Behavioral Advertising - The Offer You Cant Refuse PDF
Behavioral Advertising - The Offer You Cant Refuse PDF
Behavioral Advertising - The Offer You Cant Refuse PDF
1-1-2012
Ashkan Soltani
Nathaniel Good
Dietrich J. Wambach
Recommended Citation
Behavioral Advertising: The Offer You Can't Refuse, 6 Harv. L. & Pol'y Rev. 273 (2012)
This Article is brought to you for free and open access by Berkeley Law Scholarship Repository. It has been accepted for inclusion in Faculty
Scholarship by an authorized administrator of Berkeley Law Scholarship Repository. For more information, please contact [email protected].
Behavioral Advertising:
The Offer You Cannot Refuse
INTRODUCTION
ventions can enable choice, while the alternative, pure marketplace ap-
proaches can deny consumers opportunities to exercise autonomy.
tection From Subcomm. on Commerce, Trade, and Consumer Protection Democratic Staff Re-
garding Hearing on "Do Not Track Legislation: Is Now the Right Time?" (Nov. 30, 2010),
available at http://democrats.energycommerce.house.gov/documents/2010120 I/Briefing.
Memo.12.01.2010.pdf.
16 See Rainey Reitman, White House, Google, and Other Advertising Companies Commit
to Supporting Do Not Track, EFF DEEPLINKS BLOG (Feb. 23, 2012), https://www.eff.org/
deeplinks/2012/02/white-house-google-and-other-advertising-companies-commit- supporting-
do-not-track.
" What Does Tracking Mean?, MOZILLA DEVELOPER NEiWORK (last updated Sept. 8,
2011), https://developer.mozilla.org/en/The Do Not TrackFieldGuide/Introduction/What_
does tracking-mean.
Harvard Law & Policy Review [Vol. 6
isSee Arnold Roosendaal, Facebook Tracks and Traces Everyone: Like This! 3 (Tilburg
Law Sch. Legal Studies Research Paper Series No. 03/2011, 2010), available at http://ssrn.
corn/abstract- 1717563.
19 See What They Know: A Glossary, WAIL ST. J., July 30, 2010, at 13.
20 Understanding Cookies, MICROSOFT.COM, http://www.microsoft.com/resources/
documentation/windows/xp/all/proddocs/en-us/sec-cook.mspx (last visited Apr. 14, 2012).
21Id.
22 See Rob Pegoraro, How to Block Tracking Cookies, WASH. Posi, July 17, 2005, at F7
(I've had my browsers set to block third-party cookies for the past few years. I haven't met
the slightest inconvenience as a result.").
2 Mickey Alam Khan, Rising Cookie Rejection Bites Into Metrics, Dmici MARcKETNG
Nrws (July 11, 2005), http://www.dmnews.com/rising-cookie-rejection-bites-into-metrics/
article/88103/.
21Chris Jay Hoofnagle, Jennifer King, Su Li, & Joseph Turow, How Diffrent ar, Young
Adults From Older Adults When it Comes to InftJrmation Privacy Attitudes and Policies? 5
(Working Paper, 2010), available at http://ssrn.com/abstract 1589864.
2-Angwin, supra note 13.
2 See Adrian Chen, Use Facebook's TargetedAds to Find Out How Many People Are Into
Kinky Sex in Any Workplace, GAWKER (Jan. 13, 2012), http://gawker.com/5875937/heres-how-
many-facebook-employees-are-into-kinky-sex-according-to-facebook.
2012] Behavioral Advertising
mous cookie. 27 For instance, by signing up for some "free" offer, advertis-
ers can link the information provided by the user to the existing cookies on
that user's machine.
Users may be able to avoid some tracking by blocking cookies, but that
approach assumes that advertisers will respect individuals' choices, and that
advertisers will not employ alternative methods for tracking. Recall that in
the telemarketing debate, technologies adopted by consumers to avoid sales
calls were circumvented through clever new approaches by telemarketers.
Our research at Berkeley examines those assumptions through investi-
gations into new and existing tracking technologies.
