We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not an Insider? Subscribe now for unlimited access to online articles.

Intelligent Machines

Mining Social Networks for Clues

A researcher shows how programming tools can be used to track users’ real-life movements and behavior.

The dangers of posting sensitive personal information on social-networking sites are well known, but a researcher has now revealed how data mining these sites can dig up undisclosed personal information.

On Wednesday, in a presentation at the Black Hat computer-security conference in Las Vegas, Nitesh Dhanjani detailed how the information posted on social websites like Facebook and Twitter can be mined to find out a person’s whereabouts and activities.

Dhanjani showed data-collection programs that can be created using the programming tools released by such sites. For instance, he showed how to track the movements of politicians and celebrities using Twitter, by mining the service for relevant geographical information. Earlier this year, Republican congressman Pete Hoekstra was criticized for posting information on Twitter that revealed his location while traveling in Iraq.

Dhanjani also showed how to work out what software a person uses to post to Twitter; this information could help an attacker hack into that person’s account, he said.

Sensitive business information can also be revealed by mining social-network connections, Dhanjani said. For example, if there’s a rumor that two companies are in talks for a merger, an interested party could watch the business-networking site LinkedIn for connections between company employees. If a higher-than-average number of connections start forming, this might help to confirm the rumors.

With some social sites, a snooper needs to befriend someone in order to view her personal connections. But last year, two computer-security consultants–Nathan Hamiel of Hexagon Security Group and Shawn Moyer of Agura Digital Security–showed how this can be done by finding a friend of the target who doesn’t yet have a profile and creating a fake one. At that point, the target’s friends will often initiate a social connection themselves.

“The more powerful you are, the more the secrecy of your address book is important,” Dhanjani said, since an attacker can build up significant information about a target just by gaining access to the network.

However, Dhanjani also demonstrated more positive uses of social-network mining. He demonstrated a tool that can filter posts on Twitter by geographic area and search for particular keywords, such as posts mentioning “fire” or “smoke” to provide an earlier warning for emergency responders.

Dhanjani suggested that social networks could also assist with criminal investigations. Today, investigators talk with friends and associates of known criminals to identify accomplices. The connections on social sites could help reveal which people are closest to a target, he said.

Previously, Dhanjani identified a likely credit-card criminal by watching his behavior across a number of social-networking sites. Dhanjani was able to connect the criminal’s profile to a suspected true identity, partly through an analysis of his postings.

Other researchers agree that social-networking sites reveal far more than users often intend. “Legitimate software now does everything malware used to do that we freaked out about,” says Hamiel of Hexagon Security.

Dhanjani noted that social networks have both positive and negative qualities. “I think social media is beautiful, and I use it, too,” he said. As a security researcher, he tries to be careful about what he reveals when he uses Twitter, but he’s discovered that it isn’t possible to fully protect his privacy. “Social media is like a cocktail party,” he said. “In order to get something out of it, you have to give something up.”

Keep up with the latest in Privacy at EmTech Digital.
Don't be left behind.

March 25-26, 2019
San Francisco, CA

Register now
More from Intelligent Machines

Artificial intelligence and robots are transforming how we work and live.

Want more award-winning journalism? Subscribe to Insider Basic.
  • Insider Basic {! insider.prices.basic !}*

    {! insider.display.menuOptionsLabel !}

    Six issues of our award winning print magazine, unlimited online access plus The Download with the top tech stories delivered daily to your inbox.

    See details+

    Print Magazine (6 bi-monthly issues)

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.