All Vendors
call_tracking

Invoca

Invoca is an enterprise call tracking and conversation intelligence vendor that deploys JavaScript for dynamic number insertion and AI-powered call analysis, creating a closed-loop identity system that links digital ad engagement to recorded phone conversations and feeds call outcome data back to advertising platforms.

4 IOCs
35
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Invoca discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Analysis pending. Findings will appear here once intelligence collection is complete.

Disclosure Gaps

Claims vs. Observed Behavior

2 gaps

pending

UNKNOWN
They Claim

Awaiting scanner verification

Observed Behavior

Analysis based on public documentation, Invoca product pages, press releases, and integration specifications

pending

UNKNOWN
They Claim

Voice biometric data handling unverified

Observed Behavior

Invoca references patented voice biometric technologies but specific data retention and processing details have not been independently verified

Customer Impact

What This Means For You

Organizations deploying Invoca face elevated compliance complexity due to the platform's dual nature as both a visitor tracking system and a call recording/AI analysis engine. The JavaScript DNI component creates standard web tracking obligations, but the conversation intelligence layer introduces wiretapping and recording consent requirements that vary significantly by jurisdiction. In the United States alone, 11 states require all-party consent for call recording, and violations can carry statutory damages. Invoca's enterprise positioning means deployments often span multiple states and countries, compounding the consent management challenge. The AI transcription and analysis layer processes potentially sensitive spoken information (financial data, health details, account numbers) and distributes extracted insights across integrated platforms, creating data governance obligations that extend well beyond the Invoca platform itself. The closed-loop advertising integration means call outcome data influences ad targeting for other users, raising questions about secondary use of conversation-derived data.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

Recommended Actions for Invoca

  • Audit the Invoca JavaScript snippet and cookie behavior to understand the full scope of visitor data collection and session tracking on your properties.
  • Review call recording consent mechanisms across all jurisdictions where your business receives calls—ensure Invoca's recording and AI transcription are disclosed to callers before conversations begin.
  • Map every active Invoca integration to understand where call data, transcriptions, and AI-derived insights are flowing—particularly bidirectional connections to Google Ads, Meta, and Salesforce.
  • Evaluate the voice biometric processing—request documentation on what biometric data is collected, how long it is retained, and whether it is used for any purpose beyond the stated service.
  • Assess whether conversation intelligence data flowing to ad platforms for lookalike audience creation and retargeting aligns with your privacy policy disclosures and data subject consent.

Negotiation Leverage

  • Invoca's enterprise positioning and compliance certifications (HIPAA, SOC 2, PCI DSS) provide leverage for demanding rigorous contractual protections. Key negotiation points: request a complete data sub-processor list including all platforms that receive call data through integrations. Require contractual commitment that AI models (Signal AI, GPT Call Analysis) are not trained on your organization's call recordings or transcriptions. Negotiate data retention limits for recordings, transcriptions, and voice biometric data with contractual deletion guarantees. Ask specifically how Invoca handles call recordings that contain incidental PII (credit cards, SSNs spoken during calls)—is this data automatically redacted before storage and before transmission to integrated platforms? For the advertising integrations, request documentation of exactly what data elements are sent to Google, Meta, and other ad platforms when call conversions are reported. Invoca's HIPAA compliance claim should be backed by a signed BAA if your organization handles protected health information.
Runtime Detections

Runtime Detections

2 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C08Cross-Domain Sync

Identity stitching

BTI-C13Persistence Mechanisms

Long-lived identifiers

IOC Manifest

IOC Manifest

4 INDICATORS

Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

No indicators in this category

Ecosystem

Ecosystem & Supply Chain

Invoca maintains one of the most extensive integration ecosystems in the call tracking category. Advertising platform integrations include Google Ads (bidirectional conversion and audience data), Google Analytics 4, Google Campaign Manager, Search Ads 360, Microsoft Advertising, and Meta Ads (via Conversions API). CRM and sales integrations include Salesforce Sales Cloud (leads, opportunities, closed-loop reporting), Salesforce Marketing Cloud, and Adobe Experience Cloud. The platform supports Slack notifications, custom webhook integrations, and a developer API. Invoca's no-code integration library (Invoca Exchange) enables data activation across hundreds of platforms for bid optimization, caller retargeting, lookalike audience creation, and CRM enrichment. The bidirectional nature of these integrations means Invoca is not merely reporting data—it is actively feeding conversation intelligence back into advertising algorithms and sales automation workflows.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

4 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details