How This Briefing Works
This report opens with key findings, then maps the gaps between what RocketReach discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Claims vs. Observed Behavior
Undisclosed Gap
“”
Undisclosed Gap
“”
Undisclosed Gap
“”
Undisclosed Gap
“”
Undisclosed Gap
“”
Undisclosed Gap
“”
Undisclosed Gap
“”
Undisclosed Gap
“”
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Negotiation Leverage
- →The phantom OneTrust banner (loaded but never shown, all categories auto-consented) is a material compliance failure that contradicts their SOC 2 Type II and ISO 27001 certifications. Request audit reports and remediation timelines.
- →The cloaked tracking domain (a.usbrowserspeed.com) represents an undisclosed data flow that violates standard vendor transparency requirements. Demand full disclosure of all tracking infrastructure and subprocessors.
- →As a self-identified Texas data broker processing 5,887 annual opt-out requests, RocketReach faces increasing regulatory overhead and consumer friction. Use this as pricing leverage.
- →The Google Ads userId=[object Object] bug suggests engineering debt in their tracking implementation — indicates insufficient QA on privacy-critical code paths.
- →Lead with the consent theater finding. It is objective, verifiable, and directly contradicts their stated certifications. Do not accept responses that characterize this as a configuration issue — OneTrust requires explicit configuration to suppress the banner.
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Cookie/localStorage reading
Impact:
Keystroke/mouse tracking
Impact:
Full session replay
Impact:
Ignoring CMP signals
Impact:
Device identification
Impact:
PII deanonymization
Impact:
Site tampering (MITB)
Impact:
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses