Case Studies
Real-world investigations demonstrating BLACKOUT's detection capabilities.
Featured Cases
Investigation Methodology
BLACKOUT investigations follow a systematic approach:
1. Initial Detection
Automated scanning identifies anomalous vendor behavior.
2. Evidence Collection
Full HAR capture, cookie inventory, and script analysis.
3. Behavior Analysis
Compare claimed behavior vs actual behavior.
4. Documentation
Create evidence pack with chain of custody.
5. Classification
Assign KILL/CONTAIN/WATCH/SAFE recommendation.
Common Findings
| Pattern | Frequency | Risk |
|---|---|---|
| Undisclosed data collection | 78% of sites | HIGH |
| Piggyback loading | 45% of sites | MEDIUM |
| Pre-consent tracking | 32% of sites | CRITICAL |
| Consent bypass | 18% of sites | CRITICAL |
| Hash/fingerprinting | 25% of sites | MEDIUM |
Contributing Cases
Have a case study to contribute? Contact research@deployblackout.com with:
- Target domain (anonymized if needed)
- Vendor(s) investigated
- Key findings
- Evidence pack (optional)