Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks

IIIT Hyderabad
IIIT Hyderabad IIIT Hyderabad
Call Me MayBe:
Understanding Nature and Risks of
Sharing Mobile Numbers on Online Social
Networks
Prachi Jain
M.Tech. Thesis Defense
14th November 2013
Committee:
Dr. Ponnurangam Kumaraguru, IIIT-Delhi (Chair)
Dr. Alessandra Sala, Alcatel Lucent (Bell Labs), Dublin
Dr. Amarjeet Singh, IIIT-Delhi
Problem Statement
 Characterize mobile number sharing behavior on
Online Social Networks.
 Examine risk of collation of mobile number’s
owner data from multiple online public data
sources.
 Propose a systematic approach for risk
communication.
2
Achievements
 Paper:
Call Me MayBe: Understanding Nature
and Risks of Sharing Mobile Numbers on
Online Social Networks, Conference
on Online Social Networks (COSN) 2013

 Poster:
Flash of Two Worlds, Security and
Privacy Symposium (SPS) 2013
3
Achievements

4
5
Research
motivation
Research Motivation
 46% of Internet users post original (self created)
content on internet.
 User Generated Content (UGC) has high similarity with
offline interactions of user.
 Concerns on (un)intentional mention of sensitive
information on OSN profile.
 Mobile phone number is an example of identifiable
information with which a real-world entity can be
associated uniquely, in most cases.
7
How many of you have posted
mobile numbers on Online Social
Networks?

How many of you have seen
mobile numbers being posted on
Online Social Networks?
8
Sample posts

9
Sample posts

10
Sample posts

11
Sample posts

12
Is it a good idea?
Characterize mobile number
sharing behavior on Online
Social Networks
 Focus on Indian Mobile Numbers

“India has the fastest growing telecom
market in the world.“

 Focus on two most popular social
networks – Facebook & Twitter
14
Background
Twitter 101
Name
Screen name

User description
Whom I
follow

Who
follow me

Tweet

Retweet = Tweet exposed
16
to new audience
Facebook 101
Name

People I am
friends with
User attributes

Public !
Post

17
Personally Identifiable Information
(PII)
An attribute that itself or in combination of other
attributes can connect an online user account
with a real world entity.
 Email address (Balduzzi et al, 2010)
 Phone numbers (Magno et al, 2012; Jain et al, 2013)

18
Indian Mobile Number format
 10 digit number, start with 7 / 8 / 9
 Country code: +91 ( Example: +91 9123456789 )
 Trunk Code: 0 ( Example: 0 9123456789 )

No standard

way of sharing mobile numbers on OSN!

+91- 9123456789

91.91.23.456.789

+91- 91-2345-6789 (91)23.456.789

0 9123456789
(91234)56789
19
Literature
Review
Literature review
 Identity information disclosure on OSNs.

 Consequences of identity information disclosure on
OSNs.
 Communicating the risk of identity information
disclosure.

21
1. Identity information disclosure
on OSNs
Zheleva et al, 2009

Group membership

Balduzzi et al, 2010

Email address

Burger et al, 2011

Gender

Dey et al, 2012

Age

Magno et al, 2012;
Chen et al, 2012;
Jain et al, 2013

Phone numbers

No quantitative study on mobile numbers sharing
behavior on OSN.
22
1. Identity information disclosure
on OSNs
Chen et al, 2012
Observed 2% Facebook users (in their dataset) share
their mobile number as a profile attribute.

Magno et al, 2012
Observed users share their mobile number as profile

attribute on Google+
Single Indian males share most mobile numbers
We dive deeper to understand characteristics of exposed
mobile numbers on Facebook and Twitter posts and user
descriptions.

23
2. Consequences of identity
information disclosure on OSNs
Jagatic et al, 2007
Social phishing

Chen et al, 2012 Mao et al, 2011
Linkage attack

Privacy attack

Krishnamurthy et al, 2012
Auxiliary information collected from online sources might help in
connecting an online profile with an offline entity.

We explore if Indian mobile numbers leaked from OSNs
can be used to gain a wider profile by linking it with
e-government data and truecaller.
24
2. Consequences of identity
information disclosure on OSNs
Schrittwieser et al, 2012
Mobile numbers can be used
to exploit smart phone
messaging services.
Address book resolution
Impersonation, SMS spam,
Phone number enumeration
attack, Status message forgery

attack

Cheng et al, 2013
Address book resolution
Randomly picked mobile

numbers used to integrate
accounts on WeChat and
MiTalk.

Aggregate information
about users in China.
25
2. Consequences of identity
information disclosure on OSNs

We link exposed Indian mobile numbers on
Facebook and Twitter profile with their
WhatsApp profiles.

We study comprehensiveness of additional
information obtained.
26
3. Communicating the risk of
identity information disclosure
Krishnamurthy et al, 2012
Privacy leaks could be prevented by alerting the users

about information sharing vulnerabilities.

