{"id":11870,"date":"2016-04-18T09:00:38","date_gmt":"2016-04-18T13:00:38","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=11870"},"modified":"2017-09-24T17:19:17","modified_gmt":"2017-09-24T15:19:17","slug":"big-data-sells-people","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/big-data-sells-people\/11870\/","title":{"rendered":"Human trafficking: big data turned you and me into goods for sales"},"content":{"rendered":"<p>Today information is currency. Data is bought and sold, stolen and changed, and of course, gathered. If you want to know something about somebody you can find a real bunch of information legally \u2014 you need only know how.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/04\/06022427\/big_data_sells_people-FB.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11872\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/04\/06022427\/big_data_sells_people-FB.jpg\" alt=\"Human trafficking: big data turned you and me into goods for sales\" width=\"1280\" height=\"1280\"><\/a><\/p>\n<p>Special software lets people analyze public data with ease. Let\u2019s find out what anybody can understand online if they wish to.<\/p>\n<h3>Find me online<\/h3>\n<p>In April 2016 Eugene Tsvetkov, a photographer from Saint Petersburg, caught everyone\u2019s attention with a <a href=\"http:\/\/www.pcworld.com\/article\/3055305\/analytics\/your-face-is-big-data-the-title-of-this-photographers-experiment-says-it-all.html\" target=\"_blank\" rel=\"noopener nofollow\">photo project called \u201cYour face is big data\u201d<\/a>. Eugene took images of people in subway and then uploaded them to the popular site FindFace.ru. This service allows to find public users of VK.com social network using their photo.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">'Your face is big data:' It's ridiculously easy to identify and find most people online <a href=\"https:\/\/t.co\/m5jGMTGK2c\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/m5jGMTGK2c<\/a> by <a href=\"https:\/\/twitter.com\/noyesk?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@noyesk<\/a><\/p>\n<p>\u2014 PCWorld (@pcworld) <a href=\"https:\/\/twitter.com\/pcworld\/status\/720231481688399872?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 13, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Tsvetkov made a set of double photos: the images of people sitting in front of him at the subway and their profile photos from VK.com. About 70 percent of search attempts were successful although the service had troubles while recognizing the images of elderly people. During the process, he learned a whole lot about the lives of complete strangers without speaking to them directly.<\/p>\n<p>This situation has a romantic side as well: with the help of FindFace anyone with a VK account can find that cute boy or girl that they met at a party, you know, the one with the beautiful smile. Though we have to be realistic: only a few would like to be searchable by literally everybody with a camera, simply because such a stranger can make a cyberbullying campaign or anything worse. For example, to undertake a kind of study given below.<\/p>\n<h3>Where they \u201cteach\u201d the oldest profession<\/h3>\n<p>The team of the Russian online media Social Data Hub launched a <a href=\"https:\/\/sdh.sexy\/ru\/2015\/09\/22\/%D0%B2%D1%83%D0%B7%D1%8B-%D0%B3%D0%B4%D0%B5-%D0%B3%D0%BE%D1%82%D0%BE%D0%B2%D1%8F%D1%82-%D0%BF%D0%BE%D1%82%D0%B5%D0%BD%D1%86%D0%B8%D0%B0%D0%BB%D1%8C%D0%BD%D1%8B%D1%85-%D0%BF%D1%80%D0%BE%D1%81%D1%82\/\" target=\"_blank\" rel=\"noopener nofollow\">scandalous project<\/a> which collected data on 27,856 women and 1,387 men who practice prostitution. With the help of their own face recognition technology the team found these people\u2019s\u2019 social media accounts and used this information to make \u201cthe rating of Moscow universities, graduates of which walk the streets\u201d. The data for this project had been taken only from public sources.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">10 Tips to keep your <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a> secure online \u2013  <a href=\"https:\/\/t.co\/iY92VsV3Qa\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/iY92VsV3Qa<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"https:\/\/t.co\/mmnxnM9x6B\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/mmnxnM9x6B<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/667396729956904960?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Of course, their conclusions are not ultimately accurate. The correlation of men and women in the feed data shows that specialties popular among women will anyhow prevail and thereby an ore mining institute can hardly hit the TOP of this \u201cresearch\u201d. Nevertheless, the provocation succeeded.<\/p>\n<h3>Caught in one network<\/h3>\n<p>The power of social medias is not limited by these things. When we post something online we don\u2019t fully realize what picture one can see if they do the puzzle. For example, there is a service for VK.com social network that helps visualise social network connections.<\/p>\n<p>Look at the picture below. There you see two circles of friends: mine and my sister\u2019s. Each point on the diagram is a person that is connected with either me or her. What\u2019s interesting, we have friends who know each other and only one of us, not both.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/04\/06022422\/en.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11874\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/04\/06022422\/en.jpg\" alt=\"Human trafficking: big data turned you and me into goods for sales\" width=\"1265\" height=\"525\"><\/a><\/p>\n<p>If you spend some time and study the scheme, you\u2019ll detect the circle of the closest friends of your target, as this person and his\/her company will all be interconnected. Here you can see my ex-colleagues from a previous job.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/04\/06022428\/big_data_2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11871\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2016\/04\/06022428\/big_data_2.jpg\" alt=\"Human trafficking: big data turned you and me into goods for sales\" width=\"578\" height=\"519\"><\/a><\/p>\n<p>Do you remember the saying \u201ctell me who your friend is and I will tell you who you are\u201d? Well, it works. If the majority of people in one circle share one hobby, than your target probably shares it as well. If all people in the circle work for one and the same company you must have found a line from your targets CV.<\/p>\n<p>In such a way one can quickly detect the most probable ex-boyfriends and -girlfriends of their targets, find their family, friends and colleagues and get to know a lot of other interesting things.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Special <a href=\"https:\/\/twitter.com\/hashtag\/report?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#report<\/a> Who's spying on you? <a href=\"https:\/\/t.co\/blOrDAOaTL\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/blOrDAOaTL<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a> <a href=\"https:\/\/t.co\/vSfaxnYAOg\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/vSfaxnYAOg<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/688085829038813184?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 15, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>While this service is just some kind of a toy, made to test skills and entertain friends, there is professional software for the very same purpose. And it is more able and lets specialists find <b>a lot of<\/b> information.<\/p>\n<h3>We are living in a glass aquarium. What can be done?<\/h3>\n<p>Try to remember how many surveillance cameras are used on the streets and how often you publish your photos online. That probably tells you that our world is really transparent. With the help of the aforementioned technologies you can find people online with just one photo, and analyze their accounts to find out a lot about them. You could probably make their biographies out of this data.<\/p>\n<p>The more this or that company knows about a person the easier it is to sell goods and make personal offers, which increase the likelihood of sales. And believe us, companies use it to the max.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Some flaws with <a href=\"https:\/\/twitter.com\/hashtag\/BigData?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#BigData<\/a> that need to be addressed. <a href=\"https:\/\/t.co\/II3rZcS8qf\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/II3rZcS8qf<\/a> <a href=\"https:\/\/t.co\/Pk6m0YHbXm\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Pk6m0YHbXm<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/714807442287247360?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 29, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Social networks have become that free piece of cheese found in a mousetrap. Modern analytical technologies turned people into goods officially, though only a few would like this interpretation of what\u2019s going on. Besides, social media are a useful and entertaining part of our life so nobody wants to consider the problem at this angle. But something must be done to fix it.<\/p>\n<p>There are <a href=\"https:\/\/www.kaspersky.co.za\/blog\/camouflaging-from-global-surveillance\/10133\/\" target=\"_blank\" rel=\"noopener\">a lot of ways<\/a> to fight mass spying. One can apply unusual haircut and special makeup, which drive facial recognition systems insane. It\u2019s also a good idea to put on clothes, which reflect light into camera lens and spoil the photos. You can also turn to dark glasses and a hoodie, just like celebrities and movie characters.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Tips and Tricks to Hide from <a href=\"https:\/\/twitter.com\/hashtag\/BigBrother?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#BigBrother<\/a> Watchful Eye <a href=\"https:\/\/t.co\/xJ6VqqUKuo\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/xJ6VqqUKuo<\/a> <a href=\"http:\/\/t.co\/oeNopI12hL\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/oeNopI12hL<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/652500369264783360?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 9, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Maybe, we\u2019ll all try it one day, but right now we should at least limit access to our social media accounts. Besides we recommend you a good read on <a href=\"https:\/\/www.kaspersky.co.za\/blog\/enhanced-privacy-kaspersky-2016\/9562\/\" target=\"_blank\" rel=\"noopener\">how to enhance privacy online<\/a>.<\/p>\n<p>We also have a series of articles, which explains how you can protect your <a href=\"https:\/\/www.kaspersky.co.za\/blog\/facebook-privacy-settings-video\/4623\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>, <a href=\"https:\/\/www.kaspersky.co.za\/blog\/keep-instagram-secure\/11045\/\" target=\"_blank\" rel=\"noopener\">Instagram<\/a>, <a href=\"https:\/\/www.kaspersky.co.za\/blog\/linkedin-security-tips\/11757\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>, <a href=\"https:\/\/www.kaspersky.co.za\/blog\/twitter-security\/11860\/\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> and <a href=\"https:\/\/www.kaspersky.co.za\/blog\/vk-privacy\/10743\/\" target=\"_blank\" rel=\"noopener\">VK.com<\/a> accounts. Hopefully, these articles will help you to set up proper security for your social media pages. If you do it right, it would be harder to transform your personal life into a part of big data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How everyone and his dog online make the big data tyranny raise. <\/p>\n","protected":false},"author":522,"featured_media":11873,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1788,1789],"tags":[1042,1020,363,43,211,98,1333],"class_list":{"0":"post-11870","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"category-technology","10":"tag-big-data","11":"tag-face-recognition","12":"tag-personal-data","13":"tag-privacy","14":"tag-social-media","15":"tag-social-networks","16":"tag-vk-com"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/big-data-sells-people\/11870\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/big-data-sells-people\/7042\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/big-data-sells-people\/7074\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/big-data-sells-people\/7014\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/big-data-sells-people\/8173\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/big-data-sells-people\/8005\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/big-data-sells-people\/11662\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/big-data-sells-people\/11870\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/big-data-sells-people\/6592\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/big-data-sells-people\/7455\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/big-data-sells-people\/11108\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/big-data-sells-people\/11662\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/big-data-sells-people\/11870\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/big-data\/","name":"big data"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/11870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=11870"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/11870\/revisions"}],"predecessor-version":[{"id":18529,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/11870\/revisions\/18529"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/11873"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=11870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=11870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=11870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}