Constella Intelligence

Cookie Policy

Cookie Policy

Effective Date: July 9, 2025

Constella Intelligence, Inc., (hereinafter, “Constella”), on its own or on a third party contracted to provide measurement services, may use cookies and other similar data storage and retrieval mechanisms in terminal equipment (hereinafter, “Cookies”).

Through the use of cookies, it is possible that the server where the website is hosted recognizes the browser used by the user, in order to make navigation easier, allowing, for example, access to users who have previously registered, access to areas, services, or promotions reserved exclusively for them without having to register each visit. They are also used to measure the audience and traffic parameters, as well as to control the progress and number of entries.

WHAT ARE COOKIES?

A cookie is a file that is installed in the user’s browser when accessing certain pages or applications. Cookies allow the owner of a website or app, among other things, store and retrieve information about browsing habits of a user or your computer and, depending on the information they contain and the way you use your computer, can be used to recognize the user.

TYPES OF COOKIES

By domain management entity
● First-party cookies
● Third-party cookies

By time of permanence
● Session Cookies
● Persistent cookies

By purpose
● Technical cookies
● Personalization cookies
● Analytics cookies
● Behavioral advertising cookies

WHAT TYPES OF COOKIES DOES THIS WEBSITE USE AND WHAT ARE THEIR PURPOSES?

By the entity managing the domain:

a) First-party cookies: are those that are sent to the user’s terminal equipment from a computer or domain managed by the editor itself and from which the service requested by the user is provided.

b) Third-party cookies: those that are sent to the user’s terminal equipment from a computer or domain that is not managed by the editor, but by another entity that processes the data obtained through the cookies.

By the time of their permanence:

a) Session cookies: these are a type of cookies designed and used to collect and store data while the user accesses a web page. As their name suggests, these cookies are stored in the terminal until the end of the user’s browsing session.

b) Persistent cookies: are those in which the data remain stored in the terminal and can be accessed and treated for a period defined by the person responsible for the cookie, and that can range from a few minutes to several years.

By their purpose:

a) Technical Cookies: are those that allow the user to navigate through a web page and the use of the different options or services that exist in it, including that are used to allow the management and operation of the website and enable its functions and services.

b) Personalization Cookies: are those that allow to remember information for the user to access the service with certain features that can differentiate your experience from that of other users.

c) Analysis Cookies: are those that allow us to quantify the number of users and thus perform the measurement and statistical analysis of the use made by users of the service offered. To do this, your browsing on our website is analyzed in order to improve the supply of products or services that we offer.

d) Behavioral advertising cookies: are those that store information on user behavior obtained through the continuous observation of their browsing habits, allowing the development of a specific profile to display advertising based on the same.

LIST OF COOKIES BY ISSUER:

Cookie name Issuer Type Conservation period More information

__cf_bm

_hs_opt_out

_ga Google Analysis

_ga_JT2BE6BTBQ Google Analysis

_zitok

This information table will be updated as soon as possible when the services offered on this site change. However, it is possible that the information table may temporarily not include a cookie, tag or other similar device due to an update, although there will always be devices with identical purposes to those included in this chart.

WHO ARE THE RECIPIENTS OF THE INFORMATION? WHERE ARE THEY LOCATED?

The information collected through Cookies may be used both by Constella and by third party collaborating companies, such as web analytics operators and agents, for the purposes described in the previous section.

Some of these collaborators may be located in third countries whose legislation does not offer an equivalent level of data protection; however, the user may consult the appropriate guarantees they offer so that international data transfers are carried out taking into account the rights and freedoms of the data subjects.

The user can learn more about these third parties, as well as the types of cookies they install, the purposes for which they process the data, the guarantees they offer to carry out international transfers, the retention periods and how preferences can be configured with respect to them, through their privacy policies. In any case, Constella is not responsible for the accuracy and content of the privacy policies offered by those third parties on their websites.

COOKIES MANAGEMENT

Taking into account the information provided through this Cookie Policy, below we provide you with information on how you can manage the cookies used on the web through the different options offered by the most common browsers (Explorer, Firefox, Chrome, Safari and Opera). The Help function of most browsers tells you how to configure your browser to not accept cookies, to notify you each time you receive a new cookie, as well as to completely disable all cookies.

So, for example, you can find information on how to manage your cookie preferences in the most common browsers through the following links:

Firefox from here. Chrome from here. Microsoft Edge from here. Safari from here. Opera from here.

If your browser is not among the above, please consult the specific documentation for your browser.

The opt-out mechanism creates a cookie that allows us to remember that you do not want additional cookies. However, if you delete cookies after you have asked for them to be deleted, you will have to repeat the process.

These changes only apply to the browser through which you are currently logged in. To delete cookies from other devices, you must follow the process described for those devices.

If you prevent the installation of all cookies on the website, some functionalities of the website as well as some content may be affected.

ADDITIONAL INFORMATION

You can contact Constella through privacy@constellaintelligence.com where you can write to exercise your rights of access, rectification or cancellation, limitation of processing, opposition, to data portability or not to be subject to a decision based solely on automated processing, as well as to withdraw the consent given.

To the extent that the information processed relates only to unique codes or identifiers of devices or browsers used by the user, and is not related to data that directly identifies the user, the above rights shall not apply, unless the user provides additional information that allows its identification.

If you wish to know additional information about the treatment of your data, you can consult the Privacy Policy of Constella.

The Hidden Cyber Risks in Your Executive Team’s Digital Footprint

Executive Team’s Digital Footprint Exposure Is Real

Executives, board members, and other high-profile users carry more than just influence – they carry risk. With access to strategic assets, critical systems, and high-trust communications, these individuals are prime targets for threat actors. And in the age of oversharing, infostealers, and deepfakes, an executive’s digital footprint becomes a high-value entry point.

Why Are Executives Targeted So Aggressively?

These individuals have sprawling digital identities – corporate emails used across third-party sites, public speaking engagements, social media presence, travel announcements, and more. Attackers use this abundance of information to:

  • Craft spear-phishing and impersonation campaigns
  • Hijack personal and professional accounts
  • Deploy infostealers to silently harvest credentials and cookies from executive devices

And unfortunately, even the most tech-savvy leaders fall into predictable patterns. Password reuse, lack of MFA, and device exemptions for frictionless access all make them vulnerable.

When Human Behavior Meets Cybercrime

Let’s get specific. Here’s how executive exposure has turned into real-world breaches:

  • Mark Zuckerberg: His Twitter and Pinterest accounts were hijacked using a password (“dadada”) leaked in the 2012 LinkedIn breach. This wasn’t just about access—it was reputational damage.
  • Colonial Pipeline: An inactive VPN account with a reused password—found in a breach—enabled one of the most high-profile ransomware attacks in U.S. history. MFA wasn’t enabled. The result? A fuel supply disruption across the Eastern U.S.
  • Voice-Cloning Fraud: In 2019, cybercriminals used deepfake voice technology to impersonate a CEO’s voice, instructing a subordinate to wire $243K to a fraudulent account. The voice sounded real enough that no suspicion was raised—until it was too late.