We communicate the risk to a set of users by calling them
with the help of an IVR system.
We also study their reactions.
27
Methodology
Approach
Keyword Selection
Data Extraction / Collection
Data Validation
29
System architecture
Facebook
Graph
API

Public users /
posts
with mobile
numbers

Category
+91

Regex
patterns

Category 0
Category
void

call ring

Mobile
number
validation

Keyword
Selection

contact

Indian
Mobile
Number
Database

Category
void

Twitter
Stream
API

Keyword selection

Public Bio/Tweets
with mobile
numbers

Regex
patterns

Category 0
Category
+91

Data collection

Data validation

30
System architecture
Facebook
Graph
API

Public users /
posts
with mobile
numbers

Category
+91

Regex
patterns

Category 0
Category
void

call ring

Mobile
number
validation

Keyword
Selection

contact

Indian
Mobile
Number
Database

Category
void

Twitter
Stream
API

Keyword selection

Public Bio/Tweets
with mobile
numbers

Regex
patterns

Category 0
Category
+91

Data collection

Data validation

31
Data statistics
Twitter:

12th October 2012 – 20th October 2013

Facebook:

16th November 2012 – 20th April 2013

Numbers

Category +91

Category 0

Category void

Twitter Facebook Twitter Facebook Twitter
Mobile
885
Numbers

2,191

User
profiles

2,663

1,074

100%

14,909 8,873
85%

17,913 9,028

Total

Facebook Twitter Facebook

25,566 25,294

41,360 36,358

85%

31,149 25,406

49,817 36,588

32
Analysis
Ownership
Analysis
Ownership analysis: Methodology
Owner posted
the number

Post

Has 1st
person
pronoun

Frequent
action
words

Bio /
Name

Y

Y
Has 2nd / 3rd
person
pronoun

N

Phrasal
search

Y
Non-owner posted
the number

35
Ownership Analysis: Results
Social Network Mechanism

Mobile
Numbers

Total

Twitter:
Owner

Bio

155

291/885 (33%)

Tweet

136

Non-owner

Tweet

18

18/885 (0.02%)

Facebook:
Owner

Post

468

485/2191 (22%)

Name

17

Non-owner

Message

25

25/2191
(0.01%)

Users share their own mobile numbers on OSNs!
36
Source Analysis
Source analysis: Results
Which applications are used
Which applications are used
to share mobile numbers on
to share mobile numbers on
Twitter?
Facebook?
32% numbers on Twitter
were pushed from
Facebook

5%

Facebook
mobile
Facebook for
iPhones
Photos

1%

Facebook
11%

32%

Twitterfeed

12%
8%

Google
26%

LinkedIn
26%

TweetDeck

14%

50%
15%

Facebook for
Android
HootSuite
Twitterfeed

Users posted same mobile numbers on multiple OSNs !

38
Topographical
Analysis
Topographical analysis:
Methodology
Indian Mobile number

XXXX - NNNNNN
Network operator

Subscriber number

Telecom Zone/Circle
Metro

(High density)

A Circle

(Largest
population coverage)

B Circle

C Circle

(Smallest
population coverage)

(Source: http://www.trai.gov.in)
40
Topographical analysis: Results
Telecom Circle

Category

# of Mobile Numbers

Delhi

Metropolitan 582

Mumbai

Metropolitan 312

Karnataka

“A” Circle

233

Punjab

“B” Circle

226

Rajasthan

“B” Circle

171

Andhra Pradesh

“A” Circle

164

Kerala

“B” Circle

158

Maharashtra

“A” Circle

140

Gujarat

“A” Circle

135

Tamil Nadu

“A” Circle

102

Users of metropolitan cities in India actively posted mobile
numbers on OSNs !

41
Gender Analysis
Gender analysis: Results
Cross Syndication

Facebook Twitter
Total users
Gender available (G)

2,663
1,438

1,074
29

Females (F)
Males (M)
F/G

220
1,218
15%

6
23
20%

Females are conservative while
sharing mobile numbers on OSNs !

43
Context Analysis
Context Analysis: Results
Twitter Tag Cloud

Facebook Tag Cloud

Emergency,
marketing, escort
and entertainment
business are major
context on OSNs !
45
Risk
Assessment
Risk of Collation: Experiment 1
Methodology
Mobile
Number

Penetration rate:

Store in Phone
Address Book
Install and
open
WhatsApp

Status

userexposed
prate =
usertotal
= 1,071 / 3,076
= 34.8 %

Last Seen
time
47
Risk of Collation: Experiment 1
Sample Status

48
Risk of Collation: Experiment 2
OCEAN:
Open
Government
Data
Repository

Details

User 1

User 2

Mobile
Number

+9198xxxx5485

+9199xxxx2708

Full Name

xxxxxx Jeswani

x Gambhir

Age

53

23

Gender

Male

Father’s
Name

x x Jeswani

Address

***, Mig Flats, *-block,
xxxxx Vihar Phase-I

8 Delhi
Male
Users
xx Gambhir
Identified
Uniquely
***, xxxx Bagh,
Delhi

ID

Driving License:
DL/04/xxx/222668

Voter ID:
NLNxxx5696

Shared by
Owner?

