{"id":51019,"date":"2024-04-17T07:29:04","date_gmt":"2024-04-17T11:29:04","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=51019"},"modified":"2024-04-17T07:29:04","modified_gmt":"2024-04-17T11:29:04","slug":"disable-rtb-ad-tracking-law-enforcement-spy-agencies","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/51019\/","title":{"rendered":"Advertisers sharing data about you with\u2026 intelligence agencies"},"content":{"rendered":"<p>The industrial scale of surveillance of internet users is a topic we keep returning to. Every <a href=\"https:\/\/www.kaspersky.com\/blog\/web-beacons-explained-and-how-to-stop-them\/47281\/\" target=\"_blank\" rel=\"noopener nofollow\">click on a website<\/a>, every scroll in a mobile app, and every word you type into a search bar is tracked by <a href=\"https:\/\/www.kaspersky.com\/blog\/google-privacy-sandbox-and-ad-topics-explained\/49154\/\" target=\"_blank\" rel=\"noopener nofollow\">dozens of tech companies<\/a> and advertising firms. And it affects not only phones and computers, but also smart watches, <a href=\"https:\/\/www.kaspersky.com\/blog\/smart-speaker-tv-smartphone-eavesdropping\/50236\/\" target=\"_blank\" rel=\"noopener nofollow\">smart TVs and speakers<\/a> \u2014 even <a href=\"https:\/\/www.kaspersky.com\/blog\/spies-on-wheels-how-carmakers-sell-your-intimate-data\/49341\/\" target=\"_blank\" rel=\"noopener nofollow\">cars<\/a>. As it turns out, these motherlodes of information are used not only by advertisers offering vacuum cleaners or travel insurance. Through various intermediary companies, this data is snapped up by security agencies of all stripes: police, intelligence, you name it. See here for the latest <a href=\"https:\/\/www.404media.co\/inside-global-phone-spy-tool-patternz-nuviad-real-time-bidding\/\" target=\"_blank\" rel=\"nofollow noopener\">investigation into such practices<\/a>, focusing on the Patternz platform and the \u201cadvertising\u201d firm Nuviad. Previously, similar investigations probed <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2023-05-11\/surveillance-company-turns-ad-data-into-government-tracking-tool\" target=\"_blank\" rel=\"nofollow noopener\">Rayzone<\/a>, <a href=\"https:\/\/www.wsj.com\/tech\/cybersecurity\/how-ads-on-your-phone-can-aid-government-surveillance-943bde04\" target=\"_blank\" rel=\"nofollow noopener\">Near Intelligence<\/a>, and <a href=\"https:\/\/www.haaretz.com\/israel-news\/2023-09-14\/ty-article-magazine\/.highlight\/revealed-israeli-cyber-firms-developed-an-insane-new-spyware-tool-no-defense-exists\/0000018a-93cb-de77-a98f-ffdf2fb60000\" target=\"_blank\" rel=\"nofollow noopener\">others<\/a>. These companies, their jurisdictions of incorporation, and their client lists vary, but the general formula is always the same: collect and save proprietary information generated by advertising, then resell it to law enforcement agencies worldwide.<\/p>\n<h2>Behind the scenes of contextual advertising<\/h2>\n<p>We\u2019ve already described in detail how data is <a href=\"https:\/\/www.kaspersky.com\/blog\/web-beacons-explained-and-how-to-stop-them\/47281\/\" target=\"_blank\" rel=\"noopener nofollow\">collected on web pages and in apps<\/a> \u2014 but not how it gets put to use. In overly simplified terms, behind every banner display or advertising link in today\u2019s online world, there is some lightning-fast, super-complex trading. Advertisers upload their ads and audience requirements to a demand-side platform (DSP), which finds suitable sites or apps to display such advertising. The DSP then takes part in an auction for the types of advertising (banner, video, and so on) to be displayed on these sites and apps. Depending on who views the ads and how well they match the advertiser\u2019s requirements, a particular type of ad may win the auction. This process is known as real-time bidding (RTB). During the bidding, participants receive information about the potential ad consumer: previously collected data on the individual is condensed into a brief description card. Depending on the platform, the composition of this data may vary, but a fairly typical set would be the consumer\u2019s approximate or precise location, the device in use, the OS version, as well as \u201c<a href=\"https:\/\/iabtechlab.com\/standards\/openrtb\/\" target=\"_blank\" rel=\"nofollow noopener\">demographic and psychographic attributes<\/a>\u201d \u2014 that is, gender, age, family members, <a href=\"https:\/\/github.com\/InteractiveAdvertisingBureau\/openrtb2.x\/blob\/main\/2.6.md#objectuser\" target=\"_blank\" rel=\"nofollow noopener\">hobbies, and other topics of interest to the user<\/a>.