đ
How Facebook tracks and manipulates everyone, everything, and everywhere - Delete your Facebook now - YouTube
Channel: The Hated One
[33]
Facebook privacy policy is a masterpiece of deception.
[36]
Itâs intentionally vague, open-worded and
doesnât have any universal boundaries that
[40]
would put reasonable limits on Facebookâs
tracking.
[43]
The data policy uses blanket terms like third
parties, to cover a vast range of activities
[47]
that allow Facebook to follow your every step
and do with that information whatever they want
[58]
When you agree to the terms of service, you
as an Internet citizen cannot even imagine
[62]
the uses and value your personal information
has to Facebook and the database marketing
[66]
industry behind it.
[68]
Facebook doesnât just collect all of your
personal information you upload on their website
[72]
through private chat conversations, expressions
in likes and comments, or posts on your newsfeed.
[77]
Facebook will plant permanent trackers on
your mobile and desktop devices to follow
[80]
you around the Internet to map all of your
browsing history.
[83]
In cooperation with its marketing partners,
Facebook helps to match that information with
[87]
your real-life data like social security number,
physical address, age and family relationships.
[93]
Where does your data go after Facebook collects
them?
[96]
What does Facebook privacy policy really means
for your personal information?
[100]
There is an entire industry developed behind
Facebookâs business model violating your privacy.
[105]
It doesnât often make headlines and operates
as secretively as high-profile banking.
[109]
And just like clandestine predatory banking
threatens financial stability, Facebook is
[113]
standing up for industry that poses a threat
to democratic values that enabled creation
[117]
of Facebook in the first place.
[119]
In the next few minutes, youâll learn how
Facebook stands behind major data broking
[123]
conglomerates who boast with their ability
to predict and influence consumer behavior
[127]
based on the data collection facilitated by
the Facebook company.
[130]
Nothing thatâs mentioned here is a conspiracy
theory.
[133]
The analysis is made of publicly available
information and everything will have sources
[138]
in the description below.
[139]
Hopefully, information presented here will
help you understand the intrusive scope of
[143]
Facebook privacy policy and maybe give you
enough reason to want to stop using Facebook
[148]
immediately.
[149]
Because their manipulative marketing practices
threaten everything free and democratic world
[154]
stands for.
[155]
What Facebook does with the privacy of Internet
citizens is currently not regulated or supervised
[159]
and you donât have the option to opt out,
even you donât use Facebook at all.
[163]
We are in an alarming situation were big database
marketing industry collects private and personally
[168]
identifiable information on almost all adults
on the Internet.
[172]
This information is used to make blanket judgments
about people based on how profitable their
[176]
trading algorithms view them.
[178]
Itâs an uncontrolled joint mechanism with
the intent to influence and manipulate people
[182]
for their own benefit, where consumers have
no say whatsoever.
[185]
Trading happens about them, but without them.
[188]
You should have a say in this.
[190]
You should now whatâs happening to your
private information, and where it goes once
[193]
Facebook collects it.
[194]
You should have the right to opt out, and
not be an involuntary target of advertising
[198]
industry.
[203]
This year Google announced that it will track
users offline behavior by connecting online
[208]
advertisements to purchases in brick and mortar
stores, to verify its clients online ad impressions.
[213]
Meanwhile, Facebook has been actively doing
this since 2014.
[216]
With the freshly rebuilt ad platform called
Atlas, Facebook launched unified tracking
[221]
mechanisms to allow marketers to follow users
across thousands of websites and mobile applications.
[226]
The service promotes itself as âreaching
people across devices and bridging the gap
[230]
between online impressions and offline purchasesâ.
[232]
Atlas made it possible to identify specific
subjects for targeted advertisements opening
[237]
up the world of possibilities for influential
marketing techniques.
[240]
Analytics algorithm made it possible to determine
certain personality traits to exploit for
[244]
profit.
