FourWinds10.com - Delivering Truth Around the World
Custom Search

* * * Every picture you take is secretly encoded with your GPS location * * *

Tom Heneghan International Intelligence Expert

Smaller Font Larger Font RSS 2.0

July 8, 2013

How to Turn Off GPS on a Cell Phone | USA Today

 
traveltips.usatoday.com/turn-off-gps-cell-phone-21147.html 
Applications for cell phones can give directions, find nearby restaurants or other ... and perform other location-based functions by using the built-in GPS. ... Turning off GPS will conserve battery life and keep your travels private. ... display a small image of a satellite dish next to the battery
 

GPS On Cell Phone Photos Can Put You In Danger « CBS Chicago

chicago.cbslocal.com/ 2010/ 10/ 07/ gps-on-cell-phone-photos-can-put-you-in-danger/ 
Oct 7, 2010 ... They were accurate to my location from my house. So my immediate ... Just turn off the GPS feature for photos on your phone. It won't affect the ...
 

Daily Tip: How to turn off GPS geo-location for iPhone photos ...

www.imore.com/ daily-tip-turn-gps-geolocation-iphone-photos-protect-privacy 
Dec 2, 2011 ... Curious how to turn-off the GPS geo-location information your iPhone, iPod touch , or iPad can store in the ... iMore: More of everything you love about iPhone, iPad , and Apple mobile! .... Browse Accessories For Your Phone.
 

Mom scare: GPS on phone cameras identifying kids' locations ...

blogs.ajc.com/ momania/ 2011/ 08/ 26/ mom-scare-gps-on-phone-cameras-identifying-kids-locations/ 
Aug 26, 2011 ... I think it will match photos up by location through that meta data. Let me know if I am wrong on ... Will you disable the GPS on your phone camera? – Theresa Walsh .... I probably would…if I had a cell phone. WHAT?!?!?! That's ...
 

How to disable geotagging for pictures on your smart phone -- GCN

 
www.gcn.com/ articles/ 2012/ 12/ 10/ how-to-disable-smart-phone-geotagging-feature.aspx 
Dec 10, 2012 ... Pictures taken with a GPS-enabled device can give up your location, as the recent ... How to disable a smart phone's geotagging feature ... For instance, a photo taken by a U.S. soldier on his or her smart phone could ... Here are the steps to disable geotagging for the four major m

Every picture you take is secretly encoded with your GPS location

If there is one thing you need to remember at all times in the Electronic Age, it is that privacy no longer exists. Every electronic device, every electronic communication, every electronic anything betrays your sense of privacy in every imaginable way, and that is also true of a seemingly innocuous item – the photo.
 
If taken with a smartphone – as many photos these days certainly are – then the government, as well as ordinary folk (including those who mean you harm) can use metadata embedded in that photo you just tweeted or posted on Facebook to find out your exact coordinates.
 
That includes where you live, if that’s where you sent or posted the photo from, according to a new investigative report by McClatchy Newspapers
 
The GPS location information embedded in a digital photo is an example of so-called metadata, a once-obscure technical term that’s become one of Washington’s hottest new buzzwords.
 
The word first sprang from the lips of pundits and politicians earlier this month, after reports disclosed that the government has been secretly accessing the telephone metadata of Verizon customers, as well as online videos, emails, photos and other data collected by nine Internet companies.
 
In the wake of revelations that the NSA has been collecting all of that metadata, President Obama has sought to assure us that “nobody is listening to your phone calls.” Other government officials compared the collection of such data to – no kidding – “reading information on the outside of an envelope, which doesn’t require a warrant,” McClatchy reported.
 
Sure. But privacy experts say these are not reassurances at all. They say that anyone who knows how to mine metadata understand it can reveal so much more about us and how we live our daily lives than other forms of communication.

Metadata is, essentially, all your information

What is metadata, exactly? McClatchy explains:
Simply put, it’s data about data. An early example is the Dewey Decimal System card catalogs that libraries use to organize books by title, author, genre and other information. In the digital age, metadata is coded into our electronic transmissions.
 
“Metadata is information about what communications you send and receive, who you talk to, where you are when you talk to them, the lengths of your conversations, what kind of device you were using and potentially other information, like the subject line of your emails,” Peter Eckersley, the director of technology projects at the Electronic Frontier Foundation, a digital civil liberties group, told the newspaper group.
 
He went onto say that powerful computer algorithms are capable of analyzing metadata to profile individuals and learn their patterns.
 
“Metadata is the perfect place to start if you want to troll through millions of people’s communications to find patterns and to single out smaller groups for closer scrutiny,” he told the newspaper group. “It will tell you which groups of people go to political meetings together, which groups of people go to church together, which groups of people go to nightclubs together or sleep with each other.”
 
How’s that for breaching your privacy? So government doesn’t have to listen to your conversations; it can learn pretty much all it wants to learn from the pics you post, tweet or otherwise send out over the invisible wireless networks.
 
“That’s certainly enough to know if you’re pregnant or not, what diseases you have, whether you’re looking for a new job, whether you’re trying to figure out if the NSA is watching you or not,” said Eckersley, the latter a reference to the NSA. That kind of info provides “a deeply intimate window into a person’s psyche,” he noted.
So, the more we rely on our smartphones, the more metadata we make available to build our profiles.

Metadata can identify gun owners too

Here’s another constitutional concern.
Karen Reilly, the director of development for The Tor Project, an American non-profit group that makes technology designed to provide online anonymity and skirt censorship, said metadata can even identify you as a gun owner.
 
“Never mind background checks, if you bring your cellphone to the gun range you probably have a gun,” she said.
 
