(WORLD NEWS) ***** How Silicon Valley Big Tech Killed Dating And Human Interaction

After multiple FTC investigations and lawsuits, money-laundering charges and DOJ filings;  Big Tech is STILL harming citizens with their automatted mass human data harvesting using ‘dating’ as the BAIT!

Are you tired of pandering shill corporate Facebook and Google media outlets trying to sell you on mindlessly naive, rainbows and unicorns, wishful thinking, BS crunchy-granola concepts that have an utter disregard for actual human nature, sociology and psychology?


How The Silicon Valley Tech Bros Ruined Dating Forever

– Guidelines and horrors created by corporate ‘dating mill’ meat farm big tech companies

“I feel like I can’t be myself,” confesses Bree, a young woman from Plainfield, Ill.

“You don’t want to seem like you care,” says Cam, slouched on a couch in Santa Cruz, Calif.

“I hate it, I hate it,” sobs Cheyenne of Austin, Texas. “Everything, so much of who you are, is dependent on how you look.”

“It exhausts me,” admits Alex.

“Nothing good happens from Tinder,” agrees Kyle, Alex’s sometime boyfriend — even though the two New Yorkers met through the massively popular dating app.


“So much dysfunction,” says journalist and filmmaker Nancy Jo Sales of the dozens of college students and young adults she interviewed for her documentary “Swiped: Hooking Up in the Digital Age,” premiering Sept. 10 at 10 p.m. on HBO.

After a five-year immersion in the social-media-driven sex lives of the millennial generation — and, more personally, as the mother of an 18-year-old daughter — it’s clear to Sales that many of her subjects are miserably swiping their way through the brave new dating world that Silicon Valley has created for them.

“We are experiencing an unprecedented change in how we date, how we mate and how we connect,” Sales tells The Post.


At least 40 million Americans use one or more of the dozens of online dating services and mobile apps that have cropped up in the last six years. Millennials aged 18 to 30 spend an average of 10 hours a week flicking through the portraits and profiles on sites like Tinder, Bumble, Grindr and Hinge.


The biggest, Tinder, sees up to 1.5 billion swipes a day worldwide, says company co-founder Jonathan Badeen, the man who claims credit for inventing the swipe — the right-or-left motion that drives the app as users pursue or reject potential matches. The simple mechanism perfectly suits the service’s short-attention-span, glued-to-their-phones target market.


It also launched a seismic social shift that psychologists are just beginning to grapple with.

“We evolved in the context of small groups,” says David Buss, a University of Texas evolutionary psychologist interviewed in the film.

Early humans encountered just a few dozen potential mates over a lifetime. But modern life — and especially Internet dating — provides an endless parade of choices, which “triggers the short-term mating psychology in a way that never would have been triggered ancestrally,” Buss adds.

In other words, it encourages hookups.

“Hookup culture did not start with dating apps,” Sales says. “But online dating has weaponized hookup culture and has sent it into warp speed.”

And even though 80 percent of dating-app users say they turn to them in hopes of finding a long-term partner, Sales says, the apps instead reward behaviors that undermine and, eventually, destroy relationships.

THE fault lies in their very design, which exploits our brain chemistry through a calculated program of intermittent rewards that arrive regularly but unpredictably, just like the occasional jackpots of a slot machine.

“We absolutely added these almost game-like elements, where you feel like you’re being rewarded,” Tinder’s Badeen tells Sales in the film. “You’re excited to see who the next person is, or you’re excited to see, did I get the match?”

When a pair of Tinder users swipe right on each other’s profiles, the signal of mutual interest sets off some gratifying graphics and audio effects.



“And then you unlock the ability to message them, and it feels good,” explains Vin, a college student from California. “Or you can go back and test your luck again.”

“It’s like a mini-adrenaline rush every time,” Kyle says. “It’s like a little video game.”

Badeen based the function on the theories of Harvard behavioral scientist B.F. Skinner, whose experiments with pigeons proved that even birds can be transformed into compulsive gamblers, addicted to the high of occasional machine-driven winnings, if the rewards are doled out on what he called a “variable ratio schedule.”

“Having unpredictable, yet frequent, rewards is the best way to motivate somebody,” Badeen says in the film.

Alex (left) and Kyle met on Tinder but have negative feelings about the app.HBO







“It’s called gamification, and it is designed to be addictive,” Sales adds. “It’s explicitly modeled to control behavior.”

A variable ratio schedule, Skinner maintained, is what hooks us on gambling devices. The payoffs, when they happen, bathe our brains in a feel-good hit of dopamine — and the unpredictability goads us into trying for just one more win.

“Apps that give you variable feedback, rather than predictable feedback, have this same potential to be addictive,” says NYU psychologist Adam Alter.

“They are engineered to draw you in and to keep on using it, not to help you meet the love of your life,” Sales says.

Finding a long-term partner “may be what the user wants, but it’s not the goal of these platforms. The goal is to keep you swiping, keep you coming back for more” — an urge the apps can monetize by offering premium features and added access, for a price.


Tinder is on pace to earn $800 million this year, its parent company said last month.

“The way these services are designed tips the scale toward hookups,” admits Justin McLeod, the CEO of Hinge, a dating app that bills itself as relationship-oriented.

And even the apps that talk a good relationship game trend in the same Tinder-fied direction, users say.

“All the guys, they’re not looking for s–t but hookups,” Bree insists in the film. “And like quick, that-night hookups . . . for guys, it’s like a catalog for them.”

“This tech has actually privileged the people who want hookups,” Sales says. “And statistically, it’s just true that men are more interested in hooking up than women.”

She blames the “bro culture” of Silicon Valley and the tech genius of young men — and a handful of female peers — who bonded in college and went on to build sites that suited their own social needs.

ONE of those few women, Tinder co-founder Whitney Wolfe Herd, appears in the film to talk about her company’s early marketing strategy.

The app was launched with Herd’s 2012 visit to Southern Methodist University in Texas. “It was first taken to the sororities — pretty much the height of the culture of traditional femininity,” Sales says.

“Then we took it to the frats,” Herd recalls. “And we told them, ‘Every Kappa, every Pi Phi, every Theta — they’re on this app and they’re waiting for you to match with them. Download it, download it, download it!’ ”

Dylan recounts an ex treating her like an “object” only valued for her Instagram likes.HBO










“Talk about reinforcing gender stereotypes!” Sales says. “[Herd] seemed to be very proud of her marketing strategy. But here they were, literally giving girls to guys. That’s what these apps are designed to do.”

