Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2817946.2817957acmconferencesArticle/Chapter ViewAbstractPublication PagescosnConference Proceedingsconference-collections
research-article
Free access

The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children

Published: 02 November 2015 Publication History

Abstract

Data brokers have traditionally collected data from businesses, government records, and other publicly available offline sources. While each data source may provide only a few elements about a person's activities, data brokers combine these elements to form a detailed, composite view of the consumer's life. The emergence of social media gives data brokers unprecedented opportunities to enhance their profiles. Data brokers are increasingly interested in combining the information collected from offline sources with information publicly available in social networks to profile not only adults but also children.
In this paper, we show how data brokers and other third parties can combine online and offline data sources -- namely, public Facebook profiles and voter registration records -- to create detailed profiles of adults, teens, and children in any target city in the US. We outline and execute an approach that leverages a Facebook user's social ties combined with the city's voter registration records to infer the Facebook users who reside in the city. These inferences enable a data broker to create detailed user profiles, which not only include information publicly available from Facebook but also the user's exact residential address, date and year of birth, and political affiliation.
We further show how additional inferences can be made from the combined data. We then discuss how this city attack can be extended to create detailed profiles of minors and children. Finally, we make recommendations to Facebook, municipal authorities, and individuals to decrease the risk of this large-scale privacy breach.

References

[1]
Frequently asked questions. United States Census Bureau. Available: https://www.census.gov/hhes/www/income/about/faqs.html.
[2]
Data brokers: a call for transparency and accountability. Federal Trade Commission, Washington, DC, 2014.
[3]
Acxiom becomes an audience data provider in facebook marketing partner program. February 17, 2015.
[4]
K. Alexander and K. Mills. Voter privacy in the digital age. California Voter Foundation, 2004.
[5]
P. Barberá. Birds of the same feather tweet together: Bayesian ideal point estimation using twitter data. Political Analysis, 23(1):76--91, 2015.
[6]
J. Chang, I. Rosenn, L. Backstrom, and C. Marlow. epluribus: Ethnicity on social networks. ICWSM, 10:18--25, 2010.
[7]
T. Chen, M. A. Kaafar, A. Friedman, and R. Boreli. Is more always merrier?: a deep dive into online social footprints. In Proceedings of the 2012 ACM workshop on Workshop on online social networks, pages 67--72. ACM, 2012.
[8]
R. Dey, Y. Ding, and K. Ross. The high-school profiling attack: How online privacy laws can actually increase minors' risk. In Proc. of Internet Measurement Conference, volume 13, 2013.
[9]
R. Dey, Z. Jelveh, and K. W. Ross. Facebook users have become much more private: A large-scale study. In PerCom Workshops, pages 346--352. IEEE, 2012.
[10]
R. Dey, C. Tang, K. Ross, and N. Saxena. Estimating age privacy leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE, pages 2836--2840. IEEE, 2012.
[11]
M. Duggan, N. B. Ellison, C. Lampe, A. Lenhart, and M. Madden. Social media update 2014. Pew Research Center, September 2014.
[12]
M. N. Elliott, P. A. Morrison, A. Fremont, D. F. McCaffrey, P. Pantoja, and N. Lurie. Using the census bureau's surname list to improve estimates of race/ethnicity and associated disparities. Health Services and Outcomes Research Methodology, 9(2):69--83, 2009.
[13]
Y. Fu, G. Guo, and T. S. Huang. Age synthesis and estimation via faces: A survey. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 32(11):1955--1976, 2010.
[14]
D. Irani, S. Webb, K. Li, and C. Pu. Large online social footprints--an emerging threat. In International Conference on Computational Science and Engineering, volume 3, pages 271--276. IEEE, 2009.
[15]
S. Issenberg. The victory lab: The secret science of winning campaigns. Broadway Books, 2012.
[16]
C. Jernigan and B. F. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009.
[17]
H. Köpcke and E. Rahm. Frameworks for entity matching: A comparison. Data & Knowledge Engineering, 69(2):197--210, 2010.
[18]
T. Minkus, K. Liu, and K. W. Ross. Children seen but not heard: When parents compromise children's online privacy. In Proceedings of the 24th International Conference on World Wide Web. IW3C2, 2015.
[19]
T. Minkus and K. W. Ross. I know what you're buying: Privacy breaches on ebay. In Privacy Enhancing Technologies, pages 164--183. Springer, 2014.
[20]
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy, 2008, pages 111--125. IEEE, 2008.
[21]
D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manils. How unique and traceable are usernames? In Privacy Enhancing Technologies, pages 1--17. Springer, 2011.
[22]
T. Pontes, G. Magno, M. Vasconcelos, A. Gupta, J. Almeida, P. Kumaraguru, and V. Almeida. Beware of what you share: Inferring home location in social networks. In IEEE 12th International Conference on Data Mining Workshops, pages 571--578. IEEE, 2012.
[23]
T. Pontes, M. Vasconcelos, J. Almeida, P. Kumaraguru, and V. Almeida. We know where you live: privacy characterization of foursquare behavior. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 898--905. ACM, 2012.
[24]
I. Rubinstein. Voter privacy in the age of big data. Wisconsin Law Review, 2014.
[25]
S. Sengupta. Update urged on children’s online privacy. New York Times, September 15, 2011.
[26]
S. Stecklow. On the web, children face intensive tracking. Wall Street Journal, September 17, 2010.
[27]
C. Tang, K. Ross, N. Saxena, and R. Chen. What's in a name: A study of names, gender inference, and gender behavior in facebook. In Database Systems for Adanced Applications, pages 344--356. Springer, 2011.
[28]
J. Turow, M. X. D. Carpini, and N. Draper. Americans roundly reject tailored political advertising at a time when political campaigns are embracing it. 2012.

