How a Global Ad‑Based Tracking System Spies on Half a Billion Phones

An April 2026 investigation reveals Webloc, an ad‑intelligence geolocation platform that can monitor up to 500 million mobile devices in real time, retain three years of history, and is sold to law‑enforcement agencies worldwide, exposing serious privacy risks and a complex data‑broker supply chain.

Black & White Path
Black & White Path
Black & White Path
How a Global Ad‑Based Tracking System Spies on Half a Billion Phones

In April 2026 the Overseas Security Lab disclosed Webloc, a global ad‑intelligence geolocation system capable of tracking up to 500 million mobile devices in real time and storing three years of historical movement data.

Data collection channels

Webloc aggregates location information from two sources. The first is real‑time bidding (RTB) where, within a second of an ad‑enabled app or website opening, an auction broadcasts the device’s advertising identifier, current location, age, gender, interests and other attributes to dozens of ad firms. The second source is third‑party software development kits (SDKs) embedded in free apps that harvest precise GPS, nearby Wi‑Fi SSIDs, Bluetooth device lists and sensor data.

Company background

Webloc was originally built by Israeli monitoring company Cobwebs Technologies (founded 2015 by former special‑forces personnel). In July 2023 Cobwebs was bought by US private‑equity firm Spire Capital for $200 million and merged with US law‑enforcement software vendor Penlink. Penlink, founded in 1987, previously sold PLX, a tool that ingests telecom and internet data. After the merger the product suite includes Tangles (network‑intelligence platform) with Webloc as an add‑on, plus Lynx (virtual‑identity management), Trapdoor (social‑engineering platform) and Weaver (financial‑investigation suite).

Core capabilities

Global coverage of up to 500 million devices

Retention of up to three years of historical location records

Data refresh every 4–24 hours

Electronic‑fence (geofence) creation and device listing per zone

Movement‑trajectory tracking across multiple locations

Long‑term activity analysis to infer home address, workplace and daily routes

Detailed user profiling: age, gender, language, interests, installed apps, device model, OS version, Wi‑Fi hotspot names, etc.

Illustrative cases

A leaked technical proposal shows a five‑day trace of a male user in Abu Dhabi: 81 GPS points, 110 Wi‑Fi‑derived points, a list of 141 installed apps, and classification as “commuter”, “basketball fan” and “luxury‑goods buyer”. Another case follows a device from Germany through Austria to Hungary using 39 historical points and demonstrates cross‑border device detection.

Customer base

US agencies are the largest market: Immigration and Customs Enforcement (ICE) has spent over $5 million on Cobwebs/Penlink tools since 2021 and signed a $2.3 million contract in September 2025 for a one‑year Webloc license. The US Navy, Army Space and Missile Defense Command, Texas Department of Public Safety, and dozens of city police departments also use Webloc. International customers include Salvadoran police ($680 k purchase in 2020), Vietnamese technical specifications, Hungarian intelligence agencies (new license in March 2026), UK police (39 of 44 departments use or refuse to comment), and several European ministries that either confirm or deny usage.

Server footprint

Technical analysis identified 298 active Cobwebs‑related servers in 25 countries. Of these, 219 servers are directly tied to product deployment, all hosted on Microsoft Azure (126 in the US, 32 in the Netherlands, 17 in Singapore, 8 in Germany, 8 in Hong Kong, 7 in the UK). Five servers appear dedicated to Webloc (located in Mexico, Singapore, the Netherlands and Hungary); the Hungarian server was shut down in January 2026, coinciding with the agency’s new license.

Data fusion and export

Webloc merges ad‑derived data with telecom dumps (e.g., cellular data dumps from AT&T, Verizon) and supports CSV export for further analysis. The interface integrates Google Street View, allowing investigators to view street‑level imagery of target locations.

Trapdoor platform

Beyond passive tracking, the report uncovers Trapdoor, a “active network‑intelligence” social‑engineering platform. Its features include generating phishing links that mimic any website, rapid creation of fake webpages and pop‑ups, automatic extraction of device fingerprints (IP, browser, OS, screen resolution, battery level), a built‑in keylogger, payload delivery, and the ability to open hidden browser tabs to harvest media files. While Trapdoor itself does not contain malware, it enables customers to deploy malicious payloads and even access camera and microphone via browser code. Active servers possibly linked to Trapdoor were found in Kenya, Indonesia, Japan, the UAE, Singapore and Hong Kong; no confirmed customers are known, though a 2021 Meta report mentions Cobwebs customers using fake accounts for social‑engineering attacks.

Privacy implications and mitigation

Grant location permission to apps only when necessary

Disable cross‑app tracking features

Delete or periodically reset the device’s advertising identifier

Use privacy‑focused browsers and search engines

Avoid free weather, navigation and fitness apps that embed tracking SDKs

The investigation concludes that ad‑based geolocation surveillance is spreading rapidly worldwide with little regulation, posing a severe threat to global freedom and personal security.

SDKlaw enforcementRTBmobile privacyad trackingdata brokersgeolocation surveillance
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.