Obama Administration using Metadata to Track your every move

Status
Not open for further replies.

Terry Ganzi

Level 26
Thread author
Verified
Top Poster
Well-known
Feb 7, 2014
1,540
If you send a picture from your living room using your smartphone or any GPS enabled device , you’re revealing the exact coordinates of your house to any one of the Obama sanctioned listening goon squads. The GPS location information embedded in a digital photo is an example of so-called metadata, a once-obscure technical term that’s become one of the Whitehouse's newest tools to steal your information and keep track of you. Powerful computer algorithms to expose patterns and instantly profile individuals and their associates. Metadata records of search terms and webpage visits, credit card use, can all be used to reveal a log of your thoughts by documenting what you’ve been reading and researching. The more Americans rely on their smartphones and the Internet, the more metadata is generated, and it is being stored forever in the biggest data storage center on earth.(see video clip below) Metadata with GPS locations, for example, can trace a person anywhere they go within 20ft. A former senior official of the National Security Agency said the government’s massive collection of metadata allowed the agency to construct “maps” of an individual’s daily movements, social connections, travel habits and other personal information. “This is blanket. There is no constraint. No probable cause. No reasonable suspicion,” said Thomas Drake, who worked unsuccessfully for years to report privacy violations and massive waste at the agency to his superiors and Congress.
READ ARTICLE


Mod Edit
 
Last edited by a moderator:
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top