SlideShare a Scribd company logo
1 of 25
Download to read offline
Tracking the Trackers
A Digital Methods Summer School 2013 Workshop
Anne Helmond (UvA) & Alexei Miagkov (Ghostery)
One action, many data points
“For every explicit action of a user, there are
probably 100+ implicit data points from
usage; whether that is a page visit, a scroll
etc.” (Berry 2011: 152)
Hitting & tracking
Every time a web user requests a
website, a series of tracking
features are enabled.
Hitting & tracking
Every time a web user requests a
website, a series of tracking
features are enabled.
Workshop objective: Tracking the
trackers.
Cookies
• (HTML) Cookies are a string of text or a
unique identifier downloaded to your browser
after requesting a website.
• Cookies do not share data about the user,
but recognise returning visits/requests.
• Every time the associated website is
visited, information is send to the cookie
owner.
Cookies
• Can be issued by requested website.
• But can also come from third party
providers: ad companies, analytics services,
social media platforms.
Multiple purposes
• Remember site preferences.
• Collect information to enhance usability of
site.
• Part of secure logins.
• User profiling across sites (ad services).
• Behavioural targeting.
• Additional user data for platform.
Cookies & dataflows
• Tracking devices enable behavioural
targeting.
• Not only happen in the back-end, return to
users through personalised ads &
recommendations.
Tracking ecologies
• Tracking data is used & re-used by multiple actors.
• Profiling, reselling, personalisation, recommendation, behaviour
targeting, re-combination...
• Profiling machines (Elmer 2004), qualculation (Thrift 2008), de- &
recomposition of relations (Mackenzie 2012).
• Part of multiple relational databases: Not individual datasets or
datapoints matter, but relations created between them (Mackenzie
2012).
Cookie auctions & piggybacking
• Cookies are not only being used by the services that
issues them.
• Real-time reselling & cookie auctions for personalised
advertising (Borgesius 2012).
• Cookies trigger further tracking devices & let them
piggyback - websites do not exactly know which services
collect data about their visitors.
Social media platform cookies
• Platform features (Facebook Connect, Twitter Buttons,
etc) can place cookies.
• Data can be connected to existing user profiles or
collected and used upon sign-up.
• Facebook: Cookies not used for ads. Twitter: used for
ads & recommendations.
• All web users are potential platform users & contribute
to its data mining practices.
Beyond cookies
• Flash cookies: Used on Flash websites.
• Server logs: Saving requests to the website’s server
usually include: IP, date/time, referral page, time spend
and pages visited.
• Beacons: Small, mostly invisible objects (pixels, bugs)
embedded in websites or emails. Enables third parties
to identify website requests. Do not place a file on the
browser.
• Widgets: Small applications that can be implemented
and executed on websites, i.e. social media or blog
widgets.
Tracking blockers
Ghostery: Detects and allows to block the invisible web.
• Allows to selectively enable/disable cookies,
advertising, beacons etc.
• Users can opt to contribute to Ghostrank: analytics on
the most dominant tracking devices online.
• Detecting over 1000 trackers.
Visualising trackers
Mozilla Collusion: Creates a network of
browsed sites and associated tracking
services for users in real time while
browsing.
• Visualises which services are tracking
users and how they are connected to other
websites visited.
Tracking blockers
Disconnect.me: Blocks and visualises
trackers. Especially disables social widgets
and personalised advertising.
• Disables Facebook Social Plugins/
recommendation features.
Tracking blockers
Mozilla Do Not Track: Firefox
feature which allows users to
tell websites that they want to
opt out of third-party tracking
services.
• Transmits a Do Not Track
HTTP whenever data is
requested.
• Requires tracking services to
offer opt out: Works for Twitter,
but not for Facebook.
Tracking projects & research
Tracking the trackers
(Guardian): User generated
tracking map based on Mozilla
Collusion data.
• Covers 7000 websites and
features insights into the data
shared by most prominent
tracking services.
• Limitations: user generated,
random set of URLs.
Tracking projects & research
Cookie Search Engine
(German): Detects first and
third party cookies on URLs.
• Provides list of cookies, their
domain, security options and
expiry date.
Tracking projects & research
Visipisi: Deploys cookies to detect which
websites have recently been visited.
DMI: Tracker Tracker
• Objective: detecting interfaces to the cloud and
data-mining features operating in the back-end.
• Repurpose analytical capacities of Ghostery to
detect presence of tracking devices on websites.
• Input list of URL, output: list of trackers &
network formatted data.
DMI: Tracker Tracker
Allows to detect alternative fabric
of the web - not organised by
mutual linking practices between
webmasters, but through the
presence of tracking devices.
DMI: Tracker Tracker
Websites using Facebook Social
Plugins and Facebook Connect in
the top 1000 global websites
according to Alexa, February
2012
DMI: Tracker Tracker
Websites using Google Analytics
in the top 1000 global websites
according to Alexa, February
2012
DMI: Tracker Tracker
Presence of Trackers on
websites of Dutch
political parties, June
2012.
Tracking exercise
1. Collect a set of URLs, for instance via www.alexa.com.
Use the Link Ripper to extract them.
2. Enter the list into the Tracker Tracker tool (max 100).
Settings: Only look at specific pages.
3. Save .gefx file.
4. Open in Gephi, use colour settings to visually distinguish
different tracking services.
Questions?

More Related Content

Viewers also liked

Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...
Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...
Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...
Digital Methods Initiative
 
National Tracking Ecologies - Digital Methods Summer School 2013
National Tracking Ecologies - Digital Methods Summer School 2013National Tracking Ecologies - Digital Methods Summer School 2013
National Tracking Ecologies - Digital Methods Summer School 2013
Digital Methods Initiative
 
Traces of the Trackers. Tracking the Trackers: A historical analysis using th...
Traces of the Trackers. Tracking the Trackers: A historical analysis using th...Traces of the Trackers. Tracking the Trackers: A historical analysis using th...
Traces of the Trackers. Tracking the Trackers: A historical analysis using th...
Digital Methods Initiative
 
Crawling and Scraping tutorial at the Digital Methods Summer School 2013
Crawling and Scraping tutorial at the Digital Methods Summer School 2013Crawling and Scraping tutorial at the Digital Methods Summer School 2013
Crawling and Scraping tutorial at the Digital Methods Summer School 2013
Digital Methods Initiative
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Digital Methods Initiative
 
Digital Methods Summer School 2015 Tool Medley
Digital Methods Summer School 2015 Tool MedleyDigital Methods Summer School 2015 Tool Medley
Digital Methods Summer School 2015 Tool Medley
Digital Methods Initiative
 

Viewers also liked (19)

Richard Rogers, Otherwise Engaged: Critical Analytics and the New Meanings of...
Richard Rogers, Otherwise Engaged: Critical Analytics and the New Meanings of...Richard Rogers, Otherwise Engaged: Critical Analytics and the New Meanings of...
Richard Rogers, Otherwise Engaged: Critical Analytics and the New Meanings of...
 
Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...
Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...
Studying Facebook via Data Extraction: a Netvizz tutorial at the Digital Meth...
 
Digital Methods Summer School 2013 Tool Medley
Digital Methods Summer School 2013 Tool MedleyDigital Methods Summer School 2013 Tool Medley
Digital Methods Summer School 2013 Tool Medley
 
Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_Rogers studyingpoliticalissues mar2014_optimized_ii_
Rogers studyingpoliticalissues mar2014_optimized_ii_
 
National Tracking Ecologies - Digital Methods Summer School 2013
National Tracking Ecologies - Digital Methods Summer School 2013National Tracking Ecologies - Digital Methods Summer School 2013
National Tracking Ecologies - Digital Methods Summer School 2013
 
Post-social methods? Issues in live research, by Noortje Marres and Esther We...
Post-social methods? Issues in live research, by Noortje Marres and Esther We...Post-social methods? Issues in live research, by Noortje Marres and Esther We...
Post-social methods? Issues in live research, by Noortje Marres and Esther We...
 
Traces of the Trackers. Tracking the Trackers: A historical analysis using th...
Traces of the Trackers. Tracking the Trackers: A historical analysis using th...Traces of the Trackers. Tracking the Trackers: A historical analysis using th...
Traces of the Trackers. Tracking the Trackers: A historical analysis using th...
 
Digital Methods Summer School 2014 Tool Medley
Digital Methods Summer School 2014 Tool MedleyDigital Methods Summer School 2014 Tool Medley
Digital Methods Summer School 2014 Tool Medley
 
Web Flags Summer School 2012
Web Flags Summer School 2012Web Flags Summer School 2012
Web Flags Summer School 2012
 
Repurposing Wikipedia: Wikipedia as data set and analytical device
Repurposing Wikipedia: Wikipedia as data set and analytical deviceRepurposing Wikipedia: Wikipedia as data set and analytical device
Repurposing Wikipedia: Wikipedia as data set and analytical device
 
Rogers data days_2014_slides_opti
Rogers data days_2014_slides_optiRogers data days_2014_slides_opti
Rogers data days_2014_slides_opti
 
Hashtag lifelines
Hashtag lifelinesHashtag lifelines
Hashtag lifelines
 
Crawling and Scraping tutorial at the Digital Methods Summer School 2013
Crawling and Scraping tutorial at the Digital Methods Summer School 2013Crawling and Scraping tutorial at the Digital Methods Summer School 2013
Crawling and Scraping tutorial at the Digital Methods Summer School 2013
 
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
Cross-Platform Profiling tutorial at the Digital Methods Summer School 2013
 
Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_
 
Interactive visualization and exploration of network data with Gephi
Interactive visualization and exploration of network data with GephiInteractive visualization and exploration of network data with Gephi
Interactive visualization and exploration of network data with Gephi
 
Digital Methods Summer School 2015 Tool Medley
Digital Methods Summer School 2015 Tool MedleyDigital Methods Summer School 2015 Tool Medley
Digital Methods Summer School 2015 Tool Medley
 
Digital Methods Tool Medley
Digital Methods Tool MedleyDigital Methods Tool Medley
Digital Methods Tool Medley
 
The Birth of Social Media Methods
The Birth of Social Media MethodsThe Birth of Social Media Methods
The Birth of Social Media Methods
 

Similar to Tracking the Trackers tutorial at the Digital Methods Summer School 2013

Similar to Tracking the Trackers tutorial at the Digital Methods Summer School 2013 (20)

Web Tracking in cyber security and network security
Web Tracking in cyber security and  network securityWeb Tracking in cyber security and  network security
Web Tracking in cyber security and network security
 
Ferrante and Griffey "Federated Authentication_ Browser changes and what to e...
Ferrante and Griffey "Federated Authentication_ Browser changes and what to e...Ferrante and Griffey "Federated Authentication_ Browser changes and what to e...
Ferrante and Griffey "Federated Authentication_ Browser changes and what to e...
 
Google WorkShop for STC LoneStar Chapter
Google WorkShop for STC LoneStar ChapterGoogle WorkShop for STC LoneStar Chapter
Google WorkShop for STC LoneStar Chapter
 
Web Analytics Primer
Web Analytics PrimerWeb Analytics Primer
Web Analytics Primer
 
PPT 3 Web Analytics (1).pptx
PPT 3 Web Analytics (1).pptxPPT 3 Web Analytics (1).pptx
PPT 3 Web Analytics (1).pptx
 
OWF 2014 - Take back control of your Web tracking - Dataiku
OWF 2014 - Take back control of your Web tracking - DataikuOWF 2014 - Take back control of your Web tracking - Dataiku
OWF 2014 - Take back control of your Web tracking - Dataiku
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
 
Google Analytics tutorial by Jay Murphy
Google Analytics tutorial by Jay Murphy Google Analytics tutorial by Jay Murphy
Google Analytics tutorial by Jay Murphy
 
Affiliate Summit Orlando Meetup Group: Google Analytics for Beginners
Affiliate Summit Orlando Meetup Group:  Google Analytics for BeginnersAffiliate Summit Orlando Meetup Group:  Google Analytics for Beginners
Affiliate Summit Orlando Meetup Group: Google Analytics for Beginners
 
OWF14 - Big Data Track : Take back control of your web tracking Go further by...
OWF14 - Big Data Track : Take back control of your web tracking Go further by...OWF14 - Big Data Track : Take back control of your web tracking Go further by...
OWF14 - Big Data Track : Take back control of your web tracking Go further by...
 
Digital innovation-summit roi-of-ai-sept2017_v3
Digital innovation-summit roi-of-ai-sept2017_v3Digital innovation-summit roi-of-ai-sept2017_v3
Digital innovation-summit roi-of-ai-sept2017_v3
 
Connection and Context: ROI of AI for Digital Marketing
Connection and Context: ROI of AI for Digital MarketingConnection and Context: ROI of AI for Digital Marketing
Connection and Context: ROI of AI for Digital Marketing
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Making Web Analytics actionable with Web Content Management
Making Web Analytics actionable with Web Content ManagementMaking Web Analytics actionable with Web Content Management
Making Web Analytics actionable with Web Content Management
 
European Privacy Legislation - a primer
European Privacy Legislation - a primerEuropean Privacy Legislation - a primer
European Privacy Legislation - a primer
 
AoIR 2016 Digital Methods Workshop - Tracking the Trackers
AoIR 2016 Digital Methods Workshop - Tracking the TrackersAoIR 2016 Digital Methods Workshop - Tracking the Trackers
AoIR 2016 Digital Methods Workshop - Tracking the Trackers
 
Website Parameters.pptx
Website Parameters.pptxWebsite Parameters.pptx
Website Parameters.pptx
 
Web analytics & Online privacy
Web analytics & Online privacyWeb analytics & Online privacy
Web analytics & Online privacy
 
