How Facebook tracks and manipulates everyone, everything, and everywhere - Delete your Facebook now - YouTube

Channel: The Hated One

[33]
Facebook privacy policy is a masterpiece of deception.
[36]
It’s intentionally vague, open-worded and doesn’t have any universal boundaries that
[40]
would put reasonable limits on Facebook’s tracking.
[43]
The data policy uses blanket terms like third parties, to cover a vast range of activities
[47]
that allow Facebook to follow your every step and do with that information whatever they want
[58]
When you agree to the terms of service, you as an Internet citizen cannot even imagine
[62]
the uses and value your personal information has to Facebook and the database marketing
[66]
industry behind it.
[68]
Facebook doesn’t just collect all of your personal information you upload on their website
[72]
through private chat conversations, expressions in likes and comments, or posts on your newsfeed.
[77]
Facebook will plant permanent trackers on your mobile and desktop devices to follow
[80]
you around the Internet to map all of your browsing history.
[83]
In cooperation with its marketing partners, Facebook helps to match that information with
[87]
your real-life data like social security number, physical address, age and family relationships.
[93]
Where does your data go after Facebook collects them?
[96]
What does Facebook privacy policy really means for your personal information?
[100]
There is an entire industry developed behind Facebook’s business model violating your privacy.
[105]
It doesn’t often make headlines and operates as secretively as high-profile banking.
[109]
And just like clandestine predatory banking threatens financial stability, Facebook is
[113]
standing up for industry that poses a threat to democratic values that enabled creation
[117]
of Facebook in the first place.
[119]
In the next few minutes, you’ll learn how Facebook stands behind major data broking
[123]
conglomerates who boast with their ability to predict and influence consumer behavior
[127]
based on the data collection facilitated by the Facebook company.
[130]
Nothing that’s mentioned here is a conspiracy theory.
[133]
The analysis is made of publicly available information and everything will have sources
[138]
in the description below.
[139]
Hopefully, information presented here will help you understand the intrusive scope of
[143]
Facebook privacy policy and maybe give you enough reason to want to stop using Facebook
[148]
immediately.
[149]
Because their manipulative marketing practices threaten everything free and democratic world
[154]
stands for.
[155]
What Facebook does with the privacy of Internet citizens is currently not regulated or supervised
[159]
and you don’t have the option to opt out, even you don’t use Facebook at all.
[163]
We are in an alarming situation were big database marketing industry collects private and personally
[168]
identifiable information on almost all adults on the Internet.
[172]
This information is used to make blanket judgments about people based on how profitable their
[176]
trading algorithms view them.
[178]
It’s an uncontrolled joint mechanism with the intent to influence and manipulate people
[182]
for their own benefit, where consumers have no say whatsoever.
[185]
Trading happens about them, but without them.
[188]
You should have a say in this.
[190]
You should now what’s happening to your private information, and where it goes once
[193]
Facebook collects it.
[194]
You should have the right to opt out, and not be an involuntary target of advertising
[198]
industry.
[203]
This year Google announced that it will track users offline behavior by connecting online
[208]
advertisements to purchases in brick and mortar stores, to verify its clients online ad impressions.
[213]
Meanwhile, Facebook has been actively doing this since 2014.
[216]
With the freshly rebuilt ad platform called Atlas, Facebook launched unified tracking
[221]
mechanisms to allow marketers to follow users across thousands of websites and mobile applications.
[226]
The service promotes itself as “reaching people across devices and bridging the gap
[230]
between online impressions and offline purchases”.
[232]
Atlas made it possible to identify specific subjects for targeted advertisements opening
[237]
up the world of possibilities for influential marketing techniques.
[240]
Analytics algorithm made it possible to determine certain personality traits to exploit for
[244]
profit.
[245]
They could find people with propensity to gambling, abusing knowledge of private information
[250]
that shouldn’t have been know to them, just so that they can deploy manipulative advertisements.
[253]
Atlas uses data to make stereotypical assumptions about people based on their race, gender,
[258]
location, and influence a specific behavior according to societal expectations.
[262]
Sometimes even enforcing trends like body shaming of young men and women, exploiting
[266]
people more susceptible to predatory lending, or taking advantage of addiction weaknesses
[271]
like smoking or alcohol.
[273]
People make mistakes, and privacy is to protect them from being exploited for those mistakes.
[277]
This is what happens when an entire industry forms around abusing people’s natural and
[281]
perfectly reasonable need for comfort and convenience.
[284]
Facebook’s affiliated mobile applications and web services give them access to your
[288]
location, phone number and telemetric data from your mobile devices.
[292]
All that’s necessary to develop capability for its marketing partners to make and maintain
[296]
permanent self-updating profiles.