<\/p>\n<h2>How RTB data is used for surveillance<\/h2>\n<p>A <a href=\"https:\/\/www.404media.co\/inside-global-phone-spy-tool-patternz-nuviad-real-time-bidding\/\" target=\"_blank\" rel=\"nofollow noopener\">404 Media investigation<\/a> found that the Patternz platform advertised to clients that it processed 90 <strong>terabytes<\/strong> of data daily, covering the actions of around five billion user IDs. Note that there are far fewer real users than IDs since each person can have several IDs. Because advertising is global \u2014 so too is the scope of data collection.<\/p>\n<p>Collecting and analyzing the above data allows precision tracking of:<\/p>\n<ul>\n<li>potential consumers\u2019 movements<\/li>\n<li>times when they leave or visit certain places<\/li>\n<li>times when they are located close to certain people<\/li>\n<li>their interests and search queries<\/li>\n<li>history of changing interests<\/li>\n<li>affiliation to certain segments, for example, \u201crecently had a baby\u201d or \u201cjust went on vacation\u201d<\/li>\n<\/ul>\n<p>This information makes it possible to discover lots of curious things: where the person is during the day and at night, who they like to spend time with, who they travel with by car and where, and masses of other personal information. As <a href=\"https:\/\/www.wsj.com\/tech\/cybersecurity\/how-ads-on-your-phone-can-aid-government-surveillance-943bde04\" target=\"_blank\" rel=\"nofollow noopener\">stated<\/a> by the U.S. Office of the Director of National Intelligence (ODNI), such depth of data collection was previously only possible through physical surveillance or targeted wiretapping.<\/p>\n<p>Is such data collection legal? Although laws vary greatly from country to country, in most cases intelligence agencies\u2019 carrying out mass surveillance \u2014 especially with the use of commercial data \u2014 finds itself in a gray area.<\/p>\n<h2>Bonus game: surveillance through push notifications<\/h2>\n<p>There\u2019s another unrelated, but no less unpleasant method of centralized surveillance of users. In this case, the role of treasure trove falls to Apple and Google, which send centralized push notifications to all iOS and Android devices, respectively. To save power on smartphones, almost all app notifications are delivered through Apple or Google servers; and depending on the app\u2019s architecture, a notification may contain information that\u2019s easy to see and of interest to third parties. It turns out that some intelligence agencies have tried to gain <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-senator-govts-spy-on-apple-google-users-via-mobile-notifications\/\" target=\"_blank\" rel=\"nofollow noopener\">access to notification data<\/a>. What\u2019s more, a recent study found that a significant number of apps <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/iphone-apps-abuse-ios-push-notifications-to-collect-user-data\/\" target=\"_blank\" rel=\"nofollow noopener\">abuse notifications<\/a> to collect data about the device (and the user) at the time the notification is received \u2014 even if the user is not in the relevant app at that moment or on their phone at all.<\/p>\n<h2>How to guard against surveillance through advertising<\/h2>\n<p>Since all of the above-mentioned companies collect data using central hubs in the shape of large ad exchanges, no amount of denylisting apps and sites will protect you from being tracked. Any banner ad, video insert, or social network advertising generates events for trackers.<\/p>\n<p>The only way to achieve any meaningful reduction in the scale of surveillance is with quite radical anti-advertising measures. Not all of them are convenient or suitable for everyone, but the more tips from the list you can apply, the fewer \u201cevents\u201d involving you will end up on the servers of Rayzone or other such companies. In a nutshell:<\/p>\n<ul>\n<li>Use apps that don\u2019t display ads. This doesn\u2019t guarantee the absence of <a href=\"https:\/\/www.kaspersky.com\/blog\/web-beacons-explained-and-how-to-stop-them\/47281\/\" target=\"_blank\" rel=\"noopener nofollow\">web beacons and tracking<\/a>, but will at least reduce the intensity.