Guest post by David Haynes, author of Metadata for Information Management and Retrieval, 2nd edition: Understanding metadata and its use
Use of metadata by the security services
“Metadata tells you everything about somebody’s life. If you have enough metadata you don’t really need content” (Schneier 2015, p.23)
If anyone wondered about the importance of metadata, this quote by Stuart Baker of the US National Security Agency should leave no-one in any doubt. The Snowden revelations about the routine gathering of metadata about international telephone calls to or from the United States continues to have repercussions today (Greenwald 2013). Indeed Privacy International (2017) has identified the following types of metadata that is gathered or could be gathered by security agencies:
- Device used
- Length of call
“Metadata in aggregate is content” as Jacob Appelbaum observed when the Wikileaks controversy first blew up (Democracy Now 2013). In other words when metadata from different sources is aggregated it can be used to reconstruct the information content of individual communications.
Invasion of privacy or personal benefit?
These concerns extend well beyond the use of metadata by Governments and the security services. The social media giants prosper by exploiting personal data and targeting digital advertising. Personal profiles of targeted individuals are based on metadata about online use and are the basis of online behavioural advertising. Cookies and other tracking technologies can monitor the online activity of an individual to predict future behaviour. Metadata about online sessions reveals a great deal about an individual and his or her life. This may extend to gathering information about friends, family, colleagues and other contacts.
The upside of this is that metadata is a powerful tool to facilitate use of online services, by remembering users’ preferences and delivering content that is more likely to be of interest or relevance to them. This has to be balanced against the risks associated with online disclosure of personal data.
Metadata describes an information object whether that be raw data or more descriptive information about an individual. This is important because the treatment of metadata has become a political issue. Personal data, especially data that reveals opinions, attitudes and beliefs is potentially very sensitive. Use of this personal data by service providers or by third parties can expose users to risks such as nuisance from unwanted ads, harassment from internet trolls or fraud through identity theft, if the data is not held or transmitted security. Many digital advertisers would say that because the data is aggregated it is not possible to identify individuals – i.e. the data is anonymised. However this is no protection against privacy breaches as has been demonstrated by Narayanan and Shmatikov (2009) and others.
Daniel Rosenberg (2013) makes a nice distinction between data, facts and evidence. Data if true may be a fact, but if false ceases to be a fact. Samuel Arbesman (2012) in his book ‘The Half Life of Facts’ introduced the idea that in a given period half the certainties that we had are shown to be false or are superceded by new understandings and that they cease to be ‘facts’. Data, whether it is true or not, continues to be data, but is only factual if true. Perhaps there is some way of recording the reliability of information or data so that it can be exploited appropriately. Many of the arguments and counter-arguments on climate change for instance centre on the quality and veracity of the evidence used by each side of the debate. This idea is not new, as medical researchers have for some time evaluated the quality of research used to make clinical decisions. This information about the quality and reliability of data is metadata.
Metadata is political
Metadata has become a political issue because of its use by security agencies and because of wider privacy issues in the commercial world. Anyone who had asked the question ‘What does metadata matter?’ prior to 2013 will realise just how important a bearing it has on current political issues. The Fourth Amendment to the U.S. Constitution protects ‘The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures’ (United States 1791). A lot hangs on the interpretation of privacy as Solove (2011) has so eloquently discussed in his book ‘Nothing to Hide’. ‘Fake news’ is not new, but the phenomenon has reared its head in recent elections and is unlikely to go away any time soon. Good governance also depends on a good understanding of metadata and accountability for past actions.
Metadata for information management and retrieval
In the new edition of Metadata for Information Management and Retrieval, published in January 2018 I consider the origins of metadata and look at the ways in which it is used for managing information resources. The ethical dimensions of metadata are explored and issues such as governance, privacy, security and human rights are considered. The book also discusses the digital divide and the potential that metadata has for making information accessible to wider audiences.
Metadata has an important role in politics and ethics. How then do we manage it to best effect?
Haynes, D (2018) Metadata for Information Management and Retrieval: understanding metadata and its use. ISBN 9781856048248. Facet Publishing. London, 2018, 267pp. http://www.facetpublishing.co.uk/title.php?id=048248
You can follow David on Twitter @JDavidHaynes
Arbesman, S., 2012. The half-life of facts : why everything we know has an expiration date,
Democracy Now, 2013. Court: Gov’t Can Secretly Obtain Email, Twitter Info from Ex-WikiLeaks Volunteer Jacob Appelbaum. Available at: https://www.democracynow.org/2013/2/5/court_govt_can_secretly_obtain_email [Accessed March 21, 2017].
Greenwald, G., 2013. NSA Collecting Phone Records of Millions of Verizon Customers Daily. The Guardian. Available at: http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order [Accessed July 7, 2014].
Narayanan, A. & Shmatikov, V., 2009. De-anonymizing Social Networks. In 2009 30th IEEE Symposium on Security and Privacy. IEEE, pp. 173–187.
Privacy International, 2017. Privacy 101. Metadata. Available at: https://www.privacyinternational.org/node/53 [Accessed March 23, 2017].
Rosenberg, D., 2013. Data before the Fact. In L. Gitelman, ed. “Raw Data” is an Oxymoron. Cambridge, MA: MIT Press, pp. 15–40.
Schneier, B., 2015. Data and Goliath: the hidden battles to collect your data and control your world, New York, NY: W.W.Norton.
Solove, D.J., 2011. Nothing to Hide: the false tradeoff between privacy and security, New Haven, CT: Yale University Press.
United States, 1791. U.S. Constitution Amendment IV, United States.
Join our mailing list
Sign up to our mailing list to hear more about new and forthcoming books.
The CILIP Cyrmu Wales Conference 2017 in Llandudno is three weeks away but places can only be booked until Thursday 4th May. Our pick of the sessions are below along with some useful resources from us to help you prepare for what is sure to be a memorable event.
Here’s our pick of the sessions:
Keynote: Copyright Education and Librarians: understanding privileges and rights
Dr Jane Secker, co-author of Copyright and E-learning is presenting this keynote speech.
Keynote: Protecting the privacy of library users
Paul Pedley, author of Practical Copyright for Library and Information Professionals, is presenting the other keynote on the last day of the conference.
Session: How we made a makerspace- and how you can too!
Allie Cingi, Library Manager at Awen Cultural Trust and Rob Jones, Library Assistant st Pencoed Library present this session on makerspaces; innovative DIY studios known as makerspaces where people can build, invent, share, and learn.
Session: Marketing to thrive and survive
In this session, Sian Nielson and Giles Lloyd-Brown explore how they’ve strengthened outreach and engagegement with students and disparate teams at Swansea University’s libraries.
Session: Supporting evidence informed decision making for public health practice and policy
This session is presented by Katrina Hall, Team Lead, Knowledge Management, Observatory Evidence Service, Public Health Wales.
Session: Planning for Disasters or Literally Firefighting?
In this session, Mark Ludlam, Learning Resources Manager at Gower College Swansea describes the experiences and lessons learned from the fire destroyed the college’s library service at the Tyoch Campus last year.
Sign up to our mailing list to hear more about new and forthcoming books. Plus, receive an introductory 30% off a book of your choice – just fill in your details below and we’ll be in touch to help you redeem this special discount:*
*Offer not available to customers in USA, Canada, Australia, New Zealand, Asia-Pacific