In 2009, we surveyed popular websites to empirically document how
such sites were tracking users. Our study showed that advertisers do adapt
to user cookie blocking through alternative trackers. In that study, we found
widespread use of "Flash cookies."28 Flash cookies, technically called "lo-
cal shared objects," are files used by Adobe Flash developers to store data
on users' computers. Developers can use Flash cookies to store information
about users' preferences, such as volume settings for Internet videos, or they
can be used to store unique identifiers for tracking users.
Our 2009 study elucidated the advantages of Flash cookies from a de-
veloper perspective, and documented that some advertisers adopted Flash
cookies because they were relatively unknown, more difficult for consumers
to delete, and more effective in tracking than standard or "HTTP" cookies.2 9
We noted other tracking advantages of Flash cookies as well-they are more
persistent than standard cookies, they can store 100 KB of information by
default (standard cookies only store 4 KB), and they are stored in such a way
that all browsers on a computer can access them, meaning that even if a user
switches browsers, Flash cookies enable the user to be tracked. 3
Consumers can avoid some online tracking and aggregation by deleting
their cookies. By deleting cookies, the user breaks the link between the
2' Arvind Narayanan, There Is No Such Thing as Anonymous Online Tracking, CENTER
FOR INLERNEI & Soc'y BLOG (July 28, 2011), http://cyberlaw.stanford.edu/node/6701.
2' Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, & Chris Jay Hoof-
nagle, Flash Cookies and Privacy (Working Paper, 2009), available at http://ssrn.com/abstract
-1446862.
29 For a discussion of the benefits of the Flash-cookies-based web tracking utility devel-
oped by United Virtualities, see Press Release, United Virtualities, United Virtualities Devel-
ops ID Backup to Cookies (Mar. 31, 2005), available at http://web.archive.org/web/20050410
041854/http://www.unitedvirtualities.com/UV-Pressrelease03-31-05.htm ("United Virtualities,
the leading innovator of creative marketing and technology solutions for the digital market-
place, today announced it has developed a backup ID system for cookies set by web sites, ad
networks and advertisers, but increasingly deleted by users. UV's 'Persistent Identification
Element' (PIE) is tagged to the user's browser, providing each with a unique ID just like
traditional cookie coding. However, PIEs cannot be deleted by any commercially available
anti-spyware, malware, or adware removal program. They will even function at the default
security setting for Internet Explorer.").
3' For an in-depth discussion of the various advantages of different tracking vectors,
see
Sonal Mittal, User Privacy and the Evolution of Third-party Tracking Mechanisms on the
World Wide Web (May 10, 2010) (unpublished honors thesis, Stanford University), available
at http://www. stanford.edu/-sonalm/MittalThesis.pdf.
Harvard Law & Policy Review [Vol. 6
sonalized web that they do not think consumers are competent to decide to
reject it.
This article proceeds in three parts. First, we discuss the landscape of
research on Internet tracking and the findings from our 2011 study. The
landscape's contours show that there has been increasing interest in studying
how companies track consumers online. These studies show that there is
much more tracking now than at the inception of the commercial web,
among a smaller group of tracking companies. Second, we turn to the pri-
vacy problems raised by this tracking. Increased tracking means that a small
number of companies have a window into most of our movements online.
Inferences derived from that tracking can be sold to third parties or used in
ways that users find transgressive. Finally, we conclude by returning to the
theme of consumer choice. Advocates of market approaches vigorously ob-
ject to consumer privacy rules, sometimes labeling them "paternalistic." We
suggest that this objection more aptly applies to market approaches. Policy-
makers can remedy this problem by enabling consumer choice and protect-
ing those choices from technical circumvention.
3 See, e.g., Jonathan R. Mayer & John C. Mitchell, Third-Party Web Tracking: Policy and
Technology, 33 IEEE SYMP. ON SYCTRITY & PRIVACY (forthcoming May 2012), available at
https://www.stanford.edu/-jmayer/papers/trackingsurveyl2.pdf; Berkeley Ctr. for Law &
Tech., May 2012 Web Privacy Measurement, BERKEI.Y L., http://www.law.berkeley.edu/
12633.htm (last visited Apr. 18, 2012).
" Surder Beware: PersonalPrivacy and the Internet, Ei.YCTRONIC PRIVACY INFO. CENTYR
(June 1997), http://epic.org/reports/surfer-beware.html.