It led almost inexorably to the “Barbie and Ken culture” that social scientists see as the norm on dating apps aimed at heterosexual users.

Both sexes “rely on gender stereotypes, leading many women to sexualize themselves and many men to present themselves in a very stereotypically masculine way,” Sales says.

Fish pics, for example. The photo of a young man hoisting a just-caught sailfish or trout is a common Tinder trope.

“Literally, it’s saying, ‘I will get food for you,’ ” Sales says. “Or they’ll post a picture of themselves at the top of a mountain — that says ‘I can climb, I am strong.’ Or torso shots at the gym.”

Women, in turn, feel pressure to project a veneer of ultra-feminine sexuality.

“We got the bombshell bra on, face full of makeup, the weave or the wig,” Bree says in the doc. “And when all that comes off, when they see the real you, then they’re not even attracted to you anymore.”

“The accepted narrative of the apps is all about liberation,” Sales says. “But in truth it’s just a lot of people reapplying gender stereotypes — and a lot of times feeling bad about it.”

The constant curation of an online persona can do a number on users’ emotional health.

“The effect of mobile dating apps is that you feel like you can be dating all the time,” says Harvard dating historian Moira Weigel. “You feel as if you should always be putting yourself out there, promoting your product.”

“I’m very aware of the pressure and the need to be manicured and beautiful and to have a uniform Instagram feed that people will want to follow,” says Cheyenne. “I don’t enjoy doing sexual stuff with people because I’m so caught up in how I look. And then I’m also caught up in how they look.”

“I don’t have the greatest self-esteem,” she admits.

Millennials like Dylan, a young New York DJ with an impressive social-media following, don’t have it any easier.

“I was his trophy girlfriend with the cool clothes and a lot of followers on Instagram . . . but I don’t think he genuinely wanted me,” she says of one former flame. “He treated me like I was an object.”

Sales calls it “the scourge of ‘likes.’ ”

“That constant pressure to post and be perfect and be sexy has now worked its way into dating,” she says. “The makeup industry has exploded, by the way, and also plastic surgery — plastic surgeons have young women coming in saying ‘I want to look good in selfies.’ ”

An August study released by the American Society of Plastic Surgeons noted a sharp rise in procedures for girls under age 19 — tying that stat to the fact that the average millennial will take more than 25,000 selfies in his or her lifetime.

“Now dating is based entirely on pictures, not just on dating apps but also on Instagram, on Snapchat, multiple platforms,” Sales says.

“Heartbreak is nothing new, but it becomes so much easier with this technology.” “This technology” watches YOU even worse than you thought. What if your dating site is full of spies? A secret program at the Central Intelligence Agency relies on a form of mass surveillance activity that involved the collection of an unknown data set and included the gathering of some records belonging to Americans, according to a newly declassified letter from two Democratic senators.

Details of the CIA program have been kept from the public as well as some lawmakers, according to the April 2021 letter to the agency from Sens. Ron Wyden (D., Ore.) and Martin Heinrich (D., N.M.), members of the Senate Intelligence Committee. The letter was partially declassified and disclosed Thursday.

The nature of the type of collection isn’t made clear in the heavily redacted letter. It couldn’t be determined when the surveillance occurred or if the intelligence program is currently operational. It was also not clear whether another U.S. intelligence agency was performing the actual surveillance that supported the functioning of the CIA program, which isn’t unusual.

The senators’ letter urged the CIA to inform the public about the program, including what kinds of records have been collected, as well as the spy agency’s relationship with its sources of intelligence, the legal framework of the program, the amount of Americans’ records being maintained and how often searches of U.S. data are performed.

“This declassification is urgent,” the senators wrote.

“CIA recognizes and takes very seriously our obligation to respect the privacy and civil liberties of U.S. persons in the conduct of our vital national security mission, and conducts our activities, including collection activities, in compliance with U.S. law, Executive Order 12333, and our Attorney General guidelines,” Kristi Scott, the agency’s privacy and civil liberties officer, said in a statement. “CIA is committed to transparency consistent with our obligation to protect intelligence sources and methods.”

The CIA is generally prohibited by law from engaging in domestic spying. But some U.S. intelligence programs collect broad streams of internet or telephone data in a way that can scoop up information on Americans, such as when someone is communicating with a target of surveillance who lives overseas. Intelligence agencies refer to such information gathered about Americans as incidental collection, an issue that lawmakers in both parties have long said raises privacy concerns because it can evade traditional warrant requirements.

The surveillance activity is authorized under presidential Executive Order 12333, according to the senators’ letter, which is a Reagan-era document that sets rules for some methods of U.S. intelligence gathering. It is not subject to some of the same oversight that governs surveillance activities performed under the Foreign Intelligence Surveillance Act, a decades-old law that created a secretive court to review surveillance requests by U.S. intelligence agencies. But in their letter, the senators say the CIA has run the program “entirely outside the statutory framework that Congress and the public believe govern this collection.”

Ms. Scott didn’t address the senators’ concerns.

A redacted portion of the letter appearing to refer to previous actions by lawmakers said, “history demonstrates Congress’s clear intent, expressed over many years and through multiple pieces of legislation, to limit and, in some cases, prohibit the warrantless collection of Americans’ records, as well as the public’s intense interest in and support for these legislative efforts,” the letter to Director of National Intelligence Avril Haines and CIA Director William Burns said. “And yet, throughout this period, the CIA has secretly conducted its own bulk program.”

Disclosures in 2013 by former intelligence contractor Edward Snowden revealed that the National Security Agency had been secretly operating a program that collected bulk metadata from phone carriers about U.S. phone calls and text messages. The disclosures ignited an international uproar over the scope of America’s electronic-spying capabilities. That program was narrowed by a law passed by Congress in 2015 but has been beset by technical challenges since then and is believed by lawmakers to currently not be operational following the law’s lapse in March of 2020.

Soon after, reporting by The Wall Street Journal and other news organizations disclosed that the CIA was obtaining bulk data from companies such as Western Union Co. on international money transfers that included millions of Americans’ financial and personal data. The program was meant to fill what U.S. officials saw as an important gap in their ability to track terrorist financing world-wide, the Journal reported in 2014.

