Invisible Surveillance and Very Visible Consequences

He Went Looking for an Affair and Lost $1.4M Instead and How Invisible Tracking Technologies Feed Criminal Romance Operations

In partnership with

In the first half of 2025 alone, we've tracked 1,732 publicly reported data compromises affecting over 1.1 billion individuals, a 490% increase year-over-year.

The Dead Drop: When A Website Becomes Their Weapon

How Criminal Networks Are Weaponizing Tracking Technologies to Hunt Everyone, From Middle-Class Families to Ultra-Wealthy Targets

GM, Welcome Back to the Dead Drop

In early 2023, a retail company's customer service team received a complaint that seemed routine at first: a customer reported unauthorized changes to her account. What followed was a five-month investigation involving web development teams, IT security specialists, and external forensic experts that revealed something far more sinister than anyone expected.

The breach hadn't been caused by ransomware. There was no business email compromise. Instead, investigators discovered unauthorized tracking technologies embedded in the company's website that had been systematically siphoning customers' personal data to third-party brokers who then sold usernames, passwords, purchasing habits, and credit card information to criminal networks.

The customers affected? Everyone from college students making their first online purchases to retirees managing fixed incomes to wealthy professionals. The criminals didn't discriminate. They harvested everything and sorted targets later based on value. That's the critical point most people miss: these attacks don't just target the wealthy. They target everyone, then criminals sort through the data to identify the most profitable victims.

In the first half of 2025 alone, we've tracked 1,732 publicly reported data compromises affecting over 1.1 billion individuals, a 490% increase year-over-year. The average cost of a data breach dropped to $4.44 million this year, but that statistic is misleading. Organizations got better at containment. The successful breaches are hitting harder than ever, and the criminals behind them have found a perfect hiding place in the invisible infrastructure of tracking technologies that exist on virtually every website you visit.

The Democratic Threat: Why This Affects Everyone, Not Just the Wealthy

Before I dive into how sophisticated actors target high-net-worth individuals, let's address the elephant in the room: you might be thinking "I'm not rich, so I'm not worried about this." That's exactly what criminals are counting on.

Here's the operational reality from investigating these cases: tracking technology exploitation works like a massive dragnet. Criminals compromise websites that millions of people visit, harvest data on everyone, then sort through it to identify targets worth pursuing. Your information gets collected whether you have $5,000 in the bank or $5 million. The difference is only in what criminals do with it afterward.

For individuals without significant wealth, the stolen data still has substantial value in underground markets:

Your personal information enables:

  • Credit card fraud and identity theft affecting your credit score for years

  • Tax refund theft that delays legitimate refunds you're counting on

  • Medical identity theft that corrupts your health records and insurance

  • Account takeover of your banking, email, and social media

  • Synthetic identity creation using your Social Security number

  • Employment fraud using your work history and credentials

The 2025 data shows that identity theft is the most common crime on the dark web, accounting for over 65% of all monitored illicit activities. Your Social Security number sells for $1-6 on dark web markets. Your complete credit profile goes for $15-50. A full identity package, your "fullz", commands $200-1,000 depending on your credit score and account balances.

But here's where it gets particularly insidious: tracking technologies don't just help criminals steal from you directly. They help criminals understand who you know, where you work, and who you have access to. If you work at a company with wealthy executives, your compromised credentials become a pathway to targeting them. If you have family members with money, your social connections become intelligence for criminal networks. Your value isn't just about what's in your bank account; it's about what access you provide to other targets.

That said, high-net-worth individuals face amplified risks because the same tracking technologies that enable $500 credit card fraud can also enable multi-million dollar wire fraud when criminals have detailed intelligence about wealthy targets. So while everyone needs to understand this threat, those with significant assets face systematically different targeting that requires additional defensive protocols.

The Perfect Cover: How Legitimate Tools Became Criminal Weapons

Here's what most security professionals miss about tracking technologies: they were never designed with security as a priority. They were built for convenience, for understanding customer behavior, for optimizing marketing campaigns. Every website you visit deploys dozens of these tracking scripts, e.g. cookies, pixels, beacons, tags, that monitor your interactions and report back to various parties.