The Deepfake Era Has Arrived

What used to be phishing emails has now evolved into:

  • Deepfaked video and voice impersonations
  • Fake Teams and Zoom meetings with AI-generated faces
  • Spoofed WhatsApp messages that mimic executive tone and context

Security teams are facing not just technical exploits but psychological manipulation – crafted from breached data and AI tooling. And executives are the preferred channel for this high-leverage social engineering.

Infostealers Targeting Executive Endpoints

Threat actors know where the value lies. Infostealers like Raccoon, RedLine, and Vidar are mass-deployed to capture saved logins, cookies, and autofill data. Executive devices, often used across corporate and personal workflows, become low-friction, high-yield targets.

These logs are bundled and sold on dark web markets like Russian Market or Genesis, sometimes specifically filtered for domains like yours. One CISO’s nightmare? Seeing their CEO’s corporate login and session token available for $100 to the highest bidder.

How to Defend What Matters Most

Identity-centric digital risk intelligence provides visibility that traditional tools lack. Constella’s digital risk intelligence platform helps you:

  • Continuously monitor executive credentials across breach dumps, infostealer logs, and dark web forums
  • Detect impersonation attempts – email spoofing, social profile cloning, or deepfake media
  • Apply identity risk scoring to high-privilege individuals to drive priority response

Final Thought
Executives won’t stop being high-value targets. But with the right visibility, proactive detection, and identity-centric alerts, you can stop their exposure from becoming your next breach.

Protect the people who protect your company. Download The Identity Intelligence Playbook today.

Potential Cybersecurity Threats to the 2024 U.S. Election: Voter Database Leaks

As the 2024 U.S. presidential election takes place, cybersecurity analysts are on high alert, warning of voter database leaks. They are warning of an increasingly complex landscape that could jeopardize voter data security and election integrity due to voter database leaks. The face-off between Kamala Harris and Donald Trump has intensified the focus on ensuring that electoral systems remain secure and resilient against potential cyberattacks.

It is crucial to protect against breaches, leaks, and disinformation campaigns that could influence public trust and democratic outcomes. Drawing insights from Constella Intelligence, this analysis examines the specific risks and incidents shaping the current election season.

U.S. Voter Data Leaks: A Persistent Threat

The United States has become a major target for voter data leaks, experiencing significant breaches that expose a wide range of personal information. Moreover, voter data from these breaches is being actively traded on deep and dark web forums, posing an ongoing risk to voter privacy and security.

Constella Intelligence’s findings show that U.S. voter data leaks account for approximately 78% of all voter data circulating on the dark web, underscoring the nation’s unique vulnerabilities stemming from its decentralized electoral system and vast voter data infrastructure. In the U.S. alone, 23 states have suffered data breaches, impacting regions nationwide and exposing significant weaknesses in the protection of sensitive voter information.

Key examples include Florida, Texas, Michigan, and Wisconsin. Given that there are 50 states in the United States, this means that approximately 46% of states have been affected by voter data breaches, reflecting the widespread and systemic nature of these vulnerabilities.

Notable incidents since 2020 illustrate the scope of these breaches:

  • Oklahoma: As shown in the previous image, a dark web forum post offered the 2024 Oklahoma voter list, including absentee voters, with instructions for accessing sensitive information for political purposes.
  • Florida: Multiple significant leaks have affected Florida, including incidents in April 2020 and March 2022. These repeated exposures highlight the challenges in securing voter information in large states with complex voter registration systems and higher volumes of data, which increase their vulnerability to breaches.
  • Wisconsin: A 2020 data leak compromised millions of voters, including such personal information as emails, names, phone numbers, and full addresses, showing how even isolated breaches can undermine public trust and voter security.
  • Other States: States like Oklahoma, North Carolina, Pennsylvania, Michigan, Delaware, Texas, and Alaska have also reported leaks, some of which date back as far as 2013. These incidents highlight the systemic difficulties in securing voter data across state lines.

Of the 23 affected states, voter data breaches have impacted both Democratic and Republican strongholds, as well as crucial swing states, highlighting the widespread nature of the threat regardless of political affiliation or regional importance.

  • Approximately 45% of Democratic-leaning states and 50% of Republican-leaning states have experienced data breaches.
  • Key swing states (5%) such as Florida, Georgia, or Pennsylvania have also been impacted. Swing states are particularly important because they often decide the overall outcome of elections, making any breach in these regions potentially more impactful.

This broad geographic spread means that voters from both parties, along with undecided voters, could be affected, potentially impacting voter turnout and election trust.

Emerging Cyber Threats and Manipulation Risks in the 2024 Election

In addition to voter data leaks, other cybersecurity threats could impact the 2024 U.S. election, such as disinformation campaigns, targeted voter suppression, and foreign interference. Constella Intelligence has identified several notable cases:

  • Campaign-Related Data Breaches (2024): A potential breach linked to Donald Trump’s campaign emails, allegedly involving foreign entities, exposed sensitive data. This underscores the risks posed by foreign influence operations.
  • National Public Data Leak (2024): A 2024 incident exposed million records, including sensitive information of million U.S. voters, highlighting ongoing vulnerabilities in protecting voter data.
  • RNC Leak (2017): This breach affected millions of voters, exposing personal details like birth dates and political affiliations. The data was used in predictive models, suggesting a risk of similar information being exploited to manipulate voter perceptions in the 2024 race.

These breaches illustrate the persistent risks of data misuse, identity theft, and election manipulation, each capable of eroding public trust in the democratic process.

Global Perspective: Voter Data Leaks Beyond the United States

Although U.S. voter data leaks are the most prevalent, other nations have also experienced significant breaches, especially during election cycles. Notable examples include:

  • Mexico: High-profile breaches occurred in 2017 and 2021, including targeted attacks on political organizations like the Partido Acción Nacional (PAN).
  • Israel: The 2020 elections saw a significant voter data breach, illustrating vulnerabilities even in nations with advanced cybersecurity frameworks.
  • The Philippines and India: The Philippines experienced a leak in 2016, and India faced a breach in 2024, demonstrating that populous democracies remain attractive targets for cybercriminals.
  • Other Nations: Countries like Iraq, Honduras, and Ukraine have also reported voter data breaches, underscoring the global nature of these threats.

