Anomaly 6, another firm run by ex-military and location industry veterans, sold location data secretly sourced from ordinary smartphone apps to SOCOM/SOCAFRICA, a US military unit tasked with counterterrorism, counterinsurgency and special reconnaissance: vice.com/en/article/z3v…
SOCOM states the contract was about evaluating the "feasibility of using Anomaly 6 telemetry services in an overseas operating environment"

As the WSJ reported in August, Anomaly 6 tracks "the movements of hundreds of millions of mobile phones world-wide" wsj.com/articles/u-s-g…
Once again, the way our digital (app) economy currently works, built and optimized for uncontrolled marketing surveillance, treating personal data as just another mass commodity, is directly feeding into the most invasive forms of government surveillance.
In 2020, member of parliament André Hahn was asking the German government whether services by Anomaly 6 are being used by German authorities.

The government's "neither deny nor confirm" response is so specific that it suggests yes.

Original in German:
andre-hahn.eu/app/uploads/20…
"Disclosure of details of knowledge of the software in question from the U.S. company Anomaly Six would allow far-reaching, direct conclusions to be drawn about the working methods and ... about the technical equipment and reconnaissance potential of the intelligence services"
"information... concerning possible knowledge and use of the software of the U.S. company Anomaly Six affects such evident secrecy interests [of the Federal Republic of Germany] requiring protection that even the slight risk of the information becoming known ... must be avoided"
"In weighing up the parliamentary right to information of the members of parliament on the one hand and the interests in secrecy justified by the welfare of the state on the other, the parliamentary right to information must therefore exceptionally take a back seat"
Babel Street, a similar company providing both social media surveillance and commercial location data, has sold to nearly every major defense and intelligence agency in the US, and to governments including in the UK and in Germany, according to the WSJ: wsj.com/articles/acade…
Ich finde, es muss dringend geklärt werden, ob dt. Behörden kommerzielle Standortdaten kaufen, die zwielichtige Firmen wie Anomaly 6 von ahnungslosen Smartphone-App-NutzerInnen absaugen.

/cc @UlrichKelber @EskenSaskia @andre_meister @annalist @sonstso_sk @PatrickBeuth @jbruehl
Hier nochmal die -doch sehr erstaunlich formulierte- Antwort von Staatssekretär Richter auf die schriftliche Frage von MdB André Hahn in Bezug auf die Nutzung der Dienste der US-Standortdatenhandelsfirma Anomaly 6 durch dt Behörden:
andre-hahn.eu/app/uploads/20…
dipbt.bundestag.de/extrakt/ba/WP1…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Wolfie Christl

Wolfie Christl Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @WolfieChristl

17 Mar
"A surveillance contractor that has previously sold services to the U.S. military is advertising a product that it says can locate the real-time locations of specific cars in nearly any country on Earth", based on data sent by cars+components themselves: vice.com/en/article/k7a…
"automakers and Original Equipment Manufacturers (OEMs) often include sensors in vehicle parts that collect information such as their airbag and seatbelt status, engine temperature, and current location, and then transmit that information ... to the automaker or to third parties"
"Ulysses is a small surveillance contractor…that also claims to offer cellular interception and jamming technology [and] has worked with U.S. Special Operations Command (SOCOM), a branch of the military tasked with counterinsurgency, counterterrorism, and special reconnaissance"
Read 4 tweets
13 Mar
Interesting. Google refers to Oracle's Datalogix, which sells consumer profiles based on purchase data from thousands of shops, as a "key external vendor".

From a job announcement for an "Insights Manager, Global Client & Agency Solution" at Google EMEA:
webcache.googleusercontent.com/search?q=cache… Image
It's interesting because I didn't often see Google naming Datalogix a partner/vendor in recent years.

In 2016, DoubleClick named Oracle Data Cloud an offline conversion partner:
doubleclick-advertisers.googleblog.com/2016/10/get-be…

In 2018 it was named a "Google Measurement Partner":
blogs.oracle.com/oracledataclou… ImageImage
In this list of "Ad Manager Certified External Vendors", Google names Datalogix a "data provider":
developers.google.com/third-party-ad…

In this newer list of "Ad technology providers", Google lists Oracle Data Cloud as a vendor who may serve and measure ads in EEA/UK:
support.google.com/admanager/answ… ImageImage
Read 7 tweets
12 Mar
"Just as algorithms could be trained to predict who would click what ad, they could also be trained to predict who would like or share what post, and then give those posts more prominence"

#longread on the history of 'engagement' maximization at Facebook: technologyreview.com/2021/03/11/102…
"Teams had previously used design tactics, like experimenting with the content and frequency of notifications, to try to hook users more effectively. Their goal…was to increase a metric called L6/7, the fraction of people who logged in to Facebook six of the previous seven days"
After introducing ml-based optimization, "every user interaction once analyzed by engineers was being analyzed by algorithms. Those algorithms were creating ...more personalized feedback loops for tweaking and tailoring each user’s news feed to keep nudging up engagement numbers"
Read 5 tweets
11 Mar
Yes, much of today's surveillance-based advertising is something between an empty promise and a giant fraud.

But the fact that we're all getting badly targeted ads does not mean that it doesn't work, because this is how it is intended to work, if it does.
ft.com/content/b013d9…
It's a misunderstanding that surveillance advertising aims to accurately target everyone. If at all, it aims to accurately target a low percentage of addressed users in order to make them act how it wants them to act.

Spamming everyone else is always part of the calculation.
Much of the data is flawed or fraudulent in today's broken web economy, and many metrics, clicks and even users are fake.

At the same time, attempts to optimize behavior in digital environments based on mass profiling and testing can be successful and lead to many side effects.
Read 10 tweets
11 Mar
T-Mobile US says it will start selling web+device usage data to the digital profiling industry by default.

But don't worry it's not tied to your name but only to personal identifiers that are much more suitable to track and follow you everywhere anyway.
t-mobile.com/privacy-center… Image
Telecommunication services are basic digital infrastructure, and they should not be allowed to sell behavioral data at all.

It's bad enough if they trick people into 'opting in', selling it by default is beyond bad.

Such reckless and irresponsible business practices must end.
Also, T-Mobile US owns PushSpring, a consumer data broker that trades in extensive mobile data on hundreds of millions of people without their knowledge.
Read 12 tweets
10 Mar
Diving into UEBA systems that large corporations use to protect themselves from cyber attacks, espionage, noncompliance, fraud, 'insider' threats and other risks ...I feel like this is a kind of totalitarian surveillance hellscape we'd never accept in any other area of life.
"A Watch List is used to monitor entities ...that are considered problematic or require special attention"

"...users who have received a poor performance review can be placed on a Watch List so that their activity can be closely monitored" #cybersecurity

documentation.securonix.com/onlinedoc/Cont… Image
An "abnormal number of logon failures", a "rare domain visited" or "flight risk behavior on web browsing to multiple job sites in a short period of time" ...put this employee on the Watch List #cybersecurity

In 'Spotter'. The product is called "SNIPR".

(p378) Image
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!