Thursday, December 10, 2020
  • VMRay Closes $25 Million Series B
  • The Hacker Mind Podcast: Hacking OpenWRT
  • Goodbye to Flash – if you’re still running it, uninstall Flash Player now
  • Smart DNS: Delivering the Best Subscriber Experience
  • New Microsoft Spear-Phishing Attack Uses Exact Domain Spoofing Tactic

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security Mobile Security SBN News Security Bloggers Network Social Engineering 

Home » Cybersecurity » Data Security » Data Brokers: You Are Being Packaged and Sold

Data Brokers: You Are Being Packaged and Sold

by SEORG on June 7, 2018

The recent Facebook-Cambridge Analytica data scandal put a spotlight on the nebulous world of data brokers and data mining. As you shop, browse the Internet, participate in a quiz, subscribe to a magazine, fill a prescription, or network on social media, data brokers are hovering in the background, stealthily collecting your personal information. In the eyes of data brokers, you are the commodity. You are being packaged and sold. Because data brokers lurk in shadowy darkness, you may be unaware of their existence, leading to such questions as:  What are data brokers? What are they collecting and how do they get it? What are the dangers and what can you do?  

What are Data Brokers?  

According to The Federal Trade Commission (FTC), data brokers are companies that collect, analyze, package and sell consumer information. Government agencies, businesses, other data brokers, organizations, and individuals purchase your information for the purpose of marketing products, establishing identity, or detecting fraud. The data broker industry is divided into three broad categories based upon the type of product that they sell: (1) marketing products, (2) risk mitigation products, and (3) people search products. Examples of these categories are: 

Marketing products: 

  • Acxiom  
  • Epsilon  
  • Experian
     

Risk mitigation and people search products:  

  • BackgroundChecks  
  • LexisNexis 
  • PeekYou 

How Data Brokers Get Your Information? 

Your personal information is collected from commercial, government, and other publicly available sources such as:   

  • online or offline warranty cards, sweepstakes entries, contests, quizzes, surveys, and loyalty cards; 
  • web crawlers – programs that capture content across the Internet and transmit it back to the data broker’s server; 
  • census demographic information, motor vehicle records, driver’s license records, telephone directories, voter registrations, court filings, real property and tax assessor records, recorded liens and mortgages, real estate listings, birth, marriage, divorce and death records, professional license filings, and recreational licenses; and 
  • social media platforms such as Facebook, LinkedIn, WhatsApp and others. 

What are Data Brokers Collecting? 

Data brokers collect details of who you are and your everyday interactions. “Imagine if you could know consumers like you know your friends. Understanding what they crave, what they need, why they buy and what they’ll buy next.”  This quote from Epsilon’s web page makes it clear that they want to know everything about you. For example, Experian and Epsilon collect the following data elements about you:  

  • life event triggers like new parents, new homeowners, and new movers; 
  • consumer demographics like age, gender, marital status, children, and income; 
  • attitudinal and behavioral data such as interests, hobbies, and brand preference; 
  • automotive data, vehicles consumers have in their garages, and the likelihood of households to purchase a vehicle; 
  • technology attributes, use and adoption of devices and, even social media platforms; and 
  • ailments, allergies, arthritis, diabetes, high blood pressure, respiratory ailments, and high cholesterol. 

A detailed profile of your life is compiled based on the information that is collected. Data brokers analyze these elements to infer your interests, including potentially sensitive interests. You may now be grouped into multiple categories called segments with other consumers such as, “Winter Activity Enthusiast,” “Dog Owner,” “Diabetes Interest,” “Cholesterol Focus,” “Expectant Parent,” and so on. Astonishing amounts of information have been collected. For nearly every U.S. consumer data brokers have collected 3,000 data segments.  

What Dangers Does This Pose? 

Storing detailed consumer profiles has inherent security risks. Consumer profiles are high value targets for identity thieves and other malicious hackers. LexisNexus and ChoicePoint were victims of social engineering attacks that exposed the data of thousands of consumers. Axicom and Epsilon both experienced significant data breaches. In 2015 the Experian data breach affected 15,000,000 T-Mobile consumers. The 2017 Equifax data breach affected 145,000,000 consumers. 

What You Can Do? 

Be proactive. Some data broker companies offer an “opt-out” form. The process may feel a bit counterintuitive as the form requires you to submit personal information such as your name, mailing address, and possibly an email address, but it’s worth the effort. According to the FTC, data brokers have indicated they will only use this information for identity verification to initiate the opt out process. It may also be necessary to submit multiple opt-out requests to take into consideration name variations.  For example, “Jonathan Doe” may also need to submit an opt-out form for “John Doe.” Filling out and submitting the opt-out form may not remove your information entirely. Axicom’s opt-out form states, “the information provided on this form will be used only for the purpose of removing information about you from Axicom’s marketing products.” A master list of data brokers and their opt-out links can be found at  Privacy Rights Clearinghouse and Stop Data Mining Me.   

Knowing how data brokers obtain information empowers you to make informed choices. Use that knowledge to shine a light on the dark and shadowy world of data brokers. The fact that Cambridge-Analytica used the personality-quiz app, “This Is Your Digital Life,” to mine the data of millions of Facebook users should make you think twice before you participate in the next quiz that comes your way.   

If you are curious to see how you may be unknowingly giving away your information, the FTC has produced this helpful video.  

“It is better to light a candle than to curse the darkness” – Eleanor Roosevelt  

Sources:  

https://www.cnbc.com/2018/04/10/facebook-cambridge-analytica-a-timeline-of-the-data-hijacking-scandal.html
https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf 
https://us.epsilon.com/data-driven-marketing-solutions#CRM
http://www.experian.com/marketing-services/targeting/data-driven-marketing/consumer-view-data.html
https://www.social-engineer.org/framework/general-discussion/categories-social-engineers/identity-theives/ 
https://www.social-engineer.org/framework/general-discussion/categories-social-engineers/information-brokers/
https://www.theregister.co.uk/2006/02/23/acxiom_spam_hack_sentencing/
https://krebsonsecurity.com/2015/03/feds-indict-three-in-2011-epsilon-hack/
https://www.theguardian.com/business/2015/oct/01/experian-hack-t-mobile-credit-checks-personal-information
https://www.social-engineer.com/equifax-breach-need-know/
https://www.theatlantic.com/technology/archive/2018/04/facebook-cambridge-analytica-victims/557648/
https://www.privacyrights.org/data-brokers
https://www.stopdatamining.me/opt-out-list/ 

The post Data Brokers: You Are Being Packaged and Sold appeared first on Security Through Education.

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by SEORG. Read the original post at: https://www.social-engineer.org/general-blog/data-brokers-you-are-being-packaged-and-sold/

June 7, 2018June 7, 2018 SEORG Axicom, Cambridge Analytica, Choicepoint, Data Brokers, Data Brokers: You Are Being Packaged and Sold, Data Mining, Epsilon, Equifax, Experian, facebook, General Social Engineer Blog, Hackers, How Data Brokers Get Your Information, Information Brokers, LexisNexis, social engineering, T-Mobile, The Dangers and What You Can Do, What are Data Brokers Collecting?, What are Data Brokers?
  • ← Yep, I Suggested Monica
  • Adobe Patches Zero-Day Flash Flaw →

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Michael Clark

Prevent Catastrophic Data Loss in the Cloud

Rich Gardner

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Tips From a Hacker to Keep Smartphones Safe
Verizon Report Finds Cyber Espionage Attacks Aimed Mostly at Endpoints
Kazakhstan Spies on its People via Man-in-the-Middle Attack, Again
Targeted Cyberattacks Require Targeted Security Awareness Training
One Step Ahead: Using Threat Hunting to Anticipate the Unknown
Why You Need to Have a Risk Register to Keep Track of Cybersecurity Risks
Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
The Top 19 Internet of Things(IoT) Security Solutions
Add Security Events to Your Monitoring Tools
DEF CON 28 Safe Mode Aerospace Village – Allan Tart’s & Fabian Landis’ ‘Low Cost VHF Receiver’

Upcoming Webinars

Thu 10

Data Security for Contact Centers Leveraging Cloud Technologies

December 10 @ 3:00 pm - 4:00 pm
Mon 14

Issues and Answers in Cloud Security

December 14 @ 1:00 pm - 2:00 pm
Tue 15

3 Things to Get Right for Successful DevSecOps

December 15 @ 3:00 pm - 4:00 pm
Wed 16

Unsolved Problems in Open Source Security

December 16 @ 11:00 am - 12:00 pm
Wed 16

Securing Medical Apps in the Age of COVID-19: How to Close Security Gaps and Meet Accelerated Demand

December 16 @ 1:00 pm - 2:00 pm
Wed 16

Deliver your App Anywhere … Publicly or Privately

December 16 @ 3:00 pm - 4:00 pm
Thu 17

Secure Your Peace of Mind and Your Mobile App While Giving Developers Back Their Happy Coding Time

December 17 @ 11:00 am - 12:00 pm
Thu 17

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig

December 17 @ 1:00 pm - 2:00 pm
Thu 17

Securing JavaScript/Go Code with Insights and Analytics

December 17 @ 3:00 pm - 4:00 pm
Jan 12

Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport

January 12, 2021 @ 3:00 pm - 4:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Why Next-Gen Firewalls Miss the Mark for Today’s Remote Workforce
Cybersecurity Industry Spotlight Network Security Security Boulevard (Original) 

Why Next-Gen Firewalls Miss the Mark for Today’s Remote Workforce

December 10, 2020 Mike Riemer | 8 hours ago 0
Pandemic Waves Underscore Vulnerabilities in Cloud File Systems
Cloud Security Cybersecurity Industry Spotlight Security Boulevard (Original) 

Pandemic Waves Underscore Vulnerabilities in Cloud File Systems

December 9, 2020 Edward M.L. Peters | Yesterday 0
One Step Ahead: Using Threat Hunting to Anticipate the Unknown
Cybersecurity Industry Spotlight Security Boulevard (Original) Threat Intelligence 

One Step Ahead: Using Threat Hunting to Anticipate the Unknown

December 8, 2020 Paul German | 2 days ago 0

Top Stories

Kazakhstan Spies on its People via Man-in-the-Middle Attack, Again
Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Network Security News Security Awareness Security Boulevard (Original) Spotlight 

Kazakhstan Spies on its People via Man-in-the-Middle Attack, Again

December 7, 2020 Richi Jennings | 2 days ago 0
Verizon Report Finds Cyber Espionage Attacks Aimed Mostly at Endpoints
Cybersecurity Data Security Featured Network Security News Security Boulevard (Original) Spotlight 

Verizon Report Finds Cyber Espionage Attacks Aimed Mostly at Endpoints

December 7, 2020 Michael Vizard | 3 days ago 0
Brazil Govt’s Huge Leak: Health Data of 243M
Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Brazil Govt’s Huge Leak: Health Data of 243M

December 4, 2020 Richi Jennings | Dec 04 0

Security Humor

Via  the amusing regulatory humor of   Daniel Stori   at   turnoff.us   (from the Archive, originally published in August of 2017)

Daniel Stori’s ‘AI Regulation’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.