How This Briefing Works
This report opens with key findings, then maps the gaps between what CallTrackingMetrics discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Awaiting scanner verification”
Analysis based on public documentation, CTM privacy policy, cookie policy, help center articles, and integration specifications
pending
“DNT non-compliance scope unverified”
CTM states they do not honor DNT signals but the full scope of tracking behavior when DNT is set has not been independently observed
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for CallTrackingMetrics
- →Audit the CTM JavaScript tracking code to understand the full scope of data collection—IP addresses, cookies, device fingerprinting—and verify behavior when Do Not Track is enabled in visitor browsers.
- →Enable PII redaction for call transcriptions immediately if not already active—verify that credit card numbers, SSNs, and phone numbers spoken during calls are being automatically detected and removed from recordings and transcriptions.
- →Review call recording consent configuration across all jurisdictions where calls originate—ensure legally compliant disclosure is provided to callers before recording begins.
- →Evaluate the Google Ads Enhanced Conversions integration to understand exactly what customer data elements are being sent to Google beyond standard conversion events.
- →Map all active CTM integrations (CRM, ad platforms, Zapier workflows, API consumers) to create a complete data flow inventory of where call recordings, transcriptions, and visitor tracking data propagate.
Negotiation Leverage
- →CTM's explicit DNT non-compliance and opt-in PII redaction provide concrete leverage points for contractual negotiation. Key demands: require contractual commitment on data retention limits for call recordings and transcriptions, with guaranteed deletion schedules. Request a complete list of data elements sent to Google via the Enhanced Conversions integration and negotiate the ability to opt out of enhanced data sharing while retaining standard conversion tracking. Demand that PII redaction be enabled by default for your account, not as an opt-in feature. Ask CTM to document their position on DNT non-compliance in writing and confirm it does not conflict with your organization's published privacy commitments. For the developer API, negotiate rate limiting and access controls to prevent unauthorized bulk extraction of call data. Request audit rights to verify that PII redaction is functioning correctly and that deleted recordings are actually purged from all systems including backups and integrated platforms.
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
93 detection signatures across scripts, domains, cookies, and network endpoints