skip to main content
10.1145/2487788.2488063acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Weaving a safe web of news

Published:13 May 2013Publication History

ABSTRACT

The rise of social media and data-capable mobile devices in recent years has transformed the face of global journalism, supplanting the broadcast news anchor with a new source for breaking news: the citizen reporter. Social media's decentralized networks and instant re-broadcasting mechanisms mean that the reach of a single tweet can easily trump that of the most powerful broadcast satellite. Brief, text-based and easy to translate, social messages allow news audiences to skip the middleman and get news "straight from the source."

Whether used by "citizen" or professional reporters, however, social media technologies can also pose risks that endanger these individuals and, by extension, the press as a whole. First, social media platforms are usually proprietary, leaving users' data and activities on the system open to scrutiny by collaborating companies and/or governments. Second, the networks upon which social media reporting relies are inherently fragile, consisting of easily targeted devices and relatively centralized message-routing systems that authorities may block or simply shut down. Finally, this same privileged access can be used to flood the network with inaccurate or discrediting messages, drowning the signal of real events in misleading noise.

A citizen journalist can be anyone who is simply in the right place at the right time. Typically untrained and unevenly tech-savvy, citizen reporters are unaccustomed to thinking of their social media activities as high-risk, and may not consider the need to defend themselves against potential threats. Though often part of a crowd, they may have no formal affiliations; if targeted for retaliation, they may have nowhere to turn for help. The dangers citizen journalists face are personal and physical. They may be targeted in the act of reporting, and/or online through the tracking of their digital communications. Addressing their needs for protection, resilience, and recognition requires a move away from the major assumptions of in vitro communication security. For citizen journalists using social networks, the adversary is already inside, as the network itself may be controlled or influenced by the threatening party, while "outside" nodes, such as public figures, protest organizers, and other journalists can be trusted to handle content appropriately. In these circumstances there can be no seamless, guaranteed solution. Yet the need remains for technologies that improve the security of these journalists who in many cases may constitute a region's only independent press.

In this paper, we argue that a comprehensive and collaborative effort is required to make publishing and interacting with news websites more secure. Journalists typically enjoy stronger legal protection at least in some countries, such as the United States. However, this protection may prove ineffective, as many online tools compromise source protection. In the remaining sections, we identify a set of discussion topics and challenges to encourage a broader research agenda aiming to address jointly the need for social features and security for citizens journalists and readers alike. We believe communication technologies should embrace the methods and possibilities of social news rather than treating this as a pure security problem. We briefly touch upon a related initiative, Dispatch, that focuses on providing security to citizen journalists for publisihing content.

References

  1. S. Aday, H. Farell, M. Lynch, J. Sides, and D. Freelon. Blogs and Bullet II: New Media and Conflict After the Arab Spring. Report to the United States Institute of Peace, 2012.Google ScholarGoogle Scholar
  2. S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker. On preserving privacy in content-oriented networks. In Proceedings of the ACM SIGCOMM workshop on Information-centric networking, ICN '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Balasubramanian, B. N. Levine, and A. Venkataramani. DTN routing as a resource allocation problem. In SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. N. Banerjee, M. Corner, D. Towsley, and B. N. Levine. Relays, base stations, and meshes: enhancing mobile networks with infrastructure. MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of Human Mobility on Opportunistic Forwarding Algorithms. IEEE Transactions on Mobile Computing, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Chaintreau, A. Mtibaa, L. Massoulié, and C. Diot. The diameter of opportunistic mobile networks. In CoNEXT '07: Proceedings of the 2007 ACM CoNEXT conference, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Douceur. The sybil attack. Peer-to-peer Systems, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones. In Proceedings of OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. Fall. A delay-tolerant network architecture for challenged internets. Proceedings of the 2003 conference on Applications, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Fifield, N. Hardison, J. Ellithorpe, E. Stark, R. Dingledine, P. Porras, and D. Boneh. Evading Censorship with Browser-Based Proxies. In Privacy Enhancing Technologies Symposium, pages 239--258, Vigo, Spain, 2012. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. L. Gawhry. Assessing the Impact of Social Media on the 25 January 2011 Egyptian Revolution. 2012.Google ScholarGoogle Scholar
  12. A. Ghosh and P. McAfee. Incentivizing high-quality user-generated content. In WWW '11: Proceedings of the 20th international conference on World wide web, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Gunawardena, T. Karagiannis, A. Proutiere, E. Santos-Neto, and M. Vojnovic. Scoop: decentralized and opportunistic multicasting of information streams. In MobiCom '11: Proceedings of the 17th annual international conference on Mobile computing and networking, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Ioannidis, A. Chaintreau, and L. Massoulié. Optimal and Scalable Distribution of Content Updates over a Mobile Social Network. INFOCOM 2009, IEEE, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Isaacman, S. Ioannidis, A. Chaintreau, and M. Martonosi. Distributed rating prediction in user generated content streams. In RecSys '11: Proceedings of the fifth ACM conference on Recommender systems, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. T. Lauinger, T. Strufe, T. Universitıt, N. Laoutaris, E. Biersack, P. Rodriguez, and E. Kirda. Privacy implications of ubiquitous caching in named data networking architectures.Google ScholarGoogle Scholar
  17. J. R. Mayer and J. C. Mitchell. Third-Party Web Tracking: Policy and Technology. Security and Privacy (SP), 2012 IEEE Symposium on, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Meeder, B. Karrer, A. Sayedi, R. Ravi, C. Borgs, and J. Chayes. We know who you followed last summer: inferring social link creation times in twitter. In WWW '11: Proceedings of the 20th international conference on World wide web, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Mislove, B. Viswanath, K. Gummadi, and P. Druschel. You are who you know: inferring user profiles in online social networks. Proceedings of the third ACM international conference on Web search and data mining, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Narayanan and V. Shmatikov. De-anonymizing Social Networks. Security and Privacy, 2009 30th IEEE Symposium on, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Pollock. Streetbook, MIT Technology Review, 2011.Google ScholarGoogle Scholar
  22. J. Pollock. People Power 2.0. MIT Technology Review, 2012.Google ScholarGoogle Scholar
  23. J. Reich and A. Chaintreau. The age of impatience: optimal replication schemes for opportunistic networks. In CoNEXT '09: Proceedings of the 5th international conference on Emerging networking experiments and technologies, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. F. Roesner, T. Kohno, and D. Wetherall. Detecting and defending against third-party tracking on the web. In NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Seth, D. Kroeker, M. Zaharia, S. Guo, and S. Keshav. Low-cost communication for rural internet kiosks using mechanical backhaul. In MobiCom '06: Proceedings of the 12th annual international conference on Mobile computing and networking, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Srivatsa and M. Hicks. Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel. CCS '12: Proceedings of the 19th ACM conference on Computer and communications security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Viswanath, A. Post, K. Gummadi, and A. Mislove. An analysis of social network-based Sybil defenses. SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. C. York. Beyond Streetbook. MIT Technology Review, 2012.Google ScholarGoogle Scholar
  29. H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking (ToN), 18:885--898, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. H. Yu, M. Kaminsky, and P. Gibbons. SybilGuard: Defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Weaving a safe web of news

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        WWW '13 Companion: Proceedings of the 22nd International Conference on World Wide Web
        May 2013
        1636 pages
        ISBN:9781450320382
        DOI:10.1145/2487788

        Copyright © 2013 Copyright is held by the International World Wide Web Conference Committee (IW3C2).

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 May 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        WWW '13 Companion Paper Acceptance Rate831of1,250submissions,66%Overall Acceptance Rate1,899of8,196submissions,23%
      • Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)3

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader