Posted on 06/11/2013 4:38:17 AM PDT by Haiku Guy
London, 1772.
I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majestys subjects. This is in connection with the discussion of the role of metadata in certain recent events and the assurances of various respectable parties that the government was merely sifting through this so-called metadata and that the information acquired does not include the content of any communications. I will show how we can use this metadata to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner.
(snip)
...(O)ur current Eighteenth Century beta of PRISM has been used to collect and analyze information on more than two hundred and sixty persons (of varying degrees of suspicion) belonging variously to seven different organizations in the Boston area.
Rest assured that we only collected metadata on these people, and no actual conversations were recorded or meetings transcribed. All I know is whether someone was a member of an organization or not. Surely this is but a small encroachment on the freedom of the Crowns subjects.
(snip)
What a nice picture! The analytical engine has arranged everyone neatly, picking out clusters of individuals and also showing both peripheral individuals andmore intriguinglypeople who seem to bridge various groups in ways that might perhaps be relevant to national security. Look at that person right in the middle there.
He seems to bridge several groups in an unusual (though perhaps not unique) way. His name is Paul Revere.
(snip)
(Excerpt) Read more at kieranhealy.org ...
Cameras also produce metadata. When I want to copy write photos I insert it into the metadata.
good post
very, VERY interesting.
You just get tired of hacks in the Administration saying “It’s onlly metadata”, and brain dead idiots in the MFM nodding their heads as if they understand what that means.
Cameras also can be used for facial recognition. Using photos posted online and through traffic, security, ATM and other cameras, it is possible to track your every move. All it takes is the application of sufficient computer resources, and the cost of those resouces is going down all the time.
If I were to take a photo of a known terrorist and post it on the net, the photo could be traced back to me by way of metadata. (depending on how I store and post the image) It tells what camera was used, all the camera settings, camera accessories, time, and depending on the camera, location.
Your connections define you. Who but you, for example, would have connections to your old college and also to your current employer? Or to people in your neighborhood and your current employer? And if somebody wants to harass you, your connections provide a chart of who to hit in order to cause you harm or distress.
That is the best description of matrix multiplication I've ever seen.
I shall be including it in my next lecture on the subject.
Photos on FaceBook provide an increasingly useful method of analyzing connections, what with advances in facial recognition technology and the increasing resolution of photos. How many times this year have pictures been taken that include you in the background?
———to figure out just about everything-—
or, equally possible, to reach an erroneous conclusion.
That is, David miller, a disgruntled Rvere customer is targeted because the messages were complaints about not finishing the silver tea set on time
I consider myself "defined" by the best of company.
So, Mr. Creek, how is it that you know this Known Terrorist?
Tell us, Mr. Creek, how is it that you both happened to be on the It's a Small World ride at Disneyland at the same time?
Were you aware, Mr. Creek, that both you and this very same Known Terrorist passed through the same stoplight in Times Square in Manhattan within minutes of each other just two weeks before? How would you explain that?
Wiki has a fairly detailed explanation of metadata.
http://en.wikipedia.org/wiki/Metadata
Most people are just learning the word and seem to think it applies only to phones but virtually all things computerized or digitized produce metadata.
When my meter reader stopped coming into my yard I stopped him one day and asked him if he could access the info from the alley. He showed me a little antenna on the car and said it collects metadata from a range of around 10 yards.
I’ve got a Hutaree member just down the road from me. I’m sure we’re on camera together at the post office and we’ve even spoken on the phone about a car he wanted to buy.
I know a lot of folks who will not use EZPASS, because it records your transit of tollbooths and can be used to reconstruct your movements. What they do not realize is that every toolbooth that uses EZPASS also has a license plate camera that scans and records all license plates passing through the booth.
Maybe the GOP can't drag themselves off the golf course or away from the cocktail parties.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.