	{"id":15105,"date":"2013-06-12T11:27:49","date_gmt":"2013-06-12T18:27:49","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=15105"},"modified":"2013-08-16T13:13:17","modified_gmt":"2013-08-16T20:13:17","slug":"unpacking-the-nsa-scandal-what-is-metadata","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/","title":{"rendered":"Unpacking the NSA Scandal: What is Metadata?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadata.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-15109\" alt=\"metadata\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadata.jpg\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadata.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadata-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadata-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to how to interpret the discussion so that you can come to your own informed opinion.<\/p>\n<p>As I\u2019ve been reading the ample coverage about the recent NSA scandal, there\u2019s one thing that I see again and again that a lot of people are apparently misunderstanding. The current issue isn\u2019t about whether the government is tapping people\u2019s phones and reading people\u2019s emails, per se. The whole trope of listening for code words is more \u201c<a href=\"http:\/\/www.nsawatch.org\/echelonfaq.html\" target=\"_blank\">ECHELON<\/a>\u201d than \u201c<a href=\"http:\/\/gizmodo.com\/what-is-prism-511875267\" target=\"_blank\">PRISM<\/a>,\u201d and the recent scandal is about the latter.<\/p>\n<p>So, what\u2019s the difference? In the case of ECHELON, the idea was that the government was parsing the content of communications to look for certain specific keywords relating to drugs and terrorism. Given the unbelievably massive amount of data that would need to be parsed, and the popularity of strong encryption methods among people that know they\u2019re doing something illicit, this could be considerably more trouble than it\u2019s worth.<\/p>\n<p>For better or worse, the content of communications themselves is not the only way to get meaningful information. Advertisers have been doing this too, which is why <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-do-not-track-and-why-should-you-care\/\" target=\"_blank\">\u201cDo Not Track\u201d<\/a> is such a big deal. The idea with PRISM is that it\u2019s not dealing with voice or text content that can be encrypted, but with the data <i>about the call itself<\/i>. This is what we call meta-data: data about data.<\/p>\n<p>What sort of data can be gleaned about our communications? Here\u2019s a short list of the most common questions that metadata answers:<\/p>\n<ul>\n<li>Where is it from?<\/li>\n<li>Where is it going?<\/li>\n<li>When did it start?<\/li>\n<li>How long did it last?<\/li>\n<li>How often does it repeat?<\/li>\n<\/ul>\n<p>These are all pretty simple pieces of information, but <a href=\"http:\/\/www.theverge.com\/2013\/5\/16\/4336994\/metadata-matters-how-phone-records-and-obsolete-laws-harm-privacy\" target=\"_blank\">potentially powerful<\/a> ones.<\/p>\n<p>In the case of advertising, this is used to gear ads to your interests, and <a href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\" target=\"_blank\">personally identifiable\u00a0information<\/a>\u00a0(PII) is ostensibly scrubbed. (Though,\u00a0<a href=\"http:\/\/www.securityfocus.com\/brief\/277\" target=\"_blank\">as history shows<\/a>, people can often be easily identified anyway.) Sometimes this can result in ads that are so uncannily accurate that it seems like someone\u2019s bugged your house. Sometimes this can result in ads that are a little more off the mark \u2013 one site in particular seems to think I&#8217;m a sushi-eating truck driver with Parkinson&#8217;s disease. (Okay, the sushi part <i>is<\/i> true.)<\/p>\n<p>It remains to be seen what the full scope of the NSA search covers, though it seems likely that more details will eventually come to light. Hopefully this information can give you a better understanding about what it could mean for you, personally.<\/p>\n<p><span style=\"font-size: x-small;\">Pete Ashton via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\">cc<\/a><br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to how to interpret the discussion so that you can come to your own informed opinion. As I\u2019ve been reading the ample coverage about the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15111,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[61,455,453,106,457],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unpacking the NSA Scandal: What is Metadata? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-12T18:27:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-08-16T20:13:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"266\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg\",\"width\":400,\"height\":266},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/\",\"name\":\"Unpacking the NSA Scandal: What is Metadata? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#primaryimage\"},\"datePublished\":\"2013-06-12T18:27:49+00:00\",\"dateModified\":\"2013-08-16T20:13:17+00:00\",\"description\":\"First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unpacking the NSA Scandal: What is Metadata?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Unpacking the NSA Scandal: What is Metadata?\",\"datePublished\":\"2013-06-12T18:27:49+00:00\",\"dateModified\":\"2013-08-16T20:13:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#webpage\"},\"wordCount\":462,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg\",\"keywords\":[\"Government Surveillance\",\"Metadata\",\"NSA\",\"Privacy\",\"Scandal\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/","og_locale":"en_US","og_type":"article","og_title":"Unpacking the NSA Scandal: What is Metadata? - The Mac Security Blog","og_description":"First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-06-12T18:27:49+00:00","article_modified_time":"2013-08-16T20:13:17+00:00","og_image":[{"width":400,"height":266,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg","width":400,"height":266},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/","name":"Unpacking the NSA Scandal: What is Metadata? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#primaryimage"},"datePublished":"2013-06-12T18:27:49+00:00","dateModified":"2013-08-16T20:13:17+00:00","description":"First of all, let me say that this is not intended as commentary or opinion on the current scandal. My goal in posting this is to simply educate you as to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Unpacking the NSA Scandal: What is Metadata?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Unpacking the NSA Scandal: What is Metadata?","datePublished":"2013-06-12T18:27:49+00:00","dateModified":"2013-08-16T20:13:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#webpage"},"wordCount":462,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg","keywords":["Government Surveillance","Metadata","NSA","Privacy","Scandal"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/unpacking-the-nsa-scandal-what-is-metadata\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/metadataFT.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3VD","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15105"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=15105"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15105\/revisions"}],"predecessor-version":[{"id":15125,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15105\/revisions\/15125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/15111"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=15105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=15105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=15105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}