<\/li>\n<li>Block ads and tracking in web browsers. Mozilla Firefox and Safari have built-in anti-surveillance protection, while anti-spyware and anti-advertising add-ons are available for all popular browsers in the official add-on stores.<\/li>\n<li>For maximum protection, turn on <em>Private Browsing<\/em> in <a href=\"https:\/\/www.kaspersky.com\/standard?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kstand___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Standard<\/a>, <a href=\"https:\/\/www.kaspersky.com\/plus?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Plus<\/a>, or <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>.<\/li>\n<li>Disable <a href=\"https:\/\/www.kaspersky.com\/blog\/web-beacons-explained-and-how-to-stop-them\/47281\/\" target=\"_blank\" rel=\"noopener nofollow\">auto-downloading of images in emails<\/a>.<\/li>\n<li>Configure <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-dns-private-dns-benefits\/47209\/\" target=\"_blank\" rel=\"noopener nofollow\">secure DNS<\/a> on your smartphone, computer, and home router by specifying an ad-blocking server, say, <a href=\"https:\/\/blahdns.com\/\" target=\"_blank\" rel=\"nofollow noopener\">BlahDNS<\/a>.<\/li>\n<li>Check your smartphone\u2019s privacy settings. Make it a habit to reset your <a href=\"https:\/\/www.kaspersky.com\/blog\/android-device-identifiers\/31755\/\" target=\"_blank\" rel=\"noopener nofollow\">advertising ID<\/a> at least once a month. Prevent apps from collecting data for personalized ads and showing location-based ads (<a href=\"https:\/\/support.apple.com\/en-ca\/105131\" target=\"_blank\" rel=\"nofollow noopener\">Apple<\/a>, <a href=\"https:\/\/privacyinternational.org\/guide-step\/4317\/android-opt-out-targeted-ads-and-renew-your-advertising-id\" target=\"_blank\" rel=\"nofollow noopener\">Google<\/a>);<\/li>\n<li>Revoke permissions to access location and other sensitive data <a href=\"https:\/\/www.kaspersky.com\/blog\/five-regular-checks-for-android\/36440\/\" target=\"_blank\" rel=\"noopener nofollow\">from all apps<\/a> that do not require it for their primary function.<\/li>\n<li>Completely disable push notifications in your smartphone settings for all apps that can do without it.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Advertising firms\u2019 extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?<\/p>\n","protected":false},"author":2722,"featured_media":51020,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683,9],"tags":[810,105,14,22,1250,26,43,768,321,131,812],"class_list":{"0":"post-51019","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-ads","10":"tag-android","11":"tag-apple","12":"tag-google","13":"tag-ios","14":"tag-iphone","15":"tag-privacy","16":"tag-surveillance","17":"tag-technology","18":"tag-tips","19":"tag-tracking"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/51019\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/27333\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/22643\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/30010\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/27488\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/27319\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/29978\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/28786\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/37246\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/12267\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/21804\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/22512\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/31208\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/36255\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/27609\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/33494\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/disable-rtb-ad-tracking-law-enforcement-spy-agencies\/33121\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=51019"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51019\/revisions"}],"predecessor-version":[{"id":51026,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51019\/revisions\/51026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/51020"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=51019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=51019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=51019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}