The letter from the two senators concerns a separate CIA program, according to a report also released Thursday by the Privacy and Civil Liberties Oversight Board, or PCLOB, a government panel that reviews classified intelligence programs. The board’s report refers to the same surveillance activity referenced by the senators as “another classified program” apart from the CIA’s financial data surveillance, which the privacy board also released findings on Thursday.

The privacy board said in its report it researched the CIA’s surveillance program between August 2015 and December 2016. The five-member board’s operations and its ability to release material to the public has been hampered for years by struggles to maintain a quorum.

Senators weren’t aware of the full details of how the CIA program operated before the board completed a review of it in March of 2021, according to the letter by Messrs. Wyden and Heinrich.

“Until the PCLOB report was delivered last month, the nature and extent of the CIA’s collection was withheld even from the Senate Select Committee on Intelligence,” the senators’ letter said.

On top of that: Zoom users on Apple computers got a shock when they realized their microphones were still recording them after installing macOS Monterey in October 2021. At the end of December, Zoom released an update — Zoom version 5.9.1 (3506) — to fix the bug, but users are still seeing the same thing happen.

Key Details

  • Apple’s devices have visual signals when apps use the device’s microphone or camera — an orange dot in the menu bar for the mic, a green dot for the camera — which users noticed that even when they weren’t on a call, these dots would still appear.
  • After Zoom’s December update, one user said, “I’ve just noticed the orange dot again, and when I quit Zoom, Timing.app told me that I’d apparently been on a 2 hour Zoom call.”

IN FACT – EVERY online camera, on dating sites, and just plain old Zoom, WEBEX, all of the Cisco products, etc. DO record you when you are not aware, and open your computer, or phone, to every hacker on Earth. Only dumb-bells use internet devices to relay any personal thoughts!

In partnership with

In the months leading up to Russia’s invasion of Ukraine, two obscure American startups met to discuss a potential surveillance partnership that would merge the ability to track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter. According to Brendon Clark of Anomaly Six — or “A6” — the combination of its cellphone location-tracking technology with the social media surveillance provided by Zignal Labs would permit the U.S. government to effortlessly spy on Russian forces as they amassed along the Ukrainian border, or similarly track Chinese nuclear submarines. To prove that the technology worked, Clark pointed A6’s powers inward, spying on the National Security Agency and CIA, using their own cellphones against them.

Virginia-based Anomaly Six was founded in 2018 by two ex-military intelligence officers and maintains a public presence that is scant to the point of mysterious, its website disclosing nothing about what the firm actually does. But there’s a good chance that A6 knows an immense amount about you. The company is one of many that purchases vast reams of location data, tracking hundreds of millions of people around the world by exploiting a poorly understood fact: Countless common smartphone apps are constantly harvesting your location and relaying it to advertisers, typically without your knowledge or informed consent, relying on disclosures buried in the legalese of the sprawling terms of service that the companies involved count on you never reading. Once your location is beamed to an advertiser, there is currently no law in the United States prohibiting the further sale and resale of that information to firms like Anomaly Six, which are free to sell it to their private sector and governmental clientele. For anyone interested in tracking the daily lives of others, the digital advertising industry is taking care of the grunt work day in and day out — all a third party need do is buy access.

Company materials obtained by The Intercept and Tech Inquiry provide new details of just how powerful Anomaly Six’s globe-spanning surveillance powers are, capable of providing any paying customer with abilities previously reserved for spy bureaus and militaries.

According to audiovisual recordings of an A6 presentation reviewed by The Intercept and Tech Inquiry, the firm claims that it can track roughly 3 billion devices in real time, equivalent to a fifth of the world’s population. The staggering surveillance capacity was cited during a pitch to provide A6’s phone-tracking capabilities to Zignal Labs, a social media monitoring firm that leverages its access to Twitter’s rarely granted “firehose” data stream to sift through hundreds of millions of tweets per day without restriction. With their powers combined, A6 proposed, Zignal’s corporate and governmental clients could not only surveil global social media activity, but also determine who exactly sent certain tweets, where they sent them from, who they were with, where they’d been previously, and where they went next. This enormously augmented capability would be an obvious boon to both regimes keeping tabs on their global adversaries and companies keeping tabs on their employees.


Most Read


Noam Chomsky and Jeremy Scahill on the Russia-Ukraine War, the Media, Propaganda, and Accountability

Jeremy Scahill

Jared Kushner Flaunted His Influence With Saudi Arabia, Russia in Pitch to Investors

Ken Klippenstein

The Armenian Genocide Holds a Bitter Lesson for Those Who Weep for Ukraine

Jon Schwarz

The source of the materials, who spoke on the condition of anonymity to protect their livelihood, expressed grave concern about the legality of government contractors such as Anomaly Six and Zignal Labs “revealing social posts, usernames, and locations of Americans” to “Defense Department” users. The source also asserted that Zignal Labs had willfully deceived Twitter by withholding the broader military and corporate surveillance use cases of its firehose access. Twitter’s terms of service technically prohibit a third party from “conducting or providing surveillance or gathering intelligence” using its access to the platform, though the practice is common and enforcement of this ban is rare. Asked about these concerns, spokesperson Tom Korolsyshun told The Intercept “Zignal abides by privacy laws and guidelines set forth by our data partners.”

A6 claims that its GPS dragnet yields between 30 to 60 location pings per device per day and 2.5 trillion locational data points annually worldwide, adding up to 280 terabytes of location data per year and many petabytes in total, suggesting that the company surveils roughly 230 million devices on an average day. A6’s salesperson added that while many rival firms gather personal location data via a phone’s Bluetooth and Wi-Fi connections that provide general whereabouts, Anomaly 6 harvests only GPS pinpoints, potentially accurate to within several feet. In addition to location, A6 claimed that it has built a library of over 2 billion email addresses and other personal details that people share when signing up for smartphone apps that can be used to identify who the GPS ping belongs to. All of this is powered, A6’s Clark noted during the pitch, by general ignorance of the ubiquity and invasiveness of smartphone software development kits, known as SDKs: “Everything is agreed to and sent by the user even though they probably don’t read the 60 pages in the [end user license agreement].”

The Intercept was not able to corroborate Anomaly Six’s claims about its data or capabilities, which were made in the context of a sales pitch. Privacy researcher Zach Edwards told The Intercept that he believed the claims were plausible but cautioned that firms can be prone to exaggerating the quality of their data. Mobile security researcher Will Strafach agreed, noting that A6’s data sourcing boasts “sound alarming but aren’t terribly far off from ambitious claims by others.” According to Wolfie Christl, a researcher specializing in the surveillance and privacy implications of the app data industry, even if Anomaly Six’s capabilities are exaggerated or based partly on inaccurate data, a company possessing even a fraction of these spy powers would be deeply concerning from a personal privacy standpoint.

Reached for comment, Zignal’s spokesperson provided the following statement: “While Anomaly 6 has in the past demonstrated its capabilities to Zignal Labs, Zignal Labs does not have a relationship with Anomaly 6. We have never integrated Anomaly 6’s capabilities into our platform, nor have we ever delivered Anomaly 6 to any of our customers.”

When asked about the company’s presentation and its surveillance capabilities, Anomaly Six co-founder Brendan Huff responded in an email that “Anomaly Six is a veteran-owned small business that cares about American interests, natural security, and understands the law.”

Companies like A6 are fueled by the ubiquity of SDKs, which are turnkey packages of code that software-makers can slip in their apps to easily add functionality and quickly monetize their offerings with ads. According to Clark, A6 can siphon exact GPS measurements gathered through covert partnerships with “thousands” of smartphone apps, an approach he described in his presentation as a “farm-to-table approach to data acquisition.” This data isn’t just useful for people hoping to sell you things: The largely unregulated global trade in personal data is increasingly finding customers not only at marketing agencies, but also federal agencies tracking immigrants and drone targets as well as sanctions and tax evasion. According to public records first reported by Motherboard, U.S. Special Operations Command paid Anomaly Six $590,000 in September 2020 for a year of access to the firm’s “commercial telemetry feed.”

Anomaly Six software lets its customers browse all of this data in a convenient and intuitive Google Maps-style satellite view of Earth. Users need only find a location of interest and draw a box around it, and A6 fills that boundary with dots denoting smartphones that passed through that area. Clicking a dot will provide you with lines representing the device’s — and its owner’s — movements around a neighborhood, city, or indeed the entire world.

As the Russian military continued its buildup along the country’s border with Ukraine, the A6 sales rep detailed how GPS surveillance could help turn Zignal into a sort of private spy agency capable of assisting state clientele in monitoring troop movements. Imagine, Clark explained, if the crisis zone tweets Zignal rapidly surfaces through the firehose were only a starting point. Using satellite imagery tweeted by accounts conducting increasingly popular “open-source intelligence,” or OSINT, investigations, Clark showed how A6’s GPS tracking would let Zignal clients determine not simply that the military buildup was taking place, but track the phones of Russian soldiers as they mobilized to determine exactly where they’d trained, where they were stationed, and which units they belonged to. In one case, Clark showed A6 software tracing Russian troop phones backward through time, away from the border and back to a military installation outside Yurga, and suggested that they could be traced further, all the way back to their individual homes. Previous reporting by the Wall Street Journal indicates that this phone-tracking method is already used to monitor Russian military maneuvers and that American troops are just as vulnerable.

In another A6 map demonstration, Clark zoomed in closely on the town of Molkino, in southern Russia, where the Wagner Group, an infamous Russian mercenary outfit, is reportedly headquartered. The map showed dozens of dots indicating devices at the Wagner base, along with scattered lines showing their recent movements. “So you can just start watching these devices,” Clark explained. “Any time they start leaving the area, I’m looking at potential Russian predeployment activity for their nonstandard actors, their nonuniform people. So if you see them go into Libya or Democratic Republic of the Congo or things like that, that can help you better understand potential soft power actions the Russians are doing.”

To fully impress upon its audience the immense power of this software, Anomaly Six did what few in the world can claim to do: spied on American spies.

The pitch noted that this kind of mass phone surveillance could be used by Zignal to aid unspecified clients with “counter-messaging,” debunking Russian claims that such military buildups were mere training exercises and not the runup to an invasion. “When you’re looking at counter-messaging, where you guys have a huge part of the value you provide your client in the counter-messaging piece is — [Russia is] saying, ‘Oh, it’s just local, regional, um, exercises.’ Like, no. We can see from the data that they’re coming from all over Russia.”

To fully impress upon its audience the immense power of this software, Anomaly Six did what few in the world can claim to do: spied on American spies. “I like making fun of our own people,” Clark began. Pulling up a Google Maps-like satellite view, the sales rep showed the NSA’s headquarters in Fort Meade, Maryland, and the CIA’s headquarters in Langley, Virginia. With virtual boundary boxes drawn around both, a technique known as geofencing, A6’s software revealed an incredible intelligence bounty: 183 dots representing phones that had visited both agencies potentially belonging to American intelligence personnel, with hundreds of lines streaking outward revealing their movements, ready to track throughout the world. “So, if I’m a foreign intel officer, that’s 183 start points for me now,” Clark noted.

The NSA and CIA both declined to comment.


Anomaly Six tracked a device that had visited the NSA and CIA headquarters to an air base outside of Zarqa, Jordan.

Screenshot: The Intercept / Google Maps

Clicking on one of dots from the NSA allowed Clark to follow that individual’s exact movements, virtually every moment of their life, from that previous year until the present. “I mean, just think of fun things like sourcing,” Clark said. “If I’m a foreign intel officer, I don’t have access to things like the agency or the fort, I can find where those people live, I can find where they travel, I can see when they leave the country.” The demonstration then tracked the individual around the United States and abroad to a training center and airfield roughly an hour’s drive northwest of Muwaffaq Salti Air Base in Zarqa, Jordan, where the U.S. reportedly maintains a fleet of drones.


“It doesn’t take a lot of creativity to see how foreign spies can use this information for espionage, blackmail, all kinds of, as they used to say, dastardly deeds.”

“There is sure as hell a serious national security threat if a data broker can track a couple hundred intelligence officials to their homes and around the world,” Sen. Ron Wyden, D-Ore., a vocal critic of the personal data industry, told The Intercept in an interview. “It doesn’t take a lot of creativity to see how foreign spies can use this information for espionage, blackmail, all kinds of, as they used to say, dastardly deeds.”

Back stateside, the person was tracked to their own home. A6’s software includes a function called “Regularity,” a button clients can press that automatically analyzes frequently visited locations to deduce where a target lives and works, even though the GPS pinpoints sourced by A6 omit the phone owner’s name. Privacy researchers have long shown that even “anonymized” location data is trivially easy to attach to an individual based on where they frequent most, a fact borne out by A6’s own demonstration. After hitting the “Regularity” button, Clark zoomed in on a Google Street View image of their home.

