The Surveillance Economy and Data Brokers

An in-depth look at how personal data is collected, bought, and sold by corporations and governments. Explains the advertising-to-surveillance pipeline, the role of data brokers, and specific risks within the Iranian internet landscape.

Time10 minutes

The Surveillance Economy and Data Brokers

In the modern digital age, "free" services are rarely truly free. If you are not paying for the product, you are likely the product. This concept is often called Surveillance Capitalism.

While global corporations collect data to target advertisements, in the context of Iran, this economy feeds directly into state repression. The mechanisms used by advertisers to track consumer behavior—location tracking, device fingerprinting, and behavioral profiling—are identical to those used by security agencies to monitor dissidents, identify protesters, and suppress opposition.

What is the Surveillance Economy?

The surveillance economy creates a marketplace where human experience is claimed as free raw material for translation into behavioral data. This data is not just used for service improvement; it is declared as a proprietary "behavioral surplus," fed into advanced manufacturing processes known as "machine intelligence," and fabricated into prediction products that anticipate what you will do now, soon, and later.

The Advertising-to-Surveillance Pipeline

Most mobile applications and websites contain third-party tracking codes known as Software Development Kits (SDKs). These SDKs are often provided by data brokers or advertising companies to app developers in exchange for monetization.

  1. Collection: You grant a weather app permission to access your location.
  2. Aggregation: The app uses an SDK that sends your precise coordinates not just to the weather provider, but to a third-party data broker.
  3. Profiling: The broker links this location data with your Mobile Advertising ID (MAID)—a unique code assigned to your device (Apple's IDFA or Android's GAID).
  4. Sale: This data is packaged and sold on open markets. Buyers can include legitimate advertisers, hedge funds, and government agencies.

Data Brokers: The Invisible Middlemen

Data Brokers are companies that exist solely to collect, aggregate, and sell information about individuals. They operate with little oversight and possess profiles on millions of people, often without the individuals' knowledge.

Types of Data Collected

  • Real-Time Location: Precise GPS coordinates, revealing where you sleep (home), where you work, and who you meet.
  • Demographic Data: Age, gender, ethnicity, religion, and political leanings.
  • Financial Data: Purchase history, credit worthiness, and economic status.
  • Social Connections: Who you interact with, derived from call logs, contact lists, and proximity to other devices.

Geofencing and Dragnet Searches

Data brokers allow clients to perform Geofencing. A client can draw a virtual boundary around a specific area—such as a protest site, a university, or a mosque—and request the IDs of every device that entered that zone during a specific timeframe. This technique effectively bypasses the need for a warrant in many jurisdictions and is a primary method for identifying attendees at political gatherings.


The Iranian Context: Domestic Threats

While global surveillance capitalism is driven by profit, the Iranian landscape is driven by control. The Islamic Republic has developed a "Halal Internet" (National Information Network) designed to keep data within national borders, making it accessible to intelligence services.

1. Domestic "Super-Apps" and Services

Iranian platforms (e.g., Snapp, Tap30, Rubika, Eitaa, Bale) operate under strict state regulations. Unlike Western corporations that might fight government subpoenas, Iranian tech companies are legally and structurally required to provide data to security agencies (FATA, IRGC Intelligence, MOIS).

  • Ride-Sharing Apps: Apps like Snapp collect precise real-time location data and history. This data can be used to reconstruct a user's movement history ("Pattern of Life" analysis).
  • Domestic Messengers: Platforms like Rubika and Eitaa are not end-to-end encrypted. The service providers—and by extension, the state—can access message content, contacts, and metadata.
  • Payment Apps: Financial transactions are fully visible to the state, allowing them to track funding for strikes or protests.

2. The Trap of Free VPNs

In Iran, where censorship circumvention is necessary, the market for "Free VPNs" is a significant part of the surveillance economy.

  • The Cost of "Free": rigorous analysis shows that many free VPNs available on the Iranian market generate revenue by selling user traffic data, injecting ads, or even installing malware.
  • State-Affiliated VPNs: There is evidence that some VPNs are operated by state-affiliated actors to conduct Man-in-the-Middle (MitM) attacks or to log user connections.

3. International Data Purchasing

Authoritarian regimes, including Iran, can access the global data broker market. Through front companies or intermediaries, state actors can purchase commercially available location data or metadata from global brokers to track diaspora members or monitor citizens using foreign apps.


Mechanisms of Tracking

To protect yourself, you must understand the technical mechanisms used to track you.

Mobile Advertising IDs (MAID)

Your phone transmits a unique ID (GAID for Android, IDFA for iOS) to apps and web trackers. This ID links your activity across different apps. If you look up a political topic on a news app and then open a game, the trackers know both actions were performed by the same device.

Real-Time Bidding (RTB)

When you load a webpage with ads, an auction happens in milliseconds. Your data (location, device type, interests) is broadcast to hundreds of advertisers who bid to show you an ad. This broadcast data can be intercepted or bought by surveillance entities to build profiles of users.

Browser Fingerprinting

Even if you block cookies, websites can identify you by your "fingerprint"—a unique combination of your screen resolution, installed fonts, battery level, and browser version.


Defense Strategies

While it is difficult to completely opt-out of the surveillance economy, you can significantly reduce your footprint and "devalue" the data held about you.

1. Minimize Data Collection

  • App Hygiene: Uninstall apps you do not need. If a flashlight app asks for your location or contacts, delete it immediately.
  • Web Browsers: Use browsers instead of native apps for services like Facebook or TikTok. Browsers (especially Firefox with uBlock Origin) offer better protection against tracking than installed apps.
  • Reset Advertising IDs:
    • Android: Settings → Google → Ads → Delete advertising ID.
    • iOS: Settings → Privacy → Tracking → Allow Apps to Request to Track (Turn Off).

2. Use Privacy-Respecting Tools

  • Ad-Blockers: Install uBlock Origin on your browser. It blocks the scripts that send your data to brokers.
  • Secure VPNs: Use trusted, paid VPNs (like Mullvad or IVPN) or community-verified tools (like Outline or V2Ray with trusted configs). Avoid free VPNs on the App Store/Play Store.
  • FOSS Alternatives: Replace proprietary apps with Free and Open Source Software (FOSS) alternatives from F-Droid (e.g., use NewPipe instead of the YouTube app).

3. Compartmentalization (The "Sandox" Approach)

  • Device Separation: If possible, keep a separate "clean" phone for sensitive activities. Do not install domestic Iranian apps (Snapp, Divar, etc.) on the same device used for activism or secure communication.
  • Profile Separation: Use the "Work Profile" feature on Android (via apps like Shelter or Insular) to isolate invasive apps from your main data.

4. Poisoning the Data

  • Fake Info: Never provide real names, birthdates, or addresses to online services unless legally required (e.g., banking).
  • Obfuscation: Intentionally feeding false data to trackers can make the collected profile useless.

Conclusion

The surveillance economy transforms your daily digital life into a commodity sold to the highest bidder. In Iran, the "highest bidder" is often the state security apparatus. By understanding that data brokers and domestic apps are the supply lines for this surveillance, you can take active steps to cut off the flow of information and protect your digital identity.


Related Resources:

  • [[The_Mechanisms_of_Digital_Surveillance|The Mechanisms of Digital Surveillance]]
  • [[Biometrics_and_Identity_Profiling|Biometrics and Identity Profiling]]
  • [[Network-Level Surveillance]]
Source:
Edit