Anomaly Six

Last updated
Anomaly Six LLC
Industry Media intelligence
Founded2018;6 years ago (2018)
FoundersFormer military intelligence officers Brendan Huff and Jeffrey Heinz
Headquarters Alexandria, Virginia, U.S.
Products Location data products
Website www.anomalysix.com

Anomaly Six (A6) is a media intelligence company. It sells global-location-data products to the United States government and the private sector. The company has embedded its software in over 500 mobile applications, giving it the ability to track hundreds of millions of mobile phones. [1] [2] In one presentation, the company claimed it could track 3 billion phones in real time. [3]

Contents

History

The company was founded in 2018 by two former military intelligence officers. It is based in Alexandria, Virginia. [3]

The company purchases cell phone location data from advertisers who in turn get the information from embedded software development kits (SDK) in commonly used phone applications. [3] The publishers of apps frequently allow third parties to insert SDKs into their apps for a fee. [1] Some of the apps have Anomaly Six’s own SDK embedded in them. This system often relies on disclosures in the complex terms of service that must be agreed to in order to use an application. [3] Most apps' privacy policies do not disclose whether or not SDKs are embedded in their product. [1]

In September 2020, U.S. Special Operations Command Africa, an operational unit of the United States Special Operations Command, paid Anomaly 6 $589,500 for a "Commercial Telemetry Feed". This is the first reported contract between the United States government and Anomaly 6. [2]

In April 2022, it was revealed that the company had demonstrated its surveillance ability by tracking the mobile phones of members of the CIA and NSA. The company revealed the tracking during a meeting between A6 and Zignal Labs. The two companies were in talks to discuss a potential partnership, which they decided not to proceed on. [4] [3]

Related Research Articles

<span class="mw-page-title-main">Industrial espionage</span> Use of espionage for commercial purposes rather than security

Industrial espionage, also known as economic espionage, corporate spying, or corporate espionage, is a form of espionage conducted for commercial purposes instead of purely national security.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

iOS SDK Software development kit for iOS

The iOS SDK, formerly the iPhone SDK, is a software development kit (SDK) developed by Apple Inc. The kit allows for the development of mobile apps on Apple's iOS and iPadOS operating systems.

<span class="mw-page-title-main">Tailored Access Operations</span> Unit of the U.S. National Security Agency

The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden.

<span class="mw-page-title-main">XKeyscore</span> Mass surveillance system

XKeyscore is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

This is a category of disclosures related to global surveillance.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

<span class="mw-page-title-main">Sentry Eagle</span>

Sentry Eagle, the National Initiative Protection Program, is a compartmented program of the National Security Agency's (NSA) Central Security Service (CSS) and the US Strategic Command Joint Functional Component Command - Network Warfare (JFCC-NW). Its existence was revealed during the 2013 global surveillance disclosure by Edward Snowden.

<span class="mw-page-title-main">NSO Group</span> Israeli cyber-espionage and malware firm

NSO Group Technologies is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance of smartphones. It employed almost 500 people as of 2017.

Zignal Labs is a SaaS-based media intelligence software service company that serves marketing and public relations departments. It was founded in 2011 and is headquartered in San Francisco.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the CIA.

Glassbox is an Israeli software company. It sells session-replay analytics software and services.

DarkMatter Group is a computer security company founded in the United Arab Emirates (UAE) in 2014 or 2015. The company has described itself as a purely defensive company, however in 2016, it became a contractor for Project Raven, to help the UAE surveil other governments, militants, and human rights activists. It has employed former U.S. intelligence operatives and graduates of the Israel Defense Force technology units.


Founded in 2013, X-Mode Social is a US company based in Reston, Virginia.

References

  1. 1 2 3 Tau, Byron (August 7, 2020). "U.S. Government Contractor Embedded Software in Apps to Track Phones" . The Wall Street Journal .
  2. 1 2 Cox, Joseph (March 30, 2021). "U.S. Special Operations Command Paid $500,000 to Secretive Location Data Firm". Vice Media . Archived from the original on June 5, 2022. Retrieved April 24, 2022.
  3. 1 2 3 4 5 Biddle, Sam; Poulson, Jack (April 22, 2022). "American Phone-Tracking Firm Demo'd Surveillance Powers by Spying on CIA and NSA". The Intercept . Archived from the original on June 5, 2022. Retrieved April 24, 2022.
  4. Ropek, Lucas (April 22, 2022). "Surveillance Firm Reportedly Tracked NSA and CIA Spies as Product Demo". Gizmodo . Archived from the original on June 5, 2022. Retrieved April 24, 2022.