🔒 BLACKOUT v1.0 — GTM Security Operations Platform
Case Studies
Overview

Case Studies

Real-world investigations demonstrating BLACKOUT's detection capabilities.


Featured Cases


Investigation Methodology

BLACKOUT investigations follow a systematic approach:

1. Initial Detection

Automated scanning identifies anomalous vendor behavior.

2. Evidence Collection

Full HAR capture, cookie inventory, and script analysis.

3. Behavior Analysis

Compare claimed behavior vs actual behavior.

4. Documentation

Create evidence pack with chain of custody.

5. Classification

Assign KILL/CONTAIN/WATCH/SAFE recommendation.


Common Findings

PatternFrequencyRisk
Undisclosed data collection78% of sitesHIGH
Piggyback loading45% of sitesMEDIUM
Pre-consent tracking32% of sitesCRITICAL
Consent bypass18% of sitesCRITICAL
Hash/fingerprinting25% of sitesMEDIUM

Contributing Cases

Have a case study to contribute? Contact research@deployblackout.com with:

  • Target domain (anonymized if needed)
  • Vendor(s) investigated
  • Key findings
  • Evidence pack (optional)