Impact and Risks: Manipulating Election Outcomes Through Exposed Voter Databases

Beyond data leaks, the risks extend to manipulation tactics that leverage this exposed information. When voter databases are exposed, the personal and political information they contain can be weaponized to manipulate election outcomes in various ways:

  1. Targeted Disinformation: Threat actors can use leaked data to send misleading messages, such as false voting locations or procedures, potentially causing voters to miss their opportunity to vote.
  2. Voter Suppression Tactics: Leaked data allows cyber actors to discourage specific voters from participating by sending intimidating or misleading messages.
  3. Identity Manipulation for Fraudulent Voting: Using personal details from leaked databases, malicious actors could impersonate registered voters to submit fraudulent ballots or alter voter rolls, causing confusion at polling stations.
  4. Amplifying Polarization: By leveraging insights into voter preferences, cyber actors can create messages that heighten political divisions, influencing voters through emotional manipulation rather than factual discourse.

These tactics threaten not only individual privacy but also the integrity of the election process. When personal information is exposed, it can be used to manipulate voters, distort their perceptions, and ultimately undermine the fairness of the election. This direct impact on voter behavior erodes confidence in democratic institutions and the legitimacy of the results.

Threat Narratives: Misinformation and Disinformation Linked to Voter Data Leaks

Disinformation narratives pose significant threats because they can manipulate public perceptions and erode trust in democratic institutions. Constella Intelligence has identified several such narratives that could shape public opinion on the Dark Web:

  • Electoral Fraud: We have uncovered several threads discussing how leaked voter data could be used to manipulate voter intentions. Some threat actors allege the presence of ‘fake election officials’ in Pennsylvania, the removal of mailboxes in Luzerne County, and reports of ‘a box full of ballots’ discovered in Dade County, Florida. Additionally, claims about the purging of ineligible voters in Oklahoma, including deceased individuals, coupled with a previous voter list leak in the state, raise concerns about potential manipulation of the electoral system. These posts reflect the growing polarization among citizens and contribute to speculation around voter manipulation. However, we have not conducted further investigation into these claims.
  • Political Corruption: False narratives also target political figures, especially Kamala Harris and the Obamas. Harris is accused of plagiarism in her criminal justice book and collaborating with foreign countries to spy on Trump.
  • Russian Disinformation Campaign: The U.S. intelligence community has reported that Russian actors could be actively spreading false information to undermine public confidence in the integrity of U.S. elections, especially in key swing states. This includes creating fake videos and articles suggesting election fraud, ballot stuffing, and cyber attacks in places like Arizona, targeting specific candidates such as Kamala Harris.
  • Deep State: The idea of a ‘deep state’ aiming to control the country and silence opposition is frequently repeated. Steve Bannon, for example, is portrayed as a ‘political prisoner.’ Claims also suggest that this ‘deep state’ controls the media and censors information that could expose its actions.
  • QAnon Conspiracy Theories: Some narratives align with QAnon conspiracy theories, such as mentions of ‘Agenda 47’ and references to Q. These theories, which speak of a satanic cabal controlling the world, are popular among some right-wing groups in the U.S. and often intersect with narratives about electoral fraud and political corruption.

These narratives significantly threaten democratic stability by promoting misinformation, eroding public trust, and influencing voter behavior. Data from voter databases could further be used to create targeted misinformation campaigns, aimed at voters who are already inclined to believe these narratives, thus deepening their impact on democratic processes.

Recommendations for Securing Voter Data and Upholding Electoral Integrity

In response to the rise in voter database breaches, Constella Intelligence recommends proactive measures for citizens to safeguard their data:

  1. Understand Your Digital Footprint: Stay informed about the personal information that is publicly accessible, including voter data and details from breaches like the NPD leak. By being aware of what information is exposed, you can take steps to protect yourself from threat actors who may attempt to exploit this data, especially during sensitive periods like Election Day.
  • Enable Two-Factor Authentication (2FA): Strengthen account security by using 2FA, which makes unauthorized access more difficult.
  • Be Mindful of Social Media Posts: Exercise caution with what you share or read on social media, as AI tools now make it easier than ever to create convincing fake content. Threat actors can exploit personal information or posts to manipulate narratives, spread disinformation, or target individuals during critical times like Election Day.
  • Be Cautious of Phishing Attempts: On Election Day, be especially wary of unsolicited messages claiming to provide election updates or voter information. Avoid clicking on links or downloading attachments, as scammers frequently use these tactics to steal personal data or spread disinformation during critical events like elections.

Stay vigilant against potential threats, from voter data breaches to disinformation, and take steps to protect your personal information. As you head to the polls, remember the importance of safeguarding our democratic process. Enjoy your Election Day, and best wishes to you all, America!

Uncovering Cyber Criminals Leveraging the World’s Most Extensive Database

Constella Intelligence, a pioneer in Deep OSINT investigations, unlocks the power of the deep and dark web to uncover cyber criminals and create the world’s most extensive database of malicious actors. This blog delves into Deep OSINT and explores how Constella Intelligence leverages it for superior Cyber-Investigations, Fraud Detection, and Insider Monitoring. 

Finding Actors Beyond the Surface 

Traditional Open-Source Intelligence (OSINT) gathers information from readily available online sources like social media and public records. Deep OSINT ventures far deeper. It delves into the hidden corners of the web, the deep and dark web, uncovering data that was never meant for public eyes. 

Constella Intelligence leverages Deep OSINT to build the world’s largest data lake, which exceeds one trillion digital assets. Even though the raw data from the deep and dark web can be messy and inconsistent, once is processed it can be used at scale:

  • Data Normalization Provides Scalability: Constella applies sophisticated data normalization and verification techniques. This ensures the data is formatted consistently and the information is real and not fabricated. Imagine millions of data points from various sources speaking a universal language – that’s the power of data normalization. 
  • ID Fusion Algorithms Connect the Dots: Once normalized, Constella’s ID Fusion algorithms take center stage. These advanced algorithms connect the dots, meticulously linking disparate data records into comprehensive profiles of individuals. Social media handles, forum aliases, dark web fingerprints – all these scattered pieces are woven together to create a holistic picture. 

A Digital Treasure Trove for Uncovering Cyber Criminals:  

  • Identify Criminals Behind Incidents: After a security incident, Deep OSINT helps identify the perpetrators by tracing their digital footprints across the web. ID Fusion then connects these footprints to build a complete profile of the attacker. Categorization allows you to identify if the attacker is a hacker, a phisher, or an insider based on their past activities and affiliations. 
  • Monitor Insider Threats: Mitigate insider threats by uncovering hidden connections, past activities, and potential red flags associated with employees. ID Fusion helps link seemingly unconnected data points to reveal a more comprehensive picture of an employee’s digital footprint, flagging potential insiders. 
  • Analyze Third-Party Vendors: Deep OSINT investigations provide a comprehensive analysis of third-party vendors, uncovering potential risks before establishing partnerships. ID Fusion helps ensure a complete vendor profile is established, identifying any inconsistencies or red flags that may indicate money laundering or other illicit activities. 
  • Digital Background Checks: Conduct thorough digital background checks on individuals, identifying any concerning activity lurking in the deep and dark web. ID Fusion connects the dots across various data sources to provide a holistic view of the individual’s digital presence, including potential ties to human trafficking or other harmful activities. 
  • Advanced KYC (Know Your Customer): Deep OSINT helps verify customer identities with unparalleled thoroughness, uncovering potential discrepancies and preventing fraud. ID Fusion ensures all aspects of a customer’s identity are examined and linked together for a watertight KYC process, identifying potential money launderers or other financial criminals. 

Constella Intelligence’s Database: A Categorized Arsenal Against Malicious Actors 

Constella Intelligence’s database isn’t just vast; it’s meticulously categorized. This categorization allows for targeted searches and identifications. Here’s a glimpse into the malicious actor categories within the database: 

  • Hackers: Individuals with advanced technical skills who exploit computer systems for malicious purposes. 
  • Carders: Criminals who steal and sell credit card information on the dark web. 
  • Hitmen: Individuals who are allegedly hired to commit murder. 
  • Pedophiles: Those who engage in illegal activities involving child exploitation.) 
  • Phishers: Deceptive individuals who attempt to steal personal information by impersonating legitimate entities. 
  • Insiders: Employees or trusted individuals who misuse their access privileges to harm an organization. 
  • Money Launderers: Criminals who disguise the source of illegally obtained money. 
  • Human Traffickers: Individuals who exploit and trade human beings for forced labor, sexual exploitation, or organ harvesting. 
  • Nation-State Actors: Government agencies that engage in cyber espionage or other malicious activities. 

By leveraging Deep OSINT, data normalization, and ID Fusion, Constella Intelligence empowers businesses and security service providers to: 

  • Shorten investigation times: Quickly identify the perpetrators behind security incidents. 
  • Strengthen insider threat detection: Proactively identify potential insider threats before they can cause harm. 
  • Make informed decisions about third-party vendors: Partner with trustworthy vendors who minimize security risks. 
  • Conduct comprehensive background checks: Hire with confidence by uncovering any concerning activities in an individual’s digital footprint. 
  • Comply with KYC regulations: Ensure robust KYC procedures to prevent money laundering and other financial crimes. 

Deep OSINT: The Future of Security 

Deep OSINT offers a revolutionary approach to security. By integrating Constella Intelligence’s database and expertise into your security measures, you gain a significant advantage in the fight against cybercrime and fraud. Constella Intelligence sets a benchmark for robust digital defense mechanisms in today’s complex threat landscape. 

Don’t Wait Until It’s Too Late: Secure Your Digital World Today 

Deep OSINT is not a luxury; it’s a necessity for robust cybersecurity. Explore how Constella Intelligence can empower you to create new revenue streams, improve customer retention, and ultimately, secure your digital world in the face of ever-evolving threats. 

Constella and Social Links Join Forces to Deliver Transformative OSINT Solutions

March 25, 2024[1]  — Social Links, a leading developer of open-source intelligence (OSINT) software, has announced a strategic partnership with Constella Intelligence, a prominent identity signals provider. This collaboration marks a milestone in the investigative reach of both Social Links’ solutions and the OSINT industry at large.

Social Links has always understood the crucial role that darknet data plays in increasing the reach and scope of investigative work. By integrating Constella Intelligence’s leading-edge identity intelligence with a powerful OSINT platform, users will be able to conduct investigations that search wider and deeper. This will lead to more insights and leads, higher levels of success, and, most importantly, contribute to digital and global safety.

Social Links CEO, Ivan Shkvarun, reiterated the transformative potential this partnership brings. “We’ve always strived to provide our users with the most comprehensive, accurate, and up-to-date data. And our new collaboration with Constella Intelligence shows that we are really expanding horizons and giving investigators, prosecutors, and security professionals the invaluable edge they need to resolve their cases.”

As prominent specialists in digital risk protection and providers of data from diverse sources, Constella Intelligence brings immense expertise and advanced technologies to the partnership. Their specialized techniques and tools to extract data from the Deep and Dark Web can deliver the data that case breakthroughs are made of.

Constella Intelligence’s available resources include data that can’t be found through Surface Web domains. Used responsibly, such information can be instrumental in investigative work, case-building and evidence collection, as well as a range of cybersecurity objectives, such as exposure identification or incident response. 

Constella Intelligence CEO, Kevin Senator expressed enthusiasm for the partnership’s potential to drive significant innovation in the field of intelligence software: “The innovative, forward-thinking solutions of Social Links are the perfect counterpart to our mission to deliver the most complete, reliable data possible. This synergy has the potential to bring something truly groundbreaking to the OSINT landscape, revolutionize investigative work, and make the world a safer place.”

About Social Links

Social Links is a leading open-source intelligence (OSINT) provider, bringing together data from 500+ sources covering social media, messengers, blockchains, and the Dark Web. The company’s ML-powered solutions facilitate data-driven investigations for law enforcement, national security, cybersecurity, due diligence, and more.

About Constella Intelligence  

Constella.ai offers comprehensive identity protection solutions that leverage deep and dark web intelligence to provide actionable insights. Our solution integrates seamlessly with existing security systems and prioritizes data security through compliance with industry standards. With the world’s largest breach database, containing over Trillion data attributes and 200 billion Identity records in 125+ countries and over 53 languages, Constella sets the standard in data depth and security. Our expertise in OSINT investigations provides critical insights into digital footprints, offering a decisive edge in protecting and securing your data. Ready for a secure future? Reach out to Constella today and stay one step ahead of digital threats.


Placeholder.

A Tale of Two Identity Trends: Minimizing privacy for criminals & maximizing our own

Never before have our identities been so publicly available, minimizing privacy.

From our exact location (mobile phone GPS) to evolving physical appearances (Instagram) and even our internal thoughts (X, formally-Twitter), the internet is a treasure trove for validating and attributing identity and intentions.

The birth of the OSINT expert

The explosion of Open Source Intelligence (OSINT) professionals shows us that a lot of skill and effort is involved to weave together all this personal exposure into an actionable piece of intelligence. If there was a magic button to profile an identity, we wouldn’t need OSINT experts. Far from falling victim to automation, the OSINT expert community is actually booming.

The OSINT community is full of helpful ‘How to’ guides and libraries showcases 100s of tools to help finding people. Yes, Social Media is a primary source, but from wedding gift registries, flight records, archived webpage capture, vehicle history and electoral rolls, there’s plenty more to keep an investigator busy when identifying someone.

OSINT done right is a highly specialized and laborious task. And it’s only getting harder.

Criminals are painting us into a corner – minimizing privacy

Meta recently stopped API access to Facebook Groups, and in 2023 X started what many deem as phase one of monetizing or gating API access to its rich content.

This comes just as End-2-End Encryption (E2EE) is being rolled out in earnest across all remaining social messengers. A perfect storm for OSINT investigators. Less data (or exclusionary data) equals less intelligence.

For the sake of privacy, many welcome these initiatives, and indeed privacy is often the trigger for these policies in the first place. But you don’t need to go far to find investigators, especially tasked with unmasking criminals, unhappy with this direction.

Such is the reaction from OSINT community that one start up even became a privacy champion in response to X’s API restrictions , switching from consuming X … to protecting users from X.

This response from the market is to be expected. Without co-dependence between platforms and 3rd parties, a quasi-adversarial culture of VPNs, privacy tools and takedown services have sprung up in response.

Identity: A weapon for criminals

But a boom in any market brings with it fraudsters and manipulators. There are criminals in all walks of life. Ironically, the privacy industry can’t escape identity thieves.

For example, Brian Krebs (with the help of Constella) recently investigated various consumer data brokers and people-search providers – such as OneRep and Radaris – both of which have links to Belarus and Russia… respectively raising suspicions.

Criminals have more options: more privacy tools at their disposal…to fight an increasingly disjointed enemy of manual OSINT investigators, regulators and privacy activists.

Identity: A weapon for us

Here’s where we believe exposed identity data – that is, the mass dumps of identity information found online – can changes things for the better.

Apart from the obvious protection that being aware of exposed credentials offer individuals and business (social engineering, ATO and synthetic ID fraud remain top threat vectors of attack), exposed identity data fills the gap for an OSINT investigator searching for an effective response to new online profiling obstacles.

As outlined by Krebs above, and in countless other OSINT investigations, aliases identified in breached datasets join the dots between people and networks the surface web cannot resolve by itself. What’s more, it’s a dataset which, by its nature, can’t be put back in the box and subject to takedown. It’s a decentralized and uncontrolled treasure chest. There’s nothing a criminal can do to stop it.

By Lindsay Whyte

Website Privacy Policy

Website Privacy Policy

Effective date: July 9, 2025

1. Who is the data controller?

Constella Intelligence, Inc. is the data controller for the processing of your personal data for the purpose of providing you with the services identified in this privacy policy.

Constella Intelligence, Inc. is a company domiciled at PO Box 20085 San Jose, CA 95160 (hereinafter referred to as “Constella”).

If you have any questions or comments about this Privacy Policy, the ways in which we collect and use your Personal Data or your choices and rights regarding such collection and use, please do not hesitate to contact us at:

privacy@constellaintelligence.com
Constella Intelligence, Inc., PO Box 20085 San Jose, CA 95160

If you are located in the European Union, you may use the following information to contact our Data Protection Officer and our European Union-Based Member Representative:

Our branch office in the European Union: Sucursal en España located at C/Acanto 22, 7th floor, 28045, Madrid (Spain) · Data Protection Officer: privacy@constellaintelligence.com.

At Constella we are committed to the fundamental right to the protection of your personal data and this privacy policy is intended to inform you of your rights under the Data Protection Legislation, including, but not limited, to the General Data Protection Regulation (“GDPR”).

We inform you that Constella has appointed a Data Protection Officer in accordance with the General Data Protection Regulation (GDPR), at your disposal for any doubts or queries regarding the processing of your data, and whom you can contact via email privacy@constellaintelligence.com

2. What information do we process?

a) The data you provide us with directly:

As a Data Controller, we collect information about you when you contact us to request a Demo, or when you subscribe to the Constella Newsletter.

When you contact us through these channels, we will ask for your name and surname, business e-mail, Company name, job title and country you work from.

All fields marked with an asterisk (*) in the forms provided to you in the channels must be completed, so that the omission of any of them could make it impossible to provide you with the services requested. You must provide truthful information, and the impersonation of identity or the use of aliases or anonymous names is prohibited.

You may not, when providing any data that may be requested from you on the channels, choose expressions that are offensive, coincide with trademarks, trade names, names or pseudonyms of public figures or celebrities that you are not authorized to use.

So that the information provided is always up to date and does not contain errors, you must inform Constella, as soon as possible, of any changes to your personal data that may occur.

Likewise, by clicking on the “Request a Demo” or “Sign me up” button (or equivalent) incorporated in the aforementioned forms, you declare that the information and data you have provided are accurate and truthful.

Furthermore, we may collect your personal data to provide you with the services you have requested from us, in order to manage and maintain our business relationship with you, as a point of contact of our clients.

b) Data obtained indirectly:

When you browse, various cookies and other tracking devices may be installed on your device, as explained in our Cookie Policy.

3. What is the origin of the data?

We consider that all data processed by Constella have been freely provided by you.

In the event that the personal data provided belong to a third party, you guarantee that you have informed them of this Privacy Policy and have obtained their authorization to provide the data to Constella for the aforementioned purposes. Likewise, you guarantee that the data provided are accurate and up to date, and you accept responsibility for any direct or indirect damage or harm that may be caused as a result of non-compliance with this obligation.

4. For what purpose and on what legitimate basis do we process the data?

Constella acts as the controller of personal data for the following purposes and in accordance with the following legitimate bases:

● On the basis of the management of the contractual or pre-contractual relationship:

a) To provide you with the demo and/or services you have requested from us and to deal with your requests for information, as well as to facilitate the exercise of your rights.

b) To manage and maintain our business relationship once you request a demo and/or use our services.

● Based on the fulfilment of the Constella’s legal obligations:

a) To enable users to exercise their rights.

b) To comply with the regulations applicable to Constella.

c) To respond to law enforcement requests and as required by applicable law, court order, or governmental regulations.

● On the basis of the explicit, free and unequivocal consent that, where appropriate, you give us at the time of collecting your data:

a) Where appropriate, to keep you informed about our own or third party products and services, always sent through the Constella by electronic means.

● Based on the existence of a legitimate interest on the part of the Constella:

a) To keep you informed about Constella’s products and services, related to those previously contracted and which may be of interest to you.

b) To conduct internal reviews and, where appropriate, contact the customer in the event that fraud or identity theft is detected or there are reasonable suspicions of fraud or identity theft.

However, if you do not wish your data to be processed for these purposes, you may object at any time by contacting us via privacy@constellaintelligence.com as indicated in the Exercise of Rights section of this Privacy Policy.

5. To whom is the data communicated?

All transfers of personal data carried out by us are necessary for the fulfilment of the stated purposes, or are carried out in order to comply with a legal obligation:

a) To the public administrations and the administration of justice, and to the security forces in compliance with the legal obligations that apply to us.

b) Companies providing IT services, tools or IT infrastructure on which the services provided by Constella are based, such as hosting providers, CRMs, emailing service companies, etc.

In this regard, we inform you that any transfer will be carried out taking into account all the necessary legal safeguards. We also guarantee that we sign specific contracts with all our service providers in accordance with the regulations.

Furthermore, Constella has external providers necessary for IT services, tools or IT infrastructure on which the services provided by Constella are based, such as hosting providers, CRMs, emailing service companies, etc, with whom we have signed the corresponding data processing agreements, and who perform data storage, administrative, and other tasks.

Similarly, Constella guarantees that in the case of suppliers located in countries outside the European Union or other countries not considered adequate in accordance with data protection regulations, the necessary precautions are taken to ensure that the data can be transferred securely, either because the supplier offers adequate guarantees, for example, the signing of Standard Contractual Clauses issued by the European Commission; or because any of the exceptions set out in the regulations are applicable.

6. Constella as a data processor

In order to provide our services, Constella acts as a data processor, following the instructions of the relevant customer. These services are related to offer products and services that are designed to protect against or deter fraudulent, illegal or harmful actions and to assist our clients with maintaining the safety, security and integrity of their products and information relating to their customers (which may include you).

To carry out the operations, Constella will access a range of personal data from different sources, which includes, but are not limited to, first and last name, username, email, telephone, data of birth, address, unique personal identifiers, Unique personal identifiers (e.g. social security number, tax ID, driver’s license number, passport number, other national identification number), Professional or employment-related information, e.g. company name, company website, professional identifier numbers, usernames, and passwords, and Credit card number, bank account number, insurance account number. This personal data shall be collected directly or indirectly from different sources, including from our clients.

In most cases, our clients share specific types of personal data about you with us in the first place, and our clients are responsible for obtaining your consent for such sharing. We only process personal data for this purpose according to the specific criteria of the data search or requests as instructed by our clients.

7. Exercising your rights.

7.1. Rights under the European legislation

We inform you that you may exercise the following rights under the GDPR:

1. Right of access to your personal data in order to know what personal data are being processed and the processing operations carried out on them.

2. The right to rectify any inaccurate personal data.

3. The right to erasure of their personal data, where possible.

4. The right to request the restriction of the processing of your personal data where the accuracy, lawfulness or necessity of the data processing is in doubt, in which case we may retain the data for the purpose of pursuing or defending claims.

5. The right to object to automated decision-making, including profiling.

6. The right to object to the processing of your personal data when the legal basis that enables us to process your personal data, in accordance with section 4 above, is legitimate interest.

7. The right to the portability of your data, when the legal basis that enables us to process it of those indicated in section 4 above is the existence of a contractual relationship or your consent.

8. Right to revoke the consent given to Constella.

You may exercise your rights at any time and free of charge in the following ways:

1. By sending an email to privacy@constellaintelligence.com via the email address with which you registered for our services and indicating the right you wish to exercise.

2. By sending a written request to the address Constella´s location, indicating the right you wish to exercise.

3. In addition, when you receive any communication from us, by clicking on the unsubscribe section that will contain that communication, you will be able to unsubscribe from all previously accepted commercial communications.

When you exercise your rights, and only if we have doubts about your identity, we may ask you for additional information to verify your identity.

We also inform you that you have the right to lodge a complaint with the Spanish Data Protection Agency if you consider that we have committed a breach of data protection legislation regarding the processing of your personal data.

We also inform you that you can join the Robinson List at www.listarobinson.es: the advertising exclusion system managed by the Spanish Digital Economy Association (ADIGITAL), in which you can register to object to the use of your data for the purpose of sending you commercial communications.

7.2. Rights under the legislation from the USA

If you are a California resident, you have the rights set forth in this section. Please see the “Exercising Your Rights” section below for instructions regarding how to exercise these rights. Please note that we may process Personal Data of our customers’ end users or employees in connection with our provision of certain Services to our customers. If we are processing your Personal Data as a service provider, you should contact the entity that collected your Personal Data in the first instance to address your rights with respect to such data.

If there are any conflicts between this section and any other provision of this Privacy Policy and you are a California resident, the portion that is more protective of Personal Data shall control to the extent of such conflict. If you have any questions about this section or whether any of the following rights apply to you, please contact us at privacy@constellaintelligence.com.

Exercising Your Rights

Please follow the instructions and requirements described below and, on our websites, when submitting your requests. Requests that fail to comply with any of these instructions and requirements may result in delayed or no response.

As a California resident, you have the following rights under the CCPA:

1. Right of access to your personal data in order to know what personal data are being processed and the processing operations carried out on them: the categories of personal information we hve collected and disclosed, the categories of sources, the business or commercial purpose for collecting, sharing or selling your data, and the categories of third parties with whom we disclosed, sell or shared personal information with.

2. Right of deletion of personal information.

3. Right of requesting correction of inaccurate personal information.

4. Right of opting out of the sale or sharing of personal information.

5. Right of not receiving discriminatory treatment for exercising the privacy rights.

6. Right of limiting the use and disclosure of sensitive information.

To exercise the rights described below as a California resident, you must send us a request (1) that provides sufficient information (including, without limitation, email verification) to allow us to verify that (i) you are the person about whom we have collected Personal Data, (ii) you, as the requester, are the same person as the data subject for whose information you’re requesting (or such person’s parent/guardian), (2) that describes your request in sufficient detail to allow us to understand, evaluate and respond to it, (3) that declares, under the penalty of perjury, that you’re exercising your rights under the CCPA as a California resident solely for lawful purposes, and (4) in a way that does not and would not unduly burden or otherwise abuse our data request system and/or our Services. Each request that meets all of these criteria will be considered a “Valid Request.” We may not respond to requests that do not meet these criteria. We will use commercially reasonable efforts to determine whether a request may be for harmful, fraudulent, deceptive, threatening, harassing, defamatory, obscene, or otherwise objectionable purposes, and we reserve the right not to respond to such request. We will only use Personal Data provided in a Valid Request to verify your identity and complete your request. You do not need an account to submit a Valid Request.

We will work to respond to your Valid Request within 45 days of receipt.

We will not charge you a fee for making a Valid Request unless your Valid Request(s) is excessive, repetitive or manifestly unfounded. If we determine that your Valid Request warrants a fee, we will notify you of the fee and explain that decision before completing your request.

You may submit a Valid Request using the following methods:

· Email us at: privacy@constellaintelligence.com.
· Submit a form at this address: https://constella.ai/website-privacy-policy/

You may also authorize an agent (an “Authorized Agent”) to exercise your rights on your behalf. To do this, you must provide your Authorized Agent with written permission to exercise your rights on your behalf, and we may request a copy of this written permission from your Authorized Agent when they make a request on your behalf.

Access

You have the right to request certain information about our collection and use of your Personal Data over the past 12 months. In response to a Valid Request, we will provide you with the following information:

· The categories of Personal Data that you requested and we have collected about you.

· The categories of sources from which that Personal Data was collected.

· The business or commercial purpose for collecting or selling your Personal Data.

· The categories of third parties with whom we have shared your Personal Data.

· The specific pieces of Personal Data that you explicitly requested and we have collected about you.

If we have disclosed your Personal Data to any third parties for a business purpose over the past 12 months, we will identify the categories of Personal Data shared with each category of third party recipient. If we have sold your Personal Data over the past 12 months, we will identify the categories of Personal Data sold to each category of third-party recipient.

