Anomaly Six

Last updated
Anomaly Six LLC
Industry Media intelligence
Founded2018;5 years ago (2018)
FoundersFormer military intelligence officers Brendan Huff and Jeffrey Heinz
Headquarters Alexandria, Virginia, U.S.
Products Location data products
Website www.anomalysix.com

Anomaly Six (A6) is a media intelligence company. It sells global-location-data products to the United States government and the private sector. The company has embedded its software in over 500 mobile applications, giving it the ability to track hundreds of millions of mobile phones. [1] [2] In one presentation, the company claimed it could track 3 billion phones in real time. [3]

Contents

History

The company was founded in 2018 by two former military intelligence officers. It is based in Alexandria, Virginia. [3]

The company purchases cell phone location data from advertisers who in turn get the information from embedded software development kits (SDK) in commonly used phone applications. [3] The publishers of apps frequently allow third parties to insert SDKs into their apps for a fee. [1] Some of the apps have Anomaly Six’s own SDK embedded in them. This system often relies on disclosures in the complex terms of service that must be agreed to in order to use an application. [3] Most apps' privacy policies do not disclose whether or not SDKs are embedded in their product. [1]

In September 2020, U.S. Special Operations Command Africa, an operational unit of the United States Special Operations Command, paid Anomaly 6 $589,500 for a "Commercial Telemetry Feed". This is the first reported contract between the United States government and Anomaly 6. [2]

In April 2022, it was revealed that the company had demonstrated its surveillance ability by tracking the mobile phones of members of the CIA and NSA. The company revealed the tracking during a meeting between A6 and Zignal Labs. The two companies were in talks to discuss a potential partnership, which they decided not to proceed on. [4] [3]

Related Research Articles

<span class="mw-page-title-main">Industrial espionage</span> Use of espionage for commercial purposes rather than security

Industrial espionage, economic espionage, corporate spying, or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

An international mobile subscriber identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. The 3G wireless standard offers some risk mitigation due to mutual authentication required from both the handset and the network. However, sophisticated attacks may be able to downgrade 3G and LTE to non-LTE network services which do not require mutual authentication.

<span class="mw-page-title-main">Crash reporter</span> System software that identify and report crash details

A crash reporter is usually a system software whose function is to identify reporting crash details and to alert when there are crashes, in production or on development / testing environments. Crash reports often include data such as stack traces, type of crash, trends and version of software. These reports help software developers- Web, SAAS, mobile apps and more, to diagnose and fix the underlying problem causing the crashes. Crash reports may contain sensitive information such as passwords, email addresses, and contact information, and so have become objects of interest for researchers in the field of computer security.

Mobile app development is the act or process by which a mobile app is developed for one or more mobile devices, which can include personal digital assistants (PDA), enterprise digital assistants (EDA), or mobile phones. Such software applications are specifically designed to run on mobile devices, taking numerous hardware constraints into consideration. Common constraints include CPU architecture and speeds, available memory (RAM), limited data storage capacities, and considerable variation in displays and input methods. These applications can be pre-installed on phones during manufacturing or delivered as web applications, using server-side or client-side processing to provide an "application-like" experience within a web browser.

iOS Mobile operating system by Apple

iOS is a mobile operating system developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also includes the system software for iPads predating iPadOS—which was introduced in 2019—as well as on the iPod Touch devices—which were discontinued in mid-2022. It is the world's second-most widely installed mobile operating system, after Android. It is the basis for three other operating systems made by Apple: iPadOS, tvOS, and watchOS. It is proprietary software, although some parts of it are open source under the Apple Public Source License and other licenses.

iOS SDK Software development kit for iOS

The iOS SDK, formerly the iPhone SDK, is a software development kit (SDK) developed by Apple Inc. The kit allows for the development of mobile apps on Apple's iOS and iPadOS operating systems.

<span class="mw-page-title-main">Here Technologies</span> Netherlands-based mapping data company

Here Technologies is an American–Dutch multinational group dealing with mapping, location data and related automotive services to individuals and companies. It is majority-owned by a consortium of German automotive companies and American semiconductor company Intel whilst other companies also own minority stakes. Its roots date back to U.S.-based Navteq in 1985, which was acquired by Finland-based Nokia in 2007. Here is currently based in The Netherlands.

<span class="mw-page-title-main">Recon Instruments</span>

Recon Instruments was a Canadian technology company that produced smartglasses and wearable displays marketed by the company as "heads-up displays" for sports. Recon's products delivered live activity metrics, GPS maps, and notifications directly to the user's eye. Recon's first heads-up display offering was released commercially in October 2010, roughly a year and a half before Google introduced Google Glass.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">Global surveillance disclosures (2013–present)</span> Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

Zignal Labs is a SaaS-based media intelligence software service company that serves marketing and public relations departments. It was founded in 2011 and is headquartered in San Francisco.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers, and the operating systems of most smartphones, as well as other operating systems such as Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the C.I.A.

Glassbox is an Israeli software company. It sells session-replay analytics software and services.

Stalkerware is monitoring software or spyware that is used for cyberstalking. The term was coined when people started to widely use commercial spyware to spy on their spouses or intimate partners. Stalkerware has been criticized because of its use by abusers, stalkers, and employers.


Founded in 2013, X-Mode Social is a US company based in Reston, Virginia.

References

  1. 1 2 3 Tau, Byron (August 7, 2020). "U.S. Government Contractor Embedded Software in Apps to Track Phones" . The Wall Street Journal .
  2. 1 2 Cox, Joseph (March 30, 2021). "U.S. Special Operations Command Paid $500,000 to Secretive Location Data Firm". Vice Media . Archived from the original on June 5, 2022. Retrieved April 24, 2022.
  3. 1 2 3 4 5 Biddle, Sam; Poulson, Jack (April 22, 2022). "American Phone-Tracking Firm Demo'd Surveillance Powers by Spying on CIA and NSA". The Intercept . Archived from the original on June 5, 2022. Retrieved April 24, 2022.
  4. Ropek, Lucas (April 22, 2022). "Surveillance Firm Reportedly Tracked NSA and CIA Spies as Product Demo". Gizmodo . Archived from the original on June 5, 2022. Retrieved April 24, 2022.