SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Unclassified // Public Release



Social Media Analysis and Privacy


Joshua White
whitej@ainfosec.com

Senior Computer Engineer
Assured Information Security
http://ainfosec.com

PhD Student of Engineering Science
Clarkson University

Date: Oct 31, 2012
Release: Unclassified // Public




                                                                                  153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
 Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




 About: Company

     AIS (Assured Information Security)
           Research and Development of technologies and capabilities to support
            effective operations within the entirety of the cyber domain.
           Leading pioneers in the disciplines of Information Operations including
            Network Operations, Electronic Warfare, and Computer Network
            Operations of all types.
           Located In:
                 Rome NY (Corporate Headquarters)
                 Portland OR
                 Baltimore MD
                 Beavercreek OH
                 San Antonio TX
                 Colorado Springs, CO


                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




 About: Speaker

     Joshua White
           Education:
                 AAS Computer Network Technology (FLCC)
                 BS / MS Telecommunications (SUNYIT)
                 PhD Student of Engineering Science (Clarkson University)
           Experience:
                 7+ years Government Contracting in Information Security and
                  Telecommunications Engineering
           Areas of Study:
                 Intrusion Detection Systems
                 Optical Network Security
                 Large Dataset Analysis
                 Distributed Processing
                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




 Overview: The Big Questions

     Introduction
     The Big Research Questions:
           What are social media networks?
           What is the privacy problem relating to them?
           Who would want this data and why?
           What rights of privacy must I protect?
           What regulations regarding privacy exist?
           What happens if I don't protect the privacy?

     Conclusions
     References


                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




                    What are social media networks?




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Definition

     Social Media Networks
           DHS identified multiple categories [1]
                 Search
                 Video
                 Maps
                 Photos
                 Blog aggregates
                 Micro-blogs
                 Traditional social networks




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




     What's the privacy problem as it relates to
          these social media networks?




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Problem

     Two-Part Problem
           End Users
                 Unsure or unaware on ways to properly protect their privacy
           Data Collectors
                 Don't know how to properly maintain the privacy of their
                  datasets




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Problem

   Social Media-Networking Sites
         Provide a communications method thought by many to be at least
          somewhat private
               Many never change the default security settings associated with their
                accounts
               Example: Percentage of Facebook users by age that change their
                account security settings to anything other then the default (no
                security) setting [2]
                       18-19 years old = 71%
                       30-39 years old = 67%
                       50-64 years old = 55%
                       80% of all users fall within the 18-64 age range
                       Estimated 20+ million users have no security but must still have a basic
                        expectation of privacy
         Provides the largest “Social Network” datasets available for study
                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




            Who would want this data and why?




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Problem Focus: Data Collectors

     The problem of user expectations and
      knowledge of privacy settings is for another
      discussion
     Lets focus on the “larger” problem
           Data Collection
                 What can we collect?
                 What can we do with the data?
                 How must we protect the privacy of an individual’s PII
                  contained within the datasets?



                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release



Social Media Networks Awareness

      Benefits:
            Government
                  Track locations of persons of interest with reasonable
                   accuracy
                  “Bad guys” may have protected posts
                      Sometimes accessible by simply looking at their friend’s
                       

                      posts, or even other sites that they have allowed access
                      within their accounts
                  Track trends
                      Who said what, who repeated it?
                       


                        Is it going to cause a riot or worse yet, a war?
                  News before “official” reports
                          Natural disasters, shootings, etc
                                                                                  153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
 Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release



Social Media Networks Awareness

      Benefits:
            Businesses
                  Directed advertising
                       Track locations of consumers with reasonable accuracy
                       


                      Track buying habits and interests


                  Track trends
                      Who said what, who repeated it, is something going to
                       

                      effect a brand?
                  News before “official” reports
                          Did something happen that will effect the market rapidly
                              Natural disasters, news reports, etc



                                                                                  153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
 Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release



Social Media Networks Awareness

      Benefits:
            Academia
                  Research
                       Track locations of subjects with reasonable accuracy
                       


                      Track habits, interests and moods over time


                  Track trends
                      Who said what, who repeated it (graph theory)?
                       


                  Study social networks with the largest datasets ever created
                  Collaborate with millions
                  Build prediction models



                                                                                  153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
 Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release



Social Media Networks Awareness

      It Concerns Groups Differently
            Persons of interest
                  Don't want to be incriminated in things that you may not have done
            Consumers
                  Don't want others to know things about their buying habits that can
                   be used against them
            Subjects
                  Don't want information released that might cause them to be judged
                   by their peers

      Some Concerns Everyone Shares
            Discrimination
            A feeling of (privacy) violation

                                                                                  153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
 Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Case Study: Twitter

     A real-time social media network of microblogs
     Various API's
           Search, Live, Historical
     Highly accessible
           Example: NodeXL offers a MS Excel plugin for quickly grabbing a
            few thousand samples a day from multiple sites
     Large user base
           65+ million “tweets” per day
           750+ “tweets” per second
     International Community
           At least 27 languages represented
                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Case Study: Twitter

     Twitter is used by:
           People
                 Every Day Individuals
                 Politicians
                 Celebrities
                 Professionals
                 Bad Guys
           Objects
                 Gadgets that tweet (Sensors, bots, computers, spammers)
           Labeled Nefarious Groups
                 Lulzsec
                 Anonymous
                 others
                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Case Study: Twitter

     What's accessible:
           Posts contain far more then what's shown in the
            http://www.twitter.com web interface
                 Data is accessible as XML or in it's native JSON form
                 Data includes:
                         Location (Geo fields)
                         User names / real names
                         Threading
                             Track conversations using replies
                             Track re-tweets
                         Twitter client software data
                         Time stamping
                         Tweet text
                         And so much more

                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Case Study: Twitter




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Case Study: Twitter

     What can be done with all of this:
           NYC Company DataMinr
                 Report the death of Bin Laden:
                      25 minutes after he was killed
                      


                     13 minutes before the presidents address


                 They saw the first message regarding this only 19 minutes
                  after it happened
                 They were able to trace even earlier messages that with the
                  right algorithms would have shown something going on
                  before the initial military strike
                         Reports of US helicopter flying over head


                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Case Study: Twitter

     Consequences
           Data on sites like twitter can be used to:
                 Predict Social Security numbers with reasonable accuracy [4]
                 Deduce the gender of an individual from nothing but the
                  message text [5]
                 Track a persons physical location and create predictable
                  pattern maps
                 Deny services based on views and opinions expressed
                 Use posts, even those that were deleted as evidence in court
                  [6]
                 So much more


                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




        What rights of privacy must I protect?
                           &
     What laws regarding privacy regulation exist?




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Privacy Protection / Regulation

     First we need a strict definition for what is
      and isn't PII (Personally Identifiable
      Information)
           PII is any information that can be used to identify a
            specific individual
                 This includes data that can be combined with other sources
                  to identify an individual




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Privacy Protection / Regulation

     You decided to use this data, what's next?
           Protecting the PII of individuals within the dataset is
            key, and to some extent dependent on who you are
                 We're back to:
                         Government
                         Businesses
                         Academics
           Let's concentrate on US law during the rest of this talk




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Privacy Protection / Regulation

     The US Government
           Must protect the privacy of its citizens
           Federal: Cannot collect data on citizens without a warrant
           States: Cannot collect data on citizens without just cause
           Cannot deny citizens the right to use social media networks
           Cannot enforce privacy on the individual
           Can enforce regulations on the social media companies
            and those who use the data




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Privacy Protection / Regulation

     Businesses in the US
           Must protect the privacy of consumers
           Must abide by regulations imposed by the government
            that the site is located within
           While not required by law, it's good practice to let
            consumers know what is being done with their data




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Privacy Protection / Regulation

     Academics in the US
           Must protect the privacy of subjects
                 This applies even in instances where data is gathered without
                  consent, such as from social media network sites
                         Consent is not required for the collection of information
                          from these sites
           Depending on the specific sites EULA, datasets may:
                 Not be shared with other researchers outside of the
                  organization
                 Not be duplicated within a publication
                         Summation through statistics and results is OK


                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




  What happens if I don't protect the privacy of the
         individuals within my datasets?




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Consequences

     There are obvious legal ramifications for
      not protecting the privacy of individuals
      within a dataset
           Legal (Federal / State)
           Legal personal injury
     Not so obvious
           Loss of consumer trust / support
           Loss of position through ethics violation clauses



                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Consequences: Example

     Ethics can be tied closely to privacy
           Harvard researchers accessed complete Facebook
            profiles of 1700 students [7]
                 Data consisted of public profiles collected within the
                  university
                 Researchers outside the university had to apply for access to
                  the data
                 Data manual contained statistics about the dataset that did
                  not require the application to be filled out
                         These statistics were used to identify individuals
                            Consequently researchers lost funding and the
                             University found that opinion of the school had
                             lowered
                         Researchers were put before the ethics board
                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Conclusion

     Social media network datasets contain PII
     PII is not just profile data, it's also unseen
      fields such as geo-location and data that can
      be derived from the messages posted
     Datasets can not be shared outside an
      organization without prior permission if
      required by the EULA
     If the EULA allows for sharing of the data, it
      still must be properly anonymized

                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




References

 [1] DHS, Office of Operations Coordination and Planning, “Publicly Available Social Media
     Monitoring and Situational Awareness Initiative,” June 22, 2010
 [2] “Vaidhyanathan, S.; , “Welcome to the surveillance society,” Spectrum, IEEE , vol.48,
      no.6, pp.48-51, June 2011 doi: 10.1109/MSPEC.2011.5779791
 [3] Brodkin, Jon.; , “Bin Laden death-detecting analytics services signs partnership with
     Twitter,” ArsTechnica, Apr 9 2012
 [4] Alessandro Acquisti, Ralph Gross.; ,“Predicting Social Security Numbers from public
     data”, Proceedings of the National Academy of Sciences, vol. 106, no. 27, July 7,
     2009.
 [5] Burger, John., Et. All.; , “Discriminating Gender on Twitter,” Mitre Corp, Nov, 2011
 [6] Smith, . ; , "No warrant needed, no privacy: Judge rules even deleted tweets can be
     used in court," Network World, Apr. 24, 2012
 [7] Parry, Marc., ; , "Harvard Researchers Accused of Breaching Students' Privacy," The
     Chronicle of Higher Education, July 10, 2011



                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.
Unclassified // Public Release




Questions




                                                                                 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com
Copyright 2012 Assured Information Security, Inc.

Contenu connexe

Tendances

Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011Donald E. Hester
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safetymkinzie
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingIshfaq Majid
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media GovernanceJesse Wilkins
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 

Tendances (20)

Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safety
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 

En vedette

Presentation - Application of Actor Level Social Characteristic Indicator Sel...
Presentation - Application of Actor Level Social Characteristic Indicator Sel...Presentation - Application of Actor Level Social Characteristic Indicator Sel...
Presentation - Application of Actor Level Social Characteristic Indicator Sel...Joshua S. White, PhD josh@securemind.org
 
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...Joshua S. White, PhD josh@securemind.org
 
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...Joshua S. White, PhD josh@securemind.org
 
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...IIIT Hyderabad
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and PrivacyTypeset
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social mediaSupriya Radhakrishna
 
Deportes del ecuador
Deportes del ecuadorDeportes del ecuador
Deportes del ecuadormanuelito1244
 
1. Презентация шпаргалка
1. Презентация шпаргалка1. Презентация шпаргалка
1. Презентация шпаргалкаRnD_SM
 
Deportes belen jimenez cuesta
Deportes belen jimenez cuestaDeportes belen jimenez cuesta
Deportes belen jimenez cuestaBelen JC
 
Presentation 'The Civil Rights Movement'
Presentation 'The Civil Rights Movement'Presentation 'The Civil Rights Movement'
Presentation 'The Civil Rights Movement'Gizem Tuncer
 

En vedette (20)

Presentation - Application of Actor Level Social Characteristic Indicator Sel...
Presentation - Application of Actor Level Social Characteristic Indicator Sel...Presentation - Application of Actor Level Social Characteristic Indicator Sel...
Presentation - Application of Actor Level Social Characteristic Indicator Sel...
 
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
 
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
 
ase-social-informatics (6)
ase-social-informatics (6)ase-social-informatics (6)
ase-social-informatics (6)
 
Supraja_SMS_presentation
Supraja_SMS_presentationSupraja_SMS_presentation
Supraja_SMS_presentation
 
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
Privacy and Security on Online Social Media: Workshop on Data Analytics & Its...
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 
Deportes del ecuador
Deportes del ecuadorDeportes del ecuador
Deportes del ecuador
 
Gênesis
GênesisGênesis
Gênesis
 
1. Презентация шпаргалка
1. Презентация шпаргалка1. Презентация шпаргалка
1. Презентация шпаргалка
 
Deportes belen jimenez cuesta
Deportes belen jimenez cuestaDeportes belen jimenez cuesta
Deportes belen jimenez cuesta
 
