Jonathan Mayer
Evaluating the privacy properties of telephone metadata
Jonathan Mayer, Patrick Mutchler, and John C. Mitchell. 2016. (View Paper → )
Since 2013, a stream of disclosures has prompted reconsideration of surveillance law and policy. One of the most controversial principles, both in the United States and abroad, is that communications metadata receives substantially less protection than communications content. Several nations currently collect telephone metadata in bulk, including on their own citizens. In this paper, we attempt to shed light on the privacy properties of telephone metadata. Using a crowdsourcing methodology, we demonstrate that telephone metadata is densely interconnected, can trivially be reidentified, and can be used to draw sensitive inferences.
The authors through investigating telephone metadata showed that even seemingly innocuous data like call logs and text metadata can be re-identified and used to infer sensitive personal information, such as location, relationships, and health or political preferences.
It challenged the misconception that metadata is inherently less private than content, demonstrating that aggregated metadata is densely interconnected and can easily reveal a person’s private details when analysed with publicly available data.
The study’s methodology, which combined crowdsourced data with automated and manual re-identification techniques, highlighted the inherent risks of bulk metadata collection and provided quantitative evidence for why such data should receive stronger privacy protections.
For modern product managers, the key lessons are:
- Privacy by Design: Always consider that even metadata can compromise user privacy, so systems should be built with robust privacy protections from the outset.
- Data Minimisation: Collect and retain only the data absolutely necessary for the product’s functionality, as accumulating more data increases privacy risks.
- User Transparency and Control: Clearly communicate what data is collected and how it is used, and empower users with control over their own data.
This study underscores the importance of understanding and mitigating the privacy risks associated with all types of data in today’s digital products.