Professional Documents
Culture Documents
www.IJoFCS.org
Anchises M. G. de Paula
Abstract - Social networks represent a new range of online uses that pose a series of
challenges to the security community. While these networks provide new opportunities
for interaction and socialization among users, the overwhelming amount of information
generated, exchanged, and redistributed by users demands the adoption of new tools
and techniques to search, analyze and secure online data, which are the subject of this
paper. An understanding of the implications of online social networking to human social
interaction and societal structure will bring new ideas and challenges to consumers,
businesses, and governments worldwide. This report analyzes the social network
phenomenon, focusing on its security implications and perspectives on potential future
development paths.
Figure 2-2: Social Graph Example Representing Social Data with Semantic Web
The application of Semantic Web has provided
Social Graphs models that represent the richness of online
Social graphs (Fig. 2-2) [5] depict social social interactions. As the Web becomes more
structures comprised of nodes (user profiles) social, a vast amount of knowledge is generated,
that represent individuals or organizations. exchanged, and collected online. Researchers
Nodes are linked by one or more specific have used Semantic Web to construct models
interdependencies representing generic levels that capture such activities and track the
of relationships, such as friends, co-workers, or transformation of information into collective
family members. intelligence.
64 Security Aspects and Future Trends of Social Networks
Semantic Web technologies construct formal
models that are useful for the extraction of
knowledge produced by online social interactions
(Fig. 2-3). By connecting social networks to
FOAF and social activities (e.g., blog comments)
to SIOC, Semantic Web provides a complete
interlinked graph that supersedes existing
networks.
Demographics
Social-networking sites are organized
primarily around people, with each individual
Figure 2-3: Social Graph Representation Using managing personal connections from the center
Semantic Web of his or her community. Despite the fact that
Researchers see social data within a two-fold many social-networking services use designs
structure that includes data describing the social that promote wide accessibility, various services
network and those that represent what members attract homogenous populations where these
produce. Several ontologies can be used to link groups commonly use the social networking
data across various social networks, including sites to segregate themselves by nationality, age,
Friend of a Friend (FOAF)2 and Semantically educational level, or other factors that typically
Interlinked Online Communities (SIOC).3 FOAF segment the offline society.
represents individual profiles and links data Because social-networking sites enable
among social networks. SIOC aggregates data users to contact real-life friends, the majority
from various Web-based media (including wikis of online connections are between friends,
and blogs) and presents information to users in family members, colleagues, and professional
the most appropriate manner [7]. acquaintances. A dominant social network can
Existing concepts can be organized and surmount local competition by providing the
linked to SIOC descriptions using the Simple service of choice among existing groups of
Knowledge Organization System (SKOS).4 SKOS friends.
develops specifications and standards to support Figure 2-4 displays the dominant social
the use of knowledge-organization systems, networks by country in November 2008 [8],
such as thesauri, classification schemes, indicating pronounced regional variation in the
subject-heading systems, and taxonomies, most popular social networks. The success of
within the framework of Semantic Web. SKOS social-networking sites relies fundamentally on
represents knowledge-organization systems their cultural relevance to a specific population.
using the Resource Description Framework
(RDF).5 RDF-encoded information can be passed 2.4. Current Problems
interoperable between computer applications.
An RDF-based description of social data forms Decentralization and Interoperability
a rich-typed graph and offers a powerful way to Most social-networking sites provide very
represent online social networks. little interaction with external online services.
They operate as “walled gardens,” wherein user
2
http://foaf-project.org
content is exclusive to the site and cannot be
3
http://sioc-project.org
4
http://www.w3.org/2004/02/skos shared with other Internet applications. This
5
http://www.w3.org/RDF limitation results from the sites’ business
Anchises M. G. de Paula 65
models, which employ user lock-in as a strategy sharing. Most sites use simple password
for the acquisition of the largest possible user protection and have a simple three-level access-
base. control system similar to that of UNIX systems:
users can choose to keep their information
Many users would prefer an interoperable
completely private, share it with a designated
format that would allow them to transport social
group of friends, or make it publicly available to
interactions across different sites. Users who
all viewers. Most social-networking sites restrict
have struggled to gain a reputation within one
profile access to internal users by requiring
site would like to transfer that reputation to
authentication as a community member.
