Facebook’s psychological experiments and Edward Snowden’s NSA leaks epitomize a world of increasing information awareness in the social media ecosystem. With over a billion monthly active users, Facebook as a nation is overtaking China as the largest country in the world.
President Barack Obama, in his 2011 State of the Union Address, called America “the nation of Edison and the Wright brothers” and “of Google and Facebook.” U.S. Chief Information Officer Steven VanRoekel opines that America has become a “Facebook nation” that demands increased transparency and interactivity from the federal government.
Ubiquitous social networks such as Facebook, Google+, Twitter, and YouTube are creating the technologies, infrastructures, and big data necessary for Total Information Awareness – a controversial surveillance program proposed by DARPA after the 9/11 attacks. NSA’s secret PRISM program has reinvigorated WikiLeaks founder Julian Assange’s accusation that “Facebook is the most appalling spying machine that has ever been invented.” Facebook CEO Mark Zuckerberg once said, “We exist at the intersection of technology and social issues.” This book offers discourse and practical advice on the privacy issue in the age of big data, business intelligence in social media, e-government and e-activism, as well as personal total information awareness.
This expanded edition also includes insights from Wikipedian Emily Temple-Wood and Facebook ROI experts Dennis Yu and Alex Houg.
1. vii
Contents
Part I Prologue
1 From 1984 to Total Information Awareness ......................................... 3
1.1 President Ronald Reagan in 1984 .................................................. 3
1.2 Total Information Awareness ......................................................... 6
1.3 Edward Snowden’s NSA Leaks and PRISM.................................. 9
1.4 Social Networks’ Responses to NSA Leaks and PRISM............... 12
1.5 Reform Government Surveillance and Reset the Net .................... 14
References................................................................................................. 16
Part II Privacy in The Age of Big Data
2 Social Networks and Privacy ................................................................. 23
2.1 Zero Privacy and the Central Intelligence Agency......................... 24
2.2 The Archer, Carrier Pigeons, and President Jimmy Carter............ 24
2.3 The Pervasiveness of Facebook...................................................... 26
2.4 Chairs Are Like Facebook.............................................................. 27
2.5 Facebook and Personal Privacy...................................................... 28
2.6 Facebook Friends and Personal Privacy......................................... 31
2.7 Facebook, Children, and COPPA................................................... 32
2.8 Facebook, Peer Pressure, and Social Issues................................... 34
2.9 Reality TV and Social Media......................................................... 36
2.10 YouTube and Facebook Videos: Am I Pretty or Ugly?.................. 37
2.11 Netflix and Social Apps on Facebook............................................ 39
2.12 Facebook Timeline and Open Graph.............................................. 40
2.13 Ambient Social Apps ..................................................................... 41
2.14 Stalking Apps and Facebook for Sex............................................. 43
2.15 Facial Recognition Apps................................................................ 44
2.16 Facial Recognition on Facebook, Google+, and iPhone................ 45
2.17 Virtual Passports: from Privacy to Data Use.................................. 48
2. viii
2.18 Social Search: Google, plus Your World & Microsoft’s Bing ....... 49
2.19 Self-Destructing Messages............................................................. 51
2.20 Facebook Anonymous Login ......................................................... 52
2.21 Anonymous Social Apps................................................................ 53
2.22 Responses to Zero Privacy ............................................................. 55
References................................................................................................. 56
3 Smartphones and Privacy ...................................................................... 71
3.1 Smartphones................................................................................... 71
3.2 Location Tracking on iPhone and iPad .......................................... 72
3.3 Carrier IQ ....................................................................................... 73
3.4 Smartphone Data Collection Transparency.................................... 74
3.5 Always On...................................................................................... 75
3.6 Mobile Apps Privacy Invasion ....................................................... 76
3.7 Mobile Apps for Children.............................................................. 77
3.8 Android Market and Google Play .................................................. 78
3.9 Apple’s App Store.......................................................................... 79
3.10 Facebook App Center..................................................................... 80
References................................................................................................. 80
4 Privacy Breaches..................................................................................... 85
4.1 Google Street View ........................................................................ 85
4.2 Google Easter Eggs in Disguise..................................................... 87
4.3 Apple Software Bugs ..................................................................... 89
4.4 Facebook User Tracking Bug and Online Behavioral Tracking .... 90
4.5 Carrier IQ and Other Privacy Blunders.......................................... 91
References................................................................................................. 93
Part III Business Intelligence in Social Media
5 Business Intelligence............................................................................... 97
5.1 Intelligent Digital Billboards.......................................................... 97
5.2 Data Mining: Amazon.com, Lowe’s, Target, True&Co................. 98