[299]
Advanced algorithms rank people’s profiles according to their monetization opportunity.
[303]
“Waste” is a common word used to describe low level targets with little expectations
[307]
for profit generation.
[309]
Usual practice to deal with people ranked in this way is to put them on slower customer
[313]
service lanes, and offer discriminatory pricing, What Facebook cannot track for themselves,
[318]
its advertising partners will do it for them.
[320]
Facebook is affiliated with over 190 marketing partners that together form the biggest database
[326]
of personal information in the world.
[328]
They are all elite members of the marketing class, but the most famous names are Exparian,
[333]
Axciom, Epsilon, Vidsy Adobe, and Oracle.
[337]
According to a Federal Trade Commission report, seven out nine data brokers buy from or sell
[341]
information from their databases to each other.
[344]
These are channeled through series of data broking companies, making it impossible to
[349]
trace original source of particular data element.
[352]
The whole industry operates on a highly clandestine nature, offering strong encryption to its
[356]
clients, but near zero level protection of consumer data.
[360]
Privacy for corporations, but surveillance for everyone else.
[364]
Security breaches and hacker attacks are regular routine, to which marketing industry exposes
[368]
your private information.
[370]
One of the biggest brokers, Epsilon, had its database breached by unknown hackers.
[374]
The breach exposed millions of email address and consumer names for Epsilon’s top clients
[379]
including JPMorgan Chase, Citibank, Target, and Walgreens.
[383]
It was never disclosed how much data was stolen.
[386]
Given the nature of current cyber laws, we may have never heard of countless of other
[390]
potential breaches.
[392]
Your private information could be floating around the Internet and you have no way to
[395]
stop it.
[398]
Axciom adopts an all around approach to tracking your private life.
[402]
Within high circles in the company, it’s known as “360-degree view” on consumers.
[406]
It uses its 40 year old database of offline information collected from government sources
[411]
and self-reported surveys, and past few decades of digital surveillance to develop its own
[415]
classification system to rank consumers.
[417]
This system, called PersonicX, categorizes Internet users to one of 70 socioeconomic
[422]
classes, each being marketed by its own rules.
[425]
For example, this system can determine whether someone is tech savvy, if they prefer to use
[429]
online banking, mobile devices, are price sensitive, and come from upper-middle-class.
[434]
With no spouse, they are assigned a class “savvy single”.
[437]
Thus, they’ll be marketed special tech deals with price coupons to appeal to their interests
[442]
and price responsiveness.
[444]
Whatever there is to know about this person is used to create a personalized deal to influence
[448]
them to click on the ad and make a purchase.
[450]
This, however, wouldn’t be be possible without a targeted invasion of their privacy.
[454]
The goal is to make sure a consumer buys from one of the members of their marketing chain,
[459]
and not someone else.
[460]
But that someone could have been a medium-sized retailer, who is in disadvantage, because
[464]
he doesn’t spy on your private life.
[466]
This retailer gets excluded from the Internet visible to you, because he is not part of
[471]
the elite wolf pack.
[474]
We are being told that online marketing is anonymous, so it doesn’t matter if they
[478]
breach our privacy.
[479]
But Axciom proves this is exact opposite of what marketing industry really does and wants.
[522]
AbiliTec Digital, one of Axciom’s many products, is described as “customer recognition”
[527]
service.
[528]
It works to link history of data with people’s names, nicknames, email and home addresses,
[533]
and phone numbers both mobile and landline.
[535]
In 2014 Axciom’s CEO boasted to have dropped 1.1 billion third party cookies on people
[541]
visiting client’s websites.
[543]
Why does he boast now?
[544]
It’s a marketing technique to attract even more clients and expand the industry.
[549]
Just like their website “aboutthedata.com” where you can take a peak at your data file.
[553]
However, this is just a major publicity stunt.
[555]
I don’t recommend that you proceed with looking yourself up on their website.
[559]
First of all, you’d have to provide various personal information, like your full name
[562]
and social security number.
[564]
You’d voluntarily give them even more of your private information.
[567]
Secondly, it might not even work for you anyway.
[569]
The website asks its users to update the missing data or correct if something’s wrong.
[574]
Again, you would only provide them with more personal information, and confirm that your
[577]
advertising ID truly matches your real identity.
[580]
In 2012, companies spent over $2 billion dollars on third-party data about individuals and
[586]
billions more on credit card data, just in the United States.
[590]
This personally identifiable information is used to specifically target individuals based
[594]
on their unique advertising profiles.
[596]
The whole process of targeted advertising happens through mechanism called high-frequency
[601]
trading.
[602]
It’s derived of algorithmic trading on stock exchange, were each transaction takes milliseconds
[606]
to complete.