Harvard Law & Policy Review [Vol. 6
In recent years, there has been great interest in online tracking. In their
ongoing investigations of web privacy issues, Bala Krishnamurthy, Konstan-
tin Naryshkin, and Craig Wills studied how personal information flows from
first- to third-party sites. They found that a majority of the popular sites they
analyzed "directly leak sensitive and identifiable information to third-party
aggregators. '"38
Practically, this means that the design of these sites is such that per-
sonal information entered by the consumer is exposed to third-party adver-
tising companies. For instance, users entered their email addresses in order
to sign up for a newsletter; in processing the request, the website would
make the email addresses available to third-party advertisers, probably inad-
vertently. This would occur despite promises in privacy policies to not share
data with such third parties.
In a multiple-year study of 1200 websites, Krishnamurthy and Wills
found greater collection of information about users from an increasingly
concentrated group of tracking companies.3 9
Krishnamurthy and Wills also describe how third-party tracking sites
disguise themselves as first parties. We call it "DNS aliasing," a practice
where "what appeared to be a server in one organization (e.g. w88.go.com)
was actually a DNS CNAME alias to a server (go.com. I112.2o7.net) in an-
other organization (Omniture)." 4° Practically, this renders consumers' at-
tempts to block third-party cookies ineffective because first parties (such as
36 FED. TRADE COMM'N, PRIVACY ONILINE: FAIR INFORMATION PRACTICES IN THE MARKET-
go.com in the above example) have built their servers to allow third parties
(Omniture in the above example) to instate cookies as first parties.
Krishnamurthy and Wills found a doubling in such DNS aliasing:
"[T]he percentage of first-party servers with multiple top third-party do-
mains has risen from 24% in Oct'05 to 52% in Sep'08 .... This increase is
significant because it shows that now for a majority of these first-party serv-
4
ers, users are being tracked by two and more third-party entities." '
Through decoding aliased domains, Krishnamurthy and Wills found
that third-party trackers were becoming more concentrated. Sampling from
five periods, concentration grew from forty percent in October 2005 to sev-
enty percent in September 2008. Further, they found that "[t]he overall
share of the top-five families-Google, Omniture, Microsoft, Yahoo and
AOL-extends to more than 75% of our core test set with Google alone
having a penetration of nearly 60% ."42 This means that a small number of
companies can track much of what users do online.
ETags
Researchers have also focused upon new vectors for tracking. As early
as 2003, Dean Gaudet described unique user tracking through using
"ETags," a feature of the cache in browsers. 43 The cache helps speed up the
41 Id. at 546.
41 Id. at 549.
41 See Dean Gaudet, Tracking Without Cookies, ARCTIC (Feb. 17, 2003), http://www.
arctic.org/-dean/tracking-without-cookies.html ("[O]ther than cookies, there's typically only
one other type of data a webserver can cause a browser to store on its local hard-
drive-cacheable web content. [T]his technique attempts to get the browser to store unique id
Harvard Law & Policy Review [Vol. 6
user's web browsing experience by detecting whether the user has previously
visited a webpage. If she has, the browser can show the user a saved version
of the site, rather than requesting another copy from the server. Advertisers
can use this mechanism to store unique identifiers on the user's machine.
Such enumeration is very inconvenient to block, and if users did so, they
would substantially slow their Internet browsing.
Flash Cookies
information in its cache in a manner which will be communicated to the server at a later date.
([T]he later communication will be via a GET If-Modified-Since, or If- None- Match.)").
41 CORzEY BENNINGER, AJAX SIORAGE: A LOOK AT FLASH COOKIES AND INIERNET
ExPI ORER PERSISTENCE 2 (2006), available at http://citeseerx.ist.psu.edu/viewdoc/summary?
doi -10.1.1.128.2523 ("In fact, it would be difficult to reliably detect if an application were
using flash cookies.").
41See Janice C. Sipior et al., Online Privacy Concerns Associated With Cookies, Flash
Cookies,
46 and Web Beacons, 10 J. INIERNET COM. 1, 4 (2011).
See id. at 10- 11.
4' AIEECIA M. McDONA D & LORRIE FAITH CRANOR, A SURVEY OF THE USE OF ADOBE
FLASH LOCAL SHARED OBJECTS To RESPAWN HTTP COOKIES (2011), available at http:Ilwww.
casos.cs.cmu.edu/publications/papers/CMUCyLabl
48
1001 .pdf.
