Está en la página 1de 5

Basic phone logs reveal deeply personal information

Level 3 l Advanced
1 Warmer
Think about who you last phoned and who last phoned you. If possible, look on your phone at the list of
your most recent calls, both made and received.
What information might someone be able to gather about you from your calls? For example, who your
family is, where you live, where you work, what services you use …

2 Key words
Find the key words and phrases in the article and write them next to the definitions below. The paragraph
numbers are given to help you.

1. a record of things that have happened ___________________________________ (para 1)

2. a set of data that describes and gives information about other data
___________________________________ (para 2)

3. using or having a very small amount of money ___________________________________ (para 8)

4. small groups that are close to each other ___________________________________ (para 8)

5. considered or discussed why something is as it is ___________________________________ (para 8)

6. looked for information by searching through something thoroughly ___________________________________


(two words, para 9)

7. formed an opinion based on information available ___________________________________ (para 9)

8. the person who you are married to or are having a romantic relationship with
___________________________________ (two words, para 9)

9. learn small pieces of information by asking questions, or watching or listening carefully


___________________________________ (para 10)

10. brief, interesting descriptions ___________________________________ (para 10)

11. the basic rights that all citizens have to do or say what they want, as long as they do not break the law or affect
other people’s rights ___________________________________ (two words, para 12)

12. systematic computer analysis of data ___________________________________ (para 13)


D •
TE DE E
SI A L
EB LO B
W N IA

© Macmillan Publishers Ltd 2016


M W P
O DO O
FR BE C
N T
O

NEWS LESSONS / Basic phone logs reveal deeply personal information / Advanced
CA O
H
•P
Basic phone logs reveal deeply personal information
Level 3 l Advanced
Even basic phone logs can reveal evidence we can point to that didn’t exist in the
deeply personal information, past,” he said.
researchers find 6 For the study, the researchers signed up 823
Stanford study shows how details gleaned from people who agreed to have metadata collected
telephone ‘metadata’ by National from their phones through an Android app.
Security Agency pose a threat to privacy of The app also received information from their
ordinary citizens Facebook accounts, which the scientists used
to check the accuracy of their results. In all, the
Ian Sample, science editor
researchers gathered metadata on more than
16 May, 2016 250,000 calls and over 1.2m texts.
1 The mass collection of telephone records by 7 Analysts who logged into the NSA’s
government surveillance programmes poses a metadata-gathering system were initially allowed
clear threat to the personal privacy of ordinary to examine data up to three hops away from
citizens, according to US researchers who used an individual. A call from the target individual’s
basic phone logs to identify people and uncover phone to another number was one hop. From that
confidential information about their lives. phone to another was two hops. And so on. The
2 Armed with anonymous “metadata” on people’s records available to analysts stretched back for
calls and texts, but not the content of the five years. The collection window has now been
communications, two scientists at Stanford restricted to two hops and 18 months at most.
University worked out individuals’ names, where 8 Writing in the journal Proceedings of the National
they lived and the names of their partners. But Academy of Sciences, Mutchler describes how,
that was not all. on a shoestring budget, he and fellow graduate
3 The same data led them to uncover potentially student, Jonathan Mayer, uncovered a wealth
sensitive information about some individuals. of personal information, some of it sensitive,
One man was found to own a rifle, while about people who took part in the study. Through
another had recently been diagnosed with an automatic and manual searches, they identified
irregular heartbeat. Other data pointed to a new 82% of people’s names. The same technique
pregnancy and a person with multiple sclerosis. gave them the names of businesses the people
had called. When these were plotted on a map,
4 The results highlight the extraordinary power of
they revealed clusters of local businesses, which
telephone metadata – the number called, when
the scientists speculated surrounded the person’s
and for how long – particularly when it is paired
home address. In this way, they named the city
with public information available from services
people lived in 57% of the time, and were nearly
such as Google, Yelp and Facebook. The value
90% accurate in placing people within 50 miles of
of the data, which is not subject to the same
their home. Mutchler believes some of the misses
legal protections as the content of people’s
came from people not updating their Facebook
communications, has long been recognized
page when they moved out of their parents’
by the security services. As Stewart Baker,
home, for example, to go to college.
the former general counsel at the US National
Security Agency (NSA), put it in the aftermath 9 The scientists next delved into more personal
of Edward Snowden’s revelations: “Metadata territory. Using a simple computer program to
absolutely tells you everything about somebody’s analyse people’s call patterns, they inferred who
life.” among the study volunteers was in a relationship.
Once they knew the owner of a particular number
5 Patrick Mutchler, a computer security researcher
had a partner, identifying the significant other was
at Stanford, said that while the power of
easy, they report.
metadata was understood by those gathering
the information, the public was largely in the dark 10 For the final part of the study, the researchers
because so few published studies have revealed delved even deeper, to see what sensitive
how rich the data is. “That makes it difficult information they could glean from telephone
for people with strong opinions about these metadata. They gathered details on calls made
programmes to fight them. Now, we have hard to and from a list of organizations, including
D •
TE DE E
SI A L
EB LO B
W N IA

