How do you track down a terrorist captured in a photo as he poses in front of a cave in the Syrian outback?
It’s not easy. If he’s smart enough to turn off geotagging, you don’t have Exchangeable Image File Format (EXIF) data as a beacon to his location.
If the cave happened to be around the corner from the town library or a Starbucks, you might be in luck. Then, you could get help from something like Google PlaNet: a deep-learning machine that was initially trained on 126 million photos with EXIF data in order to learn how to work out the location of almost any photo, just going by its pixels, no EXIF data needed.
But most caves aren’t so conveniently located. PlaNet had a lot more images to go on when dealing with photos of cities or places to which tourists flock, snip-snapping away and producing scads of information-filled imagery. The neural network had far fewer images to rely on when it came to remote places where people don’t take many photos, such as oceans or polar regions, so it’s going to be pretty useless in cave-land.
This difficulty of tracking down outdoor photos that haven’t been geotagged has led a US spy lab to launch Finder: a research program of the Intelligence Advanced Research Projects Agency (IARPA), the Office of the Director of National Intelligence’s dedicated research organization.
The project aims to build on existing research systems to develop technology that augments analysts’ geolocating skills. At this point, analysts rely on information such as visible skyline and terrain; digital elevation data; existing, well-understood image collections; surface geology; geography; and architecture (think red phone booths).
It’s an “extremely time-consuming and labor-intensive activity” that often meets with limited success, according to IARPA.
The goal is all-encompassing: IARPA wants Finder to find everything, as in, the ability to geolocate any video or photo taken anywhere outdoors.
It’s going to take integration of analysts’ abilities and automated geolocation technologies along the lines of PlaNet, fusion of publicly available data sources, and expansion of automated geolocation technologies that can efficiently and accurately crawl over all manner of terrain, no matter how vast or how rugged.
When it comes to law enforcement legally searching for criminals, including terrorists, we don’t like to tell people how to hide. But it’s easy to see that if Finder gets to the outdoors-omniscient level that IARPA intends to take it, it’s going to be able to find anybody, anywhere, and that includes non-criminals/terrorists.
We’ve seen kitty cats stalked and fugitives tracked to the jungles of Guatemala via photo EXIF data. We’ve seen police act like kids in a candy store with tracking technology.
If all goes as planned, Finder, like PlaNet, at some point won’t rely on EXIF data. But that point hasn’t yet arrived, and there are issues to consider in the meantime for those who are privacy-conscious. So, for what it’s worth:
Here’s how to disappear
On most Android phones, you can just open your camera app and tap on Settings. Scroll down until you see the option for “Location tags,” and slide it off.
For iOS devices, you can turn it off for the camera app entirely by going to Settings from the home screen. From there go to Privacy and then tap Location Services. Find the Camera option, tap it and choose “Never” in the “Allow Location Access” menu.
Alternatively, you can set it to prompt you on a case-by-case basis. From the Settings menu go to General, tap Reset. On the Reset screen choose Reset Location & Privacy. At this point you may be asked to input your passcode in order to make the changes, which will reset Location & Privacy settings for all apps.
From now on all apps, including the camera, wanting to use your location information will prompt you to ‘Allow Access’.
Also, here’s Apple’s support guide to turning off location services for specific apps on iOS devices.
That’s all well and good for future photos, but once you realize how many of your photos are out there, bearing EXIF data that contains times, dates and locations of, say, your kids in the playground, you might want to start scrubbing your old photos clean. Here’s a guide on that from How-To Geek.
delayedthoughtengineering
I would not want geotagging to be forced as a non-option. If the military wants better coverage of remote locations, they should take their own photos of these remote locations with drones, and feed “PlaNet” with their own geotagged photo data. Forcing geotagging would be akin to forcing a backdoor in encryption technology; it would inevitably hurt the innocent citizens that the enforcement was originally designed to protect.
To illustrate how geotags can be used to hurt someone, in 2007, Iraqi insurgents successfully used geotags on the photos taken by solders on the flightline where a new fleet of helicopters arrived. The insurgents then used that location data to successfully destroy four Apache helicopters with mortar attacks.
It’s not hard to see how bad people could easily use this technology to attack even more vulnerable targets, as described at the end of this article.