Yes

No
49
Risk
Communication
Experiment: IVR System Setup

(2,492)
51
Result:
Callee
Decision
Tree

0.35 (867)

Call the
Number
0.65 (1625)

Call not
picked

Call picked

0.61 (988)

Listen
message

Disconnect
the Call
0.48 (479)

0.52 (509)

Listen Options
0.21 (107)
FORM 1

0.39 (637)

Didn’t know
0.23 (47)

Leave
Feedback

Disconnect
the Call

0.20
(102)

0.59 (300)

Posted
purposefully

Disconnect
the Call

0.77 (60)

Disconnect
the Call

1.0 (47)

Disconnect
the Call

52
Feedback
“Thank you for information, I have deleted, I will not
post my number online.”
“I want to know how to remove my number and I don't
know, I haven't put my number purposely but if it is
there, where exactly it is there I would also like to know
that. Please get in touch with me asap. Thank you!”

“It is a very nice process that you are doing and making
people aware about online frauds and telephone
number frauds but your system is basically calling
business houses”
53
Understanding user’s
response: Ownership analysis
Ownership analysis on posts from users who said that
they did not know that their number can be leaked (IVR
option 1)
38.3% (41/107) of mobile numbers were posted
publicly by their owners.
Inability of users to manage their privacy settings.
OR
Inadvertent disclosure of personal information (mobile
number)
54
Evaluation: Interview
Mobile numbers
from profiles on
OSNs

Collating with
e-government
data repository
(OCEAN)

8 users
identified
uniquely
55
Interview questions
Interviewed 8 people whom we uniquely
identified.
To validate the information we had about them.
Inquire if they posted mobile number on OSN.
If yes than why?
If no then we informed them about the profile revealing
their number. And asked if they knew the person.

Will they remove the number and Why?
Feedback?
56
Interview results
# of callee
True positive (Valid information) 5/8
False positive
1/8
Denied to get interviewed
1/8
Did not pick
1/8

57
Interview Response
 Suspected if we got the information via
offline sources.
 Called their service provider to confirm
what bad we can do with this information
about them.

58
Interview Response
Posted mobile number to be in touch with friends
and relatives.
 Expressed concerns of getting calls from
unwanted people.
Posted mobile number to promote a small scale
business.
 Inquired and suggested some countermeasures.

59
Take
Aways
Take Aways
Users share their own mobile numbers on OSNs.
Users post same mobile numbers on multiple OSNs.
Females are conservative while sharing mobile numbers on
OSNs.

A publically shared mobile number can expose sensitive details
(age, ID, family details and full address) of its owner, from
multiple sources.
We should communicate the risks of sharing mobile numbers
online, to their owners.
Few users were unaware of the online presence of their number.
61
Future work
Build a generic technological,
people and process oriented
solutions to forewarn users and
raise awareness towards risks of
exposing mobile numbers on
OSNs.
62
Acknowledgments
Paridhi Jain, PhD student, IIIT Delhi

Siddhartha Asthana, PhD student, IIIT Delhi
Anupama Aggarwal, PhD student, IIIT Delhi
Precog family
63
Publications and poster
Prachi Jain, Paridhi Jain, Ponnurangam
Kumaraguru. Call Me MayBe: Understanding
Nature and Risks of Sharing Mobile Numbers on
Online Social Networks. ACM Conference on Online
Social Networks (COSN) 2013

Prachi Jain, Ponnurangam Kumaraguru. Flash of
Two Worlds. Security and Privacy Symposium (SPS)
2013
64
References
1.

Paul 2010, Broken promises of privacy: Responding to the surprising
failure of anonymization. UCLA Law Review, 57:1701, 2010.

2.

Prachi Jain, Paridhi Jain, and Ponnurangam Kumaraguru. Call me maybe:
understanding the nature and risks of sharing mobile numbers on online
social networks. In Proceedings of the first ACM conference on Online
social networks, pages 101-106. ACM, 2013.

3.

Gabriel Magno, Giovanni Comarela, Diego Saez-Trumper, Meeyoung Cha,
and Virgilio Almeida. New kid on the block: Exploring the google+ social
graph. In Proceedings of the 2012 ACM conference on Internet
measurement conference, pages 159-170. ACM, 2012.

4.

Latanya Sweeney. k-anonymity: A model for protecting privacy.
International Journal of Uncertainty, Fuzziness and Knowledge-Based
Systems, 10(05):557-570, 2002.

5.

Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide
Balzarotti, and Christopher Kruegel. Abusing social networks for
automated user proling. In Recent Advances in Intrusion Detection, pages
422-441. Springer, 2010.
65
References
6.

Ratan Dey, Cong Tang, Keith Ross, and Nitesh Saxena. Estimating age privacy
leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE, pages
2836-2840. IEEE, 2012.

7.

John D Burger, John Henderson, George Kim, and Guido Zarrella.
Discriminating gender on twitter. In Proceedings of the Conference on
Empirical Methods in Natural Language Processing, pages 1301-1309.
Association for Computational Linguistics, 2011.

8.

Tom N Jagatic, Nathaniel A Johnson, Markus Jakobsson, and Filippo Menczer.
Social phishing. Communications of the ACM, 50(10):94-100, 2007.

9.

Terence Chen, Mohamed Ali Kaafar, Arik Friedman, and Roksana Boreli. Is
more always merrier?: a deep dive into online social footprints. In
Proceedings of the 2012 ACM workshop on Workshop on online social
networks, pages 67-72. ACM, 2012.

10. Huina Mao, Xin Shuai, and Apu Kapadia. Loose tweets: an analysis of privacy
leaks on twitter. In Proceedings of the 10th annual ACM workshop on Privacy
in the electronic society, pages 1-12. ACM, 2011.
66
References
11. Sebastian Schrittwieser, Peter Fruhwirt, Peter Kieseberg, Manuel Leithner,
Martin Mulazzani, Markus Huber, and Edgar Weippl. Guess whos texting you?
evaluating the security of smartphone messaging applications. In
Proceedings of the 19th Annual Symposium on Network and Distributed
System Security, 2012.
12. Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, and Dengguo Feng. Bind your
phone number with caution: automated user proling through address book
matching on smartphone. In Proceedings of the 8th ACM SIGSAC symposium
on Information, computer and communications security, pages 335-340.
ACM, 2013.
13. Balachander Krishnamurthy. Privacy and online social networks: Can colorless
green ideas sleep furiously? IEEE Security & Privacy, 11(3):14-20, 2013.
14. Zeynep Tufekci. Can you see me now? audience and disclosure regulation in
online social network sites. Bulletin of Science, Technology & Society,
28(1):20-36, 2008.

67
Thank You!
Questions?
prachi1107@iiitd.ac.in
pk@iiitd.ac.in
For further information, please write to

pk@iiitd.ac.in
precog.iiitd.edu.in
1 of 70

Recommended

Evidence Gathering and Identification of LINE Messenger on Android Device by
Evidence Gathering and Identification of LINE Messenger on Android DeviceEvidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android DeviceIJCSIS Research Publications
36 views5 slides
Examen cisco Maria Alejandra Torres by
Examen cisco Maria Alejandra TorresExamen cisco Maria Alejandra Torres
Examen cisco Maria Alejandra TorresOnce Redes
200 views12 slides
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se... by
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
93 views5 slides
Using Geographical Location as an Authentication Factor to Enhance mCommerce ... by
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...CSCJournals
306 views11 slides
FAKE NEWS DETECTION PPT by
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT VaishaliSrigadhi
26.4K views25 slides
A Study of the Mobile Phone Impact on Under Graduate Students Based on Statis... by
A Study of the Mobile Phone Impact on Under Graduate Students Based on Statis...A Study of the Mobile Phone Impact on Under Graduate Students Based on Statis...
A Study of the Mobile Phone Impact on Under Graduate Students Based on Statis...ijtsrd
47 views5 slides

More Related Content

What's hot

Current trend in internet access and utilization using mobile devices among p... by
Current trend in internet access and utilization using mobile devices among p...Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...Alexander Decker
1.8K views13 slides
IRJET- Detecting Fake News by
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET Journal
92 views3 slides
Seminar Report Mine by
Seminar Report MineSeminar Report Mine
Seminar Report Minesachin narang
2.8K views20 slides
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY by
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYIJNSA Journal
49 views10 slides
Development of Security Detection Model for the Security of Social Blogs and ... by
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...AIRCC Publishing Corporation
13 views11 slides

Viewers also liked

Truecaller - Take The Right Call by
Truecaller - Take The Right CallTruecaller - Take The Right Call
Truecaller - Take The Right CallIdris Bhavnagarwala
3.5K views8 slides
Product Analytics at Truecaller by
Product Analytics at TruecallerProduct Analytics at Truecaller
Product Analytics at TruecallerTruecaller
2.2K views36 slides
How Qatar uses WhatsApp, Snapchat and other social media by
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaMOTC Qatar
20.8K views32 slides
Big Data Platform at Pinterest by
Big Data Platform at PinterestBig Data Platform at Pinterest
Big Data Platform at PinterestQubole
22.1K views27 slides
Whatsapp by
WhatsappWhatsapp
WhatsappSean Rodrigues
16.5K views38 slides
Whatsapp project work by
Whatsapp project workWhatsapp project work
Whatsapp project workVirginia Sgargi
29.3K views16 slides

Viewers also liked(8)

Product Analytics at Truecaller by Truecaller
Product Analytics at TruecallerProduct Analytics at Truecaller
Product Analytics at Truecaller
Truecaller2.2K views
How Qatar uses WhatsApp, Snapchat and other social media by MOTC Qatar
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social media
MOTC Qatar20.8K views
Big Data Platform at Pinterest by Qubole
Big Data Platform at PinterestBig Data Platform at Pinterest
Big Data Platform at Pinterest
Qubole22.1K views
Project report on 'customer satisfaction towards whatsapp' by Chirag Patel
Project report on 'customer satisfaction towards whatsapp'Project report on 'customer satisfaction towards whatsapp'
Project report on 'customer satisfaction towards whatsapp'
Chirag Patel107.7K views

Similar to Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni... by
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
52 views3 slides
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On... by
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...IIIT Hyderabad
1.5K views35 slides
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ... by
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
41 views3 slides
Measuring human behaviour by sensing everyday mobile interactions by
Measuring human behaviour by sensing everyday mobile interactionsMeasuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactionsOresti Banos
95 views36 slides
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION by
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONNana Kwame(Emeritus) Gyamfi
110 views6 slides
Smartphone Forensic Investigation Process Model by
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelCSCJournals
610 views20 slides

Similar to Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks(20)

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni... by IRJET Journal
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal52 views
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On... by IIIT Hyderabad
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...
IIIT Hyderabad 1.5K views
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ... by Eswar Publications
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Measuring human behaviour by sensing everyday mobile interactions by Oresti Banos
Measuring human behaviour by sensing everyday mobile interactionsMeasuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactions
Oresti Banos95 views
Smartphone Forensic Investigation Process Model by CSCJournals
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
CSCJournals610 views
Smartphone Forensic Challenges by CSCJournals
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
CSCJournals60 views
Personality Prediction with social media using Machine Learning by IRJET Journal
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine Learning
IRJET Journal1 view
Personality Prediction with social media using Machine Learning by IRJET Journal
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine Learning
IRJET Journal17 views
State of Social Media in India | August 2013 by Nabeel Adeni
State of Social Media in India | August 2013State of Social Media in India | August 2013
State of Social Media in India | August 2013
Nabeel Adeni1.5K views
A study of cyberbullying detection using Deep Learning and Machine Learning T... by IRJET Journal
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal19 views
A study of cyberbullying detection using Deep Learning and Machine Learning T... by IRJET Journal
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal28 views
Challenges And Challenges Of Global Market As Indonesia by Robin Anderson
Challenges And Challenges Of Global Market As IndonesiaChallenges And Challenges Of Global Market As Indonesia
Challenges And Challenges Of Global Market As Indonesia
Robin Anderson4 views
Utilizing Social Networks for User Model Priming: User Attitudes by Adam Moore
Utilizing Social Networks for User Model Priming: User AttitudesUtilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User Attitudes
Adam Moore474 views
A women secure mobile app for emergency usage (go safe app) by eSAT Journals
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
eSAT Journals261 views
A Mobile Based Women Safety Application (I Safe Apps) by IOSR Journals
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)
IOSR Journals605 views

More from IIIT Hyderabad

Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias by
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasIIIT Hyderabad
105 views56 slides
Identify, Inspect and Intervene Multimodal Fake News by
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
120 views120 slides
#ChatGPT #ResponsibleAI by
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAIIIIT Hyderabad
331 views21 slides
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety by
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
46 views38 slides
It is our choices, Harry, that show what we truly are, far more than our abil... by
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
86 views56 slides
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity by
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
58 views79 slides

More from IIIT Hyderabad (20)

Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias by IIIT Hyderabad
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
IIIT Hyderabad 105 views
Identify, Inspect and Intervene Multimodal Fake News by IIIT Hyderabad
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad 120 views
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety by IIIT Hyderabad
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
IIIT Hyderabad 46 views
It is our choices, Harry, that show what we truly are, far more than our abil... by IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad 86 views
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity by IIIT Hyderabad
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad 58 views
Data Science for Social Good: #LegalNLP #AlgorithmicBias... by IIIT Hyderabad
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
IIIT Hyderabad 22 views
How to Write a (Good) Research Paper by IIIT Hyderabad
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
IIIT Hyderabad 250 views
Data Science for Social Good: #LegalNLP #AlgorithmicBias by IIIT Hyderabad
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
IIIT Hyderabad 52 views
Social Computing Research in India by IIIT Hyderabad
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad 235 views
Modeling Online User Interactions and their Offline effects on Socio-Technica... by IIIT Hyderabad
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad 119 views
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay by IIIT Hyderabad
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad 54 views
It is our choices, Harry, that show what we truly are, far more than our abil... by IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad 56 views
It is our choices, Harry, that show what we truly are, far more than our abil... by IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad 389 views
Leveraging Social Media for Financial Advice by IIIT Hyderabad
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
IIIT Hyderabad 96 views
Development of Stress Induction and Detection System to Study its Effect on B... by IIIT Hyderabad
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad 108 views
A Framework for Automatic Question Answering in Indian Languages by IIIT Hyderabad
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad 191 views
A Framework For Automatic Question Answering in Indian Languages by IIIT Hyderabad
A Framework For Automatic Question Answering in Indian LanguagesA Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian Languages
IIIT Hyderabad 26 views
Exposing, Examining and Intervening Fake News by IIIT Hyderabad
Exposing, Examining and Intervening Fake NewsExposing, Examining and Intervening Fake News
Exposing, Examining and Intervening Fake News
IIIT Hyderabad 98 views