1d. at 14.
2012] Behavioral Advertising
49
1d. at 12.
50
1 d. at 8.
Harvard Law & Policy Review [Vol. 6
tent than standard web cookies. Standard cookies expire by default when the
user closes her browser. In order to make standard cookies persistent, devel-
opers must use complex programming. HTML5 data are persistent until af-
firmatively deleted by a website or user. Storage size is important too.
While Flash cookies have a default limit of 100 KB, standard cookies store
5
just 4 KB, compared to 5 Mb for HTML5 storage. 1
HTML5 local storage is a more universal storage mechanism than Flash
cookies because it does not require that users have plug-ins, such as Flash,
installed on their computers. Increasingly, device manufacturers such as
Apple are releasing products without support for Flash. Thus we expect to
see less reliance on Flash as a technology for tracking users.
The Evercookie
" BRUCE LAWSON & REMY SHARP, INTRODUCING HTML5 142-43 (2011).
51See generally Arvind Narayanan & Jonathan Mayer, Presentation at Workshop on In-
ternet Tracking, Advertising, and Privacy (July 22, 2011) (on file with author); The Do Not
Track Cookbook, Do Noi TRACK, http://donottrack.us/cookbook.
51 See Samy Kamkar, Evercookie, SAMY KAMKAR (Sept. 20, 2010), http://samy.pl/
evercookie/; see also Tanzina Vega, New Web Code Draws Concern Over Privacy Risks, N.Y.
Ti Es, Oct. 11, 2010, at Al.
2012] Behavioral Advertising
Fingerprinting
METHODS
" See Peter Eckersley, How Unique Is Your Web Browser?, 6205 LECTURE NOTES COM-
Sci. 1 (2010).
PITrER
51Julia Angwin & Jennifer Valentino- DeVries, Race IsOn to 'Fingerprint'Phones, PCs,
WALL Si. J., Nov. 30, 2010, at Al.
Harvard Law & Policy Review [Vol. 6
RESULTS
The most frequently appearing cookie names were: uid, id, PREF,
utmz, utma, utmb, and UID. Many of these cookie names are com-
monly associated with user tracking. For instance, cookies named " utma"
are used by Google for identifying unique visitors.56 "[U]id" and "id"typi-
cally refer to unique identifier and identifier, respectively.
First-party cookies are placed by the website that the consumer is visit-
ing, for instance, nytimes.com. Third-party cookies are placed by advertis-
ers and others who are in partnership with the first party, for instance,
DoubleClick. We found that most cookies-4915 of them-were placed by
a third party. We detected over 600 third parties among the 4915 third-party
cookies. This suggests that there are approximately 600 companies involved
in tracking users online.
Google had cookies on eighty-nine of the top 100 sites; the company's
ad tracking network, doubleclick.net, had cookies on seventy-seven. Com-
bined, Google has a presence on ninety-seven of the top 100 websites. This
includes popular government websites such as usps.com, irs.gov, and
nih.gov.
This means that the browsing that one does on irs.gov for tax informa-
tion and advice, or on nih.gov for information about health conditions, is
silently being tracked by Google. Google is free to make inferences from
the use of these sites and to combine those observations with data it obtains
from tracking users on other sites.
Only microsoft.com, ups.com, and wikipedia.org lacked some type of
Google cookie.
Other third-party trackers with a strong presence in the top 100 in-
cluded scorecardresearch.com (sixty-one) and atdmt.com (fifty-six). Among
the top 100 sites, wikia.com, legacy.com, foxnews.com, drudgereport.com,
and bizrate.com hosted the most cookies from third-party domains.
We found 100 Flash cookies on the top 100 sites, down from the 281
we found in 2009. These Flash cookies appeared on thirty-seven sites, down
from the fifty-four sites we found in 2009.
Recall that Flash cookies can store much more information than a stan-
dard cookie. We found that some sites coded a large amount of information
into their Flash cookies. For instance, MTV.com had eight Flash cookies,
one of which stored over 140 values. This means that MTV.com's eight
Flash cookies store about the same amount of information as 140 standard
cookies.
Two sites had shared values between Flash cookies and HTTP cookies:
hulu.com and foxnews.com. In the case of foxnews.com, the value was
shared in HTML5 local storage as well. Shared values are a signal that the
website is using multiple technologies to track users. As explained above,
this means that if a user deletes a single cookie, one of the other technologies
may serve as a backup and reinstate the cookie.
300
250
o 200 ......
150
E
5o
0
2009 Data 2011 Data
17See Ryan Singel, Online Tracking Firm Settles Suit Over Undeletable Cookies, WiuED
EPICENTER (Dec. 5, 2010, 2:02 AM), http://www.wired.com/epicenter/2010/12/zombie-cookie-
settlement/.
51hI re Quantcast Adver. Cookie Litig., No. 2:10-cv-05484-GW-JCG (C.D. Cal. June 13,
2011).
5 Singel, supra note 57.
Joint Submission of Supplemental Information Regarding Plaintiffs' Motion for Prelimi-
nary Approval of Class Action Settlement at 13, In re Quantcast Adver., No. 2:10-cv-05484-
GW-JCG ("The Customer Defendants, on their own behalf and on behalf of their corporate
parents and affiliates, have represented to Quantcast and Clearspring that the Customer De-
fendants were unaware that LSOs were being used to store information regarding consumers
who accessed their websites and web content. Quantcast and Clearspring do not dispute that
representation and, to the extent of their knowledge, information, and belief, adopt and incor-
porate it here.").
2012] Behavioral Advertising
use Flash as an alternative to HTTP cookies for tracking purposes. 6' These
obligations did not apply to consumer-facing websites, such as hulu.com.
We found two different methods of cookie respawning on hulu.com.
As explained above, these methods back up standard cookies, thus preserv-
ing the ability of advertisers to track users even if they delete their cookies.
First, hulu.com used standard Flash respawning to reinstate a standard
cookie with the key "guid," mirroring a Flash cookie with the key "com-
puterguid." There are two important points to raise about this: Unlike the
situation in 2009, where a third party respawned the cookies, this use of
Flash is in-house at hulu.com. And while Adobe points out that local stor-
age enables the delivery of rich content, hulu.com's use of Flash appears to
fall into the category of unique user tracking condemned by Adobe. Adobe
62
argues that such uses of Flash should be subject to express user consent.
Second, we found first-party standard and HTML5 cookies respawned
on hulu.com through a service hosted at kissmetrics.com. This respawning
employed ETags to back up the cookies. To our knowledge, this is the first
demonstration of this ETag tracking "in the wild."
ETag tracking and respawning is particularly problematic because the
technique generates unique tracking values even where the consumer blocks
standard, Flash, and HTML5 cookies. In order to block this tracking, the
user would have to clear the cache between each website visit. Even in
private browsing mode, ETags can track the user during a browser session.
The script for this function, hosted at http://douglizaerwt3.cloudfront.net,
included other code that indicated its author was aware of tracking and the
risk of data collection about the user. For instance, it included a function to
detect the collection of information that credit card companies require web-
sites to control more carefully.
On June 30, 2011, hulu.com updated its privacy policy to include dis-
closures surrounding Flash cookies.63 This update appears to have been
driven by obligations in a recent settlement from a lawsuit sparked by our
2009 paper. This settlement required any consumer-facing website to in-
clude, "inits online Privacy Policy, a disclosure of its use of LSOs [Flash
cookies] and a link to at least one website or utility offering users the ability
to manage LSOs, if such website or utility is available."1 4 This policy was in
effect when we scanned popular sites for cookies and other tracking
technologies.
In the June 30, 2011 policy, hulu.com included a link to Adobe's Flash
cookie manager and disclosed that it used Flash cookies, but downplayed
their potential for tracking: "Local Shared Objects are similar to browser
cookies, but can store data more complex than simple text. By themselves,
65
they cannot do anything to or with the data on your computer.
We object to this last sentence in particular. While it is technically true
that by themselves Flash cookies cannot do anything to the data on a user's
computer, in reality, Flash cookies never are used by themselves. It is the
code accompanying Flash cookies that enables them to mirror other data and
can be used to back up that data when deleted by the user.
