6 mins read
In April 2026, a major investigative report by the Citizen Lab exposed a global surveillance system known as Webloc, developed by Cobwebs Technologies and currently commercialized by Penlink.
The system represents a new generation of ad-based mass surveillance, leveraging commercial data from mobile apps and digital advertising ecosystems to track individuals globally.
The findings raise significant legal, privacy, and geopolitical concerns, particularly within the European Union, including Cyprus.
Webloc is a geolocation surveillance platform that collects and processes data from:
• Mobile applications (via SDK tracking)
• Digital advertising ecosystems (RTB bidstream data)
• Data brokers aggregating consumer behavioral data
According to the Citizen Lab report:
• Webloc processes data from up to 500 million mobile devices globally
• It enables tracking of location, movement patterns, and behavioral profiles
• It provides historical data access up to three years
This data includes:
• GPS and Wi-Fi location data
• Device identifiers (Advertising IDs)
• App usage and behavioral segments
• Inferred personal attributes (interests, habits, lifestyle)
The system effectively allows authorities to:
• Identify individuals via movement patterns
• Determine home and workplace locations
• Track associations between people
Webloc operates within the framework of:
• “Ad-based surveillance” (ADINT)
This model is controversial because:
• Data is originally collected for advertising purposes
• It is later repurposed for law enforcement and intelligence use
Key legal concerns include:
• Advertising IDs are not truly anonymous
• Potential violations of:
• Purpose limitation
• Lawful basis for processing
• Informed consent
Within the EU, this raises serious issues under:
• General Data Protection Regulation
• Law Enforcement Directive (LED)
Confirmed or identified Webloc users include:
• US Immigration and Customs Enforcement
• US military intelligence units
• State and local police authorities
• Hungarian intelligence services
European deployment remains largely undisclosed, often shielded by:
• National security exemptions
• Refusal to respond to FOI requests
5.1. Direct Evidence: Cyprus Appears in Webloc Infrastructure Mapping
According to the latest investigation by Citizen Lab:
• Cyprus is explicitly listed among countries hosting servers associated with Webloc / Cobwebs Technologies infrastructure
According to the latest investigation by Citizen Lab:
• Cyprus is explicitly listed among countries hosting servers associated with Webloc / Cobwebs Technologies infrastructure
More specifically:
• Technical analysis identified servers linked to Cobwebs Technologies deployments located in Cyprus
The mapping includes infrastructure tied to:
• Webloc
• Tangles
• Other intelligence products of Cobwebs Technologies
Key extract (paraphrased from source):
• Servers affiliated with Cobwebs Technologies are located in multiple countries, including Cyprus
5.2 Scale and Nature of the Cyprus Presence
Based on technical analysis detailed below, we identified active servers located in the Netherlands (32), Germany (8), France (2), Ireland (1), Sweden (1), Norway (1), and Cyprus (1) that we consider to be associated with Cobwebs product deployments.
The same report provides quantitative insight:
• At least one identified server linked to Cobwebs’ infrastructure was geolocated in Cyprus
• Cyprus is part of a global network spanning 20+ countries hosting such systems
Important clarification from the report:
• The presence of servers does not confirm that the government of Cyprus is a user or customer
• This distinction is critical from a legal standpoint.
5.3 Strategic and Legal Implications
The presence of such infrastructure in Cyprus raises:
• (a) GDPR Exposure
• Potential jurisdiction for EU enforcement
• Oversight role of the Office of the Commissioner for Personal Data Protection
• (b) National Security Considerations
• Possible foreign intelligence routing
• Increased cyber risk footprint
• (c) Compliance Liability
• Entities interacting with such infrastructure may face:
• Regulatory scrutiny
• Civil liability
• Data protection investigations
6. The Hidden Risk: Your Data Is Already Out There
The most critical shift introduced by systems like Webloc is this:
Surveillance no longer depends on hacking, it depends on existing data exposure
Data used in such systems often originates from:
• Data brokers
• Leaked credentials
• Mobile tracking ecosystems
• Public and semi-public digital footprints
This creates a new reality:
Your company, domains, emails, and phone numbers may already be:
• Indexed
• Correlated
• Sold
• Analysed
without your knowledge.
7. How Deleteme Detects and Reduces This Exposure
In this context, deleteme.com operates as a cyber intelligence and digital footprint control platform, designed to identify and reduce exactly the type of exposure exploited by systems like Webloc.
7.1 Deep Dark Web & Breach Scanning
Deleteme scans across:
• Dark web marketplaces and forums
• Infostealer malware logs
• Breach databases and credential dumps
Detecting:
• Compromised emails and passwords
• Corporate access credentials
• Leaked employee data
7.2 Company, Domain & Identity Mapping
Using advanced correlation analysis, Deleteme connects:
• Domains ↔ Companies
• Emails ↔ Systems
• Phone numbers ↔ accounts
• Individuals ↔ digital identities
This reveals:
• Hidden relationships
• Shadow infrastructure
• Undisclosed exposure points
7.3 Telephone, Email & Infrastructure Exposure Detection
Deleteme identifies links between:
• Phone numbers and online services
• Recovery emails and breached platforms
• Domains and exposed databases
This is critical because:
• These exact identifiers are often used in surveillance correlation systems
7.4 Data Broker Mapping & Removal
Since surveillance tools rely heavily on commercial datasets, Deleteme:
• Identifies presence across hundreds of data brokers
• Submits removal requests under GDPR and US frameworks
• Acts as an authorized agent for data removal
This directly reduces:
• Profiling exposure
• Tracking surface
• Data resale risks
7.5 Continuous Monitoring & Risk Intelligence
Deleteme provides:
• Real-time alerts for new leaks
• Exposure scoring models
Monitoring of:
• Emails
• Domains
• Employees
• Infrastructure
7.6 Legal and Regulatory Support
For organizations in Cyprus and the EU, Deleteme supports:
• GDPR compliance (access, erasure, objection rights)
• DPIA preparation
• NIS2 and DORA risk visibility
• Evidence collection for:
• Legal proceedings
• Regulatory submissions
• Cyber insurance claims
8. Broader European Context
Authorities across Europe, including agencies connected to Europol, have:
• Refused to disclose involvement
• Limited transparency regarding such tools
This indicates:
• Possible covert usage
• Limited democratic oversight
9. Key Legal Concerns
GDPR violations (purpose limitation, consent, transparency)
Mass profiling risks
Use without judicial oversight
Expansion beyond serious crime (“mission creep”)
10. Conclusion
Webloc represents a fundamental transformation:
• Surveillance through data aggregation instead of interception
• Intelligence derived from commercial ecosystems instead of warrants
For Cyprus, the implications are direct:
• Infrastructure presence links the country to the global surveillance network
• Regulatory and legal exposure cannot be ignored
At the same time, the real risk lies in existing data exposure.
This is where deleteme.com becomes essential:
• Identifying what data is already exposed
• Mapping how it connects
• Acting to remove and reduce it
11. Final Insight
The key question is no longer:
“Are you being monitored?”
But:
“How much of your data is already available to be used?”
Start your live scan now at cyberdeleteme.com
Need help? Visit our Help Center.
More News