[245]
They could find people with propensity to
gambling, abusing knowledge of private information
[250]
that shouldnât have been know to them, just
so that they can deploy manipulative advertisements.
[253]
Atlas uses data to make stereotypical assumptions
about people based on their race, gender,
[258]
location, and influence a specific behavior
according to societal expectations.
[262]
Sometimes even enforcing trends like body
shaming of young men and women, exploiting
[266]
people more susceptible to predatory lending,
or taking advantage of addiction weaknesses
[271]
like smoking or alcohol.
[273]
People make mistakes, and privacy is to protect
them from being exploited for those mistakes.
[277]
This is what happens when an entire industry
forms around abusing peopleâs natural and
[281]
perfectly reasonable need for comfort and
convenience.
[284]
Facebookâs affiliated mobile applications
and web services give them access to your
[288]
location, phone number and telemetric data
from your mobile devices.
[292]
All thatâs necessary to develop capability
for its marketing partners to make and maintain
[296]
permanent self-updating profiles.
[299]
Advanced algorithms rank peopleâs profiles
according to their monetization opportunity.
[303]
âWasteâ is a common word used to describe
low level targets with little expectations
[307]
for profit generation.
[309]
Usual practice to deal with people ranked
in this way is to put them on slower customer
[313]
service lanes, and offer discriminatory pricing,
What Facebook cannot track for themselves,
[318]
its advertising partners will do it for them.
[320]
Facebook is affiliated with over 190 marketing
partners that together form the biggest database
[326]
of personal information in the world.
[328]
They are all elite members of the marketing
class, but the most famous names are Exparian,
[333]
Axciom, Epsilon, Vidsy Adobe, and Oracle.
[337]
According to a Federal Trade Commission report,
seven out nine data brokers buy from or sell
[341]
information from their databases to each other.
[344]
These are channeled through series of data
broking companies, making it impossible to
[349]
trace original source of particular data element.
[352]
The whole industry operates on a highly clandestine
nature, offering strong encryption to its
[356]
clients, but near zero level protection of
consumer data.
[360]
Privacy for corporations, but surveillance
for everyone else.
[364]
Security breaches and hacker attacks are regular
routine, to which marketing industry exposes
[368]
your private information.
[370]
One of the biggest brokers, Epsilon, had its
database breached by unknown hackers.
[374]
The breach exposed millions of email address
and consumer names for Epsilonâs top clients
[379]
including JPMorgan Chase, Citibank, Target,
and Walgreens.
[383]
It was never disclosed how much data was stolen.
[386]
Given the nature of current cyber laws, we
may have never heard of countless of other
[390]
potential breaches.
[392]
Your private information could be floating
around the Internet and you have no way to
[395]
stop it.
[398]
Axciom adopts an all around approach to tracking
your private life.
[402]
Within high circles in the company, itâs
known as â360-degree viewâ on consumers.
[406]
It uses its 40 year old database of offline
information collected from government sources
[411]
and self-reported surveys, and past few decades
of digital surveillance to develop its own
[415]
classification system to rank consumers.
[417]
This system, called PersonicX, categorizes
Internet users to one of 70 socioeconomic
[422]
classes, each being marketed by its own rules.
[425]
For example, this system can determine whether
someone is tech savvy, if they prefer to use
[429]
online banking, mobile devices, are price
sensitive, and come from upper-middle-class.
[434]
With no spouse, they are assigned a class
âsavvy singleâ.
[437]
Thus, theyâll be marketed special tech deals
with price coupons to appeal to their interests
[442]
and price responsiveness.
[444]
Whatever there is to know about this person
is used to create a personalized deal to influence
[448]
them to click on the ad and make a purchase.
[450]
This, however, wouldnât be be possible without
a targeted invasion of their privacy.
[454]
The goal is to make sure a consumer buys from
one of the members of their marketing chain,
[459]
and not someone else.
