skip to main content
10.1145/2817946.2817957acmconferencesArticle/Chapter ViewAbstractPublication PagescosnConference Proceedingsconference-collections
research-article
Free Access

The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children

Published:02 November 2015Publication History

ABSTRACT

Data brokers have traditionally collected data from businesses, government records, and other publicly available offline sources. While each data source may provide only a few elements about a person's activities, data brokers combine these elements to form a detailed, composite view of the consumer's life. The emergence of social media gives data brokers unprecedented opportunities to enhance their profiles. Data brokers are increasingly interested in combining the information collected from offline sources with information publicly available in social networks to profile not only adults but also children.

In this paper, we show how data brokers and other third parties can combine online and offline data sources -- namely, public Facebook profiles and voter registration records -- to create detailed profiles of adults, teens, and children in any target city in the US. We outline and execute an approach that leverages a Facebook user's social ties combined with the city's voter registration records to infer the Facebook users who reside in the city. These inferences enable a data broker to create detailed user profiles, which not only include information publicly available from Facebook but also the user's exact residential address, date and year of birth, and political affiliation.

We further show how additional inferences can be made from the combined data. We then discuss how this city attack can be extended to create detailed profiles of minors and children. Finally, we make recommendations to Facebook, municipal authorities, and individuals to decrease the risk of this large-scale privacy breach.

References

  1. Frequently asked questions. United States Census Bureau. Available: https://www.census.gov/hhes/www/income/about/faqs.html.Google ScholarGoogle Scholar
  2. Data brokers: a call for transparency and accountability. Federal Trade Commission, Washington, DC, 2014.Google ScholarGoogle Scholar
  3. Acxiom becomes an audience data provider in facebook marketing partner program. February 17, 2015.Google ScholarGoogle Scholar
  4. K. Alexander and K. Mills. Voter privacy in the digital age. California Voter Foundation, 2004.Google ScholarGoogle Scholar
  5. P. Barberá. Birds of the same feather tweet together: Bayesian ideal point estimation using twitter data. Political Analysis, 23(1):76--91, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Chang, I. Rosenn, L. Backstrom, and C. Marlow. epluribus: Ethnicity on social networks. ICWSM, 10:18--25, 2010.Google ScholarGoogle Scholar
  7. T. Chen, M. A. Kaafar, A. Friedman, and R. Boreli. Is more always merrier?: a deep dive into online social footprints. In Proceedings of the 2012 ACM workshop on Workshop on online social networks, pages 67--72. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Dey, Y. Ding, and K. Ross. The high-school profiling attack: How online privacy laws can actually increase minors' risk. In Proc. of Internet Measurement Conference, volume 13, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Dey, Z. Jelveh, and K. W. Ross. Facebook users have become much more private: A large-scale study. In PerCom Workshops, pages 346--352. IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  10. R. Dey, C. Tang, K. Ross, and N. Saxena. Estimating age privacy leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE, pages 2836--2840. IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  11. M. Duggan, N. B. Ellison, C. Lampe, A. Lenhart, and M. Madden. Social media update 2014. Pew Research Center, September 2014.Google ScholarGoogle Scholar
  12. M. N. Elliott, P. A. Morrison, A. Fremont, D. F. McCaffrey, P. Pantoja, and N. Lurie. Using the census bureau's surname list to improve estimates of race/ethnicity and associated disparities. Health Services and Outcomes Research Methodology, 9(2):69--83, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  13. Y. Fu, G. Guo, and T. S. Huang. Age synthesis and estimation via faces: A survey. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 32(11):1955--1976, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Irani, S. Webb, K. Li, and C. Pu. Large online social footprints--an emerging threat. In International Conference on Computational Science and Engineering, volume 3, pages 271--276. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Issenberg. The victory lab: The secret science of winning campaigns. Broadway Books, 2012.Google ScholarGoogle Scholar
  16. C. Jernigan and B. F. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009.Google ScholarGoogle Scholar
  17. H. Köpcke and E. Rahm. Frameworks for entity matching: A comparison. Data & Knowledge Engineering, 69(2):197--210, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. T. Minkus, K. Liu, and K. W. Ross. Children seen but not heard: When parents compromise children's online privacy. In Proceedings of the 24th International Conference on World Wide Web. IW3C2, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Minkus and K. W. Ross. I know what you're buying: Privacy breaches on ebay. In Privacy Enhancing Technologies, pages 164--183. Springer, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy, 2008, pages 111--125. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. D. Perito, C. Castelluccia, M. A. Kaafar, and P. Manils. How unique and traceable are usernames? In Privacy Enhancing Technologies, pages 1--17. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Pontes, G. Magno, M. Vasconcelos, A. Gupta, J. Almeida, P. Kumaraguru, and V. Almeida. Beware of what you share: Inferring home location in social networks. In IEEE 12th International Conference on Data Mining Workshops, pages 571--578. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. T. Pontes, M. Vasconcelos, J. Almeida, P. Kumaraguru, and V. Almeida. We know where you live: privacy characterization of foursquare behavior. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 898--905. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. I. Rubinstein. Voter privacy in the age of big data. Wisconsin Law Review, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  25. S. Sengupta. Update urged on children’s online privacy. New York Times, September 15, 2011.Google ScholarGoogle Scholar
  26. S. Stecklow. On the web, children face intensive tracking. Wall Street Journal, September 17, 2010.Google ScholarGoogle Scholar
  27. C. Tang, K. Ross, N. Saxena, and R. Chen. What's in a name: A study of names, gender inference, and gender behavior in facebook. In Database Systems for Adanced Applications, pages 344--356. Springer, 2011. Google ScholarGoogle ScholarCross RefCross Ref
  28. J. Turow, M. X. D. Carpini, and N. Draper. Americans roundly reject tailored political advertising at a time when political campaigns are embracing it. 2012.Google ScholarGoogle Scholar

Index Terms

  1. The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        COSN '15: Proceedings of the 2015 ACM on Conference on Online Social Networks
        November 2015
        280 pages
        ISBN:9781450339513
        DOI:10.1145/2817946

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 November 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        COSN '15 Paper Acceptance Rate22of82submissions,27%Overall Acceptance Rate69of307submissions,22%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader