Free to get started. No card charged today.
Browse 8,265 companies freeA deep investigation into Anomaly Six's data collection, privacy violations, and surveillance practices. Founded 2018 in Alexandria, Virginia.
Upgrade to SeekerPro for deep-dive reports on every company that touches your data. Members get breach timelines, violation histories, privacy risk scores, and executive contact data before anyone else.
Try SeekerPro →Anomaly Six (A6) is a secretive surveillance contractor founded by two former US military intelligence officers that embeds tracking software directly into consumer mobile apps through advertising SDKs. By paying app developers to include their code, A6 can track the movements of billions of mobile devices globally in near-real-time. In a demonstration to a US senator, A6 showed it could track the movements of CIA and NSA employees by monitoring phones at intelligence agency headquarters. The Wall Street Journal investigation revealed A6 could monitor the movements of people around the world by piggybacking on the mobile advertising ecosystem. The company sells this capability exclusively to US government agencies and defense contractors, but the data collection is global and indiscriminate, capturing the movements of millions of innocent people alongside any intelligence targets. A6 represents the deepest integration of commercial surveillance infrastructure with government intelligence capabilities, where the apps on your phone are simultaneously serving you ads and reporting your location to intelligence agencies.
The following is a documented list of data points that Anomaly Six collects from users, customers, and in some cases non-users. This data powers their business model, fuels targeted advertising, and in many cases is shared with or sold to third parties including government agencies.
Upgrade to SeekerPro for deep-dive reports on every company that touches your data. Members get breach timelines, violat...
Try SeekerPro →Run a free privacy and compliance scan on any website in 60 seconds. NexusBro checks cookie consent, hidden trackers, th...
Try NexusBro →Stop spending hours filing DSAR requests and opt-out forms manually. BliniBot automates data deletion requests, cookie c...
Try BliniBot →Below is a timeline of documented privacy violations, regulatory fines, lawsuits, and enforcement actions against Anomaly Six. These events represent only the violations that became public. The true scope of data misuse at any major company is almost certainly larger than what regulators and journalists have uncovered.
WSJ investigation reveals global phone tracking capabilities
N/A (exposure)
Demonstrated tracking CIA/NSA employees via phone location
N/A (security concern)
FTC scrutiny of embedded SDK tracking practices
Ongoing
You do not have to accept Anomaly Six's data practices. These alternatives offer comparable functionality with significantly better privacy protections. Switching reduces the volume of personal data flowing into commercial surveillance systems and sends a market signal that privacy matters.
Run a free privacy and compliance scan on any website in 60 seconds. NexusBro checks cookie consent, hidden trackers, th...
Try NexusBro →Stop spending hours filing DSAR requests and opt-out forms manually. BliniBot automates data deletion requests, cookie c...
Try BliniBot →Build compliant marketing campaigns that convert without invasive tracking. ContentMation generates privacy-respecting f...
Try ContentMation →Start by understanding what data Anomaly Six already has on you. Check your account settings, download your data archive if available, and review what permissions you have granted. Use OpenPublicHub to research the full scope of Anomaly Six's data practices and compare them against industry standards.
Disable unnecessary data collection settings, revoke app permissions you do not actively need, and opt out of personalized advertising where possible. Review connected third-party apps and remove any that you no longer use. Every permission you revoke reduces your attack surface and limits the data available for profiling.
Under GDPR, CCPA, and other privacy laws, you have the right to request access to, correction of, and deletion of your personal data. File a Data Subject Access Request (DSAR) to see what Anomaly Six holds about you. Use BliniBot to automate the process across multiple companies simultaneously.
The most effective protection is to stop using privacy-invasive services entirely. The alternatives listed above offer comparable functionality without the surveillance. Start with the service you use most frequently and work through the list. Every user who switches sends a market signal that privacy is a competitive advantage.
Privacy threats evolve constantly. Follow this expose and related reports on OpenPublicHub to stay updated on Anomaly Six's practices. Share this page with friends and colleagues so they can protect themselves too. Collective action and informed consumers are the most powerful force for changing corporate behavior.
If you have apps installed that use advertising SDKs (which includes most free apps), your location data may flow through networks that A6 can access. The company embeds tracking code in consumer apps via advertising partnerships, then aggregates the data for government clients. Disabling your advertising ID and limiting app permissions reduces exposure.
Yes. In a documented demonstration, A6 showed it could track phones at CIA and NSA facilities, identifying the movements of intelligence agency personnel. This illustrates that even security-conscious government employees are vulnerable to commercial location tracking via their personal phones.
A6 pays app developers to include their SDK (software development kit) alongside advertising code. Your weather app, flashlight app, or game may include A6 tracking code without disclosing it specifically. The data is labeled as advertising data but flows to government intelligence clients.
Upgrade to SeekerPro for deep-dive reports on every company that touches your data. Members get breach timelines, violat...
Try SeekerPro →Run a free privacy and compliance scan on any website in 60 seconds. NexusBro checks cookie consent, hidden trackers, th...
Try NexusBro →Stop spending hours filing DSAR requests and opt-out forms manually. BliniBot automates data deletion requests, cookie c...
Try BliniBot →Clearview AI operates the most controversial facial recognition system in the world, having scraped ...
NSO Group develops Pegasus, the most sophisticated commercial spyware ever created, capable of silen...
Cellebrite is the world's leading provider of mobile device forensics tools, used by law enforcement...
Hikvision is the world's largest manufacturer of surveillance cameras, controlling approximately 25%...
Verkada is a US-based cloud surveillance company that operates over 250,000 cameras across schools, ...
Tools trusted by thousands of privacy-conscious professionals worldwide
No card charged today. Cancel anytime.
Want unlimited access? Explore SeekerPro