[460]
But that someone could have been a medium-sized
retailer, who is in disadvantage, because
[464]
he doesnât spy on your private life.
[466]
This retailer gets excluded from the Internet
visible to you, because he is not part of
[471]
the elite wolf pack.
[474]
We are being told that online marketing is
anonymous, so it doesnât matter if they
[478]
breach our privacy.
[479]
But Axciom proves this is exact opposite of
what marketing industry really does and wants.
[522]
AbiliTec Digital, one of Axciomâs many products,
is described as âcustomer recognitionâ
[527]
service.
[528]
It works to link history of data with peopleâs
names, nicknames, email and home addresses,
[533]
and phone numbers both mobile and landline.
[535]
In 2014 Axciomâs CEO boasted to have dropped
1.1 billion third party cookies on people
[541]
visiting clientâs websites.
[543]
Why does he boast now?
[544]
Itâs a marketing technique to attract even
more clients and expand the industry.
[549]
Just like their website âaboutthedata.comâ
where you can take a peak at your data file.
[553]
However, this is just a major publicity stunt.
[555]
I donât recommend that you proceed with
looking yourself up on their website.
[559]
First of all, youâd have to provide various
personal information, like your full name
[562]
and social security number.
[564]
Youâd voluntarily give them even more of
your private information.
[567]
Secondly, it might not even work for you anyway.
[569]
The website asks its users to update the missing
data or correct if somethingâs wrong.
[574]
Again, you would only provide them with more
personal information, and confirm that your
[577]
advertising ID truly matches your real identity.
[580]
In 2012, companies spent over $2 billion dollars
on third-party data about individuals and
[586]
billions more on credit card data, just in
the United States.
[590]
This personally identifiable information is
used to specifically target individuals based
[594]
on their unique advertising profiles.
[596]
The whole process of targeted advertising
happens through mechanism called high-frequency
[601]
trading.
[602]
Itâs derived of algorithmic trading on stock
exchange, were each transaction takes milliseconds
[606]
to complete.
[607]
Transactions are decided on by bids, where
the highest bidder wins.
[611]
Such trading occurs in online advertisements
as well.
[614]
On ad exchange, marketers place their bids
for ad space on websites where they identified
[618]
highest prospects of success.
[620]
Automated ad sales system allows website operators
to sell their ad space to the highest bids.
[625]
Websites use numerical customer codes derived
from uniquely identifying cookies placed on
[629]
web browsers to track online activities of
their visitors.
[632]
An ad exchange then takes these profiles,
and cross-reference them with their third
[636]
party data aggregates using information like
sex, age, interests, income range, and history
[642]
of purchases.
[643]
The exchange analytics then determines fair
market value of websites visitors and the
[647]
ad spaces available to show them.
[649]
The whole process has to take less than 50
milliseconds.
[652]
What you are going to see on a website is
determined before the page even loads.
[656]
Thatâs only possible because of the self-updating
trackrecord of your online activity.
[661]
Companies maintaining these ad exchanges are
PubMatic, Rubicon, Googleâs DoubleClick,
[665]
or Facebook Exchange.
[667]
Facebook Exchange is now shifting towards
Dynamic Ads.
[670]
Each of them make annual revenues of billions
of dollars from advertisers paying for display
[675]
ads.
[676]
This is what makes Facebook such a huge fortune.
[678]
The social network is just a pretty make up.
[680]
Once gathered, the available data is listed
in consumer data products catalog.
[685]
But these are not anonymous statistical categories,
as you would expect.
[688]
Axciomâs clients can buy hundreds of details
about individuals and households lumped together
[692]
in elements, like Christian families, money
seekers, dieting/weight loss, and smoking/tobacco.
[697]
There is even an option to choose a race model
â caucasians, hispanics, african-americans,
[702]
asians and so on.
[704]
A a specified retailer selling letâs say
portable computing goods can ask Axciom for
[709]
specific information on million college students
living in urban areas aged 18 to 25.