“Industry has repeatedly claimed that collecting and selling this cellphone location data won’t violate privacy because it is tied to device ID numbers instead of people’s names. This feature proves just how facile those claims are,” said Nate Wessler, deputy director of the American Civil Liberties Union’s Speech, Privacy, and Technology Project. “Of course, following a person’s movements 24 hours a day, day after day, will tell you where they live, where they work, who they spend time with, and who they are. The privacy violation is immense.”

The demo continued with a surveillance exercise tagging U.S. naval movements, using a tweeted satellite photo of the USS Dwight D. Eisenhower in the Mediterranean Sea snapped by the commercial firm Maxar Technologies. Clark broke down how a single satellite snapshot could be turned into surveillance that he claimed was even more powerful than that executed from space. Using the latitude and longitude coordinates appended to the Maxar photo along with its time stamp, A6 was able to pick up a single phone signal from the ship’s position at that moment, south of Crete. “But it only takes one,” Clark noted. “So when I look back where that one device goes: Oh, it goes back to Norfolk. And actually, on the carrier in the satellite picture — what else is on the carrier? When you look, here are all the other devices.” His screen revealed a view of the carrier docked in Virginia, teeming with thousands of colorful dots representing phone location pings gathered by A6. “Well, now I can see every time that that ship is deploying. I don’t need satellites right now. I can use this.”

Though Clark conceded that the company has far less data available on Chinese phone owners, the demo concluded with a GPS ping picked up aboard an alleged Chinese nuclear submarine. Using only unclassified satellite imagery and commercial advertising data, Anomaly Six was able to track the precise movements of the world’s most sophisticated military and intelligence forces. With tools like those sold by A6 and Zignal, even an OSINT hobbyist would have global surveillance powers previously held only by nations. “People put way too much on social media,” Clark added with a laugh.

As location data has proliferated largely unchecked by government oversight in the United States, one hand washes another, creating a private sector capable of state-level surveillance powers that can also fuel the state’s own growing appetite for surveillance without the usual judicial scrutiny. Critics say the loose trade in advertising data constitutes a loophole in the Fourth Amendment, which requires the government to make its case to a judge before obtaining location coordinates from a cellular provider. But the total commodification of phone data has made it possible for the government to skip the court order and simply buy data that’s often even more accurate than what could be provided by the likes of Verizon. Civil libertarians say this leaves a dangerous gap between the protections intended by the Constitution and the law’s grasp on the modern data trade.

“The Supreme Court has made clear that cellphone location information is protected under the Fourth Amendment because of the detailed picture of a person’s life it can reveal,” explained Wessler. “Government agencies’ purchases of access to Americans’ sensitive location data raise serious questions about whether they are engaged in an illegal end run around the Fourth Amendment’s warrant requirement. It is time for Congress to end the legal uncertainty enabling this surveillance once and for all by moving toward passage of the Fourth Amendment Is Not For Sale Act.”

Though such legislation could restrict the government’s ability to piggyback off commercial surveillance, app-makers and data brokers would remain free to surveil phone owners. Still, Wyden, a co-sponsor of that bill, told The Intercept that he believes “this legislation sends a very strong message” to the “Wild West” of ad-based surveillance but that clamping down on the location data supply chain would be “certainly a question for the future.” Wyden suggested that protecting a device’s location trail from snooping apps and advertisers might be best handled by the Federal Trade Commission. Separate legislation previously introduced by Wyden would empower the FTC to crack down on promiscuous data sharing and broaden consumers’ ability to opt out of ad tracking.

A6 is far from the only firm engaged in privatized device-tracking surveillance. Three of Anomaly Six’s key employees previously worked at competing firm Babel Street, which named all three of them in a 2018 lawsuit first reported by the Wall Street Journal. According to the legal filing, Brendan Huff and Jeffrey Heinz co-founded Anomaly Six (and lesser-known Datalus 5) months after ending their employment at Babel Street in April 2018, with the intent of replicating Babel’s cellphone location surveillance product, “Locate X,” in a partnership with major Babel competitor Semantic AI. In July 2018, Clark followed Huff and Heinz by resigning from his position as Babel’s “primary interface to … intelligence community clients” and becoming an employee of both Anomaly Six and Semantic.

Like its rival Dataminr, Zignal touts its mundane partnerships with the likes of Levi’s and the Sacramento Kings, marketing itself publicly in vague terms that carry little indication that it uses Twitter for intelligence-gathering purposes, ostensibly in clear violation of Twitter’s anti-surveillance policy. Zignal’s ties to government run deep: Zignal’s advisory board includes a former head of the U.S. Army Special Operations Command, Charles Cleveland, as well as the CEO of the Rendon Group, John Rendon, whose bio notes that he “pioneered the use of strategic communications and real-time information management as an element of national power, serving as a consultant to the White House, U.S. National Security community, including the U.S. Department of Defense.” Further, public records state that Zignal was paid roughly $4 million to subcontract under defense staffing firm ECS Federal on Project Maven for “Publicly Available Information … Data Aggregation” and a related “Publicly Available Information enclave” in the U.S. Army’s Secure Unclassified Network.

The remarkable world-spanning capabilities of Anomaly Six are representative of the quantum leap occurring in the field of OSINT. While the term is often used to describe the internet-enabled detective work that draws on public records to, say, pinpoint the location of a war crime from a grainy video clip, “automated OSINT” systems now use software to combine enormous datasets that far outpace what a human could do on their own. Automated OSINT has also become something of a misnomer, using information that is by no means “open source” or in the public domain, like commercial GPS data that must be bought from a private broker.

While OSINT techniques are powerful, they are generally shielded from accusations of privacy violation because the “open source” nature of the underlying information means that it was already to some extent public. This is a defense that Anomaly Six, with its trove of billions of purchased data points, can’t muster. In February, the Dutch Review Committee on the Intelligence and Security Services issued a report on automated OSINT techniques and the threat to personal privacy they may represent: “The volume, nature and range of personal data in these automated OSINT tools may lead to a more serious violation of fundamental rights, in particular the right to privacy, than consulting data from publicly accessible online information sources, such as publicly accessible social media data or data retrieved using a generic search engine.” This fusion of publicly available data, privately procured personal records, and computerized analysis isn’t the future of governmental surveillance, but the present. Last year, the New York Times reported that the Defense Intelligence Agency “buys commercially available databases containing location data from smartphone apps and searches it for Americans’ past movements without a warrant,” a surveillance method now regularly practiced throughout the Pentagon, the Department of Homeland Security, the IRS, and beyond.

