to how to interpret the discussion so that you can come to your own informed opinion.

As I’ve been reading the ample coverage about the recent NSA scandal, there’s one thing that I see again and again that a lot of people are apparently misunderstanding. The current issue isn’t about whether the government is tapping people’s phones and reading people’s emails, per se. The whole trope of listening for code words is more “ECHELON” than “PRISM,” and the recent scandal is about the latter.

So, what’s the difference? In the case of ECHELON, the idea was that the government was parsing the content of communications to look for certain specific keywords relating to drugs and terrorism. Given the unbelievably massive amount of data that would need to be parsed, and the popularity of strong encryption methods among people that know they’re doing something illicit, this could be considerably more trouble than it’s worth.

For better or worse, the content of communications themselves is not the only way to get meaningful information. Advertisers have been doing this too, which is why “Do Not Track” is such a big deal. The idea with PRISM is that it’s not dealing with voice or text content that can be encrypted, but with the data about the call itself. This is what we call meta-data: data about data.

What sort of data can be gleaned about our communications? Here’s a short list of the most common questions that metadata answers:

  • Where is it from?
  • Where is it going?
  • When did it start?
  • How long did it last?
  • How often does it repeat?

These are all pretty simple pieces of information, but potentially powerful ones.

In the case of advertising, this is used to gear ads to your interests, and personally identifiable information (PII) is ostensibly scrubbed. (Though, as history shows, people can often be easily identified anyway.) Sometimes this can result in ads that are so uncannily accurate that it seems like someone’s bugged your house. Sometimes this can result in ads that are a little more off the mark – one site in particular seems to think I’m a sushi-eating truck driver with Parkinson’s disease. (Okay, the sushi part is true.)

It remains to be seen what the full scope of the NSA search covers, though it seems likely that more details will eventually come to light. Hopefully this information can give you a better understanding about what it could mean for you, personally.

Pete Ashton via photopin cc

Share this:

  • Twitter
  • Facebook
This entry was posted in How To and tagged government surveillance, Metadata, NSA, privacy, scandal. Bookmark the permalink.

Popular Stories

  • How to Install macOS Monterey on Unsupported Macs, for Security Improvements
    How to Install macOS Monterey on Unsupported Macs, for Security Improvements
  • How to Run Windows on an Intel or M1 Mac
    How to Run Windows on an Intel or M1 Mac
  • How to Set Up a New Mac: Should You Migrate or Do a Clean Installation?
    How to Set Up a New Mac: Should You Migrate or Do a Clean Installation?
  • How to Enter and Exit Full Screen Mode and Use Split Screen in macOS
    How to Enter and Exit Full Screen Mode and Use Split Screen in macOS

Follow Intego

Follow Intego on Twitter Follow Intego on Facebook Follow Intego on YouTube Follow Intego on Pinterest Follow Intego on LinkedIn Follow Intego on Instagram Follow the Intego Mac Podcast on Apple Podcasts

Recommended

  • Apple
    17 Reasons Why You Should Use an iPod touch in 2022
  • How To
    USB-C and Thunderbolt: Understanding Ports and Cables for Macs and iPads
  • How To
    How to switch search engines in Safari and other browsers on macOS and iOS (and why you should)
  • How To
    How to Uncover and Delete Hidden Files Cluttering Your Mac and Save Space

Subscribe

Sign up for a Free Mac Security Newsletter to stay updated.

Apple News

  • 17 Reasons Why You Should Use an iPod touch in 2022
  • Apple’s AirTags: One Year On
  • How to choose the right Mac for your use case in 2022
  • Which iPad Is Best for You in 2022?

No related posts.

Mac Security Products for Home
  • Mac Internet Security X9
  • Mac Premium Bundle X9
  • ContentBarrier X9
  • ContentBarrier Secure X9
  • Mac Washing Machine
  • Mac Washing Machine Secure X9
Mac Security Products for Business
  • VirusBarrier X9
  • NetBarrier X9
Support
  • Knowledge Base
  • Downloads
  • Submit Malware
  • Contact Support
  • Check Your Requests
Mac Resource Center
  • New Mac User Center
  • Malware Definitions
  • Glossary of Terms
  • Why Trust a PC Vendor?
  • Free Mac Antivirus
Company
  • News
  • Careers
  • Awards
  • Partners
  • Privacy Policy
  • Terms of Use
  • Submission Policy
  • Contact Us
Downloads and Upgrades
  • Renew
  • Upgrade
  • Buy Now
  • Free Trial
Find Us
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
Sitemap
Intego Logo
  • Privacy Policy | Terms of Use
Copyright © 2022 Intego