Technology and especially today’s social media technology, simply put, is AWESOME!! We only have to click a mouse and we can connect with anyone, anywhere, anytime. We can find old Highschool buddies, lost family members, that girlfriend who broke up with us 20 years ago. We can find nearly everything we want to know on any living being on the planet.
But what if we don’t want to be found? How do we hide from this all invasive technological monster? You guessed it…. more technology. With every innovation comes a new innovation to counter it. Hiding within the Social Network has lead to the development of some of the most prolific technological science of our day….and yes, this time you have to be a Rocket Scientist to figure it out.
Recent studies and development in Graph Theory Research have begun to offer good news to those who want to hide from the Social Network. Unfortunately, this same research offers the ability to those who want to hide within the network the same possibility.
Social networks like Facebook are no big deal for graph theory. A social network is, after all, itself a graph—a mathematical structure consisting of various objects (or nodes) connected by links (or edges) in various configurations with varying complexities. Graph theory was good at parsing networks like Facebook long before Facebook even existed.
A consequence of this is that it’s very hard to “hide” within a social network. We can completely anonymize our social network presence, but we’re always subject to the bare fact of existing in a network, which is connectivity to others. We may be able to hide our names, but we are unable to hide who we are with respect to the network. Put differently, we have a role within our networks that is defined by how we interact with them. In a network, we are who we know.
The transparency of these roles—or network-defined identities—may be less necessary than it seems, however. In a paper published this week in Nature Human Behavior by Polish computer scientist Marcin Waniek and colleagues offers a defensive algorithm that can be used to hide central or important figures within a social network. As a demonstration, they showed how the technique, known as ROAM (for “remove one, add many”), could be used to easily cloak the role of 9/11 attack leader Mohamed Atta within his (real-life) terrorist network.
“Can individuals or groups disguise their standing in the network to escape detection?” Waniek and co. write. “This matters because, on the one hand, it assists the general public in protecting their privacy against intrusion from government and corporate interests, while on the other hand, it assists counter-terrorism units and law-enforcement agencies in understanding how criminals and terrorists could escape detection, especially given the increasing reliance of terrorists on social media survival strategies.”
The metric in question here is what’s known as centrality. Essentially, it describes how well-connected a network member is (how many connections it has, or “degree”), how important each one of the member’s connections are, and the distance it is from other important network nodes (how many node-to-node hops away they are). An implication of these metrics is that connections are more or less important based on the centrality of the other nodes they connect to. Like, if I have a billion Facebook friends but each one of those friends only has one or two friends, then I’m not actually very important in the network, despite the number of connections.
The ROAM algorithm has two components. The first is pretty simple. To hide a network node, we just have to remove its connections to other nodes. That does the trick, but it’s not really hiding the importance of a network node, it’s just making it less important. To do the hiding, we have to maintain as many connections to the network as possible. This is the second part of the algorithm, the “add many” part. We keep the hidden node connected to its network by rerouting the erased connections through other nodes. So, as A is connections with B and C, it can cut off B and then introduce B to C. B and C become connections, and the link from A to B is re-established.
So, we’re methodically removing our close connections and adding new, less direct connections in their place. This sounds pretty simple, but when we get into IRL networks, the algorithm starts to get really, really complex fast. In fact, it becomes an NP-hard problem, which basically means that it’s practically incomputable. Waniek and his group were able to speed things up by forcing the algorithm to consider only connectivity within the hidden node’s graph neighborhood, or its closest connections. Hiding is then possible, “without requiring massive computational power nor expertise in sophisticated optimization techniques,” they write.
As alluded to above, Waniek doesn’t view this ability as a necessarily good thing. Hiding is good because privacy and evading persecution, of course, but we’d still like to be able to shake Attas-like figures from social networks. The authors conclude: “Our findings suggest that counter-terrorism units may benefit from developing tools that identify not only the individuals and groups whose ranking (according to any measure of choice) is high, but also those whose ranking increases suspiciously and unexpectedly after making just a few modifications to the network.”
Ok, what does this all mean? How does it effect you? Why should you even care?
While having the ability to hide from others within the Social Network certainly offers us much more privacy as well, in some instances, possibly more safety, it also creates a curtain for those who might want to do us harm to hide behind.
So, what can we do if we feel threatened by or intimidated by someone “cyberly” hiding? That’s right, you go to a cyber expert…. someone who works to unravel the web and can, in many cases, pull back the curtain. Many of today’s Private Investigative firms employ just such a person and depending on the case, can be a perfect start to solving your problem.
Kusic and Kusic Inc. has been in the Private Investigative industry for the last 24 years and provides top quality services including cyber investigation confidentially to both private individuals and corporations.
Pictures courtesy of flickrPosted in: Uncategorized