other contexts. Currently, users who switch to
a new social-networking site must begin anew,
making new contacts and creating another Trust and Reputation Management
online identity. Many users are currently willing As in real-world interactions, trust is a
to join more than one social-networking site; key concept governing the establishment of
nonetheless, social networks could gain more relationships based on the online profiles of known
new subscribers by facilitating interoperability. people or strangers. To build new relationships,
users must be confident that they are connecting
with whom they expect. Reputation management
Managing Social Identities and tagging technologies help users assess the
Because users cannot transport their data trustworthiness of online third-party information.
between social networks, individuals usually
Reputation management is based on a user
subscribe to multiple social networks and must
profile’s accumulation of more positive than
thus maintain many profiles and connections.
negative comments. To build positive online
Distinct logins for each social-networking site
reputations, users must be in as many places
prevent users from proving their identity across
as possible, posting, making friends, building
several platforms.
relationships, staying active in forums, and
Further, social-networking sites have a very sharing information online with other users. The
limited set of features for the protection of digital parallel development of Web 2.0 applications
identity and the restriction of profile information has popularized social tagging, by which users
66 Security Aspects and Future Trends of Social Networks
can rank or categorize Web content, such as eased the process of information publishing to
pictures, videos, and blog posts. A set of tags an extent that overwhelms its consumers. With
built from the use of such applications forms an extremely low entry barrier and almost no
a folksonomy that can be seen as a shared expense, Web 2.0 allows anyone with a computer
vocabulary originated by, and familiar to, its to become an independent publisher. As a result,
primary users. Global tagging and aggregation users publish duplicate or reused content, and
build online trust and facilitate the identification feeds may become hard to track because they
of resources within a trusted social network. provide a tremendous amount of information
within a short period of time.
Privacy Given the time-consuming nature of tracking
Privacy concerns demand that user profiles and reading numerous online publications, blogs
never distribute information that is not explicitly and forums, users must choose what to read and
classified as publicly available. Many users what to avoid. Although information is readily
publish personal information on the Web, aggregated, it is almost impossible to process,
including pictures (e.g., on Flickr, Facebook), analyze, validate, and contextualize in a manner
opinions (e.g., on Twitter, blogs, forums), videos that offers a coherent perspective on the facts
(e.g., on YouTube), and a variety of information behind the stories. As the amount of information
on personal home pages. Such postings may continues to increase, users will require online
contain sensitive information, such as birth relationship-management and data-mining tools.
dates, home addresses, and personal phone
numbers. Because online users typically use query
functions to search profiles, groups, and forums Legal Concerns
for information about other users, the protection Most of the known issues in social networks
of personal privacy is an inherent issue. relate to the need to protect users’ personalities
and images. These social concepts encompass
As in real-life relationships, people engage several factors, including reputation, false
in online networks at different levels of allegations, the right to one’s image, privacy,
confidentiality. Users must thus be in control insults, and discrimination of all sorts. From a
of what they disclose and should be able to legal point of view, social-network risks include
define disclosure rules (e.g., “nobody,” “friends,” the violation of users’ data-protection rights and
“friends of friends,” “everyone”). Most users the perpetration of identity fraud.
have public profiles that are visible to everyone;
these profiles often contain sensitive personal Because Web 2.0 services host user-generated
data that enable skillful attackers to use social- content, service providers must establish a
engineering strategies. The increasing use of detailed “Terms of Service” statement that
microblogging services, such as Twitter, allows covers users’ rights and providers’ ability to
the creation of life streams in which users often police existing content. Social-network and Web
disclose their geographic locations and personal 2.0 service providers are often under pressure
habits. Blog entries about business meetings are to intervene in inappropriate user-generated
another form of privacy risk, as well as a potential content. These interventions may be requested
violation of corporate policies. Competitors can by other users (e.g., copyright holders, victims of
freely read and exploit such information. online harassment), law enforcement authorities
or initiated by service providers. Some of these
actions are acceptable, while others may violate
Content Overload users’ rights; such situations have posed difficult
The proliferation of Web 2.0 applications dilemmas for several providers. Service providers
(e.g., blogs, wikis, forums, social networks) has may typically intervene when a user has posted
Anchises M. G. de Paula 67
inappropriate, illegal, or copyrighted material, proximity and/or phone calls (offline stalking),
or has defamed or published private information but also through electronic means, such as
about another person. e-mail, instant messaging, and social-networking
sites (cyber-stalking). Social networks encourage
Given these legal and awareness requirements,
the publication of personal information, including
social-network providers should be familiar
data that can reveal an individual’s location and
with compliance and governance mandates and
schedule (e.g., home address and phone number,
security frameworks. Unfortunately, we currently
schedule of classes).
lack a framework for uniform international
regulation that guarantees privacy rights and Exposure to problematic content on the
personal data protection across the Internet. Internet constitutes an additional social threat.