Presentation 'The Civil Rights Movement'
Presentation 'The Civil Rights Movement'Presentation 'The Civil Rights Movement'
Presentation 'The Civil Rights Movement'
 
Presentation1 1
Presentation1 1Presentation1 1
Presentation1 1
 
projetos e exemplos
projetos e exemplosprojetos e exemplos
projetos e exemplos
 
Jesus cristo para além da história
Jesus cristo para além da históriaJesus cristo para além da história
Jesus cristo para além da história
 
Ghorepani poon hill trekking
Ghorepani poon hill trekkingGhorepani poon hill trekking
Ghorepani poon hill trekking
 
Spiriti e angeli tra paura e conforto
Spiriti e angeli tra paura e confortoSpiriti e angeli tra paura e conforto
Spiriti e angeli tra paura e conforto
 
Trabajo deportes
Trabajo deportesTrabajo deportes
Trabajo deportes
 
Capitol Hill Handyman
Capitol Hill HandymanCapitol Hill Handyman
Capitol Hill Handyman
 

Similaire à Social Media Privacy and Regulations

SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
Technology and society computer science 2.pptx
Technology and society computer science 2.pptxTechnology and society computer science 2.pptx
Technology and society computer science 2.pptxSABARISHSABARISH22
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 

Similaire à Social Media Privacy and Regulations (20)

SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
Technology and society computer science 2.pptx
Technology and society computer science 2.pptxTechnology and society computer science 2.pptx
Technology and society computer science 2.pptx
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
P50 fahl
P50 fahlP50 fahl
P50 fahl
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 

Plus de Joshua S. White, PhD josh@securemind.org (7)

Social Network Analysis Applications and Approach
Social Network Analysis Applications and ApproachSocial Network Analysis Applications and Approach
Social Network Analysis Applications and Approach
 
Clarkson joshua white - ids testing - spie 2013 presentation - jsw - d1
Clarkson   joshua white - ids testing - spie 2013 presentation - jsw - d1Clarkson   joshua white - ids testing - spie 2013 presentation - jsw - d1
Clarkson joshua white - ids testing - spie 2013 presentation - jsw - d1
 
Malware bek slides 20131023 final
Malware bek slides 20131023 finalMalware bek slides 20131023 final
Malware bek slides 20131023 final
 
Clarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal PresentationClarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal Presentation
 
Coalmine spie 2012 presentation - jsw -d3
Coalmine   spie 2012 presentation - jsw -d3Coalmine   spie 2012 presentation - jsw -d3
Coalmine spie 2012 presentation - jsw -d3
 
Phishing spie 2012 presentation - jsw - d2
Phishing   spie 2012 presentation - jsw - d2Phishing   spie 2012 presentation - jsw - d2
Phishing spie 2012 presentation - jsw - d2
 
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Social Media Privacy and Regulations

