Glenn Harlan Reynolds: 5 Privacy Laws We Should Put on the Books Right NowPosted: April 8, 2014 | Author: Pundit Planet | Filed under: Mediasphere, Science & Technology | Tags: Electronic Communications Privacy Act, Glenn Reynolds, Metadata, National Security Agency, Rick Perry, Texas, United States, United States Postal Service | 1 Comment
As we hear more and more about government spying at the federal, state, and local levels, it’s time to start thinking about what to do if we want to protect our privacy. Instapundit blogger and PopMech contributor Glenn Harlan Reynolds outlines the new rules he’d like to see. 1. Treat Email More Like Mail By statute, law enforcement can’t open domestic communications through U.S. mail without a court order. But under the federal law covering email—the Electronic Communications Privacy Act, which dates back to 1986—they can obtain many of your emails without a warrant, merely
by subpoenaing the email provider. Texas has passed, and Gov. Rick Perry has signed, a state law requiring a warrant for access to email content. This is a good start, but I’d like to see something similar at the federal level. 2. Protect Metadata The National Security Agency (NSA) and other government agencies record cellphone and email metadata—who you call, when you call, how long you call, your location when making the call—on the same basis. Likewise, many local police departments are tracking license plates around town and building databases of who goes where. Even the U.S. Postal Service records its metadata without a warrant. Because so-called cover information such as the addressee’s address, return address, and postmark is recorded on every piece of mail and postal employees can see it, the information is considered public. Read the rest of this entry »
Using Metadata to find Paul ReverePosted: June 11, 2013 | Author: Pundit Planet | Filed under: Mediasphere, Reading Room | Tags: Boston, Cambridge, David Hackett Fischer, Ireland, London, Metadata, Paul Revere, Thirteen Colonies | Leave a comment
A brilliant exercise by Kieran Healy —The Butcher
I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of “metadata” in certain recent events and the assurances of various respectable parties that the government was merely “sifting through this so-called metadata” and that the “information acquired does not include the content of any communications”. I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner.
The analysis in this report is based on information gathered by our field agent Mr David Hackett Fischer and published in an Appendix to his lengthy report to the government. As you may be aware, Mr Fischer is an expert and respected field Agent with a broad and deep knowledge of the colonies. I, on the other hand, have made my way from Ireland with just a little quantitative training—I placed several hundred rungs below the Senior Wrangler during my time at Cambridge—and I am presently employed as a junior analytical scribe at ye olde National Security Administration. Sorry, I mean the Royal Security Administration. And I should emphasize again that I know nothing of current affairs in the colonies. However, our current Eighteenth Century beta of PRISM has been used to collect and analyze information on more than two hundred and sixty persons (of varying degrees of suspicion) belonging variously to seven different organizations in the Boston area.
Rest assured that we only collected metadata on these people, and no actual conversations were recorded or meetings transcribed. All I know is whether someone was a member of an organization or not. Surely this is but a small encroachment on the freedom of the Crown’s subjects. I have been asked, on the basis of this poor information, to present some names for our field agents in the Colonies to work with. It seems an unlikely task.
If you want to follow along yourself, there is a secret repository containing the data and the appropriate commands for your portable analytical engine.
Here is what the data look like.
1 2 3 4 5 6 7 8 9 10 11 12
The organizations are listed in the columns, and the names in the rows. As you can see, membership is represented by a “1”. So this Samuel Adams person (whoever he is), belongs to the North Caucus, the Long Room Club, the Boston Committee, and the London Enemies List. I must say, these organizational names sound rather belligerent.
Anyway, what can get from these meagre metadata? This table is large and cumbersome. I am a pretty low-level operative at ye olde RSA, so I have to keep it simple. My superiors, I am quite sure, have far more sophisticated analytical techniques at their disposal. I will simply start at the very beginning and follow a technique laid out in a beautiful paper by my brilliant former colleague, Mr Ron Breiger, called ”The Duality of Persons and Groups.” He wrote it as a graduate student at Harvard, some thirty five years ago. (Harvard, you may recall, is what passes for a university in the Colonies. No matter.) The paper describes what we now think of as a basic way to represent information about links between people and some other kind of thing, like attendance at various events, or membership in various groups. The foundational papers in this new science of social networke analysis, in fact, are almost all about what you can tell about people and their social lives based on metadata only, without much reference to the actual content of what they say.
Mr Breiger’s insight was that our table of 254 rows and seven columns is an adjacency matrix, and that a bit of matrix multiplication can bring out information that is in the table but perhaps hard to see. Take this adjacency matrix of people and groups and transpose it—that is, flip it over on its side, so that the rows are now the columns andvice versa. Now we have two tables, or matrices, a 254×7 one showing “People by Groups” and the other a 7×254 one showing “Groups by People”. Call the first one the adjacency matrix A and the second one its transpose, AT. Now, as you will recall there are rules for multiplying matrices together. If you multiply out A(AT), you will get a big matrix with 254 rows and 254 columns. That is, it will be a 254×254 “Person by Person” matrix, where both the rows and columns are people (in the same order) and the cells show the number of organizations any particular pair of people both belonged to. Is that not marvelous? I have always thought this operation is somewhat akin to magick, especially as it involves moving one hand down and the other one across in a manner not wholly removed from an incantation.
I cannot show you the whole Person by Person matrix, because I would have to kill you. I jest, I jest! It is just because it is rather large. But here is a little snippet of it. At this point in the eighteenth century, a 254×254 matrix is what we call ”Bigge Data”. I have an upcoming EDWARDx talk about it. You should come. Anyway:
1 2 3 4 5 6 7
You can see here that Mr Appleton and Mr John Adams were connected through both being a member of one group, while Mr John Adams and Mr Samuel Adams shared memberships in two of our seven groups. Mr Ash, meanwhile, was not connected through organization membership to any of the first four men on our list. The rest of the table stretches out in both directions.
Notice again, I beg you, what we did there. We did not start with a “social networke” as you might ordinarily think of it, where individuals are connected to other individuals. We started with a list of memberships in various organizations. But now suddenly we do have a social networke of individuals, where a tie is defined by co-membership in an organization. This is a powerful trick.