5.3 Tumblr and Gmail: Yes to Advertisements.................................... 99
5.4 Social Ads on Facebook................................................................. 100
5.5 News Feed, Sponsored Stories, Custom Stories,
and Facebook Exchange................................................................. 102
5.6 Mobile Market 2011-Present: Facebook for Every Phone............. 103
5.7 Mobile Market 2012-Present: Instagram and Mobile
App Install Ads .............................................................................. 104
5.8 Mobile Market 2013-Present: Facebook Home and Parse............. 105
5.9 Mobile Market 2014-Present: WhatsApp
and Facebook Audience Network .................................................. 105
5.10 Location-based Mobile Advertisements ........................................ 107
5.11 Business Communications on Facebook........................................ 108
5.12 B2B, B2C, and H2H on Social Media ........................................... 109
References................................................................................................. 110
Contents
3. ix
6 Facebook Analytics, Advertising, and Marketing ............................... 117
Dennis Yu and Alex Houg
6.1 The Viral Cycle .............................................................................. 117
6.2 Metrics Analysis Action (MAA).................................................... 118
6.3 Everything You Need to Know about
Website Custom Audiences (WCA)............................................... 120
6.4 Ten Questions Any Facebook Marketing Consultant
should be Able to Answer.............................................................. 121
6.5 The Insider’s Guide to Facebook Traffic........................................ 123
6.6 Using Exclusion Targeting to Filter Out Unwanted Targets .......... 125
6.7 Guess Where Users are Spending More
Time — TV or Mobile/Web?......................................................... 126
6.8 The Mechanics of Facebook Ad Budgeting................................... 128
6.9 How Spending a Few Dollars on Facebook
can Turn You into an Influencer..................................................... 132
6.10 The Danger of Buying Facebook Fans........................................... 133
6.11 How to Tell if Your Ad is Working and Diagnose
Newsfeed Burnout.......................................................................... 135
References................................................................................................. 136
7 Consumer Privacy in the Age of Big Data............................................ 139
7.1 Oil of the Digital Age..................................................................... 139
7.2 Data Brokers: The Good, the Bad and the Ugly ............................ 140
7.3 Consumer Privacy Bill of Rights.................................................... 141
7.4 Federal Trade Commission Privacy Report ................................... 143
7.5 California Online Privacy Protection Act ...................................... 144
7.6 European Union’s “Right to be Forgotten” Law............................ 144
References................................................................................................. 146
Part IV The Rise of Facebook Nation
8 Twitter – a World of Immediacy............................................................ 151
8.1 The Pen is Mightier than the Sword............................................... 151
8.2 Citizen Journalists.......................................................................... 153
8.3 A World of Immediacy................................................................... 155
8.4 Prevalence of Twitter...................................................................... 156
8.5 Advertisements and Campaigns on Twitter ................................... 161
8.6 Cuban Twitter: ZunZuneo.............................................................. 162
8.7 Creative Uses of Twitter................................................................. 163
8.8 The Downside of Twitter................................................................ 164
References................................................................................................. 165
9 Misinformation and Disinformation ..................................................... 169
9.1 The War of the Worlds ................................................................... 169
9.2 Misinformation and Disinformation on Twitter and Facebook...... 170
9.3 Ramifications and Repercussions of Misinformation
and Disinformation......................................................................... 173
Contents
4. x
9.4 Trustworthiness of Wikipedia ........................................................ 175
9.5 Google Search Sabotage ................................................................ 177
9.6 Advertising Misinformation and Disinformation........................... 179
9.7 Authenticity of Facebook Profiles, Twitter Accounts,
and YouTube Videos ...................................................................... 180
9.8 Facebook Account Verification...................................................... 181
9.9 Twitter Verified Accounts............................................................... 182
9.10 Abuse of Power .............................................................................. 183
References................................................................................................. 184
10 Wikipedia and the New Web ................................................................. 189
Emily Temple-Wood
10.1 History of Wikipedia.................................................................... 189
10.2 Standard of Quality ...................................................................... 190
10.3 Learning Curve............................................................................. 192
10.4 Wikipedia as Major News Source................................................ 193
10.5 Wikipedians.................................................................................. 193
10.6 Acceptance of Wikipedia ............................................................. 195
10.7 Wikipedia Education Program ..................................................... 195
10.8 Systemic Bias and WikiProject Women Scientists ...................... 196
