Why the government wants your metadata
In the wake of The Guardianâs remarkable revelation Wednesday that the National Security Agency is collecting phone records from millions of Americans, defenders of this dragnet surveillance program are insisting that the intelligence agency isnât eavesdropping on the calls â itâs just scooping up âmetadata.â The implication is that civil liberties complaints about Orwellian surveillance tactics are overblown.
But any suggestion that Americans have nothing to worry about from this dragnet collection of communications metadata is wrong. Even without intercepting the content of communications, the government can use metadata to learn our most intimate secrets â anything from whether we have a drinking problem to whether weâre gay or straight. The suggestion that metadata is âno big dealâ â a view that, regrettably, is still reflected in the law â is entirely out of step with the reality of modern communications.
So what exactly is metadata? Simply, if the âdataâ of a communication is the content of an email or phone call, this is data about the data â the identities of the sender and recipient, and the time, date, duration and location of a communication. This information can be extraordinarily sensitive. A Massachusetts Institute of Technology study a few years back found that reviewing peopleâs social networking contacts alone was sufficient to determine their sexual orientation. Consider, metadata from email communications was sufficient to identify the mistress of then-CIA Director David Petraeus and then Â drive him out of office.
The âwho,â âwhenâ and âhow frequentlyâ of communications are often more revealing than what is said or written. Calls between a reporter and a government whistleblower, for example, may reveal a relationship that can be incriminating all on its own.
Repeated calls to Alcoholics Anonymous, hotlines for gay teens, abortion clinics or a gambling bookie may tell you all you need to know about a personâs problems. If a politician were revealed to have repeatedly called a phone sex hotline after 2:00 a.m., no one would need to know what was said on the call before drawing conclusions. In addition sophisticated data-mining technologies have compounded the privacy implications by allowing the government to analyze terabytes of metadata and reveal far more details about a personâs life than ever before.
As technology advances, the distinction between data and metadata can be hard to distinguish. If a Websiteâs content is data, is the Websiteâs address metadata? The government has argued it is.
But like the list of books we check out of a library, the sites we âvisitâ online are really a list of things weâve read. Not only do URLs often contain content â such as search terms embedded within them â but the very fact that weâve visited a page with a URL such as âwww.webmd.com/depressionâ can be every bit as revealing as the content of an email message.
For this reason, law enforcement and intelligence agencies have long appreciated the value of metadata, and the outdated view that metadata surveillance is far less invasive than eavesdropping has allowed those agencies to use powerful surveillance tools with relatively little judicial oversight.
They can do this because, decades ago, long before the Internet altered all aspects of modern communication, the Supreme Court ruled that when we voluntarily divulge personal information to any third party, we waive our privacy rights and lose all Fourth Amendment protection over that information.
That decision would make sense if it was about, for example, why we canât reasonably expect something to remain private when we loudly boast about it in a bar.Â But the court extended that logic to phone calls. The argument was that since we âshareâ the phone numbers we dial with the phone company â which needs that information to connect the call â we canât claim any constitutional protection when the government asks for that data.
After the Supreme Court took this wrong turn in the 1970s, Congress compounded in the 1980s by codifying a lesser standard of protection for metadata. But neither the court nor Congress could have foreseen that NSA supercomputers would one day be able to mine that metadata to construct comprehensive pictures of our lives.
So we shouldnât be comforted when government officials reassure us that theyâre not listening to our communications â theyâre merely harvesting and mining our metadata.Â In a digital world, metadata can be used to construct nuanced portraits of our social relationships and interactions.
Itâs long past time for Congress to update our surveillance and privacy laws to ensure that before the government can go digging through our digital lives, it needs to demonstrate to a judge that it has good reason to believe weâve done something wrong.
PHOTO (Insert A): An undated aerial handout photo shows the National Security Agency headquarters building in Fort Meade, Maryland. REUTERS/NSA/Handout via Reuters
PHOTO (Insert B): Commander U.S. Forces in Afghanistan General David Petraeus shakes hands with author Paula Broadwell in this ISAF handout photo posted July 13, 2011.Â REUTERS/ISAF/Handout
PHOTO (Insert C): A magnifying glass is held in front of a computer screen in this picture illustration taken in Berlin, May 21, 2013.Â REUTERS/Pawel Kopczynski