How This Briefing Works
This report opens with key findings, then maps the gaps between what Phoneburner discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Phoneburner was observed loading and executing before user consent was obtained on 75% of sites where it was detected.
Claims vs. Observed Behavior
disclosure
“Pending claims extraction”
Low Counselor score (40) indicates consent violations but minimal data commercialization. Privacy policy likely lacks specific disclosure of website-to-call tracking.
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Phoneburner
- →Implement consent gate before Phoneburner tracking scripts load
- →Audit call attribution accuracy impact from consent-gated deployment
- →Review Data Processing Agreement for call data retention and sharing
- →Confirm privacy policy discloses website-to-call tracking
If You're Evaluating Phoneburner
- →Defer Phoneburner scripts until post-consent confirmation
- →Assess server-side call attribution alternatives using form submissions instead of visitor tracking
- →Consider whether call routing can operate without pre-consent visitor behavior signals
- →Evaluate CRM-based lead routing instead of real-time visitor tracking
Negotiation Leverage
- →Phoneburner contract should address consent-gated deployment impact on attribution and routing accuracy
- →Negotiate technical capabilities for consent-aware tracking integration
- →Confirm Phoneburner supports first-party tracking modes or server-side attribution
- →Request documentation on call data retention and visitor profile persistence
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Ignoring CMP signals
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
11 detection signatures across scripts, domains, cookies, and network endpoints