  • 1. Unclassified // Public Release Social Media Analysis and Privacy Joshua White whitej@ainfosec.com Senior Computer Engineer Assured Information Security http://ainfosec.com PhD Student of Engineering Science Clarkson University Date: Oct 31, 2012 Release: Unclassified // Public 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 2. Unclassified // Public Release About: Company  AIS (Assured Information Security)  Research and Development of technologies and capabilities to support effective operations within the entirety of the cyber domain.  Leading pioneers in the disciplines of Information Operations including Network Operations, Electronic Warfare, and Computer Network Operations of all types.  Located In:  Rome NY (Corporate Headquarters)  Portland OR  Baltimore MD  Beavercreek OH  San Antonio TX  Colorado Springs, CO 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 3. Unclassified // Public Release About: Speaker  Joshua White  Education:  AAS Computer Network Technology (FLCC)  BS / MS Telecommunications (SUNYIT)  PhD Student of Engineering Science (Clarkson University)  Experience:  7+ years Government Contracting in Information Security and Telecommunications Engineering  Areas of Study:  Intrusion Detection Systems  Optical Network Security  Large Dataset Analysis  Distributed Processing 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 4. Unclassified // Public Release Overview: The Big Questions  Introduction  The Big Research Questions:  What are social media networks?  What is the privacy problem relating to them?  Who would want this data and why?  What rights of privacy must I protect?  What regulations regarding privacy exist?  What happens if I don't protect the privacy?  Conclusions  References 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 5. Unclassified // Public Release What are social media networks? 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 6. Unclassified // Public Release Definition  Social Media Networks  DHS identified multiple categories [1]  Search  Video  Maps  Photos  Blog aggregates  Micro-blogs  Traditional social networks 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 7. Unclassified // Public Release What's the privacy problem as it relates to these social media networks? 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 8. Unclassified // Public Release Problem  Two-Part Problem  End Users  Unsure or unaware on ways to properly protect their privacy  Data Collectors  Don't know how to properly maintain the privacy of their datasets 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 9. Unclassified // Public Release Problem  Social Media-Networking Sites  Provide a communications method thought by many to be at least somewhat private  Many never change the default security settings associated with their accounts  Example: Percentage of Facebook users by age that change their account security settings to anything other then the default (no security) setting [2]  18-19 years old = 71%  30-39 years old = 67%  50-64 years old = 55%  80% of all users fall within the 18-64 age range  Estimated 20+ million users have no security but must still have a basic expectation of privacy  Provides the largest “Social Network” datasets available for study 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 10. Unclassified // Public Release Who would want this data and why? 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 11. Unclassified // Public Release Problem Focus: Data Collectors  The problem of user expectations and knowledge of privacy settings is for another discussion  Lets focus on the “larger” problem  Data Collection  What can we collect?  What can we do with the data?  How must we protect the privacy of an individual’s PII contained within the datasets? 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 12. Unclassified // Public Release Social Media Networks Awareness  Benefits:  Government  Track locations of persons of interest with reasonable accuracy  “Bad guys” may have protected posts Sometimes accessible by simply looking at their friend’s  posts, or even other sites that they have allowed access within their accounts  Track trends Who said what, who repeated it?   Is it going to cause a riot or worse yet, a war?  News before “official” reports  Natural disasters, shootings, etc 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 13. Unclassified // Public Release Social Media Networks Awareness  Benefits:  Businesses  Directed advertising Track locations of consumers with reasonable accuracy   Track buying habits and interests  Track trends Who said what, who repeated it, is something going to  effect a brand?  News before “official” reports  Did something happen that will effect the market rapidly  Natural disasters, news reports, etc 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 14. Unclassified // Public Release Social Media Networks Awareness  Benefits:  Academia  Research Track locations of subjects with reasonable accuracy   Track habits, interests and moods over time  Track trends Who said what, who repeated it (graph theory)?   Study social networks with the largest datasets ever created  Collaborate with millions  Build prediction models 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 15. Unclassified // Public Release Social Media Networks Awareness  It Concerns Groups Differently  Persons of interest  Don't want to be incriminated in things that you may not have done  Consumers  Don't want others to know things about their buying habits that can be used against them  Subjects  Don't want information released that might cause them to be judged by their peers  Some Concerns Everyone Shares  Discrimination  A feeling of (privacy) violation 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 16. Unclassified // Public Release Case Study: Twitter  A real-time social media network of microblogs  Various API's  Search, Live, Historical  Highly accessible  Example: NodeXL offers a MS Excel plugin for quickly grabbing a few thousand samples a day from multiple sites  Large user base  65+ million “tweets” per day  750+ “tweets” per second  International Community  At least 27 languages represented 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 17. Unclassified // Public Release Case Study: Twitter  Twitter is used by:  People  Every Day Individuals  Politicians  Celebrities  Professionals  Bad Guys  Objects  Gadgets that tweet (Sensors, bots, computers, spammers)  Labeled Nefarious Groups  Lulzsec  Anonymous  others 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 18. Unclassified // Public Release Case Study: Twitter  What's accessible:  Posts contain far more then what's shown in the