Problematic content includes a broad spectrum
of undesirable or illegal material, such as violent
Usage Problems media (movies, music, images) which promote
Online social attacks include identity theft, hate speech, pornography, obscene content, and
defamation, stalking, injuries to personal dignity, websites related to self-harm (sites dedicated to
and cyber-bullying. Attackers create false profiles enabling self-injury and suicide, or those that
to mimic personalities or brands, or to slander encourage anorexic and bulimic lifestyles).
a known individual within a network of friends
(e.g., a celebrity or a member of a school class). An increasingly prevalent threat is represented
While such attacks may be carried out using by sexual messages or nude or suggestive
conventional Web pages, they are particularly photographs sent by teenagers using mobile
damaging within social networks because known phones. With the proliferation of camera-equipped
victims may be targeted within social groups. mobile phones and social-networking sites,
Additionally, a victim’s failure to immediately “sexting”7 has become a concern for parents. The
recognize a defamation attack may prevent him/ issue has gained international attention following
her from accessing the offending content, due multiple incidents in the United States, in which
to the attacker’s restriction of such access to the teenagers have faced child pornography charges
group ridiculing that victim. Teenagers’ extensive for sending nude or scantily clad images to
use of online resources is associated with a other teenagers. Users can post on the Internet
growing risk of abuse, including cyber-bullying6 or forward these images or sexually explicit text
and grooming by adults who intend to commit messages, which can end in harassment or even
sexual abuse. Most teenagers have not received sexual assault charges. A survey conducted in
proper instruction on how to avoid such risks. the United States [9] revealed that one in five
teenagers said they had sent or posted online
Cyber-bullying on social networks includes nude or semi-nude photographs of themselves.
harassment, denigration, outing (sharing
someone’s secrets, embarrassing information, or
images), trickery (talking someone into revealing 3. Future of Social Networking
secrets and then sharing it online), flaming (angry,
critical, or disparaging electronic messages or
Social-networking sites are a relatively new
discussions), exclusion, stalking, and threatening
phenomenon, and as with any other technologi-
behavior. Stalking typically involves threatening
cal innovation, they will require a long period of
behavior in which the perpetrator repeatedly
seeks contact with a victim through physical
7
This term combines the words “sex” and “texting” and
refers to potentially prurient messages and images send
6
Cyber-bullying is a term used to describe repeated over electronic devices, such as mobile phones or laptop
and purposeful acts of harm that are carried out using computers. Source: http://sexoffenderresearch.blogspot.
technology, particularly mobile phones and the Internet. com
68 Security Aspects and Future Trends of Social Networks
technical and social adjustment and improve- players in a hyper-real, richly rendered, three-
ment to fully meet users’ needs and accommo- dimensional space. Players control “avatars,”
date their behaviors. Users will also adjust on- which are in-game characters with defined
line practices to adapt to new social-networking attributes that interact with other avatars and
technologies. with the game’s environment.
Most MOEs share some characteristics with
3.1. Meta-Social Networks and User- popular social-networking sites and promote
Centric Social Universes social interaction among users. The social
Users currently play multiple roles within nature of these environments depends largely
dynamic and fluctuating online social networks; on users’ ability to interact within communities.
thus, the further development of social networks Major research organizations [e.g., International
must allow users to manage their profiles and Business Machines (IBM), Linden Labs] are
connections using meta-social network tools. working to enable the seamless movement
Such tools, such as Explode [10], will allow of MOE avatars among virtual worlds while
users to manage profiles and trust networks maintaining the avatar’s identity in terms of
across distinct social networks using Semantic appearance, personal information, and banking
Web, data portability, and shared-authentication status. In the future, these virtual environments
technologies. Users will thereby be able to may converge to form a metaverse.
maintain cross-network friendships using a
centralized online profile.
