ABSTRACT
Data brokers have traditionally collected data from businesses, government records, and other publicly available offline sources. While each data source may provide only a few elements about a person's activities, data brokers combine these elements to form a detailed, composite view of the consumer's life. The emergence of social media gives data brokers unprecedented opportunities to enhance their profiles. Data brokers are increasingly interested in combining the information collected from offline sources with information publicly available in social networks to profile not only adults but also children.
In this paper, we show how data brokers and other third parties can combine online and offline data sources -- namely, public Facebook profiles and voter registration records -- to create detailed profiles of adults, teens, and children in any target city in the US. We outline and execute an approach that leverages a Facebook user's social ties combined with the city's voter registration records to infer the Facebook users who reside in the city. These inferences enable a data broker to create detailed user profiles, which not only include information publicly available from Facebook but also the user's exact residential address, date and year of birth, and political affiliation.
We further show how additional inferences can be made from the combined data. We then discuss how this city attack can be extended to create detailed profiles of minors and children. Finally, we make recommendations to Facebook, municipal authorities, and individuals to decrease the risk of this large-scale privacy breach.
- Frequently asked questions. United States Census Bureau. Available: https://www.census.gov/hhes/www/income/about/faqs.html.Google Scholar
- Data brokers: a call for transparency and accountability. Federal Trade Commission, Washington, DC, 2014.Google Scholar
- Acxiom becomes an audience data provider in facebook marketing partner program. February 17, 2015.Google Scholar
- K. Alexander and K. Mills. Voter privacy in the digital age. California Voter Foundation, 2004.Google Scholar
- P. Barberá. Birds of the same feather tweet together: Bayesian ideal point estimation using twitter data. Political Analysis, 23(1):76--91, 2015.Google ScholarCross Ref
- J. Chang, I. Rosenn, L. Backstrom, and C. Marlow. epluribus: Ethnicity on social networks. ICWSM, 10:18--25, 2010.Google Scholar
- T. Chen, M. A. Kaafar, A. Friedman, and R. Boreli. Is more always merrier?: a deep dive into online social footprints. In Proceedings of the 2012 ACM workshop on Workshop on online social networks, pages 67--72. ACM, 2012. Google ScholarDigital Library
- R. Dey, Y. Ding, and K. Ross. The high-school profiling attack: How online privacy laws can actually increase minors' risk. In Proc. of Internet Measurement Conference, volume 13, 2013. Google ScholarDigital Library
- R. Dey, Z. Jelveh, and K. W. Ross. Facebook users have become much more private: A large-scale study. In PerCom Workshops, pages 346--352. IEEE, 2012.Google ScholarCross Ref
- R. Dey, C. Tang, K. Ross, and N. Saxena. Estimating age privacy leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE, pages 2836--2840. IEEE, 2012.Google ScholarCross Ref
- M. Duggan, N. B. Ellison, C. Lampe, A. Lenhart, and M. Madden. Social media update 2014. Pew Research Center, September 2014.Google Scholar
- M. N. Elliott, P. A. Morrison, A. Fremont, D. F. McCaffrey, P. Pantoja, and N. Lurie. Using the census bureau's surname list to improve estimates of race/ethnicity and associated disparities. Health Services and Outcomes Research Methodology, 9(2):69--83, 2009.Google ScholarCross Ref
- Y. Fu, G. Guo, and T. S. Huang. Age synthesis and estimation via faces: A survey. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 32(11):1955--1976, 2010. Google ScholarDigital Library
- D. Irani, S. Webb, K. Li, and C. Pu. Large online social footprints--an emerging threat. In International Conference on Computational Science and Engineering, volume 3, pages 271--276. IEEE, 2009. Google ScholarDigital Library
- S. Issenberg. The victory lab: The secret science of winning campaigns. Broadway Books, 2012.Google Scholar
- C. Jernigan and B. F. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009.Google Scholar
- H. Köpcke and E. Rahm. Frameworks for entity matching: A comparison. Data & Knowledge Engineering, 69(2):197--210, 2010. Google ScholarDigital Library
- T. Minkus, K. Liu, and K. W. Ross. Children seen but not heard: When parents compromise children's online privacy. In Proceedings of the 24th International Conference on World Wide Web. IW3C2, 2015. Google ScholarDigital Library
- T. Minkus and K. W. Ross. I know what you're buying: Privacy breaches on ebay. In Privacy Enhancing Technologies, pages 164--183. Springer, 2014.Google ScholarCross Ref
- A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy, 2008, pages 111--125. IEEE, 2008. Google ScholarDigital Library
- D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manils. How unique and traceable are usernames? In Privacy Enhancing Technologies, pages 1--17. Springer, 2011. Google ScholarDigital Library
- T. Pontes, G. Magno, M. Vasconcelos, A. Gupta, J. Almeida, P. Kumaraguru, and V. Almeida. Beware of what you share: Inferring home location in social networks. In IEEE 12th International Conference on Data Mining Workshops, pages 571--578. IEEE, 2012. Google ScholarDigital Library
- T. Pontes, M. Vasconcelos, J. Almeida, P. Kumaraguru, and V. Almeida. We know where you live: privacy characterization of foursquare behavior. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 898--905. ACM, 2012. Google ScholarDigital Library
- I. Rubinstein. Voter privacy in the age of big data. Wisconsin Law Review, 2014.Google ScholarCross Ref
- S. Sengupta. Update urged on children’s online privacy. New York Times, September 15, 2011.Google Scholar
- S. Stecklow. On the web, children face intensive tracking. Wall Street Journal, September 17, 2010.Google Scholar
- C. Tang, K. Ross, N. Saxena, and R. Chen. What's in a name: A study of names, gender inference, and gender behavior in facebook. In Database Systems for Adanced Applications, pages 344--356. Springer, 2011. Google ScholarCross Ref
- J. Turow, M. X. D. Carpini, and N. Draper. Americans roundly reject tailored political advertising at a time when political campaigns are embracing it. 2012.Google Scholar
Index Terms
- The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children
Recommendations
Children Seen But Not Heard: When Parents Compromise Children's Online Privacy
WWW '15: Proceedings of the 24th International Conference on World Wide WebChildren's online privacy has garnered much attention in media, legislation, and industry. Adults are concerned that children may not adequately protect themselves online. However, relatively little discussion has focused on the privacy breaches that ...
A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
Online social networks (OSNs), which attract thousands of million people to use everyday, greatly extend OSN users' social circles by friend recommendations. OSN users' existing social relationship can be characterized as 1-hop trust relationship, and ...
Privacy for Children and Teenagers on Social Networks from a Usability Perspective: A Case Study on Facebook
WebSci '17: Proceedings of the 2017 ACM on Web Science ConferenceChildren and teenagers comprise a user group particularly susceptible to privacy infringement risks in Online Social Networks (OSNs). In this sense, the usability of privacy controls should be appropriate to such users. This study aims to characterize, ...
Comments