“People don’t realize all the information that they’re giving out,” she added. “You can try to secure it – you can use some tech tools, you can try to be a black hole online – but if you try to live your life the way people are expecting it, it’s really difficult to control the amount of data that you’re leaking all over the place.”
 
Think about this the next time you snap a pic with the iPhone or other smart device and send it out to a friend. You’re actually sending it out to a world of metadata thieves, a group that includes, as we now know for certain, the federal government.
 
Sources for this article include:
 
 
 
 
 
see below the vital article on NSA's metadata surveillance by investigative journalist Wayne Madsen
 
WayneMadsenReport.com
The investgative journalism motto:
"COMFORT THE AFFLICTED AND AFFLICT THE COMFORTABLE"

In the tradition of Drew Pearson's and Jack Anderson's famous "Washington Merry-Go-Round" syndicated column and I.F. Stone, this online publication tackles the "politically incorrect" and "politically embarrassing" stories and holds government officials accountable for their actions. This web site extends a warm open invitation to whistleblowers and leakers. Business as usual for the crooks and liars in Washington, DC, is over.

Wayne Madsen, Editor

May 27, 2005

-----------------------
Correspondents in:
Tshwane, South Africa
Helsinki, Finland
Beijing, China
London, UK
Bangkok, Thailand
 
Wayne Madsen Biography:
Wayne Madsen is a Washington, DC-based investigative journalist, author and syndicated columnist. He has written for The Village Voice, The Progressive, Counterpunch, Online Journal, CorpWatch, Multinational Monitor, News Insider, In These Times, and The American Conservative. His columns have appeared in The Miami Herald, Houston Chronicle, Philadelphia Inquirer, Columbus Dispatch, Sacramento Bee, and Atlanta Journal-Constitution, among others.
Madsen is the author of The Handbook of Personal Data Protection (London: Macmillan, 1992), an acclaimed reference book on international data protection law; Genocide and Covert Operations in Africa 1993-1999 (Edwin Mellen Press, 1999); co-author of America's Nightmare: The Presidency of George Bush II (Dandelion, 2003); author of Jaded Tasks: Big Oil, Black Ops & Brass Plates; Overthrow a Fascist Regime on $15 a Day; and The Manufacturing of a President: the CIA's Insertion of Barack H. Obama, Jr. into the White House.
Madsen has been a regular contributor on RT and PressTV. He has been a frequent political and national security commentator on Fox News and has also appeared on ABC, NBC, CBS, PBS, CNN, BBC, Al Jazeera, and MS-NBC. Madsen has taken on Bill O'Reilly and Sean Hannity on their television shows.  He has been invited to testify as a witness before the US House of Representatives, the UN Criminal Tribunal for Rwanda, and an terrorism investigation panel of the French government.
Madsen has some twenty years experience in security issues. As a U.S. Naval Officer, he managed one of the first computer security programs for the U.S. Navy. He subsequently worked for the National Security Agency, the Naval Data Automation Command, Department of State, RCA Corporation, and Computer Sciences Corporation. Madsen was a Senior Fellow for the Electronic Privacy Information Center (EPIC), a privacy public advocacy organization.
Madsen is a member of the Society of Professional Journalists (SPJ) and the National Press Club.

WAYNE MADSEN REPORT

 
Edward Snowden merely confirmed what was already reported -- over four years ago.

The Guardian and The Washington Post did not have the scoop on NSA collection of meta-data. This news site published that story in February 2009, over four years before either The Guardian or the Post. There is a reason why they call us "conspiracy kooks," they can't stand the competition.

WMR excerpt:

 

February 4, 2009 -- SPECIAL REPORT.  NSA's meta-data email surveillance program exposed
WMR has learned details of one of the most important components of the National Security Agency's warrantless wiretapping program code named "STELLAR WIND." The highly-classified STELLAR WIND program was initiated by the George W. Bush administration with the cooperation of major U.S. telecommunications carriers, including AT&T and Verizon.
The interception of text communications by STELLAR WIND was a major priority of the NSA program.
The major NSA system for intercepting text communications is called PINWALE. On September 15, 2008, WMR first reported on how PINWALE was used to target Russian e-mails, "Code-named PINWALE, the NSA email surveillance system targets Russian government, military, diplomatic, and commercial email traffic and burrows into the text portions of the email to search for particular words and phrases of interest to NSA eavesdroppers."
WMR has learned additional details of PINWALE. The system is linked to a number of meta-databases that contain e-mail, faxes, and text messages of hundreds of millions of people around the world and in the United States. Informed sources have revealed to WMR that PINWALE can search these meta-databases using various parameters like date-time group, natural language, IP address, sender and receipients, operating system, and other information embedded in the header. When an NSA analyst is looking for Farsi or Arabic e-mails, the sender and recipients are normally foreign nationals, who are not covered by restrictions on eavesdropping on U.S. "persons" once imposed on NSA by United States Signals Intelligence Directive 18 (USSID 18). However, STELLAR WIND and PINWALE negated both USSID 18 and the Foreign Intelligence Surveillance Act of 1978 by permitting NSA analysts to read the e-mails, faxes, and text messages of U.S. persons when PINWALE search parameters included searches of e-mails in English. When English language text communications are retrieved, analysts read the text message content to determine whether it contains anything to do with terrorism. However, rather than being deleted, the messages are returned to the meta-databases.
Text message records in PINWALE, a system developed by NSA contractor Booz Allen Hamilton, are contained in three major meta-databases code-named LIONHEART, LIONROAR, and LIONFUSION.

Information that is already in the public domain can still be spiked and censored: Like this article on European Union countries complaining about NSA surveillance while they assist NSA is conducting that very same surveillance. This article in The Guardian was taken down because the surveillance powers are becoming uncomfortable in the sunshine.

<intelligence_briefings@hotmail.com>