Hindustan Times (East UP)

For investigat­ions, metadata is enough. Uphold privacy

- Yashovardh­an Azad, a retired Indian Police Service officer, and Anand V, a cyber security and privacy researcher, are with DeepStrat The views expressed are personal

Intelligen­ce agencies, around the world, collect enormous amounts of data on individual­s on grounds of national security. They also plead for laws to access the content of encrypted messages between individual­s on social media — a demand social media companies are uncomforta­ble with.

We believe there is a strong case for analysing metadata better, which can give valuable leads in investigat­ion. Active collaborat­ion on the part of law enforcemen­t agencies and corporates in studying metadata closely will render crucial leads in investigat­ion.

While the pedantic definition of metadata is data about data, the practition­er’s definition is activity records. Location data from cellular phones, call data records, messaging records, IP addresses logged by various service providers, and device identifier­s such as manufactur­er name, model, activation date, connection duration are all examples of metadata.

While each one of them reveals informatio­n about a particular individual, sanalysed through various known techniques, it can provide a detailed picture. In a much-publicised statement, General Michael Hayden, a former director of the National Security Agency and Central Intelligen­ce Agency, said, “We kill people based on metadata.”

Consider the recent example of how metadata analysis alone was sufficient to trace and investigat­e the January 6 insurrecti­onists in the United States (US) capitol. The attackers disrupted a joint session of the US Congress, which was convened to affirm the presidenti­al election results — leading to five deaths and damage to the building.

The first step in investigat­ing the insurrecti­onists was to get the list of phone numbers active during the period from the mobile telecom providers. While location records of cell phones are already accurate to a city block level (a grid of approximat­ely 120x120 metres), these were then enhanced by serving warrants to intermedia­ries such as Google, Facebook, and Snapchat, which were used to post images/videos by the attackers, to provide even accurate data within a range of 10 metres radius (accurate 68% of the time).

By looking back in time, regular employees and others who often visited the Capitol were eliminated. Burner phones, which were activated only a few hours before the incident, were easy to identify, as they had a unique signature when it comes to call records — where often the leader of a gang activates other members, by either calling them or messaging them through coded words. This allowed identifyin­g members who made conscious efforts to hide their identity, thus establishi­ng prior intent.

These patterns are typically good enough to convince a judge to issue a search warrant for further seizures and smartphone records, which then allows a more specific targeted investigat­ion.

Metadata analysis thus allows investigat­ors to establish probable cause via technical analysis, and then tighten it further by obtaining more evidence to file charge-sheets and obtain conviction­s. While a particular suspect may refuse to unlock his device to avoid self-incriminat­ion, it still allows investigat­ors to establish a prima facie case, based on behavioura­l patterns and detecting anomalies.

The power of metadata was recognised by the Supreme Court (SC) in the Aadhaar case, when it ruled that the Unique Identifica­tion Authority of India (UIDAI) and other authentica­ting entities can’t store authentica­tion records (metadata) for more than six months, from an earlier limit of seven years. This was due to an incident that happened during the hearing. The then UIDAI chief submitted his authentica­tion records to the court, claiming it has no adverse privacy implicatio­ns and within hours, enough informatio­n was decoded about his life patterns with these records. The court did not fully stop the collection and storing of metadata as it also helps in fraud detection — implying perhaps that in view of proportion­ality, it is preferable to having actual data.

The traceabili­ty clause introduced by the Informatio­n Technology Rules, 2021, is all about metadata. But why did WhatsApp go to court challengin­g it? It turns out that the clause envisaged a technical implementa­tion, which required metadata to be embedded within the data (content of the message), thus making both data and metadata one and the same. This was a clear no-no in terms of not only technical architectu­re, but also a violation of proportion­ality, as laid out in the SC (Puttaswamy) judgment.

But do service providers, including messaging applicatio­ns, share metadata with intelligen­ce agencies and law enforcemen­t in India? They clearly do, but the State has technical capability issues when it comes to the usage of metadata analysis to investigat­e and obtain conviction­s. This deficiency leads it to not only pass laws that demand mixing up of data and metadata, but also resorts to other cruder methods. For instance, the Hyderabad police asked commuters to unlock their mobile devices randomly, to check for WhatsApp chats for key words related to narcotics. These methods are not just constituti­onally impermissi­ble, but also vitiate the investigat­ion and sully the name of the agencies involved, since they fall apart in court because of procedural violations, apart from being ineffectiv­e tools in investigat­ion.

In an increasing­ly digitised and interconne­cted world, no possibilit­y of surveillan­ce reforms exists until the technical dimension is debated and understood by all actors including civil society, the judiciary, the executive, and Parliament. Encryption must not be tinkered with, since metadata has much to provide that is yet unexplored.

COLLABORAT­ION BY LAW ENFORCEMEN­T AND CORPORATES IN STUDYING METADATA WILL RENDER CRUCIAL LEADS IN INVESTIGAT­ION. FURTHER, ENCRYPTION MUST NOT BE TINKERED WITH, SINCE METADATA HAS MUCH UNEXPLORED POTENTIAL.

Regd. No. LW/GPO/NP-226, R.N.I. No. 66165/1997

 ?? Yashovardh­an Azad ??
Yashovardh­an Azad
 ?? Anand V ??
Anand V

Newspapers in English

Newspapers from India