[714]
Axciom then asks for further identification
of the retailerâs customers.
[718]
Whenever you pay for goods with your credit
card, your identifiable information is scraped
[723]
from your credit card company.
[724]
If you supplied your ZIP code or phone number,
that information is also tied to your advertising
[729]
ID.
[730]
The list of people who can thus know your
purchasing or browsing history expands as
[733]
quickly as the whole marketing industry.
[736]
The advertising is never anonymous.
[737]
At best, itâs pseudonymous.
[739]
Each person using the Internet is automatically
assigned an identification code thatâs continuously
[744]
updated and cross-referenced with database
of your public and private personal information.
[749]
However, Stanford University found out that
many websites actually leak personally identifiable
[754]
information to third party trackers, matching
user IDs with their real names.
[758]
The independently funded research found evidence
of tracking companies stockpiling databases
[762]
of clickstreams â collected browsing histories.
[765]
The tracking starts from day one and continues
until each clickstream can be assigned a pseudonym
[769]
(the unique ID).
[771]
If you click on an advertisement, first party
leaks your personally identifiable information
[775]
to a third party.
[776]
Most frequently itâs gonna be your username
or user ID, but it can also be your IP or
[780]
email address.
[781]
In most cases, third party companies act as
first party at the same time â like Facebook,
[786]
Twitter, or Google+.
[788]
The third party then buys identifying information
from a âcustomer recognitionâ service.
[791]
Itâs also possible for a third party to
exploit security vulnerabilities to learn
[796]
about your identity.
[797]
Finally, the third party matches your pseudonymous
data against their identified data, creating
[802]
a finalized version of your profile.
[804]
It doesnât matter at which point in the
future they manage to attach the ID to your
[808]
clickstream.
[809]
Identification affects the data in the future
as well as retroactively, and thus only needs
[813]
to happen once.
[815]
Sometimes, websites leak your username to
dozens of third parties at once.
[819]
For example, Photobucket would send your username
embedded in its URLs to 31 companies.
[824]
Filling out wrong password on the Wall Street
Journal website will get your email address
[828]
sent to 7 companies.
[830]
These websites behavior never gets mentioned
in their privacy policies.
[833]
And the same goes for Facebook privacy.
[835]
The Facebook privacy policy might as well
just look like this:
[839]
Using our services you agree:
to give us permission to spy on your EVERY
[842]
movement and activity 24/7, within Facebook
as well as all over the Web and your offline
[847]
physical activities, and store this information
indefinitely and permanently.
[851]
to share all information we have about you
with anybody who is willing to pay for them
[855]
or at least ask for them nicely.
[857]
We make sure our advertisers, our third parties,
and third parties of our third parties, know
[862]
exactly who you are and what you do, so that
you are more susceptible to manipulation and
[867]
surveillance.
[868]
Facebook doesnât explain that they use your
private conversations, your browsing habits,
[873]
track record of articles you read, videos
you watch, music you listen to, things you
[878]
buy, to create and maintain a unique psychological
profile of your identity to store permanently
[884]
and use indiscriminately by the whole industry.
[888]
Tracking users activity on their own website
is one thing.
[891]
But actively pursuing collection of information
on peopleâs activities on the Internet just
[895]
steps over the line by miles.
[897]
People donât know how websites work and
talk to each other, so they rationally believe
[901]
that what they share with Facebook, stays
on Facebook.
[904]
People think nobody listens to their online
conversations, because nobody does it in real
[908]
life.
[909]
People think sending emails is like sending
letters in an envelope, when in virtual reality,
[914]
everything is visible as text on a postcard.
[917]
By walking out of a brick and mortar store,
your interaction with the business ends and
[921]
everything you do the moment you step outside
is unknown to the owner of the store.
[926]
Purchase goods online with the same retailer,
and suddenly itâs not enough to just pay
[929]
with money.