When used by legitimate companies, these technologies serve valuable business purposes. They help organizations understand which products customers prefer, which marketing campaigns work, how users navigate websites. The problem is that these same technologies, by design, have access to everything you do on that website. Every click, every form field you fill out, every page you visit, every search term you enter. And once that data is collected, it flows into vast networks of third-party processors, analytics platforms, and advertising exchanges.

Criminals have now realized that instead of trying to hack through sophisticated security defenses, they can simply inject their own tracking technologies into legitimate websites and blend in with the dozens of other tracking scripts already running in the background.

A pharmaceutical company discovered this the hard way last year. During routine testing, their web team noticed irregularities in URL redirects for customer webform submissions. The investigation took six weeks to unravel. Customers' sensitive information, e.g. usernames, addresses, medications, medical conditions, was being unintentionally shared with unauthorized parties. The cause was an SQL injection attack combined with a malicious website redirect that manipulated the connection between the database and the website's forms, sending data to external servers controlled by criminal networks.

The sophistication is what makes this threat so dangerous. These weren't crude attacks that triggered security alarms. They looked exactly like the legitimate tracking technologies that every modern website deploys. The malicious scripts were obfuscated to avoid detection, operating silently in the background while appearing to serve normal analytics functions.

The Intelligence Operation: What They're Really Collecting

When most people think about website tracking, they imagine anonymous behavioral data used for marketing purposes. That's not what's happening with malicious tracking technologies. Criminal networks aren't interested in aggregate statistics about user behavior. They're conducting targeted intelligence collection on specific individuals and building databases of potential victims sorted by value.

The data being harvested goes far beyond simple demographics:

  • Financial Intelligence: Which banking sites you visit, investment research patterns, spending capacity indicators, subscription services, loan applications, credit monitoring activity

  • Geographic Intelligence: Travel patterns, property locations, routine movements, commute schedules, shopping locations, frequent destinations

  • Network Intelligence: Professional connections, family relationships, business associates, communication patterns, social media connections

  • Behavioral Intelligence: Decision-making patterns, response to urgency, trust indicators, security hygiene, password reuse patterns

In one documented case from this year, attackers gained access to a family office's email system after building a comprehensive intelligence profile through compromised tracking technologies. They knew the family's regular legal contacts, understood their communication patterns, had tracked recent financial transactions, and were aware of the family's travel schedule. When they launched their attack, impersonating trusted legal advisors through sophisticated spear-phishing, they successfully diverted over £1 million before the compromise was discovered.

But similar intelligence-gathering affects regular consumers too. Criminals track which debt consolidation sites you visit, which employment platforms you use, which financial hardship resources you research. They build profiles that tell them whether you're struggling financially (making you vulnerable to advance-fee scams), searching for jobs (making you vulnerable to employment fraud), or dealing with medical issues (making you vulnerable to healthcare scams).

The psychological manipulation becomes almost impossible to detect because criminals aren't guessing about your vulnerabilities. They're working from detailed intelligence reports built through months of surveillance via tracking technologies. For wealthy targets, they know your banker's name and your attorney's email signature style. For everyone else, they know your employer, your insurance company, your bank's customer service patterns, and the exact financial pressures you're facing.

What makes this particularly dangerous is the convergence of tracking technology data with information from massive data breaches. Companies like AT&T, Bank of America, Dell, Ticketmaster, and National Public Data have all been compromised in the 18 months, with billions of records now circulating in criminal networks. When criminals combine this stolen data with real-time tracking technology intelligence, they create what intelligence professionals call "fusion targeting", a comprehensive picture of your financial life, your vulnerabilities, and your exploitable relationships.

The Scale of Exposure: 2024-2025 Breach Reality

The numbers from the past 18 months reveal an acceleration of tracking technology exploitation that should alarm everyone. In 2024, healthcare data breaches alone exposed 276.7 million records, representing 81% of the US population. This wasn't primarily traditional hacking. Many of these breaches involved tracking technologies like pixels and analytics scripts that were transmitting sensitive patient information to third parties without proper authorization or security.

Major tracking technology breaches in 2024-2025:

  • Yale New Haven Health System: Google Analytics misconfiguration exposed 4.7 million patients' information including names, family size, insurance details, medical claims, patient financial responsibility, and doctor search information. Active from April 2021 to January 2024.

  • Gravy Analytics: Location tracking breach exposed precise location data from over 1 billion devices globally (collecting 17 billion signals daily). Caused by misappropriated access key to AWS cloud storage.

  • Globe Life Insurance: Initially reported as 5,000 affected individuals, eventually revealed approximately 850,000 people had information compromised through data broker and tracking technology vulnerabilities.

  • Change Healthcare: Largest healthcare breach in history affecting 193 million people. While initiated through a remote access server lacking MFA, the breach exposed comprehensive patient data that included tracking and behavioral information.

These aren't isolated incidents. They represent systematic failures in how tracking technologies are deployed, secured, and monitored. The companies involved weren't fly-by-night operations, but rather major healthcare providers, financial institutions, and data processors trusted by millions of Americans.

For context on the underground economy this feeds: dark web markets currently have over 22,000 bulk listings for stolen personal data, with more than 720,000 documented sales totaling at least $17.3 million in just the platforms we can track. Identity theft is the most common crime on these markets, accounting for over 65% of monitored illicit activities.

The Targeting Spectrum: From Mass Fraud to Precision Attacks

Understanding how criminals sort and use tracking technology data is essential to defending against it. The operation works like a funnel, with different criminal specializations operating at different value tiers.

At the bottom of the funnel, mass-market criminals purchase large databases of stolen information and launch volume attacks. They're looking for weak passwords, reused credentials, unmonitored accounts. If you've ever received a phishing email that seemed oddly specific about where you bank or shop, tracking technology data likely informed that targeting. These attackers might make $50-500 per successful victim, but they process thousands of victims.

Mid-tier criminals focus on more sophisticated targeting using behavioral intelligence from tracking technologies. They identify people researching expensive purchases, planning major life events, or showing signs of financial stress. They launch targeted scams offering fake financing, fraudulent investment opportunities, or advance-fee schemes. These operations might generate $5,000-50,000 per victim.

At the top of the funnel, professional criminal networks conduct comprehensive intelligence operations against high-value targets. They use tracking technology data combined with breach information and social media intelligence to build detailed profiles. They identify individuals with significant assets, complex financial structures, or positions that provide access to valuable resources.

High-value targeting indicators criminals look for:

  • Multiple bank and investment platform logins

  • Luxury retailer browsing and purchasing patterns

  • Business ownership and corporate officer information

  • Real estate investment research and transactions

  • International banking and travel patterns

  • Wealth management and family office website visits

Research shows that 41% of high-net-worth individuals have been victims of financial crime, with more than a third targeted in just the past six months. A 2024 Deloitte report found that 43% of family offices worldwide have suffered cyberattacks in the past two years, with North American family offices reporting the highest incidence at 57%. But these statistics only capture successful attacks against wealthy targets; the tracking and profiling happens to everyone.

Your digital complexity creates more data points for criminals to exploit, regardless of your wealth level. If you maintain accounts at multiple banks, use investment platforms, have retirement accounts, own property, or run a business, you're generating intelligence signals that tracking technologies harvest. The question isn't whether you're being surveilled, it's how criminals will use that intelligence once they determine your value as a target.

The Technical Reality: How the Attack Infrastructure Works

Understanding the mechanics of tracking technology exploitation is essential for defending against it. Criminal networks don't just randomly inject malicious code into websites. They conduct reconnaissance to identify valuable targets, then systematically compromise the websites and platforms those targets use.

The injection typically happens through coding vulnerabilities that exist in almost every web application. SQL injection attacks allow criminals to manipulate database connections. Cross-site scripting vulnerabilities let them inject malicious JavaScript into legitimate web pages. Supply chain compromises target the third-party libraries and frameworks that websites depend on, allowing criminals to inject tracking code that gets deployed across thousands of sites simultaneously.

Once the malicious tracking technology is in place, it operates with remarkable sophistication. Modern criminal operations use advanced techniques to evade detection. The code is obfuscated, making it difficult for security scans to identify as malicious. The data exfiltration is throttled and timed to blend with normal network traffic patterns. The external servers receiving the stolen data are distributed across multiple jurisdictions and frequently rotated to avoid blocking.

The data being collected isn't just captured, it's analyzed in near real-time. Criminal networks run sophisticated analytics on the intelligence they're gathering, identifying high-value targets based on their online behavior, financial interactions, and relationship patterns. They build comprehensive dossiers that include not just what information was entered on compromised websites, but behavioral profiles that reveal decision-making patterns, trust indicators, and potential vulnerabilities.

The Regulatory Vacuum: Why Government Protection Has Failed

Federal agencies have made gestures toward regulating tracking technologies, but their efforts reveal either incompetence or industry capture. The Consumer Financial Protection Bureau proposed regulations in December 2024 that would have brought data brokers and tracking technology operators under Fair Credit Reporting Act oversight, requiring them to follow the same rules as credit bureaus when handling sensitive financial and personal information.

By May 2025, those regulations had been quietly withdrawn after intense industry lobbying. The stated reason was that "legislative rulemaking is not necessary or appropriate at this time." Translation: political pressure from the technology and data broker industries successfully killed consumer protections that would have restricted their ability to harvest and monetize your personal information.

The Federal Trade Commission has pursued a handful of enforcement actions against specific companies for location data misuse and inadequate security practices, but these represent a tiny fraction of the tracking technology ecosystem. When organizations are fined for privacy violations, the penalties are treated as cost of business rather than deterrents.

At the state level, California's privacy laws theoretically provide some protection, but enforcement is sporadic and penalties are insufficient to change industry behavior. Most tracking technology providers have learned to craft privacy policies that technically comply with regulations while continuing operations that would shock most consumers if they understood what was actually happening.

The Defense Framework: What Actually Works

Defending against tracking technology exploitation requires understanding that you're not fighting individual attacks. You're fighting an entire infrastructure designed for surveillance and data extraction. Standard security measures like antivirus software and firewalls are necessary but insufficient.

Essential defensive protocols everyone should implement:

Browser-Level Protections:

  • Use browser developer tools to inspect websites before entering sensitive information

  • Install privacy-focused extensions that block third-party trackers

  • Clear cookies regularly and use isolated browsing sessions for financial activities

  • Check for excessive tracking scripts from unknown domains

Device and Network Security:

  • Use dedicated devices for financial activities when possible (or at minimum, separate browsers)

  • Avoid public WiFi for any sensitive transactions

  • Use VPNs, but understand they protect network traffic, not application-layer tracking

  • Keep all software and security patches current

Account Protection:

  • Enable multi-factor authentication on every account that offers it

  • Never reuse passwords across different services

  • Use password managers to generate unique, complex passwords

  • Be suspicious of unsolicited one-time passcodes

Transaction Verification:

  • Implement voice verification for significant financial transactions

  • Use separate communication channels to verify unexpected requests

  • Establish code words with financial institutions for emergency situations

  • Question requests for urgency, even when they appear to come from trusted sources

Intelligence Awareness:

  • Understand that criminals may know specific details about your life from tracking surveillance

  • Don't assume specific knowledge indicates legitimacy of communications

  • Train family members on how tracking technologies enable sophisticated social engineering

  • Maintain awareness of which platforms and services have suffered recent breaches

For high-net-worth individuals, these baseline protections need to be supplemented with professional monitoring services that scan for exposed data on dark web markets and criminal forums, regular security audits of all platforms you use, and comprehensive family office security protocols that address the unique risks of complex financial structures.

The Fraudfather Bottom Line

The tracking technologies embedded in every website and application you use weren't designed to be secure. They were designed to be invisible, to collect as much data as possible, and to share that data freely with third-party processors and analytics platforms. This infrastructure has become the perfect vector for criminal surveillance and intelligence gathering.

The threat is democratic in its collection but hierarchical in its exploitation. Everyone's data gets harvested. Everyone gets profiled. Everyone gets sorted into databases that criminals use for targeting. The difference is only in what type of attack you eventually face based on the value criminal networks assign to you as a target.

For individuals without significant wealth, this means defending against identity theft, account takeovers, and fraud schemes that can damage your credit, drain your accounts, and create years of financial stress. For high-net-worth individuals, it means defending against sophisticated, intelligence-driven attacks that can result in multi-million dollar losses.

The most dangerous aspect of this threat is its invisibility. You can't see the tracking technologies running in the background. You can't monitor which third parties are receiving your data. You can't control what happens to that information once it enters the vast ecosystem of data processors, brokers, and analytics platforms. By the time you realize your information has been weaponized against you, the criminal operation is already underway.

Every website you visit is a potential surveillance operation. Every form you fill out is a potential intelligence collection opportunity. Every transaction you conduct online creates data that can be harvested, analyzed, and used against you. The infrastructure that powers the modern internet has been thoroughly compromised, not through some sophisticated hacking operation, but through the deliberate design choices that prioritized data collection over security.

The criminals targeting you, whether you have $10,000 or $10 million, aren't hoping to get lucky with random attacks. They're running professional intelligence operations backed by comprehensive surveillance data that tracking technologies provide. When they strike, it won't feel like a criminal attack. It will feel like a normal interaction on a trusted platform until everything changes.

Learn Real Estate Investing from Wharton's Best Minds

In just 8 weeks, learn institutional-grade real estate analysis and modeling from Wharton faculty and seasoned investors.

You’ll gain:

  • Insider insights on how top firms like Blackstone and KKR evaluate deals

  • Exclusive invites to recruiting and networking events

  • Direct access to Wharton faculty and a certificate that signals credibility

Join a thriving community of 5,000+ graduates for ongoing career development, networking, and deal flow.

Use code SAVE300 at checkout to save $300 on tuition + $200 with early enrollment by January 12.

Program starts February 9.

The Fraudfather's take on the week's biggest scams, schemes, and financial felonies, with the insider perspective that cuts through the noise.

Colorado Man Seeks Affair, Loses $1.4M Retirement Instead: The Fraudfather's Analysis

Colorado man having "marital troubles" joins dating website looking for romance, loses entire $1.4 million retirement savings to crypto scam. Play stupid games, win devastating prizes.

The Criminal Playbook:

This is textbook "pig butchering." The term comes from fattening livestock before slaughter. Our victim went looking for an affair and found professional criminals instead.

Criminals targeted someone in emotional crisis on a dating website; the digital hunting ground for pig butchering operations. Emotional vulnerability plus questionable judgment creates the perfect mark. These networks specifically hunt people making bad decisions.

FaceTime conversations built intimacy without physical meeting. The video calls weren't about romance; they neutralized the "we've never met" red flag while avoiding in-person exposure that would reveal the operation.

Financial conditioning started with legitimate cryptocurrency apps showing real returns. Victims see actual account activity and gains, building confidence for the eventual extraction. This wasn't about stealing thousands—it was about harvesting $1.4 million methodically.

Once trust was established, they switched to a fake app controlled entirely by criminals. By then, every warning sign had been rationalized away.

The Operational Reality:

These networks operate from Southeast Asia using trafficked workers forced to run romance scams. Law enforcement focuses on fund recovery, not prosecution; criminals operate beyond US jurisdiction.

The victim calls himself "not a rich man." That $1.4 million represents decades of retirement savings.

Bottom Line: He went looking for someone who'd lie to his wife. He found someone who'd lie to him instead. Romance-investment scams exploit emotional vulnerability and poor judgment. Recognition is your only defense, preferably before you join dating websites while married.

 

The Fraudfather combines a unique blend of experiences as a former Senior Special Agent, Supervisory Intelligence Operations Officer, and now a recovering Digital Identity & Cybersecurity Executive, He has dedicated his professional career to understanding and countering financial and digital threats.

 This newsletter is for informational purposes only and promotes ethical and legal practices.