What is Metadata Surveillance?
The collection and analysis of communication metadata — who contacted whom, when, where, and for how long — which often reveals more than message content.
"We kill people based on metadata." — Former NSA Director Michael Hayden
What Metadata Reveals
Even without reading message content, metadata shows:
- Social graph: Who you communicate with, how often, and how closely
- Location: Where you were when you communicated
- Patterns: Your daily routine, sleep schedule, work hours
- Relationships: Who you call after talking to someone else
- Interests: Which websites, services, and topics you engage with
Research Findings
- Stanford researchers showed that phone metadata alone reveals medical conditions, gun ownership, marijuana use, and affairs
- Just four data points of mobile phone metadata can uniquely identify 95% of individuals
- Metadata analysis identified Paul Revere as the key figure in the American Revolution — no content needed
Protection
- Use Signal with sealed sender (hides sender metadata from the server)
- Use Tor (hides connection metadata from your ISP)
- Use a VPN (hides DNS and traffic metadata from your ISP)
- Minimize phone calls and SMS (metadata is always logged by carriers)
- Be aware that even encrypted messaging reveals timing and frequency patterns
Related Terms
Data Retention Directive
Laws requiring telecommunications companies and ISPs to store user metadata for a specified period, enabling retroactive surveillance.
Metadata
Data about data. In the context of communications, metadata includes information like who you contacted, when, for how long, and from where—everything except the actual content of your message. Metadata can reveal intimate details about your life even when content is encrypted.
PRISM
A classified NSA surveillance program revealed by Edward Snowden in 2013 that collects data directly from major tech companies including Google, Apple, Facebook, and Microsoft.
Sealed Sender
A messaging feature where the server cannot see who sent a message to whom, protecting sender identity metadata even from the service provider.
Have more questions?
Use our guided flow to get the right next privacy step for Metadata Surveillance.
Open Guided Flow