© Macmillan Publishers Ltd 2016


M W P
O DO O
FR BE C
N T
O

NEWS LESSONS / Basic phone logs reveal deeply personal information / Advanced
CA O
H
•P
Basic phone logs reveal deeply personal information
Level 3 l Advanced
hospitals, pharmacies, religious groups, legal programmes, like the NSA’s, will necessarily
services, firearms retailers and repair firms. From expose highly confidential information about
these, they pieced together some extraordinary ordinary citizens,” the scientists write, adding: “To
vignettes from people’s lives. strike an appropriate balance between national
security and civil liberties, future policymaking
11 The metadata from one person in the study
must be informed by input from relevant
showed they had a long call from a cardiology
sciences.”
centre, spoke briefly with a medical laboratory,
answered a number of short calls from a local 13 Ross Anderson, professor of security engineering
pharmacy and then made calls to a hotline at Cambridge University, said the study provided
for abnormal heart-rate monitoring devices. numbers that discussions can now be based
Another participant made frequent calls to a on. “With the right analytics running over nation-
local gun supplier that specialized in semi- scale communications data, you can infer huge
automatic rifles and later placed a number of amounts of sensitive information on everyone.
long calls to the customer support hotline run We always suspected that, of course, but here’s
by a major gun manufacturer that produced the the data.”
rifles. The metadata from two others suggested
© Guardian News and Media 2016
one had multiple sclerosis and the other had
First published in The Guardian, 16/05/16
just become pregnant.
12 “All of this should be taken as an indication of
what is possible with two graduate students and
limited resources,” said Mutchler, who argues
that the findings should make policymakers
think twice before authorizing mass surveillance
programmes. “Large-scale metadata surveillance

3 Comprehension check
Answer the questions using information from the article.
1. Who carried out the research and where?
2. How many volunteers took part in the research?
3. How was the metadata for the research collected?
4. How much and what kind of metadata was collected?
5. What was the metadata paired with to make it even more detailed and revealing?
6. What sort of personal information about the volunteers were the researchers able to obtain easily?
7. How might the results of this research affect mass data gathering in the future?
D •
TE DE E
SI A L
EB LO B
W N IA

© Macmillan Publishers Ltd 2016


M W P
O DO O
FR BE C
N T
O

NEWS LESSONS / Basic phone logs reveal deeply personal information / Advanced
CA O
H
•P
Basic phone logs reveal deeply personal information
Level 3 l Advanced
4 Expressions
Reorder the words in the box to make expressions from the article, then write them next to their meanings.
Find them in the article to see who or what they are used in connection with.

a be a balance dark in
pose the think threat twice strike

1. _____________________________ (three words) – present a danger


2. _____________________________ (four words) – not know very much about something because other
people are keeping it secret from you

3. _____________________________ (three words) – accept neither of two extreme positions or things but find
a solution that is reasonable and fair

4. _____________________________ (two words) – carefully consider whether what you are planning to do is a
good idea

5 Collocations
a. What adjectives and verbs appear together with information in the article?

information

b. Use the collocations you have found to talk about the article.

6 Discussion
• How easy do you think it would it be for someone to find out about your life with basic information
from your phone and social media profiles?
• By using mobile phones and social media, are we knowingly allowing government agencies access to
our personal information?
• What can we do to keep our personal information private?
• What could happen if companies or advertising agencies got hold of our data?
• Are there any positive repercussions of someone having access to our personal data?
D •
TE DE E
SI A L
EB LO B
W N IA

© Macmillan Publishers Ltd 2016


M W P
O DO O
FR BE C
N T
O

NEWS LESSONS / Basic phone logs reveal deeply personal information / Advanced
CA O
H
•P
Basic phone logs reveal deeply personal information
Level 3 l Advanced
KEY
1 Warmer 4 Expressions

Teacher’s tip: During this task, students should not 1. pose a threat (to the personal privacy of
share any specific personal information unless they ordinary citizens)
really want to. A general summary would be enough 2. be in the dark (the public are in the dark)
(omitting any calls they want to keep private). They 3. strike a balance (between national security and
might say something like, ‘Half of the calls are from my civil liberties)
daughter and my husband’ or ‘I called my hairdresser 4. think twice (before authorizing mass
and got a call from the optician.’ surveillance programmes)

2 Key words 5 Collocations

a.
1. log reveal
2. metadata personal
3. shoestring uncover
4. clusters confidential
5. speculated sensitive
public
6. delved into
gather
7. inferred receive
8. significant other
9. glean
10. vignettes
11. civil liberties
12. analytics

3 Comprehension check

1. two scientists at Stanford University in the US


2. 823
3. from their phones using an android app
4. 250,000 phone calls and over 1.2 million texts
5. public information available from services such as
Google, Yelp and Facebook
6. name, name of partner, where they lived, facts
about their health, businesses they used, things
they bought, etc
7. Policymakers will need to consider carefully before
authorizing mass surveillance programmes as
these will reveal confidential information about
ordinary citizens. Additionally, the research has
provided information that can be used as the basis
for further discussions about surveillance.
D •
TE DE E
SI A L
EB LO B
W N IA

© Macmillan Publishers Ltd 2016


M W P
O DO O
FR BE C
N T
O

NEWS LESSONS / Basic phone logs reveal deeply personal information / Advanced
CA O
H
•P

También podría gustarte