10.9 Native Language Wikipedias ....................................................... 197
10.10 Wikipedia Zero............................................................................. 197
References................................................................................................. 198
11 E-Government and E-Activism.............................................................. 201
11.1 President Barack Obama and Web 2.0......................................... 201
11.2 Gov 2.0 Apps ............................................................................... 205
11.3 The Kony 2012 Phenomenon....................................................... 208
11.4 Reactions to Kony 2012 ............................................................... 212
11.5 SOPA/PIPA Blackout Day ........................................................... 213
11.6 Reactions to SOPA/PIPA Blackout .............................................. 219
11.7 Battles over Internet Legislations – OPEN, ACTA, CISPA......... 220
11.8 Peace on Facebook and Facebook Donate................................... 221
11.9 Internet Activism and Occupy Democracy .................................. 223
11.10 Transnational (Arab-Israeli) Facebook Nation............................. 225
11.11 Internet Censorship in Western Democracies .............................. 226
11.12 Internet Censorship in China........................................................ 228
11.13 Arab Spring Uprisings, Egypt, Syria, Sandi Arabia,
and Turkey.................................................................................... 229
11.14 The Rise of Facebook Nation....................................................... 230
11.15 Electoral College, Social Network Constitution,
and Cyber Civil Rights................................................................. 232
References................................................................................................. 234
Contents
5. xi
Part V Total Information Awareness in Facebook Nation
12 Generation C in the Age of Big Data..................................................... 247
12.1 Digital Omnivores and Generation C........................................... 247
12.2 Big Data Research and Development Initiative ........................... 249
12.3 Big Data in Public Health and Economics................................... 249
12.4 Big Data in Facebook and Google ............................................... 250
References................................................................................................. 252
13 Living in Facebook Nation ..................................................................... 255
13.1 Digital Personalities and Identities............................................... 255
13.2 Intertwining Lives, Online and Offline ........................................ 256
13.3 Digital Footprint and Exhaust Data.............................................. 260
13.4 Social Media Regrets ................................................................... 261
13.5 Facebook Social Plug-in: Like..................................................... 263
13.6 Facebook Knows Who, When, and Where .................................. 265
13.7 Online Births and Deaths in Facebook Nation............................. 266
13.8 Memorialization on Facebook and Life after Death
on Social Networks ...................................................................... 267
13.9 The Facebook Cleanse or Face-to-Facebook ............................... 268
13.10 Connected Cars: In-vehicle Social Networks
and eXpressive Internet Architecture........................................... 269
13.11 Connected Home, Internet of Things, and Internet of Me........... 271
13.12 Internet Addiction and Digital Detox........................................... 272
References................................................................................................. 273
14 Personal Privacy and Information Management................................. 279
14.1 Personal Information for Sale ...................................................... 279
14.2 Personal Information at Risk........................................................ 281
14.3 Identity Theft Prevention ............................................................. 284
14.4 Password Protection..................................................................... 285
14.5 Password Security Questions ....................................................... 287
14.6 Privacy Protection ........................................................................ 288
14.7 Privacy on Facebook .................................................................... 289
14.8 Privacy on Google........................................................................ 291
14.9 Privacy on Smartphones............................................................... 293
14.10 Data Vault – Data is the New Oil................................................. 296
14.11 Personal Analytics and Social Networks ..................................... 297
14.12 Community Analytics and Social Networks................................ 298
References................................................................................................. 299
15 Personal Total Information Awareness ................................................. 305
15.1 Humanity’s Dashboard................................................................. 305
15.2 Ambient Awareness and Suicide Prevention................................ 307
15.3 Parental Awareness, School Bullying, and Cyberbullying........... 309
15.4 Student Awareness and School Safety ......................................... 313
Contents
6. xii
15.5 Crime Awareness and Video Surveillance ................................... 319
15.6 Community Awareness and Neighborhood Watch ...................... 321
15.7 Situational Awareness and Traffic Safety..................................... 324
15.8 Location Awareness and Personal Safety..................................... 325
15.9 Information Awareness and Law Enforcement............................ 327
15.10 Self-Awareness and Online Dating .............................................. 329
15.11 Pandora’s Box of Total Information Awareness........................... 333
References................................................................................................. 335
