Hello,

We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not a subscriber? Subscribe now for unlimited access to online articles.

Intelligent Machines

Mining Social Networks for Clues

A researcher shows how programming tools can be used to track users’ real-life movements and behavior.

The dangers of posting sensitive personal information on social-networking sites are well known, but a researcher has now revealed how data mining these sites can dig up undisclosed personal information.

On Wednesday, in a presentation at the Black Hat computer-security conference in Las Vegas, Nitesh Dhanjani detailed how the information posted on social websites like Facebook and Twitter can be mined to find out a person’s whereabouts and activities.

Dhanjani showed data-collection programs that can be created using the programming tools released by such sites. For instance, he showed how to track the movements of politicians and celebrities using Twitter, by mining the service for relevant geographical information. Earlier this year, Republican congressman Pete Hoekstra was criticized for posting information on Twitter that revealed his location while traveling in Iraq.

Dhanjani also showed how to work out what software a person uses to post to Twitter; this information could help an attacker hack into that person’s account, he said.

Sensitive business information can also be revealed by mining social-network connections, Dhanjani said. For example, if there’s a rumor that two companies are in talks for a merger, an interested party could watch the business-networking site LinkedIn for connections between company employees. If a higher-than-average number of connections start forming, this might help to confirm the rumors.

With some social sites, a snooper needs to befriend someone in order to view her personal connections. But last year, two computer-security consultants–Nathan Hamiel of Hexagon Security Group and Shawn Moyer of Agura Digital Security–showed how this can be done by finding a friend of the target who doesn’t yet have a profile and creating a fake one. At that point, the target’s friends will often initiate a social connection themselves.

“The more powerful you are, the more the secrecy of your address book is important,” Dhanjani said, since an attacker can build up significant information about a target just by gaining access to the network.

However, Dhanjani also demonstrated more positive uses of social-network mining. He demonstrated a tool that can filter posts on Twitter by geographic area and search for particular keywords, such as posts mentioning “fire” or “smoke” to provide an earlier warning for emergency responders.

Dhanjani suggested that social networks could also assist with criminal investigations. Today, investigators talk with friends and associates of known criminals to identify accomplices. The connections on social sites could help reveal which people are closest to a target, he said.

Previously, Dhanjani identified a likely credit-card criminal by watching his behavior across a number of social-networking sites. Dhanjani was able to connect the criminal’s profile to a suspected true identity, partly through an analysis of his postings.

Other researchers agree that social-networking sites reveal far more than users often intend. “Legitimate software now does everything malware used to do that we freaked out about,” says Hamiel of Hexagon Security.

Dhanjani noted that social networks have both positive and negative qualities. “I think social media is beautiful, and I use it, too,” he said. As a security researcher, he tries to be careful about what he reveals when he uses Twitter, but he’s discovered that it isn’t possible to fully protect his privacy. “Social media is like a cocktail party,” he said. “In order to get something out of it, you have to give something up.”

Keep up with the latest in Privacy at EmTech Digital.

The Countdown has begun.
March 25-26, 2019
San Francisco, CA

Register now
More from Intelligent Machines

Artificial intelligence and robots are transforming how we work and live.

Want more award-winning journalism? Subscribe to Print + All Access Digital.
  • Print + All Access Digital {! insider.prices.print_digital !}*

    {! insider.display.menuOptionsLabel !}

    The best of MIT Technology Review in print and online, plus unlimited access to our online archive, an ad-free web experience, discounts to MIT Technology Review events, and The Download delivered to your email in-box each weekday.

    See details+

    12-month subscription

    Unlimited access to all our daily online news and feature stories

    6 bi-monthly issues of print + digital magazine

    10% discount to MIT Technology Review events

    Access to entire PDF magazine archive dating back to 1899

    Ad-free website experience

    The Download: newsletter delivered daily

/3
You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.