[930]
You have to unknowingly hand over all of your
past and future life as another form of payment
[935]
for using their service.
[937]
Technology is several steps ahead of our understanding,
and society and laws havenât caught up yet.
[942]
It creates a loophole for an entire industry
to flourish, while values that hold together
[946]
the system in tranquility and freedom are
being torn apart in the process.
[950]
We might just have reached a point were we
have to collectively decide that profit of
[953]
a few doesnât necessarily serve the greatest
benefit for us all.
[957]
There is no solution where marriage with these
companies is still a reality.
[961]
You canât have your private life protected
while still agreeing to these privacy policies.
[966]
You have to stop using Google.
[968]
You have to stop using Facebook.
[969]
Itâs not just the government surveillance
thatâs a problem here.
[972]
The whole industry went rogue.
[974]
There has to be a new regulation that catches
up with our privacy standards of the past.
[979]
If the commercial Internet destroys everything
that allowed it to become reality in the first
[983]
place, then this will make it into history
books as a failure of free society to guard
[987]
its own liberty.
[989]
Do we want to live in a world where a handful
of marketing companies control all private
[994]
information of every adult Internet user?
[997]
Soon, Internet will be used by everybody on
Earth.
[1000]
Not using it will not be an option.
[1003]
Next privacy policy might as well just be
âwhen turning 18, you agree to have your
[1006]
life monitored 24/7 to be used by advertisers
and the government for all general purposes.
[1012]
If you disagree with this policy, feel free
to opt out of living.â
[1015]
Is this what convenience has to cost us?
[1018]
The solution to this problem is simple but
not easy.
[1021]
We need a dotcom equivalent of do not call
law.
[1023]
Do not call law is a regulation maintained
by the United States Federal Communications
[1027]
Commission that keeps a registry of people
wishing to opt-out from telemarketers calling
[1032]
their numbers for advertising purposes.
[1034]
Similarly, online marketers and websites should
not be allowed to track Internet citizens,
[1039]
if they wish to opt out.
[1040]
Tracking of browsing history should be illegal.
[1042]
No website needs to see what you do outside
of their services to âimprove their servicesâ.
[1047]
Tracking of logged out users through like
and share buttons on websites should be banned.
[1052]
Likewise, companies should be barred from
collecting information on people visiting
[1055]
websites using their third party tools like
Google Analytics or Facebook advertisements.
[1060]
When you visit a website that uses Facebook
adverts, you are not using Facebook services,
[1065]
and should not be subjected to their data
collection.
[1067]
Your browsing history should be between you
and your Internet Service Provider and no
[1071]
one else.
[1072]
ISPs shouldnât blackmail or deceive you
into defaults.
[1078]
Just like Facebook, Googleâs business model
also stands in the way of free and open Internet.
[1082]
You can also learn more about Googleâs dirty
industry practices that threaten free market
[1086]
and digital rights in my other video.
[1089]
If you feel like Facebook privacy policy is
too much for you, you can find ways to protect
[1092]
your online privacy.
[1094]
There is a useful guide on privacytools.io
where you can learn privacy protection step
[1098]
by step.
[1099]
I also made an easy to follow video tutorial
on how to protect your privacy online that
[1103]
you can use even if you are not tech savvy.
[1106]
On this channel, I want to work on exposing
clandestine business practices that go against
[1110]
our digital rights and individual freedoms.
[1112]
If you want to see more analyses like this
one and useful ways how to protect your online
[1116]
identity and privacy, subscribe to my channel
for more videos in the future.
[1119]
Please share your thoughts in the comment
section.
[1122]
Itâs essential that we spur debate about
Facebook privacy problem.
[1125]
Sooner or later, this is going to have be
about more than just installing privacy extensions
[1130]
on your browser.
[1131]
Facebookâs marketing industry already started
the legal battle.
[1134]
Itâs our turn now.
You can go back to the homepage right here: Homepage