Digital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking MethodsDigital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking Methods
 

More from Digital Methods Initiative

Digital Methods Tool Medley. Digital Methods Summer School 2012
Digital Methods Tool Medley. Digital Methods Summer School 2012Digital Methods Tool Medley. Digital Methods Summer School 2012
Digital Methods Tool Medley. Digital Methods Summer School 2012
Digital Methods Initiative
 
Digital Methods Winterschool 2012: API - Interfaces to the Cloud
Digital Methods Winterschool 2012: API - Interfaces to the CloudDigital Methods Winterschool 2012: API - Interfaces to the Cloud
Digital Methods Winterschool 2012: API - Interfaces to the Cloud
Digital Methods Initiative
 
DMI Workshop: Data visualization. Analytical clouding.
DMI Workshop: Data visualization. Analytical clouding.DMI Workshop: Data visualization. Analytical clouding.
DMI Workshop: Data visualization. Analytical clouding.
Digital Methods Initiative
 
DMI Workshop: Wikileaks and the Myth of (Data-Driven) Citizen Journalism (wik...
DMI Workshop: Wikileaks and the Myth of (Data-Driven) Citizen Journalism (wik...DMI Workshop: Wikileaks and the Myth of (Data-Driven) Citizen Journalism (wik...
DMI Workshop: Wikileaks and the Myth of (Data-Driven) Citizen Journalism (wik...
Digital Methods Initiative
 

More from Digital Methods Initiative (11)

Query Design for Digital Methods by Richard Rogers
Query Design for Digital Methods by Richard RogersQuery Design for Digital Methods by Richard Rogers
Query Design for Digital Methods by Richard Rogers
 
Digital Methods by Richard Rogers
Digital Methods by Richard RogersDigital Methods by Richard Rogers
Digital Methods by Richard Rogers
 
Dmi12 workshops - crawling and scraping
Dmi12   workshops - crawling and scrapingDmi12   workshops - crawling and scraping
Dmi12 workshops - crawling and scraping
 
Digital Methods Tool Medley. Digital Methods Summer School 2012
Digital Methods Tool Medley. Digital Methods Summer School 2012Digital Methods Tool Medley. Digital Methods Summer School 2012
Digital Methods Tool Medley. Digital Methods Summer School 2012
 
Digital Methods Winterschool 2012: API - Interfaces to the Cloud
Digital Methods Winterschool 2012: API - Interfaces to the CloudDigital Methods Winterschool 2012: API - Interfaces to the Cloud
Digital Methods Winterschool 2012: API - Interfaces to the Cloud
 
DMI Workshop: When Search Becomes Research
DMI Workshop: When Search Becomes ResearchDMI Workshop: When Search Becomes Research
DMI Workshop: When Search Becomes Research
 
DMI Workshop: Crawling and Scraping
DMI Workshop: Crawling and Scraping DMI Workshop: Crawling and Scraping
DMI Workshop: Crawling and Scraping
 
DMI Workshop: Data visualization. Analytical clouding.
DMI Workshop: Data visualization. Analytical clouding.DMI Workshop: Data visualization. Analytical clouding.
DMI Workshop: Data visualization. Analytical clouding.
 
DMI Workshop: Wikileaks and the Myth of (Data-Driven) Citizen Journalism (wik...
DMI Workshop: Wikileaks and the Myth of (Data-Driven) Citizen Journalism (wik...DMI Workshop: Wikileaks and the Myth of (Data-Driven) Citizen Journalism (wik...
DMI Workshop: Wikileaks and the Myth of (Data-Driven) Citizen Journalism (wik...
 
DMI Workshop. Data visualization: Clouding
DMI Workshop. Data visualization: CloudingDMI Workshop. Data visualization: Clouding
DMI Workshop. Data visualization: Clouding
 
IIPC Dutch Blogosphere
IIPC Dutch BlogosphereIIPC Dutch Blogosphere
IIPC Dutch Blogosphere
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Tracking the Trackers tutorial at the Digital Methods Summer School 2013

  • 1. Tracking the Trackers A Digital Methods Summer School 2013 Workshop Anne Helmond (UvA) & Alexei Miagkov (Ghostery)
  • 2. One action, many data points “For every explicit action of a user, there are probably 100+ implicit data points from usage; whether that is a page visit, a scroll etc.” (Berry 2011: 152)
  • 3. Hitting & tracking Every time a web user requests a website, a series of tracking features are enabled.
  • 4. Hitting & tracking Every time a web user requests a website, a series of tracking features are enabled. Workshop objective: Tracking the trackers.
  • 5. Cookies • (HTML) Cookies are a string of text or a unique identifier downloaded to your browser after requesting a website. • Cookies do not share data about the user, but recognise returning visits/requests. • Every time the associated website is visited, information is send to the cookie owner.
  • 6. Cookies • Can be issued by requested website. • But can also come from third party providers: ad companies, analytics services, social media platforms. Multiple purposes • Remember site preferences. • Collect information to enhance usability of site. • Part of secure logins. • User profiling across sites (ad services). • Behavioural targeting. • Additional user data for platform.
  • 7. Cookies & dataflows • Tracking devices enable behavioural targeting. • Not only happen in the back-end, return to users through personalised ads & recommendations.
  • 8. Tracking ecologies • Tracking data is used & re-used by multiple actors. • Profiling, reselling, personalisation, recommendation, behaviour targeting, re-combination... • Profiling machines (Elmer 2004), qualculation (Thrift 2008), de- & recomposition of relations (Mackenzie 2012). • Part of multiple relational databases: Not individual datasets or datapoints matter, but relations created between them (Mackenzie 2012).
  • 9. Cookie auctions & piggybacking • Cookies are not only being used by the services that issues them. • Real-time reselling & cookie auctions for personalised advertising (Borgesius 2012). • Cookies trigger further tracking devices & let them piggyback - websites do not exactly know which services collect data about their visitors.
  • 10. Social media platform cookies • Platform features (Facebook Connect, Twitter Buttons, etc) can place cookies. • Data can be connected to existing user profiles or collected and used upon sign-up. • Facebook: Cookies not used for ads. Twitter: used for ads & recommendations. • All web users are potential platform users & contribute to its data mining practices.
  • 11. Beyond cookies • Flash cookies: Used on Flash websites. • Server logs: Saving requests to the website’s server usually include: IP, date/time, referral page, time spend and pages visited. • Beacons: Small, mostly invisible objects (pixels, bugs) embedded in websites or emails. Enables third parties to identify website requests. Do not place a file on the browser. • Widgets: Small applications that can be implemented and executed on websites, i.e. social media or blog widgets.
  • 12. Tracking blockers Ghostery: Detects and allows to block the invisible web. • Allows to selectively enable/disable cookies, advertising, beacons etc. • Users can opt to contribute to Ghostrank: analytics on the most dominant tracking devices online. • Detecting over 1000 trackers.
  • 13. Visualising trackers Mozilla Collusion: Creates a network of browsed sites and associated tracking services for users in real time while browsing. • Visualises which services are tracking users and how they are connected to other websites visited.
  • 14. Tracking blockers Disconnect.me: Blocks and visualises trackers. Especially disables social widgets and personalised advertising. • Disables Facebook Social Plugins/ recommendation features.
  • 15. Tracking blockers Mozilla Do Not Track: Firefox feature which allows users to tell websites that they want to opt out of third-party tracking services. • Transmits a Do Not Track HTTP whenever data is requested. • Requires tracking services to offer opt out: Works for Twitter, but not for Facebook.
  • 16. Tracking projects & research Tracking the trackers (Guardian): User generated tracking map based on Mozilla Collusion data. • Covers 7000 websites and features insights into the data shared by most prominent tracking services. • Limitations: user generated, random set of URLs.
  • 17. Tracking projects & research Cookie Search Engine (German): Detects first and third party cookies on URLs. • Provides list of cookies, their domain, security options and expiry date.
  • 18. Tracking projects & research Visipisi: Deploys cookies to detect which websites have recently been visited.
  • 19. DMI: Tracker Tracker • Objective: detecting interfaces to the cloud and data-mining features operating in the back-end. • Repurpose analytical capacities of Ghostery to detect presence of tracking devices on websites. • Input list of URL, output: list of trackers & network formatted data.
  • 20. DMI: Tracker Tracker Allows to detect alternative fabric of the web - not organised by mutual linking practices between webmasters, but through the presence of tracking devices.
  • 21. DMI: Tracker Tracker Websites using Facebook Social Plugins and Facebook Connect in the top 1000 global websites according to Alexa, February 2012
  • 22. DMI: Tracker Tracker Websites using Google Analytics in the top 1000 global websites according to Alexa, February 2012
  • 23. DMI: Tracker Tracker Presence of Trackers on websites of Dutch political parties, June 2012.
  • 24. Tracking exercise 1. Collect a set of URLs, for instance via www.alexa.com. Use the Link Ripper to extract them. 2. Enter the list into the Tracker Tracker tool (max 100). Settings: Only look at specific pages. 3. Save .gefx file. 4. Open in Gephi, use colour settings to visually distinguish different tracking services.