3.3. Integrating Social Networks and
Tools for the management of a user’s Data Portability
distributed Web presence and others’ ability to The integration of data from different networks,
view that presence will likely be necessary to movement of information and social graphs
support effective social-network use within a across diverse sites, or identification of all content
distributed set of networks. relevant to a particular topic are complex tasks
that require specific standards and technologies
supported by social-network providers. Although
3.2. Metaverse: Convergence and Inte- many Web 2.0 services currently employ
gration of Social Networks and Virtual application programming interfaces (APIs)
Worlds to promote their integration with third-party
Internet and social-network evolution have applications, most social-network providers do
occurred within an interactive and distributed not. However, some social-networking services
environment. Increasing use of multi-user online have implemented basic features that allow users
environments (MOEs)8 reflects the growing to import and export profiling information using
importance of social networking over gaming. standard tools, such as vCard.9
Often characterized as virtual, persistent worlds,
The number of open protocols designed for or
MOEs connect many simultaneous Internet users.
usable by social-network platforms has increased
The perpetual nature of these environments
exponentially in recent years. Social-network
distinguishes them from those of typical
providers theoretically have the opportunity to
computer gaming. Users may log on, join the
use or compose with a growing number of open
game, build relationships, and leave whenever
protocols and providers. Although a detailed
they wish, but the game continues with other
overview of these protocols is beyond the scope
8
Multi-user online environments (MOEs) are a set of of this paper, they include [11]:
persistent online environments, ranging from massive
multiplayer online role-playing games (MMORPGs;
e.g.,World of Warcraft, City Of Heroes) to virtual worlds 9
vCard is a file format standard for electronic business
(e.g., Habbo Hotel, Second Life). cards.
Anchises M. G. de Paula 69
--Authentication: OpenID, CardSpace, i-card, key Facebook features, such as friend lists, into
Liberty Alliance, Facebook Connect; third-party applications. The third-party sites
--Authorization: Open Authentication (Oauth), can then send data back to Facebook and create
CardSpace, i-card, OpenSocial; news feed.
--Semantic markup and description: Resource
Existing authentication services (e.g.,
Description Framework (RDF), MicroFormats;
OpenID11) further extend interoperability and
--Network description: FOAF, XHTML Friends
single sign-in functionality by making social-
Network (XFN), OpenSocial, DiSo10;
network user IDs portable to other sites.
--Network visualization: TouchGraph, Web
Positioning System (WPS);
--Remote manipulation of data and 3.4. Social Web Bill of Rights
relationships: Representational State In response to a lengthy public discussion
Transfer (REST), SOAP (Simple Object Access of data and privacy rights, the Open Social Web
Protocol,), XML-RPC [a remote procedure call group12 presented the “Bill of Rights for the
(RPC) protocol which uses Extensible Markup Social Web”13 in September 2007. Composed by
Language (XML) standard], DiSo; four Web 2.0 pioneers, this document outlined
--Service description: XRDS (eXtensible the appropriate treatment of data collected
Resource Descriptor Sequence), UDDP by companies from social-network site users,
(Unified Design and Development Platform); including personal data, data describing to
--Service execution: OpenSocial, Facebook whom users are connected, and user-generated
Applications; content. The “Bill of Rights” defined three basic
--Message transport: REST, SOAP, Extensible users’ rights over their data: ownership, control
Messaging and Presence Protocol (XMPP), (the right to share, keep private, or completely
and Simple Mail Transfer Protocol (SMTP); revoke data at user’s discretion), and freedom.
--Application hosting: OpenSocial; These issues arose again following the
--Indexation and search: Google Social Graph. February 2009 Facebook users’ rebellion, which
Facebook, Google, and MySpace have halted the company’s attempt to change its terms
announced technologies that permit user data of service to grant itself a perpetual license to all
portability among social websites, representing member-posted photos, videos, and copyrighted
a new source of competition among social- material [12].
networking services. Google’s Friend Connect
and MySpaceID use open-source code based on
the OpenID, OAuth, and OpenSocial standards. 3.5. Virtual Currency
These standards facilitate social-identity sharing Wikipedia defines virtual economy as the
across the Internet, not just among a few partner emergent economy existing in virtual worlds,
websites. Facebook Connect was the first usually characterized by the exchange of
interoperability protocol to be implemented; it virtual goods within the context of an Internet
features an easy logon, the option to rebroadcast game [13]. Virtual worlds have distinct virtual
activities on a third-party site to Facebook friends, economies and currencies that are based on the
and the matching of existing Facebook friend exchange of virtual goods (e.g., weapons, spells,
relationships with those on a third-party site.
