How This Briefing Works
This report opens with key findings, then maps the gaps between what ClickCease discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Subprocessor Disclosure
50+ third-party vendors detected including ad networks, analytics, and B2B intelligence
Pre-Consent Tracking
45.8% pre-consent tracking rate, 13 vendors fire before user consent
Pre-Consent Activity
ClickCease was observed loading and executing before user consent was obtained on 46% of sites where it was detected.
Identity Resolution Undisclosed
ZoomInfo and RB2B perform company and individual identification
Parent Company Hypocrisy
CHEQ/ClickCease website deploys the same surveillance patterns they claim to protect customers from
Claims vs. Observed Behavior
Subprocessor Disclosure
“3 subprocessors disclosed (AWS, Azure, Zendesk)”
50+ third-party vendors detected including ad networks, analytics, and B2B intelligence
Runtime scan of clickcease.com detected GoogleAnalytics4, GoogleAds, DoubleClick, MetaPixel, HubSpot, Clarity, ZoomInfo, RB2B, HockeyStack, and 40+ more
Pre-Consent Tracking
“GDPR/CCPA compliant”
45.8% pre-consent tracking rate, 13 vendors fire before user consent
GoogleAnalytics4, MetaPixel, DoubleClick, HubSpot, TwitterPixel detected with pre_consent=true
Identity Resolution Undisclosed
“Privacy policy mentions 'Non-personal Information' and technical data collection”
ZoomInfo and RB2B perform company and individual identification
B2B intelligence vendors detected that identify visitors by company, job title, and contact information
Parent Company Hypocrisy
“CHEQ sells privacy and compliance tools”
CHEQ/ClickCease website deploys the same surveillance patterns they claim to protect customers from
CHEQ's own tracking detected pre-consent on ClickCease site, along with 50+ other trackers
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use ClickCease
- →Audit your consent mechanism to ensure ClickCease JavaScript only loads post-consent
- →Review your subprocessor disclosures — using ClickCease makes CHEQ your subprocessor with their undisclosed vendor chain
- →Request CHEQ consolidated subprocessor list covering both ClickCease and parent company vendors
- →Monitor for identity resolution data flows from ZoomInfo, RB2B, and HockeyStack on your properties
If You're Evaluating ClickCease
- →Request complete subprocessor list — 3 vendors disclosed for a 50+ vendor ecosystem is not credible
- →Verify CHEQ SOC2 certification scope covers ClickCease and all detected third-party vendors
- →Compare with ClickGuard and Lunio on vendor disclosure transparency
- →Require contractual restrictions on data sharing within the CHEQ corporate structure
Negotiation Leverage
- →94% vendor non-disclosure: 50+ vendors detected vs. 3 disclosed — the most extreme disclosure gap in this category; require complete vendor transparency as a non-negotiable condition
- →Identity resolution tools: ZoomInfo, RB2B, and HockeyStack on clickcease.com — use this to negotiate restrictions on visitor identification from your fraud protection data
- →CHEQ subsidiary structure: ClickCease is a CHEQ subsidiary — negotiate clarity on data flows within the CHEQ corporate family and require consolidated subprocessor disclosure
- →Click fraud data sensitivity: Fraud detection data reveals campaign targeting patterns — negotiate data usage restrictions preventing competitive intelligence from your fraud patterns
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Keystroke/mouse tracking
Identity stitching
Ignoring CMP signals
Device identification
Long-lived identifiers
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
79 detection signatures across scripts, domains, cookies, and network endpoints