The Internet Is Stealing Your Life!

Here’s what we’re talking about this month:

  • Real estate. How Personally Identifiable Information (PII), the housing market, and scams go hand in hand and how to avoid having your house stolen.
  • Recommended reads, including “LinkedIn Phishing Scams Up by 232% Since February.”
  • Q&A: What are dark patterns? Are they actually bad?

If you know someone who might enjoy learning more about data privacy, feel free to forward them this newsletter.

House prices may be soaring, but that hasn’t stopped Americans from going on a “near-record homebuying spree” during the pandemic. In fact, the sudden shift to hybrid work models combined with relatively low interest rates and pandemic savings have prompted more people to consider buying second and even third homes.

However, potential home buyers were not the only ones busy during the last few years. Amidst the chaos of the COVID-19 crisis, criminals also ramped up their activities, including identity theft. For example, in 2020, about 49 million Americans fell victim to identity theft, costing victims a total of almost $56 billion.

While identity theft is most commonly associated with drained bank accounts, few realize that as long as criminals can access people’s personal information, including their real estate data, they can also steal their homes.


Your Real Estate Data Is (Very) Public

In the US, the real estate recording system is based on open access. That means that any information about a home purchase is public record.

Anyone can perform a property record search to find out things like who the owner of a home is, how much they paid for it, when they purchased it, its square footage, property deeds, terms and conditions of a mortgage loan (if applicable), tax liens (if applicable), and even the owner’s personal history, like if they’re divorced or facing bankruptcy.

Real estate records are easily available.

Individuals can access this data through entities like the county courthouse, city hall, and county clerk recorder’s office.


  • In many cases, people don’t even have to leave their homes to find this data, as most agencies upload their records online.
  • Data brokers also collate this information, which they get from deed registrations, magazine subscriptions, phone connections, and the US Postal Service. However, data brokers also have other, very personal data on individuals, like their race/ethnicity, income, and presence of children, among other things.
  • Real estate property data + other personally identifiable information (PII) = Identity theft waiting to happen.

Exploiting the New Kid on the Block

At the very least, moving home will lead to predatory junk mail, targeted ads, and spam calls. This is because data brokers place people they know have bought a new home into “new movers” lists. These lists are frequently sold to furniture and appliance dealers, doctors and dentists, lawn maintenance services, and other businesses.

Experian, a data broker and credit reporting company, that has information on over a billion individuals, sells a “new movers mailing list” to local businesses so that they can get to “know prospective clients, including trade-up homebuyers, apartment renters, corporate climbers, and retirees.”


A Bigger Issue: Real Estate Scams

Identity theft. If a criminal can get their hands on your personally identifiable information, including your Social Security number, they can potentially trick a bank or a mortgage broker into thinking they are you and take out a mortgage loan in your name.

For example, in late 2021, seven individuals were sent to prison for stealing the identities of absent homeowners with no mortgages, falsifying loan documents, and opening bank accounts in their names. They then used the loan money to buy luxury cars and other expensive items.

Deed fraud. Using personal information found online, criminals can impersonate a homeowner to transfer the title of their home to themselves. While abandoned and vacation homes are the prime targets for this scam, some criminals will go after occupied homes as well. In the latter scenario, a homeowner may not realize what has happened until they go to sell the home or receive notice of eviction. In 2020 deed theft netted scammers $547 million.

Once a criminal has obtained a person’s home title, they can:


  • Live there. Although this is rare, it does happen with unoccupied properties.
  • Rent or sell the property. Once again targeting unoccupied properties, this type of scam can provide criminals with regular monthly payments from clueless tenants or profit from a home sale to a legitimate buyer.
  • Apply for a home equity line of credit. Opened in the victim’s name, this allows the criminal to take out equity against a home and not make the payment.
  • Refinance a mortgage. Here, criminals cash out the equity, taking the difference. Because criminals won’t pay the new mortgage, victims can end up facing foreclosure.

Foreclosure rescue scam. This scam starts with criminals identifying homeowners that have fallen behind on their mortgage payments through the internet or public foreclosure notices in newspapers. The criminal (or “rescuer”) then contacts the homeowner, assuring them that they can help them save their home. In the end, they usually make a profit from fees or direct mortgage payments, while the victim loses their home to foreclosure.


How to Avoid Real Estate Scams

  • Keep an eye on your property deed’s status. Do this regularly to ensure no one is attempting to take over your ownership rights. If you notice any suspicious paperwork or a signature that isn’t yours, look into it immediately.
  • Review your home equity line of credit. Periodically check your credit reports to confirm that criminals have not opened a home equity line of credit in your name.
  • Question all unusual communications. If you’re contacted by a mortgage company you don’t recognize, investigate the matter further, even if the mail is addressed to someone else. Reading what she thought was “junk mail” is exactly how one woman discovered her home was stolen.
  • Be wary of missing bills. Missing bills or automatic withdrawals that no longer happen could indicate a change in deed status. If you don’t live in a property, get your bills redirected to you.
  • Keep your personal information off the web. Don’t overshare on social media, be wary of the things you post on forums like Reddit, and continuously remove your name from data brokers and people search sites. The less you share online, the less information data brokers will be able to acquire about you, making you a less attractive target for identity theft.

Recommended Reads

Our recent favorites to keep you up to date in today’s digital privacy landscape.

Apple Is Working on Air Tags’ Privacy Features After Reports of Stalking

By connecting to nearby Apple devices, Apple AirTag trackers can help people find their keys and wallets. However, they are also increasingly being used to stalk individuals without their consent and steal luxury vehicles. In response, Apple has issued a statement notifying iPhone users of upcoming software updates that will alert them of unknown AirTags and make it easier to locate them.
Google Plans to Stop Cross-App Tracking Android Users
Following in Apple’s steps, Google recently announced that it would end cross-app tracking on Android devices. Instead, the tech giant is designing a new system that it claims will promote user privacy while at the same time keeping advertisers happy. However, Google made it clear that nothing will change for at least two years, giving the advertising industry ample time to prepare.
LinkedIn Phishing Scams Up by 232% Since February
LinkedIn phishing scams have grown by a whopping 232% since February 1st, 2022. Taking advantage of “The Great Resignation,” scammers are replicating LinkedIn email messages. Although the emails look a lot like they come from the social media site (with subject lines like “You appeared in 4 searches this week.”), the webmail address is obviously fake, and clicking on the malicious link brings victims to a site that harvests their LinkedIn credentials.
500 e-Commerce Sites Compromised with Credit Card Skimmers
Hackers compromised around 500 e-commerce shops, including Segway, by installing credit card skimmers on sites running an outdated version of the e-commerce platform Magento CMS. When shoppers entered their credit card details, the information was sent to attacker-controlled servers. The frequency of these types of attacks has grown in the past five years, as has their sophistication.

You Asked, We Answered

Here is a question one of our readers asked us last month.

Q: When logging in to a site, is it better to use an existing social media account (like Facebook or Google) or email address?

A: Logging in with an existing account may be easier, and from a security perspective, it may even be safer. However, from a privacy perspective, it is not recommended.

The reason why is that when you log in to a website with another account, you are, in most cases, permitting data sharing between the two sites. For example, when you use Facebook to log onto a site/app, it can ask Facebook for up to 40 different permissions, including access to your timeline, photos, and friends’ list.

Clearly, then, you should only use social media sign in with sites/apps you trust. It’s also a good practice to keep a close eye on your preferred social network’s privacy policy.

If, however, you’re worried about giving away your email address (which, with scams and phishing attacks soaring, is totally justifiable), consider using a masked email when signing up for sites/apps you don’t entirely trust.

Q: What are dark patterns? Are they actually bad?

A: Dark patterns are practices that trick users into taking action on a website/app/email/form/etc. that they didn’t necessarily intend to/want to take.

Sometimes, dark patterns can be attributed to poorly designed UI and UX experiences rather than deliberate manipulation. Other times, these deceptive practices are intentionally built into the UI.

Examples of dark patterns include:

  • A streaming service that automatically charges you after a trial expires.
  • An ad that pops up on a website/app and that you can’t exit because the “x” is too small for you to see.
  • A sign-up process that makes you think you have to provide certain personal data to create an account with a website/app, when, in fact, you do not (for instance, the messaging board Reddit asks you for your email address, but few people realize they can just click “Continue” to register without one).
  • A countdown clock that manipulates users into making quick decisions (popular on e-commerce sites).
  • A pop up that guilts you into signing up for something or makes you feel stupid for not doing so (for example, a 20% discount code that you can get by sharing your email. The alternative is to click “I don’t want 20% off.”)

You can see more types of dark patterns on darkpatterns.org, a website by UX specialist Harry Brignull who came up with the term in 2010, with real-world examples (“Hall of Shame”) from Google, Facebook, Amazon, LinkedIn, Apple, and more.

Back to You

We’d love to hear your thoughts about all things data privacy.

Get in touch with us. We love getting emails from our readers (or tweet us @Abine or @DeleteMe).

Don’t forget to share! If you know someone who might enjoy learning more about data privacy, feel free to forward them this newsletter. If you’d like to subscribe to the newsletter, use this link.

Data Brokers: The Middlemen of Capitalism

Here’s what we’re talking about this month:
  • Data brokers. Their business model is rooted in collecting as much data about you as possible and then selling it to third parties. How does this impact you? And is there anything you can do to stop them?
  • Recommended reads including “Meta Makes It Harder for Users to Doxx One Another.”
  • Q&A: I know it’s not okay to reuse passwords, but what about usernames? Should we have a different username for each account, or can we use the same one?
And more!
If you know someone who might enjoy learning more about data privacy, feel free to forward them this newsletter. 
“If you’re not paying for it, you’re the product.” It’s a famous saying that most of us are familiar with. However, as we browse the internet, few of us realize the true extent to which we are being tracked online—and how our personal data is monetized.

The “Middlemen of Surveillance Capitalism”

Vice describes it as the “Industry That Unmasks People at Scale.” Wired calls the firms within the sector the “…middlemen of surveillance capitalism.” So what are data brokers?

Data brokers are companies that aggregate people’s personal information from various online and offline sources and sell this data to third parties.

  • The data these firms have on you can include your gender, age, sexual orientation, income, home address, if you’re married/divorced, your political affiliation, what kind of laundry detergent you prefer, whether you purchase adult material, and so on.
  • Data brokers get this data from: third-party cookies that track you across the web, public sources such as voter registration information, retailers’ purchase histories, social media, apps that track your location, and other data brokers.

Are You an “Affluent Baby Boomer” or a “Working Class Mom”?

Not only do data brokers collect all this information about us, but they also put people into specific categories.

As noted by the Federal Trade Commission, some of these categories, like “Dog Owner,” may seem benign. However, others are much more intrusive.

How would you feel if you found out that you were tagged as “Rural Everlasting,” a single person over the age of 66 with “low educational attainment and low net worth”? What about “Bible Lifestyle,” “Help Needed—I Am 90 Days Behind with Bills,” or “Diabetes Interest”?

That last one (“Diabetes Interest”) is especially interesting. If medical information is protected under HIPAA, how on earth do data brokers find out people are pregnant or have cancer? The answer is surprisingly simple: while the information you share with your physician is indeed confidential, your online health-related searches are not. 


Why Your Insurance May Suddenly Be Higher

It’s not just marketers who want to better target their ads that data brokers sell your information to.
Data brokers have a vast and varied client base that includes individual consumers, insurance companies, financial services firms, real estate services, and technology companies, among others.
For example, if you notice that your insurance bill has gone up for no apparent reason, it could be that your lifestyle/health has resulted in data brokers placing you in a specific category, i.e., “Cholesterol Focus” or “Biking Enthusiast.”
Granted, the information that data brokers have on you and sell to others may not even be correct. For example, you may have searched online for information on cholesterol because a family member or friend has an issue, not you.
  • A few years back, a reporter for The Atlantic requested to see the data that a data broker had on her. As it turned out, almost 50% of the information was incorrect.
  • Unfortunately, data brokers do not allow individuals to edit their profiles.
  • A man who took a data broker to court in 2017 said that the erroneous information they had on him might have cost him job opportunities.