Part VI Epilogue
16 From Total Information Awareness to 1984 ......................................... 349
16.1 Brave New World of Total Information Awareness ....................... 349
16.2 George Orwell’s 1984 .................................................................... 353
16.3 Aldous Huxley’s Brave New World............................................... 355
16.4 Point of No Return and Internet.org: “Every one of us.
Everywhere. Connected.”............................................................... 356
16.5 Privacy and E-Activism: Mesh Networks
and Peer-to-Peer Social Networks.................................................. 357
16.6 Facebook Questions ....................................................................... 358
16.7 Two-Way Street of Total Information Awareness .......................... 359
References................................................................................................. 361
Appendix A: Facebook Timeline (October 2003 – August 2014)................ 367
2003................................................................................................................... 367
2004................................................................................................................... 367
2005................................................................................................................... 368
2006................................................................................................................... 369
2007................................................................................................................... 370
2008................................................................................................................... 370
2009................................................................................................................... 371
2010................................................................................................................... 372
2011................................................................................................................... 373
2012................................................................................................................... 375
2013................................................................................................................... 376
2014................................................................................................................... 378
Appendix B: Facebook’s Two-Year Historical Stock Prices
(May 18, 2012 – May 18, 2014) ...................................................................... 381
Index................................................................................................................. 383
Contents
9. 24
2.1 Zero Privacy and the Central Intelligence Agency
On May 7, 2013, the Central Intelligence Agency (CIA) selected undercover officer
Frank Archibald as the new head of its National Clandestine Service and kept his
identity secret while he remained undercover as the agency chief in Latin America.
However, within 24 hours, his name was outed onTwitter by Columbia University
journalism professor John Dinges (1) who successfully pieced together publicly
available information: The Washington Post described the new head as “a longtime
officer who served tours in Pakistan and Africa and was recently in charge of the
agency’s Latin America division, according to public records and former officials.”
The Associated Press added that he “once ran the covert action that helped remove
Serbian President Slobodan Milosevic from power” (2). Prof. Dinges said in a tele-
phone interview with Mashable, “It was pretty obvious who he was. It took me
about five minutes to find out. It wasn’t secret, nobody leaked it; it was not a big
secret” (3).
On May 9, 2013, 48 hours after the CIA appointment, one website used Intelius
to find Archibal’s address, date of birth, and names of relatives. The site also posted
online photos of his house taken from Google Maps and Google Street View (4).
Half a year earlier in November 2012, CIA director David Petraeus resigned as
head of the spy agency after the FBI uncovered his private emails that confirmed his
secret extramarital affair with his biographer Paula Broadwell. CNN’s John D.
Sutter asked, “When the CIA director cannot hide his activities online, what hope is
there for the rest of us?” (5).
Way back in January 1999, Scott McNealy, co-founder and CEO of Sun
Microsystems for 22 years, told a group of reporters and analysts: “You have zero
privacy anyway. Get over it” (6). A decade later in December 2009, Google’s then-
CEO Eric Schmidt said, “If you have something that you don’t want anyone to
know, maybe you shouldn’t be doing it in the first place” (7). In defense of the NSA
surveillance programs, President Barack Obama said in June 2013, “It’s important
to recognize that you can’t have 100% security and also then have 100% privacy and
zero inconvenience” (8).
2.2 The Archer, Carrier Pigeons, and President Jimmy Carter
A college friend of my wife, in his twenties, graduated from a well-known univer-
sity with a Master’s degree in computer science. Instead of looking for a well-paying
job, he prefers to spend most of his time living in the remote countryside without a
cell phone or Internet connection. He is a skilled archer who hunts for food in the
forest. He is also a self-proclaimed magician (think Tim Kring’s Heroes, not David
Copperfield). He enjoys a life of solitude and privacy. Nevertheless, even an eccen-
tric person like him cannot completely escape the temptation of social networks.
He has a Facebook profile with a small handful of photos of himself and his hand-
made enchanted objects. He updates his Facebook page rarely, but when he does, his
2 Social Networks and Privacy