The FTC and Independent Reverse Engineering

This dataset measures how often the Federal Trade Commission relies on the work of independent researchers when regulating consumer privacy and security.

We manually analyzed all public FTC actions related to consumer privacy and security between Jan. 1, 2017 and July 15, 2024, a total of 102 FTC cases and 332 individual counts (see our methodology for more details).

The dataset accompanies a law review article by Michael A. Specter and Andy Sellars, forthcoming in 2025. We are making this dataset available ahead of publication in order to crowdsource bugs and receive feedback from the community.

For details on the analysis of software security as a credence good, see Specter’s dissertation, Chapter 2.

Summary Statistics

We examined 102 cases with a total of 322 different “counts.” Of these, 283 counts required some form of external investigation.

In 26.5% of these counts, the FTC learned about the issue thanks to some form of independent research. Note that this is a low bar: 33.7% of cases have at least one count that is based on independent research.

Where is independent research most effective?

Category Counts based on independent research Counts that required some investigation % of counts informed by independent research
§ 5 deception – privacy claims 17 42 40.5%
§ 5 deception – security claims 16 37 43.2%
§ 5 unfairness – data collection/use/disclosure that harmed consumer 8 15 53.3%
§ 5 deception – “deceptive failure to disclose” data collection, use or disclosure 8 12 66.7%
Children’s Online Privacy Protection Act 6 15 40%
§ 5 unfairness – cybersecurity standards 5 16 31.3%

Who are these independent researchers?

Category Counts Example
Journalists at media organizations 53 The Markup on Meta Pixel tracking
Unaffiliated researchers 19 Jonathan Leitschuh on Zoom bypassing MacOS safeguards
Advocacy organizations 12 Campaign for Commercial Free Childhood on Amazon Echo
Cybersecurity vendors 10 Kryptowire on BLU Products sending data overseas
Institutional academics 7 Reardon et al. on OpenX bypassing Android permissions
Other software vendors 3 Wladimir Palant (AdBlock Plus) on Avast collecting browser data
Trade organizations 2 BBB’s Children’s Advertising Review Unit on COPPA violations

Dataset

Below is our raw dataset. The same information is available in raw CSV form: actions.csv claims.csv.

Methodology

Dataset Collection

We look here at public cases brought by the FTC in matters related to consumer privacy and security. The FTC maintains a library of all public cases and proceedings, and tags actions “Privacy and Security” if they relate to those issues. We include a small number of privacy and security cases that are tagged with related labels, including cases tagged as COPPA actions, and cases labeled “Consumer Privacy.”

We include all cases we could find in the FTC’s library with these tags that had an initial filing (either a complaint before the FTC or a complaint in a federal district court) between 1 January 2017 and 15 July 2024. In the event the action has an amended complaint(s), we look at the most recent complaint.

At the end of each complaint, the FTC articulates discrete counts, or specific alleged violations of different laws. We include each of those counts in the dataset, unless the count is an alleged violation of a state law (This occurs when the FTC brings an action with a state Attorney General as co-plaintiff.) For each count, we scrutinize the complaint and conduct web searches and searches of news databases to determine how the FTC became aware of the facts that led to the respondent or defendant’s alleged liability. We describe below how we classify our findings, and provide our count-by-count justification in the dataset.

For those where independent research was involved, we also label the researcher by the type of research party they are, which we describe below.

Codeing Methodology

Cause of action

We categorize each claim based on the law alleged to be violated, with two main exceptions:

The FTC’s discovery of the issue

We define “independent research” as research that was conducted (1) by a private party; (2) not at the request of the software vendor or the government; and (3) with the apparent objective of sharing the findings with a regulator, the general public, or some portion of the general public.

We label the FTC’s discovery of the facts that inform their alleged violation as follows:

The type of independent researcher

We categorize independent researchers as follows:

Want to cite this dataset?


@online{specterFTCIndependentReverse,
  title = {The {{FTC}} and {{Independent Reverse Engineering Dataset}}},
  author = {Specter, Michael and Sellars, Andrew},
  url = {https://ftcreverse.engineering/},
  urldate = {2025-01-10},
}