11
OpenID is a universal identification technology in which
Facebook Connect allows third-party developers a user registered with a website (OpenID Provider) is
to let users log onto their websites using their assigned a URL that serves as a personal identifier. The
user may then use the URL on any site that supports
Facebook credentials and to integrate other OpenID, and the logon process is handled through the
provider site. Source: http://openid.net.
12
http://opensocialweb.org
10
http://diso-project.org 13
http://opensocialweb.org/2007/09/05/bill-of-rights
70 Security Aspects and Future Trends of Social Networks
clothes, food, houses). Some virtual currencies such as locational coordinates or listening
are tied to the real world through purchase habits. As features are added to these devices,
from game providers, and some people interact phones become a more complete repository for
with virtual economies for real-world economic personal data linked to a single individual.
benefit. Users can also sell their characters,
The benefits of mobile social networking,
virtual money, and/or goods on online-auction
including enhanced location awareness and
websites for real money.
availability, must be balanced with users’
Games are one of the newest and most requirements for personal privacy.
popular online application types on several
social-networking sites. Because monetization
is an important aspect of games, social-network 3.7. Sensor Networks
providers have begun to distribute virtual By combining social-network- and Web-
currency (e.g., hi5’s “coins”). For example, connected devices, applications can extend
Hi5 users can spend virtual coins to purchase social activities through sensors. User activity
premium content, advanced features, and status is modeled not by voluntary user input, but can
upgrades. Many publishers of Facebook games be automatically generated by sensors. Other
are also using their own virtual currency, in the sources of social data available on the Web could
hope that a unified virtual currency will become be used as sensors to minimize the required
universal and it will engage more gamers and, user input, aggregating online activities and
ultimately, encourage them to spend more user footprints with their social profiles. Using
money on games. semantic representations of information from
The use of money (real or virtual) on social sensors, users could connect through shared
networks, however, attracts fraudsters and activities and interests. More importantly, alerts
cyber-criminals who attempt to steal users’ could be sent to users when abnormal activity
social-networking credentials and online money. patterns were detected.
An increasing number of portable devices
support sensor-based interactions, from
3.6. Mobile Social Networking peripherals (e.g., Nike + iPod sport sensor ) to
14
Given the growing ubiquity of social integrated sensors (e.g., iPhone‘s accelerometer).
networking and mobile-phone usage, the Sensors have recently become more prevalent
overlapping demographics will provide in mobile devices. By supporting Bluetooth
numerous opportunities for future mobile social- and WiFi communication, mobile phones have
networking applications. Given the limitations become sensor gateways for individuals. A wide
of mobile phones (e.g., small screens, limited range of Bluetooth sensors, such as heart and
keyboards, often-poor network connectivity), environmental monitors, can be associated with
the sophisticated native interfaces and rich these mobile phones, enabling a new paradigm
media content offered by social networks cannot —the personal sensor network — in which the
be fully duplicated on mobile devices. However, individual becomes the sensor hub.
smartphones are increasingly been equipped with
sophisticated features and sufficient processing
power for software applications. Some devices
3.8. Social Television
already include a built-in interface or leading
Internet protocol television (IPTV) is the
social networking sites. Mobile phones may
next television market, allowing users to watch
include global positioning system (GPS) tracking
television programming wherever they are. Social
devices and music players, and could supply
valuable user information to social networks, 14
http://www.apple.com/ipod/nike
Anchises M. G. de Paula 71
networking through IPTV technology brings 3.11. Corporate Use
many favorable social services to television Social networks allow the corporate sector to
viewers, based on users’ ability to share their develop closer relationships with customers, since
experiences and opinions. The main features of current Internet consumers are not merely buyers,
social TV include online sharing of TV-watching but also use many opportunities to view, inquire,
experiences, interaction among TV viewers communicate about, and analyze products and
(via chat, e-mail, forums, video-conferencing), services. Consumers readily share their feedback
community-viewing of TV programming (watching and complaints about their favorite products
together through a social television service or by and brands. Web 2.0 applications are useful for
online sharing), and recommendation sharing product development and the establishment of
(via social networks, personal broadcasts). commercial relationships, and allow companies
to learn more about consumers. Business
opportunities that incorporate social networks
3.9. Social e-Government include:
A new generation of politicians has
increasingly adopted social-media tools to --Social advertising: formats that engage
interact with citizens. The 2008 electoral the social context of the viewer and target
campaign of Barack Obama, the President of the advertising using user data;
United States, provides an excellent example --Micro-payment within social networks: enables
of such use. Governments can benefit from the exchange of goods and services within
social networks through three broad areas of the social-networking platform; also applies
interaction: to developers of social software applications;
--Platforms for micro-niches: subscription or
--Government to Citizen: promotion of
access fees could be charged;
online public services and dissemination of
--Resale of marketing and business intelligence
information as “official” advice and support,
based on information collected on the
increasing the transparency of information;
network;
--Citizen to Government: citizen use of the
--Buying clubs: to drive demand, users
Web to express views, highlight politicians’
interested in similar product types could be
work, engage with the government, and
offered coupons;
influence policy makers;
--Interaction with real-world commerce: social
--Citizen to Citizen: interactions that help fel-
platforms could be connected with small- and
low citizens handle public-service outcomes
medium-sized businesses, such as estab-
(e.g., healthcare information, advice about
lished boutiques, coffee shops, restaurants,
tax matters).
and bars.
Companies must adapt their business models
3.10. Political Use of Social Networks
to take advantage of social Web features within
Since the social-media-directed protests
disputing the 2009 election results in Iran, large (e.g. Facebook) and small or focused
Twitter and social-networking sites have social networks. Smaller networks present the
emerged as powerful online tools for the opportunity to reach a niche or distinct group of
organization and dissemination of virtual and customers.
real-world protests. People realized that they
could effectively mobilize local protests and 3.12. E-Learning through Social Net-
inform thousands of others worldwide through working
Internet resources, such as social networks and Schools and higher-education foundations
the Twitter microblogging service. increasingly prefer to use social networking as
72 Security Aspects and Future Trends of Social Networks
a communication and collaboration tool. In the --Spammers and phishers use compromised
near future, it would be beneficial for schools social-network accounts to send fraudulent
to promote online interaction through social- messages to victims’ friends;
networking sites. Such interaction could be used --Fraudsters and cyber-criminals use social
to prepare students by providing them with the networks to capture user data and carry out
adult life-skills they need to succeed. Security social-engineering attacks;
policies remain important, as does instruction --Hacktivists and offline terrorist groups create
for students about online safety and responsible communities to spread their views, promote
online expression. Students may learn these their causes, and frequently to conduct
lessons best while using social-networking tools. recruitment;
--Sexual predators use social networks to share
4. Security aspects illicit content and recruit victims.
of Social Networking Social networks are popular communication
media for many communities, including those
Although new paradigms provide many with malicious intent. Several hacking groups
opportunities, their implementation without have created hacker-themed online communities
consideration for necessary security requirements to promote their malicious activities and tools.
can deter growth and user adoption. Because Many others offer hacking tutorials, news articles,
social networks attract thousands of users who tools, or descriptions of exploitation techniques.
represent potential victims, social-networking Several communities function as marketplaces
sites are desirable targets for mass attackers. to encourage the abuse of stolen credit-card
information and attacks against high-profile
targets, such as banks or e-commerce sites
4.1. Actors and Motivation
(Fig. 4-1). Hacking communities within social-
Several actors and groups target social
networking sites also offer hacking services, often
networks for fun and profit. Malicious actors may
for profit.
adopt several categories of attacks and tools to
target social-network users; the following are a The majority of attackers’ profiles on social
few examples: networks appear to have been created by unso-
Data Loss
15
A botnet is a group of computers on the Internet that,
although their owners are unaware of it, have been Incidents of data leakage include the loss of
infected and set up to perform malicious activities to other personal, corporate, confidential, or customer
computers on the Internet, including sending spam or
running Distributed Denial of Service (DDoS) attacks. Any information, inappropriate public statements
such computer is referred to as a “zombie,” a “robot” or
“bot.” 16
http://en.wikipedia.org/wiki/Gold_farming
Anchises M. G. de Paula 75
about companies, the use of corporate resources of harm, including harassment and humiliation.