A Way to Circumvent or Break the Law

For government entities, data broker firms provide a way to get around the Fourth Amendment protection against “…unreasonable searches and seizures.” Federal agencies from the IRS to the FBI and US Immigration and Customs Enforcement have been found to regularly purchase this data without warrants or public disclosures.
Data brokers are also increasingly being used by:
  1. Cybercriminals who are looking for data to personalize their social engineering campaigns.
  2. Scammers who can use this information to trick vulnerable people. In 2021, the data broker Epsilon was told to pay $127.5 million for helping scammers carry out elder fraud schemes.
  3. Stalkers who want to find their victims’ addresses and phone numbers. 

What Are Data Brokers Saying?

Data brokers claim that the data they sell is “anonymized,” i.e., it can’t be linked to actual individuals.

Although that may sound reassuring, the reality is that data brokers provide enough information to connect data to people. Not long ago, researchers outlined a method that, according to them, allows to successfully re-identify 99.98% of Americans in any dataset based on just 15 demographic attributes.

That anonymized data is never really anonymous was proven before. In 2006, the internet company AOL published anonymized search records of its users for research purposes. None of the users were identified. Instead, they were assigned account numbers. Still, many of the searches did contain personally identifiable information. Based on searches like “60 single men,” “landscapers in Lilburn, Ga,” and “numb fingers,” The New York Times was able to unveil the identity of person no. 4417749 as a widow living in Lilburn, Ga. 


How Is Data Brokerage Still Legal?

Because data brokers get much of their information from public sources, their business model is technically legal. And although several states have passed legislation to rein them in, a comprehensive federal law hasn’t yet happened.
There are many reasons why. 
  1. For starters, data brokers are spending millions of dollars lobbying Congress.
  2. But also, many politicians use data broker services themselves to drive their campaigns, from deciding whom to target and where to campaign and even the exact wording of their campaign messages.

How to Stop Data Brokers From Selling Your Information

Use a private web browser and search engine. To avoid trackers as you browse the internet, use a browser that takes privacy seriously, like Brave or Firefox, or a search engine like DuckDuckGo (which just launched a browser for macOS, currently in beta). Brave and DuckDuckGo now also block Google’s Accelerated Mobile Pages (AMP). Through AMP, a publishing technology, Google hosts content on its own servers, which makes pages load faster. However, privacy advocates say that AMP lets Google collect even more information about people’s browsing habits.
Avoid sharing information on social media and forums. Data brokers scrape social media platforms and even password-protected forums for personal information. The latest court ruling deems this practice legal. The only way to avoid this is to refrain from oversharing online.

Keep the number of apps you have on your phone to a minimum. Like websites, many apps have trackers that send you information, including your location data, to data brokers. If you’re an iPhone user, know that this happens even with Apple’s privacy policies in place.

Disable location tracking on your phone. Whether you’re using an Android phone or an iPhone, you can disable location tracking on your phone.

Know your rights. Depending on where you live, you may be able to see the kind of information data brokers hold on you. For example, under the California Consumer Privacy Act, residents of the state can opt-out of data collection and ask data brokers to delete any information they have on them.

Opt-out of data brokers. Data brokers don’t have to honor your request to opt out, but many do. We have a free guide on how to remove yourself from the most popular data brokers. However, the process varies from data broker to data broker. While some let you fill in a form, others may require you to create an account with them, mail your opt-out request or verify your request over the phone. Remember that data brokers will relist your data after a while, so it’s important to be on this task continuously. For those who don’t have the time to go through this process repeatedly but still value their privacy, DeleteMe’s data broker removal service can remove your information from these sites on your behalf.


Recommended Reads

Our recent favorites to keep you up to date in today’s digital privacy landscape.
LinkedIn Most Imitated Brand in Phishing Campaigns
The employment-oriented social media platform LinkedIn is now the most imitated site by social engineers. It accounted for 52% of phishing attacks across the world in Q1 of 2022. That’s a 44% increase from the last quarter. Other brands threat actors like to hide behind include DHL (14%), Google (7%), Microsoft (6%), FedEx (6%), WhatsApp (4%), Amazon (2%), Maersk (1%), AliExpress (0.8%), and Apple (0.8%). 
Louis Vuitton Accused of Violating Illinois BIPA with Virtual Try-On Feature
The North American unit of the French luxury fashion house Louis Vuitton was sued for unlawfully collecting and storing consumer biometric data through its “Virtual Try-On” tool. The tool, which allows users to virtually try on eyeglasses, allegedly collects customers’ facial scans and other sensitive biometric identifiers and information without first informing users or getting their permission. 
Clearview AI to Offer Its Services to Banks and Private Businesses
The controversial face recognition company Clearview AI is branching out. The company best known for selling its software to law enforcement agencies is now planning to provide its technology to banks and other private businesses. In this way, it hopes to compete with tech giants like Microsoft and Amazon in facial recognition verification. The company claims that the technology will not rely on its 20 billion image database used by the police.
Meta Makes It Harder for Users to Doxx One Another
By the end of the year, Meta (formerly Facebook) will end an exception to its policy that lets users post people’s residential information on the platform if it is publicly available. This is in response to a recommendation from Facebook’s own Oversight Board. On the other hand, Meta users will be able to post photos of home exteriors if they’re featured in a news story, except if it’s in the context of protests against residents.

You Asked, We Answered

Here is a question one of our readers asked us last month.
Q: I know it’s not okay to reuse passwords, but what about usernames? Should we have a different username for each account, or can we use the same one?
A: If you use the same username across different accounts, then it is easier for malicious individuals to track you across the internet.

For example, if a stalker or cybercriminal knows your username on one social networking site, they can type in that username into Google and see your other accounts, including those on other social media (Instagram, Twitter, YouTube, etc.) and online forums.

In doing so, they can build an entire profile on you (i.e., where you live and work, who you’re friends with, what your interests are, and so on.)

Consequently, reusing your username — even if it doesn’t include identifying information like your name and surname — increases your risk of account hijacking, stalking, doxxing, identity theft, and social engineering attacks. 

Q: Will doing a factory reset of my device reset my personal information?
A: That depends on the device. For computers and laptops with flash storage or solid-state drive (SSD), you’ll also want to encrypt the drive before formatting the storage drive and resetting the operating system.
Wirecutter has a step-by-step guide on how to do this based on your operating system. You can skip the encryption step with computers and laptops that have a mechanical hard drive.
Since iPhones and iPads are encrypted by default, all you need to do is disable Find My Device before you do a factory reset. Most Android phones are also encrypted by default, but you should ensure this is enabled before resetting your phone.