Data pimping catches ISP on the hop
Who ate all the cookies?
In February, the Silicon Valley-based NebuAd deployed its deep-packet inspection technology on a Middle America ISP known as WOW!, formerly WideOpenWest. The official word from NebuAd is that its partner ISPs are required to directly notify customers via letter or email before its hardware is turned on, but WOW! - America's 12th largest cable operator, serving Illinois, Michigan, and Ohio - says this did not happen on its service.
According to vice president of programming Peter Smith, WOW! updated its terms of service to include a mention of NebuAd, and in some cases, it told customers that the terms had been updated. But it didn't go any further.
"We started rolling out the service in February and we completed the roll-out the first week in March," Smith told us. "About the third week in March, we got an updated memorandum from NebuAd detailing their 'best practice' standards. That was not provided before we rolled the service out.
"When we got the memorandum, we put together a plan to comply with the best practices, and we're in the process of doing that right now, sending customers an email that explicitly alerts them to NebuAd and providing messages on bills."
At least two WOW! customers argue that the ISP's initial notification was not enough. Both of these Chicago-area customers were unaware that NebuAd was tracking their behavior until some unexpected Web cookies turned up on their machines. When they visited Google, non-Google cookies were being read by addresses such as "nebuad.adjuggler.com."
When these users contacted WOW! customer support, reps initially denied that the ISP was responsible for the cookies. So these customers did some digging on their own, eventually turning up the NebuAd mention in WOW's terms of service. Only then did reps confirm that NebuAd was a partner.
Someone else's cookies
When we contacted WOW! to discuss the matter, VP Peter Smith initially denied that NebuAd uses tracking cookies. "There's been a lot of rumors out there are not correct," Smith told us. "NebuAd doesn't drop cookies, so those were someone else's cookies." When pressed, Smith then said that NebuAd only drops a cookie when users opt-out of the service.
But NebuAd makes no bones about the fact that it drops cookies from the get-go. "We place just one cookie for each NebuAd ad-serving domain," said NebuAd CEO Bob Dykes. "It usually contains just an alphanumeric, which is not the number we use internally to identify the user anonymously, and some ad-serving related info such as ad frequency caps, which is similar to functionality used by almost all ad networks in their cookies. If the user opts out, then that is noted in the cookie and the alphanumeric is deleted."
Peter Smith negotiated WOW!'s contract with NebuAd, but he said that these negotiations carried on for months and that NebuAd's practices may have changed since the two companies first spoke.
NebuAd's behavior-tracking service is similar to ISP-based services used by Phorm in the UK and Front Porch here the US (though Front Porch shares its data with outside ad firms). Other operations that appear to be working on similar services include Adzilla and Project Rialto, a "stealth company" created by Alcatel-Lucent, but these firms did not respond to our interview requests.
According to NebuAd, its current ISP contracts give it access to the search and browsing activity of at least 10 per cent of American net surfers. It then uses this data to target advertisements.
NebuAd insists the data is never matched to personally identifiable information. But many - including the Center of Democracy and Technology - believe that end users should be actively notified before these services start tracking their behavior and given every opportunity to opt-out.
Sponsored: Global DDoS threat landscape report