Cited By

View all
  • (2024)Privacy preserving large language models: ChatGPT case study based vision and frameworkIET Blockchain10.1049/blc2.12091Online publication date: 17-Nov-2024
  • (2022)A Reusable Multiplayer Game for Promoting Active School Transport: Development StudyJMIR Serious Games10.2196/3163810:1(e31638)Online publication date: 14-Mar-2022
  • (2020)Sensing Users’ Emotional Intelligence in Social NetworksIEEE Transactions on Computational Social Systems10.1109/TCSS.2019.29446877:1(103-112)Online publication date: Feb-2020
  • Show More Cited By

Index Terms

  1. The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      COSN '15: Proceedings of the 2015 ACM on Conference on Online Social Networks
      November 2015
      280 pages
      ISBN:9781450339513
      DOI:10.1145/2817946
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 November 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. data collection
      2. online social networks
      3. privacy
      4. public records

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      COSN'15
      Sponsor:
      COSN'15: Conference on Online Social Networks
      November 2 - 3, 2015
      California, Palo Alto, USA

      Acceptance Rates

      COSN '15 Paper Acceptance Rate 22 of 82 submissions, 27%;
      Overall Acceptance Rate 69 of 307 submissions, 22%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)159
      • Downloads (Last 6 weeks)25
      Reflects downloads up to 11 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Privacy preserving large language models: ChatGPT case study based vision and frameworkIET Blockchain10.1049/blc2.12091Online publication date: 17-Nov-2024
      • (2022)A Reusable Multiplayer Game for Promoting Active School Transport: Development StudyJMIR Serious Games10.2196/3163810:1(e31638)Online publication date: 14-Mar-2022
      • (2020)Sensing Users’ Emotional Intelligence in Social NetworksIEEE Transactions on Computational Social Systems10.1109/TCSS.2019.29446877:1(103-112)Online publication date: Feb-2020
      • (2020)Faces of radicalism: Differentiating between violent and non-violent radicals by their social media profilesComputers in Human Behavior10.1016/j.chb.2020.106646(106646)Online publication date: Dec-2020
      • (2019)Auditing Offline Data Brokers via Facebook's Advertising PlatformThe World Wide Web Conference10.1145/3308558.3313666(1920-1930)Online publication date: 13-May-2019
      • (2019)Data Mining Based Privacy Attack Through Paper Traces2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC)10.1109/ICSECC.2019.8907076(105-110)Online publication date: Aug-2019
      • (2019)Predicting Users’ Emotional Intelligence with Social Networking DataSecurity and Privacy in Social Networks and Big Data10.1007/978-981-15-0758-8_15(191-202)Online publication date: 24-Oct-2019
      • (2018)Attribute Inference Attacks in Online Social NetworksACM Transactions on Privacy and Security10.1145/315479321:1(1-30)Online publication date: 2-Jan-2018
      • (2018)Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface2018 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2018.00014(89-107)Online publication date: May-2018
      • (2017)AttriInferProceedings of the 26th International Conference on World Wide Web10.1145/3038912.3052695(1561-1569)Online publication date: 3-Apr-2017

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media