for personal purposes, and harassment of or Like offline bullying, cyber-bullying can lead to
inappropriate behavior toward a customer or depression, anxiety, and low self-esteem.
fellow employee. Social-networking sites are
Hate speech is a specific type of online content
another platform through which data leakage designed to threaten certain groups publicly
may occur, and such incidents have a broader and act as propaganda for offline organizations.
impact on corporate reputations. These hate groups use websites to propagate,
Many companies are currently focused share ideology, recruit new converts, link to
on preventing the loss of confidential and similar sites, advocate violence, and threaten
proprietary information and its access by others. Offline groups use online techniques
unauthorized outsiders. Most data-loss to accomplish their goals and improve
incidents occur through e-mail or file transfers, communication. Law-enforcement organizations
but instant-messaging chat tools, blog posts, are also concerned that a small number of
Twitter messages, and online resume content youths converted online may begin to use social
published on social networking sites may also networks to promote offline hate crimes.
disclose proprietary company information.
The FOAF project provides a machine-readable Second Life currently contains a radical ter-
Semantic Web format specification describing rorist group called the “Second Life Liberation
the links between people. In the absence of Army”18 that has been responsible for computer-
such sources of information, social connections coded atomic bombings of virtual-world stores
can also be inferred by mining Web content using Second Life weapons and armories. Previ-
and links. Worms that incorporated Semantic ous Second Life attacks include the explosion
Web attributes could easily identify connection of the Australian Broadcasting Commission’s
among users and quickly spread across social (ABC) island, attacks on Reebok and American
graphs. Apparel stores, and storming the stage at the
January 2007 virtual meeting of the World Eco-
nomic Forum.
Terrorism Using Social Networks and Online
Communities
Terrorist organizations have begun to use Social-Network Forensics
social networks and virtual worlds in their daily The rising use of social-networking sites
activities. Terrorists may use virtual worlds to and Web 2.0 technologies by cyber-criminals
create exact replicas of targets for the planning demands specific criminal investigation tool
and simulation of attacks, eliminating the need to and procedures by law-enforcement agencies.
travel to the target to carry out reconnaissance. Effective forensic investigation of social-
Instead of sending potential jihadists to train networking threats requires evidence gathered
in military camps in Pakistan, Afghanistan, from social-networking sites and the use of
and Southeast Asia, organizations such as al- technologies that track activities, identify
Qaeda and Jemaah Islamiah could operate perpetrators, and specify the timing of online
online training camps in virtual worlds to evade criminality. Social-network forensics is a set of
detection and avoid prosecution. Second Life specific investigation skills applied to the social-
could easily become a terrorist classroom. networking universe.
Social networks and online communities Information-security professionals must de-
also help terrorists recruit new members and velop specific tools and techniques to detect
may serve as meeting places for the discussion
of plans. Once these groups and communities 18
http://secondlla.googlepages.com
78 Security Aspects and Future Trends of Social Networks
and investigate malicious activities on social net- References
works, and to ensure that information has been
properly secured and examined and that all evi- [1] Website “What is Social Networking”. Available at: http://www.
whatissocialnetworking.com.
dence has been recovered. Information discov- [2] Source: http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html.
ery requires the ability to search for information [3] The Daedalus Project, “WoW Gender-Bending”. Available at:
http://www.nickyee.com/daedalus/archives/001369.php.
as soon as it is created or distributed by a user. [4] WikiPedia, http://en.wikipedia.org/wiki/Six_degrees_of_
It also demands the ability to measure search separation.
[5] http://www.thenetworkthinker.com.
quality, dynamically classify search results, and [6] WikiPedia, http://en.wikipedia.org/wiki/Dunbar’s_number
properly visualize data according to numerous [7] “Leveraging Social data with Semantics”. Available at: http://www.
w3.org/2008/09/msnws/papers/ereteo_et_al_2008_leveraging.
criteria and within numerous contexts.
html.
[8] http://www.oxyweb.co.uk/blog/socialnetworkmapoftheworld.php.