http://www.twitter.com web interface  Data is accessible as XML or in it's native JSON form  Data includes:  Location (Geo fields)  User names / real names  Threading  Track conversations using replies  Track re-tweets  Twitter client software data  Time stamping  Tweet text  And so much more 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 19. Unclassified // Public Release Case Study: Twitter 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 20. Unclassified // Public Release Case Study: Twitter  What can be done with all of this:  NYC Company DataMinr  Report the death of Bin Laden: 25 minutes after he was killed   13 minutes before the presidents address  They saw the first message regarding this only 19 minutes after it happened  They were able to trace even earlier messages that with the right algorithms would have shown something going on before the initial military strike  Reports of US helicopter flying over head 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 21. Unclassified // Public Release Case Study: Twitter  Consequences  Data on sites like twitter can be used to:  Predict Social Security numbers with reasonable accuracy [4]  Deduce the gender of an individual from nothing but the message text [5]  Track a persons physical location and create predictable pattern maps  Deny services based on views and opinions expressed  Use posts, even those that were deleted as evidence in court [6]  So much more 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 22. Unclassified // Public Release What rights of privacy must I protect? & What laws regarding privacy regulation exist? 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 23. Unclassified // Public Release Privacy Protection / Regulation  First we need a strict definition for what is and isn't PII (Personally Identifiable Information)  PII is any information that can be used to identify a specific individual  This includes data that can be combined with other sources to identify an individual 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 24. Unclassified // Public Release Privacy Protection / Regulation  You decided to use this data, what's next?  Protecting the PII of individuals within the dataset is key, and to some extent dependent on who you are  We're back to:  Government  Businesses  Academics  Let's concentrate on US law during the rest of this talk 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 25. Unclassified // Public Release Privacy Protection / Regulation  The US Government  Must protect the privacy of its citizens  Federal: Cannot collect data on citizens without a warrant  States: Cannot collect data on citizens without just cause  Cannot deny citizens the right to use social media networks  Cannot enforce privacy on the individual  Can enforce regulations on the social media companies and those who use the data 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 26. Unclassified // Public Release Privacy Protection / Regulation  Businesses in the US  Must protect the privacy of consumers  Must abide by regulations imposed by the government that the site is located within  While not required by law, it's good practice to let consumers know what is being done with their data 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 27. Unclassified // Public Release Privacy Protection / Regulation  Academics in the US  Must protect the privacy of subjects  This applies even in instances where data is gathered without consent, such as from social media network sites  Consent is not required for the collection of information from these sites  Depending on the specific sites EULA, datasets may:  Not be shared with other researchers outside of the organization  Not be duplicated within a publication  Summation through statistics and results is OK 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 28. Unclassified // Public Release What happens if I don't protect the privacy of the individuals within my datasets? 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 29. Unclassified // Public Release Consequences  There are obvious legal ramifications for not protecting the privacy of individuals within a dataset  Legal (Federal / State)  Legal personal injury  Not so obvious  Loss of consumer trust / support  Loss of position through ethics violation clauses 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 30. Unclassified // Public Release Consequences: Example  Ethics can be tied closely to privacy  Harvard researchers accessed complete Facebook profiles of 1700 students [7]  Data consisted of public profiles collected within the university  Researchers outside the university had to apply for access to the data  Data manual contained statistics about the dataset that did not require the application to be filled out  These statistics were used to identify individuals  Consequently researchers lost funding and the University found that opinion of the school had lowered  Researchers were put before the ethics board 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 31. Unclassified // Public Release Conclusion  Social media network datasets contain PII  PII is not just profile data, it's also unseen fields such as geo-location and data that can be derived from the messages posted  Datasets can not be shared outside an organization without prior permission if required by the EULA  If the EULA allows for sharing of the data, it still must be properly anonymized 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 32. Unclassified // Public Release References [1] DHS, Office of Operations Coordination and Planning, “Publicly Available Social Media Monitoring and Situational Awareness Initiative,” June 22, 2010 [2] “Vaidhyanathan, S.; , “Welcome to the surveillance society,” Spectrum, IEEE , vol.48, no.6, pp.48-51, June 2011 doi: 10.1109/MSPEC.2011.5779791 [3] Brodkin, Jon.; , “Bin Laden death-detecting analytics services signs partnership with Twitter,” ArsTechnica, Apr 9 2012 [4] Alessandro Acquisti, Ralph Gross.; ,“Predicting Social Security Numbers from public data”, Proceedings of the National Academy of Sciences, vol. 106, no. 27, July 7, 2009. [5] Burger, John., Et. All.; , “Discriminating Gender on Twitter,” Mitre Corp, Nov, 2011 [6] Smith, . ; , "No warrant needed, no privacy: Judge rules even deleted tweets can be used in court," Network World, Apr. 24, 2012 [7] Parry, Marc., ; , "Harvard Researchers Accused of Breaching Students' Privacy," The Chronicle of Higher Education, July 10, 2011 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.
  • 33. Unclassified // Public Release Questions 153 Brooks Road, Rome, NY | 315.336.3306 | http://ainfosec.com Copyright 2012 Assured Information Security, Inc.