{"id":30431,"date":"2013-06-17T12:00:11","date_gmt":"2013-06-17T11:00:11","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=30431"},"modified":"2015-05-06T12:52:51","modified_gmt":"2015-05-06T11:52:51","slug":"guide-to-your-metadata","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2013\/06\/guide-to-your-metadata\/","title":{"rendered":"Guide to Your Metadata"},"content":{"rendered":"<p>Metadata is information generated as you use technology, and its use has been the subject of cotroversy since <a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/world\/the-nsa-files\" >NSA&#8217;s secret surveillance program<\/a> was revealed. Examples include the date and time you called somebody or the location from which you last accessed your email. The data collected generally does not contain personal or content-specific details, but rather transactional information about the user, the device and activities taking place. In some cases you can limit the information that is collected \u2013 by turning off location services on your cell phone for instance \u2013 but many times you cannot. Below, explore some of the data collected through activities you do every day.<\/p>\n<ul>\n<li><strong><i>Choose the services you use in a day<\/i><i><\/i><\/strong><\/li>\n<li><strong><i>What metadata looks like<\/i><\/strong><i><\/i><\/li>\n<\/ul>\n<p><i>What you can tell using metadata &#8211; A case study of the Petraeus scandal:<\/i><i><\/i><\/p>\n<p>1. To communicate, Paula Broadwell and David Petraeus shared an anonymous email account.<\/p>\n<p>2. Instead of sending emails, both would login to the account, edit and save drafts.<\/p>\n<p>3. Broadwell logged in from various hotels&#8217; public Wi-Fi, leaving a trail of metadata that included times and locations.<\/p>\n<p>4. The FBI crossed-referenced hotel guests with login times and locations leading to the identification of Broadwell.<\/p>\n<p>Sources: <a target=\"_blank\" href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/gg309512.aspx\" >Microsoft<\/a>, <a target=\"_blank\" href=\"http:\/\/www.iptc.org\/std\/photometadata\/0.0\/documentation\/IPTC-PhotoMetadataWhitePaper2007_11.pdf\" >IPTC<\/a>, <a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/world\/interactive\/2013\/jun\/06\/verizon-telephone-data-court-order\" >Verizon telephone data court order<\/a>, <a target=\"_blank\" href=\"http:\/\/www.photometadata.org\/meta-tutorials-adobe-photoshop\" >Photo Metadata<\/a>, <a target=\"_blank\" href=\"https:\/\/developers.facebook.com\/docs\/reference\/login\/extended-profile-properties\" >Facebook<\/a>, <a target=\"_blank\" href=\"http:\/\/blog.newswire.ca\/wordpress-mu\/2011\/06\/28\/uncovering-the-metadata-in-a-tweet\" >Beyond the Wire<\/a>, <a target=\"_blank\" href=\"https:\/\/support.google.com\/accounts\/answer\/54068?hl=en\" >Google<\/a>, <a target=\"_blank\" href=\"http:\/\/www.aclu.org\/blog\/technology-and-liberty-national-security\/surveillance-and-security-lessons-petraeus-scandal\" >ACLU<\/a><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.guardian.co.uk\/technology\/interactive\/2013\/jun\/12\/what-is-metadata-nsa-surveillance?CMP=EMCNEWEML6619I2#meta=0000000\" ><b>PLEASE GO TO ORIGINAL TO ANALYSE YOUR DATA, GRAPHS AND LINKS &#8211; <\/b>guardian.co.uk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Below, explore some of the data collected through activities you do every day. What you can tell using metadata &#8211; A case study of the Petraeus scandal.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197,65,62,60],"tags":[],"class_list":["post-30431","post","type-post","status-publish","format-standard","hentry","category-special-feature","category-anglo-america","category-media","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/30431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=30431"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/30431\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=30431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=30431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=30431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}