Value and meaning come from relationships and context. A physical object, such as a quarter, only holds the value we give it. It has no intrinsic worth. iStockphoto.com hide caption

toggle caption iStockphoto.com

Google, like Facebook, Microsoft and other Internet companies, is concerned that data requests from U.S. surveillance agencies could ultimately damage its reputation in the U.S. and overseas. Justin Sullivan/Getty Images hide caption

toggle caption Justin Sullivan/Getty Images
Net Giants Try To Quell Users' Jitters About Their Data
  • Download
  • <iframe src="https://www.npr.org/player/embed/191044196/191070327" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Big Data may not be much to look at, but it can be powerful stuff. For instance, this is what the new National Security Agency (NSA) data center in Bluffdale, Utah, looks like. George Frey/Getty Images hide caption

toggle caption George Frey/Getty Images

The National Security Agency has been plucking data from central servers of large U.S. Internet firms, according to reports, and mining the data for possible security threats. NSA hide caption

toggle caption NSA
Dado Ruvic/Reuters/Landov
Facebook Users Question $20 Million Settlement Over Ads
  • Download
  • <iframe src="https://www.npr.org/player/embed/182861926/183674872" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

A micrograph of HeLa cells, derived from cervical cancer cells taken from Henrietta Lacks. Tomasz Szul/Visuals Unlimited, Inc./Getty Images hide caption

toggle caption Tomasz Szul/Visuals Unlimited, Inc./Getty Images
Sequencing Of HeLa Genome Revives Genetic Privacy Concerns
  • Download
  • <iframe src="https://www.npr.org/player/embed/175351289/175335300" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Cell phone communication can be hacked, tapped or otherwise tampered with. A new app aims to change that. iStockphoto hide caption

toggle caption iStockphoto
Want To Keep Your Messages Private? There's An App For That
  • Download
  • <iframe src="https://www.npr.org/player/embed/172258256/172263750" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Fill out an application for a loan, and your wage history may go places you didn't expect. Joe Raedle/Getty Images hide caption

toggle caption Joe Raedle/Getty Images

Each strand of DNA is written in a simple language composed of four letters: A, T, C and G. Your code is unique and could be used to find you. iStockphoto.com hide caption

toggle caption iStockphoto.com
Anonymity In Genetic Research Can Be Fleeting
  • Download
  • <iframe src="https://www.npr.org/player/embed/169609144/169644069" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Shwetak Patel (foreground), a MacArthur Fellow, recognized that every device in a home has a unique signature that can be used to track energy usage. The data collected by Patel's system showed that digital video recorders were responsible for 11 percent of this home's power use, just one example of The Human Face of Big Data. © Peter Menzel 2012/from The Human Face of Big Data hide caption

toggle caption © Peter Menzel 2012/from The Human Face of Big Data

Who's collecting information about her? Peggy Turbett /The Plain Dealer /Landov hide caption

toggle caption Peggy Turbett /The Plain Dealer /Landov
Many Apps For Children Still Raise Privacy Concerns, FTC Says
  • Download
  • <iframe src="https://www.npr.org/player/embed/166878852/166901324" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript