All Vendors
platform

Global

Global CDN infrastructure vendor detected deploying fingerprinting, session recording, and identity resolution when embedded on customer sites.

76 IOCs5 detections20% pre-consent3 sites
90
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Global discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

5 detections across 3 sites20% pre-consent activity
HIGH

Pre-Consent Activity

Global was observed loading and executing before user consent was obtained on 20% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

Pending Analysis

UNKNOWN
They Claim

Claims extraction pending

Observed Behavior

CDT analysis required for Terms of Service and privacy disclosures

Customer Impact

What This Means For You

Sites using Global CDN inherit fingerprinting liability from first resource request. Cross-site tracking exposure across Global customer base creates GDPR risk if CDN loads before consent. Distorted attribution from CDN-tied fingerprints undermines true performance measurement.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Global

  • Audit Global CDN Terms for fingerprinting data collection and cross-customer sharing provisions
  • Review privacy policy for CDN fingerprinting disclosures to users
  • Assess consent banner load order vs. first CDN resource request

If You're Evaluating Global

  • Alternative CDN providers with minimal client-side tracking footprint
  • Self-hosted CDN options to eliminate third-party surveillance dependency
  • Resource loading architecture that defers Global CDN until post-consent

Negotiation Leverage

  • Global CDN Terms lack clear restrictions on fingerprinting data retention or cross-customer identity resolution
  • Behavioral tracking embedded in CDN not disclosed in customer documentation, discovered via scanner detection
  • Pre-consent fingerprinting creates liability that standard CDN contract does not address
Runtime Detections

Runtime Detections

6 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Global CDN scripts employ obfuscation methods to conceal tracking activity embedded within content delivery functions.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Captures timing patterns and interaction signatures during resource loading for user profiling beyond CDN performance metrics.

BTI-C07Session Recording

Full session replay

Impact: Records page activity and resource load sequences beyond functional CDN requirements.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Fingerprinting initiates on first CDN request, before consent banner interaction or user authorization.

BTI-C10Fingerprinting

Device identification

Impact: Collects browser and device fingerprints tied to CDN resource requests, creating persistent identifier across customer sites.

BTI-C14Identity Resolution

PII deanonymization

Impact: Links device fingerprints across Global CDN customer network, enabling cross-site user tracking under guise of infrastructure.

IOC Manifest

IOC Manifest

75 INDICATORS

Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*global.com/wp-content/themes/Global/assets/js/vendor/modernizr-2.8.3.js*
Tracking script
TRACK
*global.com/wp-content/plugins/search-filter-pro/public/assets/js/chosen.jquery.js*
Tracking script
TRACK
*global.com/wp-content/plugins/search-filter-pro/public/assets/js/search-filter-build.js*
Tracking script
TRACK
*global.com/wp-content/themes/Global/assets/js/vendor/CustomEase.js*
Tracking script
TRACK
*global.com/wp-includes/js/jquery/ui/core.js*
Tracking script
TRACK
*global.com/wp-includes/js/jquery/ui/datepicker.js*
Tracking script
TRACK
*global.com/wp-content/themes/Global/assets/js/vendor/jquery.magnific-popup.js*
Tracking script
TRACK
*global.com/wp-content/themes/Global/assets/js/bundle.js*
Tracking script
TRACK
*global.com/wp-content/plugins/wp-rocket/assets/js/lazyload/17.8.3/lazyload.js*
Tracking script
TRACK
global.com/wp-content/plugins/search-filter-pro/public/assets/js/search-filter-build.min.js
Auto-extracted from scan
TRACK
global.com/wp-content/plugins/search-filter-pro/public/assets/js/chosen.jquery.min.js
Auto-extracted from scan
TRACK
global.com/wp-content/themes/Global/assets/js/vendor/modernizr-2.8.3.min.js
Auto-extracted from scan
TRACK
global.com/wp-includes/js/jquery/ui/core.min.js
Auto-extracted from scan
TRACK
global.com/wp-includes/js/jquery/ui/datepicker.min.js
Auto-extracted from scan
TRACK
global.com/wp-content/themes/Global/assets/js/vendor/jquery.magnific-popup.min.js
Auto-extracted from scan
TRACK
global.com/wp-content/themes/Global/assets/js/vendor/CustomEase.js
Auto-extracted from scan
TRACK
global.com/wp-content/themes/Global/assets/js/bundle.js
Auto-extracted from scan
TRACK
global.com/wp-content/plugins/wp-rocket/assets/js/lazyload/17.8.3/lazyload.min.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Global operates CDN infrastructure serving thousands of websites, positioning its fingerprinting network as unavoidable content delivery dependency rather than optional tracking vendor.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

76 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details