General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsOnline Behavioral Ads Fuel the Surveillance Industry--Here's How (EFF)
https://www.eff.org/deeplinks/2025/01/online-behavioral-ads-fuel-surveillance-industry-heres-howBy Lena Cohen
January 6, 2025
CC BY copyright.
Any and all original material on the EFF website may be freely distributed at will under the Creative Commons Attribution License, unless otherwise noted. All material that is not original to EFF may require permission from the copyright holder to redistribute.
There are many valuable links in the article not copied here except for the "How to Protect Yourself" section.
Please go there and bookmark the article.
A global spy tool exposed the locations of billions of people to anyone willing to pay. A Catholic group bought location data about gay dating app users in an effort to out gay priests. A location data broker sold lists of people who attended political protests.
What do these privacy violations have in common? They share a source of data thats shockingly pervasive and unregulated: the technology powering nearly every ad you see online.
Each time you see a targeted ad, your personal information is exposed to thousands of advertisers and data brokers through a process called real-time bidding (RTB). This process does more than deliver adsit fuels government surveillance, poses national security risks, and gives data brokers easy access to your online activity. RTB might be the most privacy-invasive surveillance system that youve never heard of.
What is Real-Time Bidding?
RTB is the process used to select the targeted ads shown to you on nearly every website and app you visit. The ads you see are the winners of milliseconds-long auctions that expose your personal information to thousands of companies a day. Heres how it works:
1. The moment you visit a website or app with ad space, it asks a company that runs ad auctions to determine which ads it will display for you. This involves sending information about you and the content youre viewing to the ad auction company.
2. The ad auction company packages all the information they can gather about you into a bid request and broadcasts it to thousands of potential advertisers.
3. The bid request may contain personal information like your unique advertising ID, location, IP address, device details, interests, and demographic information. The information in bid requests is called bidstream data and can easily be linked to real people.
4. Advertisers use the personal information in each bid request, along with data profiles theyve built about you over time, to decide whether to bid on ad space.
5. Advertisers, and their ad buying platforms, can store the personal data in the bid request regardless of whether or not they bid on ad space.
A key vulnerability of real-time bidding is that while only one advertiser wins the auction, all participants receive the data. Indeed, anyone posing as an ad buyer can access a stream of sensitive data about the billions of individuals using websites or apps with targeted ads. Thats a big way that RTB puts personal data into the hands of data brokers, who sell it to basically anyone willing to pay. Although some ad auction companies have policies against selling bidstream data, the practice remains widespread.
RTB doesnt just allow companies to harvest your datait also incentivizes it. Bid requests containing more personal data attract higher bids, so websites and apps are financially motivated to harvest as much of your data as possible. RTB further incentivizes data brokers to track your online activity because advertisers purchase data from data brokers to inform their bidding decisions.
Data brokers dont need any direct relationship with the apps and websites theyre collecting bidstream data from. While some data collection methods require web or app developers to install code from a data broker, RTB is facilitated by ad companies that are already plugged into most websites and apps. This allows data brokers to collect data at a staggering scale. Hundreds of billions of RTB bid requests are broadcast every day. For each of those bids, thousands of real or fake ad buying platforms may receive data. As a result, entire businesses have emerged to harvest and sell data from online advertising auctions.
First FTC Action Against Abuse of Real-Time Bidding Data
A recent enforcement action by the Federal Trade Commission (FTC) shows that the dangers of RTB are not hypotheticaldata brokers actively rely on RTB to collect and sell sensitive information. The FTC found that data broker Mobilewalla was collecting personal dataincluding precise location informationfrom RTB auctions without placing ads.
Mobilewalla collected data on over a billion people, with an estimated 60% sourced directly from RTB auctions. The company then sold this data for a range of invasive purposes, including tracking union organizers, tracking people at Black Lives Matter protests, and compiling home addresses of healthcare employees for recruitment by competing employers. It also categorized people into custom groups for advertisers, such as pregnant women, Hispanic churchgoers, and members of the LGBTQ+ community.
The FTC concluded that Mobilewalla's practice of collecting personal data from RTB auctions where they didnt place ads violated the FTC Acts prohibition of unfair conduct. The FTCs proposed settlement order bans Mobilewalla from collecting consumer data from RTB auctions for any purposes other than participating in those auctions. This action marks the first time the FTC has targeted the abuse of bidstream data. While we celebrate this significant milestone, the dangers of RTB go far beyond one data broker.
Real-Time Bidding Enables Mass Surveillance
RTB is regularly exploited for government surveillance. As early as 2017, researchers demonstrated that $1,000 worth of ad targeting data could be used to track an individuals locations and glean sensitive information like their religion and sexual orientation. Since then, data brokers have been caught selling bidstream data to government intelligence agencies. For example, the data broker Near Intelligence collected data about more than a billion devices from RTB auctions and sold it to the U.S. Defense Department. Mobilewalla sold bidstream data to another data broker, Gravy Analytics, whose subsidiary, Venntell, likewise has sold location data to the FBI, ICE, CBP, and other government agencies.
In addition to buying raw bidstream data, governments buy surveillance tools that rely on the same advertising auctions. The surveillance company Rayzone posed as an advertiser to acquire bidstream data, which it repurposed into tracking tools sold to governments around the world. Rayzones tools could identify phones that had been in specific locations and link them to people's names, addresses, and browsing histories. Patternz, another surveillance tool built on bidstream data, was advertised to security agencies worldwide as a way to track people's locations. The CEO of Patternz highlighted the connection between surveillance and advertising technology when he suggested his company could track people through virtually any app that has ads.
Beyond the privacy harms from RTB-fueled government surveillance, RTB also creates national security risks. Researchers have warned that RTB could allow foreign states and non-state actors to obtain compromising personal data about American defense personnel and political leaders. In fact, Googles ad auctions sent sensitive data to a Russian ad company for months after it was sanctioned by the U.S. Treasury.
The privacy and security dangers of RTB are inherent to its design, and not just a matter of misuse by individual data brokers. The process broadcasts torrents of our personal data to thousands of companies, hundreds of times per day, with no oversight of how this information is ultimately used. This indiscriminate sharing of location data and other personal information is dangerous, regardless of whether the recipients are advertisers or surveillance companies in disguise. Sharing sensitive data with advertisers enables exploitative advertising, such as predatory loan companies targeting people in financial distress. RTB is a surveillance system at its core, presenting corporations and governments with limitless opportunities to use our data against us.
How You Can Protect Yourself
Privacy-invasive ad auctions occur on nearly every website and app, but there are steps you can take to protect yourself:
For apps: Follow EFFs instructions to disable your mobile advertising ID and audit app permissions. These steps will reduce the personal data available to the RTB process and make it harder for data brokers to create detailed profiles about you.
For websites: Install Privacy Badger, a free browser extension built by EFF to block online trackers. Privacy Badger automatically blocks tracking-enabled advertisements, preventing the RTB process from beginning.
These measures will help protect your privacy, but advertisers are constantly finding new ways to collect and exploit your data. This is just one more reason why individuals shouldnt bear the sole responsibility of defending their data every time they use the internet.
The Real Solution: Ban Online Behavioral Advertising
The best way to prevent online ads from fueling surveillance is to ban online behavioral advertising. This would end the practice of targeting ads based on your online activity, removing the primary incentive for companies to track and share your personal data. It would also prevent your personal data from being broadcast to data brokers through RTB auctions. Ads could still be targeted contextuallybased on the content of the page youre currently viewingwithout collecting or exposing sensitive information about you. This shift would not only protect individual privacy but also reduce the power of the surveillance industry. Seeing an ad shouldnt mean surrendering your data to thousands of companies youve never heard of. Its time to end online behavioral advertising and the mass surveillance it enables.
liberalla
(10,131 posts)Need to be aware and protect yourself as much as possible. Thank you for this post!
Basso8vb
(530 posts)usonian
(15,112 posts)I use the built-in anti-tracking in Safari and Firefox, plus a bunch of ad and tracker blockers.
And Tor, when I'm looking up an easily misinterpreted search term as "bombe surprise"
People still use Google search, which keeps your search history forever if you "log in" (I am told) and probably keeps a shadow profile if you are not logged in as a Google user.(I suspect it more every time they deny it)
snot
(10,897 posts)great photo, lol! Where's it from?
dickthegrouch
(3,685 posts)Residents of Europe and at least California can use what are called Data Subject Requests to demand any company provide all the information that company knows about them.
The 2015 european law GDPR, and the California Consumer Privacy Act (and subsequent laws) created some protections.
(There is a requirement that the business have more than 50,000 Californian's information)
All websites collecting information about California residents are required to have a prominent explanation of the Data Subject Request request procedure.
Complaints can be lodged here: https://oag.ca.gov/contact/consumer-complaint-against-business-or-company
https://cppa.ca.gov/regulations/consumer_privacy_act.html
usonian
(15,112 posts)Counter-attack by Courvoisier and flaming skewers.
dickthegrouch
(3,685 posts)And plead guilty.
usonian
(15,112 posts)Even if you left out the Oysters Andaluz, shashlik, tidbits, prime rib au jus, Salade Utopia, Bombe Surprise and Mouton Rothschild '55.
🥂Courvoisier is fine. 🍾
No mental giant here. I went shopping today and left my shopping list at home.
JoseBalow
(5,901 posts)And Google's Chrome browser... And Gmail
berniesandersmittens
(11,764 posts)Blue_Tires
(57,248 posts)usonian
(15,112 posts)Not the book, but says what's in it.
Avalon Sparks
(2,645 posts)Alarming and eye opening, never heard of this and Im pretty aware of and take data privacy precautions
usonian
(15,112 posts)This briefly explains a very complex process, used to exploit you.