Deletion

You have the right to request that we delete the Personal Data that we have collected about you. Under the CCPA, this right is subject to certain exceptions: for example, we may need to retain your Personal Data to provide you with the Services or complete a transaction or other action you have requested. If your deletion request is subject to one of these exceptions, we may deny your deletion request.

Personal Data Sales Opt-Out and Opt-In

We will not sell your Personal Data, and have not done so over the last 12 months. To our knowledge, we do not sell the Personal Data of minors under 16 years of age.

We Will Not Discriminate Against You for Exercising Your Rights Under the CCPA

We will not discriminate against you for exercising your rights under the CCPA. We will not deny you our goods or services, charge you different prices or rates, or provide you a lower quality of goods and services if you exercise your rights under the CCPA. However, we may offer different tiers of our Services as allowed by applicable data privacy laws (including the CCPA) with varying prices, rates or levels of quality of the goods or services you receive related to the value of Personal Data that we receive from you.

Other State Law Privacy Rights

California Resident Rights

Under California Civil Code Sections 1798.83-1798.84, California residents are entitled to contact us to prevent disclosure of Personal Data to third parties for such third parties’ direct marketing purposes; in order to submit such a request, please contact us at privacy@constellaintelligence.com.

Your browser may offer you a “Do Not Track” option, which allows you to signal to operators of websites and web applications and services that you do not wish such operators to track certain of your online activities over time and across different websites. Our Services do not support Do Not Track requests at this time. To find out more about “Do Not Track,” you can visit www.allaboutdnt.com.

Nevada Resident Rights

If you are a resident of Nevada, you have the right to opt-out of the sale of certain Personal Data to third parties who intend to license or sell that Personal Data. We do not engage in such “sale” of your Personal Data covered by this Online Privacy Policy. If you have any questions regarding your sale opt-out right as a Nevada resident, please contact us at privacy@constellaintelligence.com with the subject line “Nevada Do Not Sell Request” and provide us with your name and the email address associated with your account.

New Jersey Resident Rights

If you are a resident of New Jersey, you have the following rights under the New Jersey Data Privacy Law, P.L. 2023, c. 266 (“NJDPL”):

7. Right of access to your personal data in order to know what personal data are being processed and the processing operations carried out on them: the categories of personal information we hve collected and disclosed, the categories of sources, the business or commercial purpose for collecting, sharing or selling your data, and the categories of third parties with whom we disclosed, sell or shared personal information with.

8. Right of deletion of personal information.

9. Right of requesting correction of inaccurate personal information.

10. Right of opting out of the sale or sharing of personal information.

Please contact us at privacy@constellaintelligence.com with the subject line “New Jersey Rights Request” and provide us with your name and the email address associated with your account.

Other US Resident Rights

Depending on your place of residence, other data protection legislation with a different list of rights may apply. You can request further information by sending an email to privacy@constellaintelligence.com.

8. Period of conservation of your data.

We will only keep your data for as long as is necessary to provide these services to you. Any of the data you provide us with through the channels will be blocked as long as they are no longer necessary to manage the service and will only be available in the event that there is a legal obligation (derived from a request from the State Security Forces and Bodies or the Courts and Tribunals) as well as when you exercise your rights.

9. Security and confidentiality.

In order to prevent unauthorized access to or unauthorized disclosure of personal data, we have put in place appropriate technical and physical measures and business processes to safeguard and secure the information we collect from you.

10. Minors.

Minors under 14 years of age may not use the services available through our website without the prior authorization of their parents, guardians or legal representatives, who shall be solely responsible for all acts carried out through the site by the minors in their care, including the completion of the forms with the personal data of minors and the ticking, where appropriate, of the boxes/fields that accompany them. In this regard, and to the extent that Constella does not have the capacity to control whether users are minors, it shall be the parents and guardians who enable the necessary mechanisms to prevent them from accessing the website and/or providing personal data without their supervision, and Constella shall not accept any liability in this regard.

If you believe that a child under 14 years of age may have provided Personal Data to us, please contact us at privacy@constellaintelligence.com.

11. Update of the privacy policy.

We make our best efforts to keep our privacy policy fully updated. If we make amendments, they will be clearly identifiable in a clear and specific manner, as possible in the relationship we have established with you (e.g., we may communicate changes to you by email).

Terms of Use

Terms of Use

Terms of Use

Last Updated: December 15th, 2020

Welcome to Constella. Please read on to learn the rules and restrictions that govern your use of our website (the “Site”). If you have any questions, comments, or concerns regarding these terms or the Site, please contact us at:

Email: info@constellaintelligence.com

Address: Constella Intelligence, Inc., 289 S. San Antonio Road, Suite 110, Los Altos, CA 94022, Attn: General Counsel

These Terms of Use (the “Terms”) are a binding contract between you and Constella Intelligence, Inc. (“Constella,” “we” or “us”). Your use of the Site in any way means that you agree to all of these Terms, and these Terms will remain in effect while you use the Site or any part of it. These Terms include the provisions in this document as well as those in the Privacy Policy and any other relevant policies. Your use of or participation in certain product and services offered by Constella may also be subject to additional policies, rules and/or conditions (“Additional Terms”), which are incorporated herein by reference, and you understand and agree that by using or participating in any such products or services, you agree to also comply with all Additional Terms.

Please read these Terms carefully. They cover important information about the Site. These Terms include information about future changes to these Terms, limitations of liability, a class action waiver, and resolution of disputes by arbitration instead of in court. PLEASE NOTE THAT YOUR USE OF AND ACCESS TO OUR SITE ARE SUBJECT TO THE FOLLOWING TERMS; IF YOU DO NOT AGREE TO ALL OF THE FOLLOWING, YOU MAY NOT USE OR ACCESS THE SITE IN ANY MANNER.

ARBITRATION NOTICE AND CLASS ACTION WAIVER: EXCEPT FOR CERTAIN TYPES OF DISPUTES DESCRIBED IN THE ARBITRATION AGREEMENT SECTION BELOW, YOU AGREE THAT DISPUTES BETWEEN YOU AND US WILL BE RESOLVED BY BINDING, INDIVIDUAL ARBITRATION AND YOU WAIVE YOUR RIGHT TO PARTICIPATE IN A CLASS ACTION LAWSUIT OR CLASS-WIDE ARBITRATION.

Will these Terms ever change?

We are constantly trying to improve our Site, so these Terms may need to change along with our Site. We reserve the right to change the Terms at any time, but if we do, we will place a notice on our site located at https://constellaintelligence.com, send you an email, and/or notify you by some other means.

If you don’t agree with the new Terms, you are free to reject them; unfortunately, that means you will no longer be able to use the Site. If you use the Site in any way after a change to the Terms is effective, that means you agree to all of the changes.

Except for changes by us as described here, no other amendment or modification of these Terms will be effective unless in writing and signed by both you and us.

What about my privacy?

Constella takes the privacy of its users very seriously. Read the current Constella Privacy Policy.