[607]
Transactions are decided on by bids, where the highest bidder wins.
[611]
Such trading occurs in online advertisements as well.
[614]
On ad exchange, marketers place their bids for ad space on websites where they identified
[618]
highest prospects of success.
[620]
Automated ad sales system allows website operators to sell their ad space to the highest bids.
[625]
Websites use numerical customer codes derived from uniquely identifying cookies placed on
[629]
web browsers to track online activities of their visitors.
[632]
An ad exchange then takes these profiles, and cross-reference them with their third
[636]
party data aggregates using information like sex, age, interests, income range, and history
[642]
of purchases.
[643]
The exchange analytics then determines fair market value of websites visitors and the
[647]
ad spaces available to show them.
[649]
The whole process has to take less than 50 milliseconds.
[652]
What you are going to see on a website is determined before the page even loads.
[656]
That’s only possible because of the self-updating trackrecord of your online activity.
[661]
Companies maintaining these ad exchanges are PubMatic, Rubicon, Google’s DoubleClick,
[665]
or Facebook Exchange.
[667]
Facebook Exchange is now shifting towards Dynamic Ads.
[670]
Each of them make annual revenues of billions of dollars from advertisers paying for display
[675]
ads.
[676]
This is what makes Facebook such a huge fortune.
[678]
The social network is just a pretty make up.
[680]
Once gathered, the available data is listed in consumer data products catalog.
[685]
But these are not anonymous statistical categories, as you would expect.
[688]
Axciom’s clients can buy hundreds of details about individuals and households lumped together
[692]
in elements, like Christian families, money seekers, dieting/weight loss, and smoking/tobacco.
[697]
There is even an option to choose a race model – caucasians, hispanics, african-americans,
[702]
asians and so on.
[704]
A a specified retailer selling let’s say portable computing goods can ask Axciom for
[709]
specific information on million college students living in urban areas aged 18 to 25.
[714]
Axciom then asks for further identification of the retailer’s customers.
[718]
Whenever you pay for goods with your credit card, your identifiable information is scraped
[723]
from your credit card company.
[724]
If you supplied your ZIP code or phone number, that information is also tied to your advertising
[729]
ID.
[730]
The list of people who can thus know your purchasing or browsing history expands as
[733]
quickly as the whole marketing industry.
[736]
The advertising is never anonymous.
[737]
At best, it’s pseudonymous.
[739]
Each person using the Internet is automatically assigned an identification code that’s continuously
[744]
updated and cross-referenced with database of your public and private personal information.
[749]
However, Stanford University found out that many websites actually leak personally identifiable
[754]
information to third party trackers, matching user IDs with their real names.
[758]
The independently funded research found evidence of tracking companies stockpiling databases
[762]
of clickstreams – collected browsing histories.
[765]
The tracking starts from day one and continues until each clickstream can be assigned a pseudonym
[769]
(the unique ID).
[771]
If you click on an advertisement, first party leaks your personally identifiable information
[775]
to a third party.
[776]
Most frequently it’s gonna be your username or user ID, but it can also be your IP or
[780]
email address.
[781]
In most cases, third party companies act as first party at the same time – like Facebook,
[786]
Twitter, or Google+.
[788]
The third party then buys identifying information from a “customer recognition” service.
[791]
It’s also possible for a third party to exploit security vulnerabilities to learn
[796]
about your identity.
[797]
Finally, the third party matches your pseudonymous data against their identified data, creating
[802]
a finalized version of your profile.
[804]
It doesn’t matter at which point in the future they manage to attach the ID to your
[808]
clickstream.
[809]
Identification affects the data in the future as well as retroactively, and thus only needs
[813]
to happen once.
[815]
Sometimes, websites leak your username to dozens of third parties at once.
[819]
For example, Photobucket would send your username embedded in its URLs to 31 companies.
[824]
Filling out wrong password on the Wall Street Journal website will get your email address
[828]
sent to 7 companies.
[830]
These websites behavior never gets mentioned in their privacy policies.
[833]
And the same goes for Facebook privacy.
[835]
The Facebook privacy policy might as well just look like this:
[839]
Using our services you agree: to give us permission to spy on your EVERY
[842]
movement and activity 24/7, within Facebook as well as all over the Web and your offline
[847]
physical activities, and store this information indefinitely and permanently.
[851]
to share all information we have about you with anybody who is willing to pay for them
[855]
or at least ask for them nicely.
[857]
We make sure our advertisers, our third parties, and third parties of our third parties, know
[862]
exactly who you are and what you do, so that you are more susceptible to manipulation and
[867]
surveillance.
[868]
Facebook doesn’t explain that they use your private conversations, your browsing habits,
[873]
track record of articles you read, videos you watch, music you listen to, things you
[878]
buy, to create and maintain a unique psychological profile of your identity to store permanently
[884]
and use indiscriminately by the whole industry.
[888]
Tracking users activity on their own website is one thing.
[891]
But actively pursuing collection of information on people’s activities on the Internet just
[895]
steps over the line by miles.
[897]
People don’t know how websites work and talk to each other, so they rationally believe
[901]
that what they share with Facebook, stays on Facebook.
[904]
People think nobody listens to their online conversations, because nobody does it in real
[908]
life.
[909]
People think sending emails is like sending letters in an envelope, when in virtual reality,
[914]
everything is visible as text on a postcard.
[917]
By walking out of a brick and mortar store, your interaction with the business ends and
[921]
everything you do the moment you step outside is unknown to the owner of the store.
[926]
Purchase goods online with the same retailer, and suddenly it’s not enough to just pay
[929]
with money.
[930]
You have to unknowingly hand over all of your past and future life as another form of payment
[935]
for using their service.
[937]
Technology is several steps ahead of our understanding, and society and laws haven’t caught up yet.
[942]
It creates a loophole for an entire industry to flourish, while values that hold together
[946]
the system in tranquility and freedom are being torn apart in the process.
[950]
We might just have reached a point were we have to collectively decide that profit of
[953]
a few doesn’t necessarily serve the greatest benefit for us all.
[957]
There is no solution where marriage with these companies is still a reality.
[961]
You can’t have your private life protected while still agreeing to these privacy policies.
[966]
You have to stop using Google.
[968]
You have to stop using Facebook.
[969]
It’s not just the government surveillance that’s a problem here.
[972]
The whole industry went rogue.
[974]
There has to be a new regulation that catches up with our privacy standards of the past.
[979]
If the commercial Internet destroys everything that allowed it to become reality in the first
[983]
place, then this will make it into history books as a failure of free society to guard
[987]
its own liberty.
[989]
Do we want to live in a world where a handful of marketing companies control all private
[994]
information of every adult Internet user?
[997]
Soon, Internet will be used by everybody on Earth.
[1000]
Not using it will not be an option.
[1003]
Next privacy policy might as well just be “when turning 18, you agree to have your
[1006]
life monitored 24/7 to be used by advertisers and the government for all general purposes.
[1012]
If you disagree with this policy, feel free to opt out of living.”
[1015]
Is this what convenience has to cost us?
[1018]
The solution to this problem is simple but not easy.
[1021]
We need a dotcom equivalent of do not call law.
[1023]
Do not call law is a regulation maintained by the United States Federal Communications
[1027]
Commission that keeps a registry of people wishing to opt-out from telemarketers calling
[1032]
their numbers for advertising purposes.
[1034]
Similarly, online marketers and websites should not be allowed to track Internet citizens,
[1039]
if they wish to opt out.
[1040]
Tracking of browsing history should be illegal.
[1042]
No website needs to see what you do outside of their services to “improve their services”.
[1047]
Tracking of logged out users through like and share buttons on websites should be banned.
[1052]
Likewise, companies should be barred from collecting information on people visiting
[1055]
websites using their third party tools like Google Analytics or Facebook advertisements.
[1060]
When you visit a website that uses Facebook adverts, you are not using Facebook services,
[1065]
and should not be subjected to their data collection.
[1067]
Your browsing history should be between you and your Internet Service Provider and no
[1071]
one else.
[1072]
ISPs shouldn’t blackmail or deceive you into defaults.
[1078]
Just like Facebook, Google’s business model also stands in the way of free and open Internet.
[1082]
You can also learn more about Google’s dirty industry practices that threaten free market
[1086]
and digital rights in my other video.
[1089]
If you feel like Facebook privacy policy is too much for you, you can find ways to protect
[1092]
your online privacy.
[1094]
There is a useful guide on privacytools.io where you can learn privacy protection step
[1098]
by step.
[1099]
I also made an easy to follow video tutorial on how to protect your privacy online that
[1103]
you can use even if you are not tech savvy.
[1106]
On this channel, I want to work on exposing clandestine business practices that go against
[1110]
our digital rights and individual freedoms.
[1112]
If you want to see more analyses like this one and useful ways how to protect your online
[1116]
identity and privacy, subscribe to my channel for more videos in the future.
[1119]
Please share your thoughts in the comment section.
[1122]
It’s essential that we spur debate about Facebook privacy problem.
[1125]
Sooner or later, this is going to have be about more than just installing privacy extensions
[1130]
on your browser.
[1131]
Facebook’s marketing industry already started the legal battle.
[1134]
It’s our turn now.