Recently uploaded

Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveNetwork Automation Forum
43 views35 slides
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
27 views49 slides
Zero to Automated in Under a Year by
Zero to Automated in Under a YearZero to Automated in Under a Year
Zero to Automated in Under a YearNetwork Automation Forum
22 views23 slides
GDSC CTU First Meeting Party by
GDSC CTU First Meeting PartyGDSC CTU First Meeting Party
GDSC CTU First Meeting PartyNational Yang Ming Chiao Tung University
11 views25 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
66 views46 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
317 views86 slides

Recently uploaded(20)

Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty22 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi139 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab23 views

Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks

  • 1. Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks Prachi Jain M.Tech. Thesis Defense 14th November 2013 Committee: Dr. Ponnurangam Kumaraguru, IIIT-Delhi (Chair) Dr. Alessandra Sala, Alcatel Lucent (Bell Labs), Dublin Dr. Amarjeet Singh, IIIT-Delhi
  • 2. Problem Statement  Characterize mobile number sharing behavior on Online Social Networks.  Examine risk of collation of mobile number’s owner data from multiple online public data sources.  Propose a systematic approach for risk communication. 2
  • 3. Achievements  Paper: Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks, Conference on Online Social Networks (COSN) 2013  Poster: Flash of Two Worlds, Security and Privacy Symposium (SPS) 2013 3
  • 5. 5
  • 7. Research Motivation  46% of Internet users post original (self created) content on internet.  User Generated Content (UGC) has high similarity with offline interactions of user.  Concerns on (un)intentional mention of sensitive information on OSN profile.  Mobile phone number is an example of identifiable information with which a real-world entity can be associated uniquely, in most cases. 7
  • 8. How many of you have posted mobile numbers on Online Social Networks? How many of you have seen mobile numbers being posted on Online Social Networks? 8
  • 13. Is it a good idea?
  • 14. Characterize mobile number sharing behavior on Online Social Networks  Focus on Indian Mobile Numbers “India has the fastest growing telecom market in the world.“  Focus on two most popular social networks – Facebook & Twitter 14
  • 16. Twitter 101 Name Screen name User description Whom I follow Who follow me Tweet Retweet = Tweet exposed 16 to new audience
  • 17. Facebook 101 Name People I am friends with User attributes Public ! Post 17
  • 18. Personally Identifiable Information (PII) An attribute that itself or in combination of other attributes can connect an online user account with a real world entity.  Email address (Balduzzi et al, 2010)  Phone numbers (Magno et al, 2012; Jain et al, 2013) 18
  • 19. Indian Mobile Number format  10 digit number, start with 7 / 8 / 9  Country code: +91 ( Example: +91 9123456789 )  Trunk Code: 0 ( Example: 0 9123456789 ) No standard way of sharing mobile numbers on OSN! +91- 9123456789 91.91.23.456.789 +91- 91-2345-6789 (91)23.456.789 0 9123456789 (91234)56789 19
  • 21. Literature review  Identity information disclosure on OSNs.  Consequences of identity information disclosure on OSNs.  Communicating the risk of identity information disclosure. 21
  • 22. 1. Identity information disclosure on OSNs Zheleva et al, 2009 Group membership Balduzzi et al, 2010 Email address Burger et al, 2011 Gender Dey et al, 2012 Age Magno et al, 2012; Chen et al, 2012; Jain et al, 2013 Phone numbers No quantitative study on mobile numbers sharing behavior on OSN. 22
  • 23. 1. Identity information disclosure on OSNs Chen et al, 2012 Observed 2% Facebook users (in their dataset) share their mobile number as a profile attribute. Magno et al, 2012 Observed users share their mobile number as profile attribute on Google+ Single Indian males share most mobile numbers We dive deeper to understand characteristics of exposed mobile numbers on Facebook and Twitter posts and user descriptions. 23
  • 24. 2. Consequences of identity information disclosure on OSNs Jagatic et al, 2007 Social phishing Chen et al, 2012 Mao et al, 2011 Linkage attack Privacy attack Krishnamurthy et al, 2012 Auxiliary information collected from online sources might help in connecting an online profile with an offline entity. We explore if Indian mobile numbers leaked from OSNs can be used to gain a wider profile by linking it with e-government data and truecaller. 24
  • 25. 2. Consequences of identity information disclosure on OSNs Schrittwieser et al, 2012 Mobile numbers can be used to exploit smart phone messaging services. Address book resolution Impersonation, SMS spam, Phone number enumeration attack, Status message forgery attack Cheng et al, 2013 Address book resolution Randomly picked mobile numbers used to integrate accounts on WeChat and MiTalk. Aggregate information about users in China. 25
  • 26. 2. Consequences of identity information disclosure on OSNs We link exposed Indian mobile numbers on Facebook and Twitter profile with their WhatsApp profiles. We study comprehensiveness of additional information obtained. 26
  • 27. 3. Communicating the risk of identity information disclosure Krishnamurthy et al, 2012 Privacy leaks could be prevented by alerting the users about information sharing vulnerabilities. We communicate the risk to a set of users by calling them with the help of an IVR system. We also study their reactions. 27
  • 29. Approach Keyword Selection Data Extraction / Collection Data Validation 29
  • 30. System architecture Facebook Graph API Public users / posts with mobile numbers Category +91 Regex patterns Category 0 Category void call ring Mobile number validation Keyword Selection contact Indian Mobile Number Database Category void Twitter Stream API Keyword selection Public Bio/Tweets with mobile numbers Regex patterns Category 0 Category +91 Data collection Data validation 30
  • 31. System architecture Facebook Graph API Public users / posts with mobile numbers Category +91 Regex patterns Category 0 Category void call ring Mobile number validation Keyword Selection contact Indian Mobile Number Database Category void Twitter Stream API Keyword selection Public Bio/Tweets with mobile numbers Regex patterns Category 0 Category +91 Data collection Data validation 31
  • 32. Data statistics Twitter: 12th October 2012 – 20th October 2013 Facebook: 16th November 2012 – 20th April 2013 Numbers Category +91 Category 0 Category void Twitter Facebook Twitter Facebook Twitter Mobile 885 Numbers 2,191 User profiles 2,663 1,074 100% 14,909 8,873 85% 17,913 9,028 Total Facebook Twitter Facebook 25,566 25,294 41,360 36,358 85% 31,149 25,406 49,817 36,588 32
  • 35. Ownership analysis: Methodology Owner posted the number Post Has 1st person pronoun Frequent action words Bio / Name Y Y Has 2nd / 3rd person pronoun N Phrasal search Y Non-owner posted the number 35
  • 36. Ownership Analysis: Results Social Network Mechanism Mobile Numbers Total Twitter: Owner Bio 155 291/885 (33%) Tweet 136 Non-owner Tweet 18 18/885 (0.02%) Facebook: Owner Post 468 485/2191 (22%) Name 17 Non-owner Message 25 25/2191 (0.01%) Users share their own mobile numbers on OSNs! 36
  • 38. Source analysis: Results Which applications are used Which applications are used to share mobile numbers on to share mobile numbers on Twitter? Facebook? 32% numbers on Twitter were pushed from Facebook 5% Facebook mobile Facebook for iPhones Photos 1% Facebook 11% 32% Twitterfeed 12% 8% Google 26% LinkedIn 26% TweetDeck 14% 50% 15% Facebook for Android HootSuite Twitterfeed Users posted same mobile numbers on multiple OSNs ! 38
  • 40. Topographical analysis: Methodology Indian Mobile number XXXX - NNNNNN Network operator Subscriber number Telecom Zone/Circle Metro (High density) A Circle (Largest population coverage) B Circle C Circle (Smallest population coverage) (Source: http://www.trai.gov.in) 40
  • 41. Topographical analysis: Results Telecom Circle Category # of Mobile Numbers Delhi Metropolitan 582 Mumbai Metropolitan 312 Karnataka “A” Circle 233 Punjab “B” Circle 226 Rajasthan “B” Circle 171 Andhra Pradesh “A” Circle 164 Kerala “B” Circle 158 Maharashtra “A” Circle 140 Gujarat “A” Circle 135 Tamil Nadu “A” Circle 102 Users of metropolitan cities in India actively posted mobile numbers on OSNs ! 41
  • 43. Gender analysis: Results Cross Syndication Facebook Twitter Total users Gender available (G) 2,663 1,438 1,074 29 Females (F) Males (M) F/G 220 1,218 15% 6 23 20% Females are conservative while sharing mobile numbers on OSNs ! 43
  • 45. Context Analysis: Results Twitter Tag Cloud Facebook Tag Cloud Emergency, marketing, escort and entertainment business are major context on OSNs ! 45
  • 47. Risk of Collation: Experiment 1 Methodology Mobile Number Penetration rate: Store in Phone Address Book Install and open WhatsApp Status userexposed prate = usertotal = 1,071 / 3,076 = 34.8 % Last Seen time 47
  • 48. Risk of Collation: Experiment 1 Sample Status 48
  • 49. Risk of Collation: Experiment 2 OCEAN: Open Government Data Repository Details User 1 User 2 Mobile Number +9198xxxx5485 +9199xxxx2708 Full Name xxxxxx Jeswani x Gambhir Age 53 23 Gender Male Father’s Name x x Jeswani Address ***, Mig Flats, *-block, xxxxx Vihar Phase-I 8 Delhi Male Users xx Gambhir Identified Uniquely ***, xxxx Bagh, Delhi ID Driving License: DL/04/xxx/222668 Voter ID: NLNxxx5696 Shared by Owner? Yes No 49
  • 51. Experiment: IVR System Setup (2,492) 51
  • 52. Result: Callee Decision Tree 0.35 (867) Call the Number 0.65 (1625) Call not picked Call picked 0.61 (988) Listen message Disconnect the Call 0.48 (479) 0.52 (509) Listen Options 0.21 (107) FORM 1 0.39 (637) Didn’t know 0.23 (47) Leave Feedback Disconnect the Call 0.20 (102) 0.59 (300) Posted purposefully Disconnect the Call 0.77 (60) Disconnect the Call 1.0 (47) Disconnect the Call 52
  • 53. Feedback “Thank you for information, I have deleted, I will not post my number online.” “I want to know how to remove my number and I don't know, I haven't put my number purposely but if it is there, where exactly it is there I would also like to know that. Please get in touch with me asap. Thank you!” “It is a very nice process that you are doing and making people aware about online frauds and telephone number frauds but your system is basically calling business houses” 53
  • 54. Understanding user’s response: Ownership analysis Ownership analysis on posts from users who said that they did not know that their number can be leaked (IVR option 1) 38.3% (41/107) of mobile numbers were posted publicly by their owners. Inability of users to manage their privacy settings. OR Inadvertent disclosure of personal information (mobile number) 54
  • 55. Evaluation: Interview Mobile numbers from profiles on OSNs Collating with e-government data repository (OCEAN) 8 users identified uniquely 55
  • 56. Interview questions Interviewed 8 people whom we uniquely identified. To validate the information we had about them. Inquire if they posted mobile number on OSN. If yes than why? If no then we informed them about the profile revealing their number. And asked if they knew the person. Will they remove the number and Why? Feedback? 56
  • 57. Interview results # of callee True positive (Valid information) 5/8 False positive 1/8 Denied to get interviewed 1/8 Did not pick 1/8 57
  • 58. Interview Response  Suspected if we got the information via offline sources.  Called their service provider to confirm what bad we can do with this information about them. 58
  • 59. Interview Response Posted mobile number to be in touch with friends and relatives.  Expressed concerns of getting calls from unwanted people. Posted mobile number to promote a small scale business.  Inquired and suggested some countermeasures. 59
  • 61. Take Aways Users share their own mobile numbers on OSNs. Users post same mobile numbers on multiple OSNs. Females are conservative while sharing mobile numbers on OSNs. A publically shared mobile number can expose sensitive details (age, ID, family details and full address) of its owner, from multiple sources. We should communicate the risks of sharing mobile numbers online, to their owners. Few users were unaware of the online presence of their number. 61
  • 62. Future work Build a generic technological, people and process oriented solutions to forewarn users and raise awareness towards risks of exposing mobile numbers on OSNs. 62
  • 63. Acknowledgments Paridhi Jain, PhD student, IIIT Delhi Siddhartha Asthana, PhD student, IIIT Delhi Anupama Aggarwal, PhD student, IIIT Delhi Precog family 63
  • 64. Publications and poster Prachi Jain, Paridhi Jain, Ponnurangam Kumaraguru. Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks. ACM Conference on Online Social Networks (COSN) 2013 Prachi Jain, Ponnurangam Kumaraguru. Flash of Two Worlds. Security and Privacy Symposium (SPS) 2013 64
  • 65. References 1. Paul 2010, Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57:1701, 2010. 2. Prachi Jain, Paridhi Jain, and Ponnurangam Kumaraguru. Call me maybe: understanding the nature and risks of sharing mobile numbers on online social networks. In Proceedings of the first ACM conference on Online social networks, pages 101-106. ACM, 2013. 3. Gabriel Magno, Giovanni Comarela, Diego Saez-Trumper, Meeyoung Cha, and Virgilio Almeida. New kid on the block: Exploring the google+ social graph. In Proceedings of the 2012 ACM conference on Internet measurement conference, pages 159-170. ACM, 2012. 4. Latanya Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557-570, 2002. 5. Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and Christopher Kruegel. Abusing social networks for automated user proling. In Recent Advances in Intrusion Detection, pages 422-441. Springer, 2010. 65
  • 66. References 6. Ratan Dey, Cong Tang, Keith Ross, and Nitesh Saxena. Estimating age privacy leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE, pages 2836-2840. IEEE, 2012. 7. John D Burger, John Henderson, George Kim, and Guido Zarrella. Discriminating gender on twitter. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, pages 1301-1309. Association for Computational Linguistics, 2011. 8. Tom N Jagatic, Nathaniel A Johnson, Markus Jakobsson, and Filippo Menczer. Social phishing. Communications of the ACM, 50(10):94-100, 2007. 9. Terence Chen, Mohamed Ali Kaafar, Arik Friedman, and Roksana Boreli. Is more always merrier?: a deep dive into online social footprints. In Proceedings of the 2012 ACM workshop on Workshop on online social networks, pages 67-72. ACM, 2012. 10. Huina Mao, Xin Shuai, and Apu Kapadia. Loose tweets: an analysis of privacy leaks on twitter. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, pages 1-12. ACM, 2011. 66
  • 67. References 11. Sebastian Schrittwieser, Peter Fruhwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar Weippl. Guess whos texting you? evaluating the security of smartphone messaging applications. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012. 12. Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, and Dengguo Feng. Bind your phone number with caution: automated user proling through address book matching on smartphone. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pages 335-340. ACM, 2013. 13. Balachander Krishnamurthy. Privacy and online social networks: Can colorless green ideas sleep furiously? IEEE Security & Privacy, 11(3):14-20, 2013. 14. Zeynep Tufekci. Can you see me now? audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1):20-36, 2008. 67
  • 70. For further information, please write to pk@iiitd.ac.in precog.iiitd.edu.in