The June 2011 hulu.com privacy policy does not mention respawning of
any kind, and even claims: "You can configure your Internet browser to
warn you each time a cookie is being sent or to refuse cookies completely.
However, unless you accept cookies, you will not have access to certain
66
Hulu Services.."
Hulu.com's June 2011 policy also describes "Web beacons." It is un-
clear whether this section of the policy describes kissmetrics.com cache
respawning. The description would not lead an average user to understand
that the cache was being used to undo cookie deletion.
We find it surprising that months after settling a suit involving unique
user tracking through third parties, hulu.com moved Flash tracking and
respawning in-house. Furthermore, the use of KissMetrics cache cookie
respawning is very similar to the respawning we found in 2009-hulu.com
used a third party to engage in tracking that users do not know about, cannot
detect, and effectively cannot block.
There are three principal privacy problems with the kind of cookie
respawning we observed on hulu.com that was being performed by Kiss-
Metrics. First, users cannot fairly be said to have notice of these activities.
The entire point of new tracking methods seems to be to ensure that users are
ignorant of them. The websites that used Flash respawning and cache ETag
tracking did not disclose those practices in their privacy policies.
Second, because these vectors are resistant to blocking, they rob con-
sumers of choice. This undermines the advertising industry's representations
about respecting individuals' choices and leaves consumers in a technical
arms race with advertisers.
Marketers think that the benefits of being tracked outweigh consumer
preferences, and thus have developed tools to frustrate cookie deletion and
blocking. This attitude is probably best presented by the CEO of United
Virtualities, a company that was a leader in promoting Flash cookies as a
tracking technology:
All advertisers, websites and networks use cookies for
targeted advertising, but cookies are under attack. According to
current research they are being erased by 40% of users creating
serious problems .... From simple frequency capping to the more
sophisticated behavioral targeting, cookies are an essential part of
any online ad campaign. PIE will give publishers and third-party
providers a persistent backup to cookies effectively rendering
them unassailable.
6" Press Release, United Virtualities, supra note 29 (internal quotation marks omitted).
Harvard Law & Policy Review [Vol. 6
Metrics to share information about users with other sites. Any of the above-
mentioned sites could share registration data about "GuTj890."
This development is important because it breaks the trust model ena-
bled by "selective revelation." A bedrock privacy principle holds that infor-
mation should be collected through fair means and, where possible, with the
informed consent of the data subject. 14 This allows the individual to be di-
rectly involved in data collection practices.
Advocates of market-based approaches to privacy have often echoed
this principle in theory. They argue that consumers selectively reveal infor-
mation to businesses they "trust." For instance, user "GuTj890" may fear
that hulu.com would send spare, and thus provide a throw-away email ad-
dress when signing up. At the same time, "GuTj890" may trust etsy.com
more, and provide more personal information and her main email address
there. This selective revelation is the way that consumers choose in the mar-
ketplace. Companies with strong levels of trust and privacy thus prevail
without the need for burdensome regulation, while companies with low trust
values will fail from lack of consumer participation.
When firms buy information from others, they circumvent consumers'
efforts to engage in selective revelation. Consumers who share any informa-
tion at all-even fake information-are at risk, because sites can match up
cookies and discover real information that the user "trusted" to some other
site. This risk is amplified where users are encouraged to authenticate in
order to use a website's services, such as popular music or video services
like Spotify or Hulu.
In the offline world, marketers have tried similar tricks for some time.
Recall the time when retailers asked consumers for their addresses (Radio
Shack) 5 or phone numbers. Consumers complained about those practices,
and California even enacted a law restricting the collection of personal infor-
mation by retailers at the register in credit-card sales.6
Some retailers responded to this law by developing more clever and
obscure ways to elicit information from consumers. Retailers learned that
by collecting the name of the consumer from a credit-card swipe and asking
for a zip code, they could determine the home address of their customers.
This was accomplished through a sophisticated data-matching product of-
fered by data brokers. In fact, Acxiom markets a product to accomplish this
linkage, and it is explicitly marketed as a tool to identify consumers without
them realizing the privacy implications of providing the zip code."
" OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal
Data, ORi. ECON. CooPETAION & DEV. (Sept. 23, 1980), http://www.oecd.org/document/18/
0,3343,en_2649_34255_1815186 I 1 1 1,00.html.
15 Greg Saitz, Radio Shack Aims to Be Less Annoying, SIAR-LEDGER, Nov. 26, 2002, at 29
(noting that Radio Shack ended the practice in 2002).
6 CAL. CIv. CoDw § 1747.08 (West 2012).
77See ACXIOM, INFOBASE@ DATA FOR SHOPPER RECO(NIIION 1 (2006), availableat http:/
/isapps.acxiom.com/AppFiles/Download I 8/AcxiomShopperRec-3262007115722.pdf (adver-
tising that the product helps retailers avoid "losing customers who feel that you're invading
Harvard Law & Policy Review [Vol. 6
"[W]hen you resent a thing, you seem to recognise it. ' ' 8
When advertisers criticize privacy protection as paternalistic, we should
remember the above-quoted observation of Cremutius Cordus-we resent
the things that we recognize in ourselves. Government interventions in the
direct marketing field have been choice enabling. The Do Not Track propo-
sal itself would simply make it easier for individuals to decide not to be
tracked. Market interventions, on the other hand, often force choices upon
the consumer.
Those who argue that consumers can negotiate the nuances of privacy
and tracking online assume that the online world is similar to the offline
world. In the offline world, consumers can vote with their feet and, in most
circumstances, leave a business they do not wish to frequent without it col-
lecting data about the experience. In the online world, efficiencies in identi-
fication and aggregation alter the balance of power of the relationship
between the consumer and the business. This has greatly benefitted consum-
ers in enabling comparison shopping along factors that are visible, such as
price. Privacy attributes of transactions are not as visible. Collectively,
website owners have organized to track individuals as they traverse the web,
and few popular websites forgo such tracking.
Advocates of market approaches rarely account for the various tech-
niques that have been developed to prevent consumers from making a choice
on privacy. The use of obscure tracking methods, data enhancement, cookie
respawning, and the zip code re-identification schemes discussed above cir-
cumvent user choice. These techniques are often adopted explicitly to make
the consumers think they are not being tracked or identified. This combina-
tion of disguised tracking technologies, choice-invalidating techniques, and
models to trick the consumers into revealing data suggests that advertisers
do not see individuals as autonomous beings. 79 Once conceived of as ob-
jects, preferences no longer matter and can be routed around with tricks and
technology.
their privacy" (emphasis added)). In Pineda v. Williams-Sonoma Stores, the plaintiff alleged
that the defendant engaged in very similar conduct:
Defendant ... used customized computer software to perform reverse searches from
databases that contain millions of names, e-mail addresses, telephone numbers, and
street addresses, and that are indexed in a manner resembling a reverse telephone
book. The software matched plaintiff's name and ZIP code with plaintiff's previ-
ously undisclosed address, giving defendant the information, which it now maintains
in its own database. Defendant uses its database to market products to customers
and may also sell the information it has compiled to other businesses.
246 P.3d 612, 615 (Cal. 2011).
" TACHrUS, THE ANNALS (109), reprinted in ANNALS AND HISTORIES 1, 151 (Alfred John
Church & William Jackson Brodribb trans., Everyman's Library 2009).
'9 See JOSEPH TLROW, THE DALY You: How IHE NEW ADVERTISING INDUSTRY Is DEFIN
ING YOUR IDENTITY AND YOUR WORTH 7 (2011) (arguing that marketers conceive of individu-
als as "targets" and "waste").
2012] Behavioral Advertising
Ayenson
Soltani McDonald Wambach et al.
2009 2011 2011
Number of sites 20
with Flash
cookies
(top 100 sites)
Total number 281 Not reported 100
of Flash cookies
(top 100 sites)
Sites with 6 2 2
respawning
(top 100 sites)
Number of 98 98 100
websites with
HTTP Cookies
(top 100 sites)
Total HTTP 3602 Not reported 5675
Cookies set
(top 100 sites)
Sites with 31 Not reported 2
shared Flash/
HTTP values
on top 100
Total shared 41 8 2
Flash/HTTP
values
on top 100
Sample Top 100 Top 100 Top 100
websites and six websites and 500 websites
government sites random sites
Method Visited Visited Visited
homepage and homepage homepage and
then made 10 multiple times then made 10
clicks on the clicks on the
same domain same domain