A new social-networking forensic framework [9] Reuters, “Sexting: The new, dangerous trend among teens.” IBN
must focus on the analysis of online actors Live. May 04, 2009. Available at: http://ibnlive.in.com/news/
sexting-the-new-dangerous-trend-among-teens/91732-19.html.
(profiles) and their activities. It must incorporate
[10] http://blogs.zdnet.com/social/?p=97.
the investigation of suspects’ or victims’ online [11] T. P. Anglade, O. Pekelman, L Montagne. “The Social Web: Small
relationships (past and present), participation Businesses / Big Solutions.” Nov. 20, 2008. Available at : http://
www.w3.org/2008/09/msnws/papers/af83.pdf.
in online communities, and usage patterns on [12] JD Lasica, “Toward a Facebook bill of rights.” SocialMedia.biz. Feb.
social-networking sites, and the forensic analysis 27, 2009. Available at: http://www.socialmedia.biz/2009/02/27/
toward-a-facebook-bill-of-rights.
of intra-social-networking applications [20]. [13] WikiPedia, http://en.wikipedia.org/wiki/Virtual_economy.
[14] http://blog.secondlife.com/2006/11/07/important-free-money-
hack-dont-fall-for-it.
5. Conclusion [15] E. Athanasopoulos, A. Makridakis, D. Antoniades S. Antonatos,
S. Ioannidis, K. G. Anagnostakis, and E. P. Markatos, “Antisocial
Networks: Turning a Social Network into a Botnet”, 2008. Available
at: http://blogs.zdnet.com/security/images/facebotisc08.pdf.
Social networks are growing rapidly and [16] R. Naraine, “PlayStation Home virtual world hacked”, ZDNET. Dec.
incorporate functionality far beyond the initial 22, 2008. Available at: http://blogs.zdnet.com/security/?p=2330.
[17] D. Danchev, “Four XSS flaws hit Facebook”, ZDNET. Dec. 15,
“list of friends” concept. Users wish to express 2008. Available at: http://blogs.zdnet.com/security/?p=2308
their identities and share information in [18] R. Thompson, “Hacked Facebook applications reach out to exploit
sites in Russia”, AVG Blogs, Oct. 14, 2009. http://thompson.blog.
restricted virtual communities. Social networks avg.com/2009/10/hacked-facebook-applications-reach-out-to-
are driving the evolution of the Internet from exploit-sites-in-russia.html.
[19] theharmonyguy, “FAQs on FAXX and the ‘Month of Facebook
a flat Web model toward a number of socially Bugs’”, theharmonyguy blog, Sep. 3, 2009. http://theharmonyguy.
interconnected, user-centric websites. The “way com/2009/09/03/faqs-on-faxx-and-the-month-of-facebook-bugs.
[20] J. Bryner, “Facebook Forensics”, SANS, June 11, 2009. Available
of communicating” online has evolved from at: https://blogs.sans.org/computer-forensics/2009/06/11/facebook-
point-to-point message exchanges between forensics.
isolated users to group-oriented activities.
Social-networking sites must recognize this
basic aspect of human social interaction and find
strong and intuitive methods for implementing
it on a software level, while providing the
necessary levels of protection, privacy, and
trust. Hacking groups continue to attack social
networks, spreading key loggers, Trojan horses,
and other malicious applications.
Governments and intelligence agencies must
adopt new paradigms and technologies to use
and manipulate the amount of information and
interaction in a social Web.
Harwinder Singh and Maninder Singh 79
Anchises M. G. de Paula works as International Cyber Intelligence Analyst at iDefense, a VeriSign company. He has
more than 15 years of experience in the computer security industry, having worked as a Security Officer for Brazilian
telecom companies and a Security Consultant for local resellers and consulting firms. He earned a bachelor’s degree in
Computer Science from the Universidade de São Paulo (USP) and a master’s degree in Marketing from the Escola Superior de
Propaganda e Marketing (ESPM). He is CISSP-, GIAC- (Cutting Edge Hacking Techniques) and ITIL-Foundations certified.
As an active member of the Brazilian information-security community, Anchises served as President of the Brazilian chapter
of the International Systems Security Association (ISSA) in 2008-2009 and Director of the Brazilian chapter of the Cloud
Security Alliance (CSA) in 2010-2011.