Children’s Online Privacy Protection Act

The Children’s Online Privacy Protection Act (“COPPA”) requires that online service providers obtain parental consent before they knowingly collect personally identifiable information online from children who are under 13 years of age. We do not knowingly collect or solicit personally identifiable information from children under 13 years of age; if you are a child under 13 years of age, please do not attempt to register for or otherwise use the Site or send us any personal information. If we learn we have collected personal information from a child under 13 years of age, we will delete that information as quickly as possible. If you believe that a child under 13 years of age may have provided us personal information, please contact us at support@constellaintelligence.com.

What are the basics of using the Site?

You represent and warrant that you are an individual of legal age to form a binding contract (or if not, you’ve received your parent’s or guardian’s permission to use the Site and have gotten your parent or guardian to agree to these Terms on your behalf). If you’re agreeing to these Terms on behalf of an organization or entity, you represent and warrant that you are authorized to agree to these Terms on that organization’s or entity’s behalf and bind them to these Terms (in which case, the references to “you” and “your” in these Terms, except for in this sentence, refer to that organization or entity).

You will only use the Site for your own internal, personal, non-commercial use, and not on behalf of or for the benefit of any third party, and only in a manner that complies with all laws that apply to you. If your use of the Site is prohibited by applicable laws, then you aren’t authorized to use the Site. We can’t and won’t be responsible for your using the Site in a way that breaks the law.

What about messaging?

As part of the Site, you may receive communications through the Site, including messages that Constella sends you (for example, via email). 

Are there restrictions in how I can use the Site?

You represent, warrant, and agree that you will not contribute any Content or User Submission (each of those terms is defined below) or otherwise use the Site or interact with the Site in a manner that:

  1. infringes or violates the intellectual property rights or any other rights of anyone else (including Constella);
  2. violates any law or regulation, including, without limitation, any applicable export control laws, privacy laws or any other purpose not reasonably intended by Constella;
  3. is dangerous, harmful, fraudulent, deceptive, threatening, harassing, defamatory, obscene, or otherwise objectionable;
  4. attempts, in any manner, to obtain the password, account, or other security information from any other user;
  5. violates the security of any computer network, or cracks any passwords or security encryption codes;
  6. runs Maillist, Listserv, any form of auto-responder or “spam” on the Site, or any processes that run or are activated while you are not logged into the Site, or that otherwise interfere with the proper working of the Site (including by placing an unreasonable load on the Site’s infrastructure);
  7. “crawls,” “scrapes,” or “spiders” any page, data, or portion of or relating to the Site or Content (through use of manual or automated means);
  8. copies or stores any significant portion of the Content; or
  9. decompiles, reverse engineers, or otherwise attempts to obtain the source code or underlying ideas or information of or relating to the Site.

A violation of any of the foregoing is grounds for termination of your right to use or access the Site.

What are my rights in the Site?

The materials displayed or performed or available on or through the Site, including, but not limited to, text, graphics, data, articles, photos, images, illustrations, and so forth (all of the foregoing, the “Content”) are protected by copyright and/or other intellectual property laws. You promise to abide by all copyright notices, trademark rules, information, and restrictions contained in any Content you access through the Site, and you won’t use, copy, reproduce, modify, translate, publish, broadcast, transmit, distribute, perform, upload, display, license, sell, commercialize or otherwise exploit for any purpose any Content not owned by you, (i) without the prior consent of the owner of that Content or (ii) in a way that violates someone else’s (including Constella’s) rights.

Subject to these Terms, we grant each user of the Site a worldwide, non-exclusive, non-sublicensable, and non-transferable license to use (i.e., to download and display locally) Content solely for purposes of using the Site. Use, reproduction, modification, distribution, or storage of any Content for any purpose other than using the Site is expressly prohibited without prior written permission from us. You understand that Constella owns the Site. You won’t modify, publish, transmit, participate in the transfer or sale of, reproduce (except as expressly provided in this Section), create derivative works based on, or otherwise exploit any of the Site, or any part of it. The Site may allow you to copy or download certain Content, but please remember that even where these functionalities exist, all the restrictions in this section still apply.

What about anything I contribute to the Site – do I have to grant any licenses to Constella or to other users?

User Submissions

Anything you post, upload, share, store, or otherwise provide through the Site is your “User Submission.” Some User Submissions may be viewable by other users. You are solely responsible for all User Submissions you contribute to the Site. You represent that all User Submissions submitted by you are accurate, complete, up-to-date, and in compliance with all applicable laws, rules and regulations.

You agree that you will not post, upload, share, store, or otherwise provide through the Site any User Submissions that: (i) infringe any third party’s copyrights or other rights (e.g., trademark, privacy rights, etc.); (ii) contain sexually explicit content or pornography; (iii) contain hateful, defamatory, or discriminatory content or incite hatred against any individual or group; (iv) exploit minors; (v) depict unlawful acts or violence; (vi) depict animal cruelty or violence towards animals; (vii) promote fraudulent schemes, multi-level marketing (MLM) schemes, get rich quick schemes, online gaming and gambling, cash gifting, work from home businesses, or any other dubious money-making ventures; or (viii) that violate any law.

Licenses

In order to display your User Submissions on the Site, and to allow other users to enjoy them (where applicable), you grant us certain rights in those User Submissions (see below for more information). Please note that all of the following licenses are subject to our Privacy Policy to the extent they relate to User Submissions that are also your personally-identifiable information.

By submitting User Submissions through the Site, you hereby do and shall grant Constella a worldwide, non-exclusive, irrevocable, perpetual, royalty-free, fully paid, sublicensable, and transferable license to translate, use, edit, modify (for technical purposes, for example, making sure your content is viewable on a mobile device as well as a computer), truncate, aggregate, reproduce, distribute, prepare derivative works of, display, perform, and otherwise fully exploit the User Submissions in connection with the Site and our (and our successors’ and assigns’) businesses, including without limitation for promoting and redistributing part or all of the Site (and derivative works thereof) in any media formats and through any media channels (including, without limitation, third party websites and feeds), and including after your termination of your account or the Site. You also hereby do and shall grant each user of the Site a non-exclusive, perpetual license to access your User Submissions through the Site, and to use, edit, modify, reproduce, distribute, prepare derivative works of, display and perform such User Submissions, including after your termination of your account or the Site. For clarity, the foregoing license grants to us and our users do not affect your other ownership or license rights in your User Submissions, including the right to grant additional licenses to your User Submissions, unless otherwise agreed in writing. You represent and warrant that you have all rights to grant such licenses to us without infringement or violation of any third party rights, including without limitation, any privacy rights, publicity rights, copyrights, trademarks, contract rights, or any other intellectual property or proprietary rights.

You may from time to time provide suggestions, comments or other feedback to Constella with respect to the Site or Constella’s products or services (“Feedback”).  Feedback shall not create any confidentiality obligation for Constella notwithstanding anything else.  You hereby grant to Constella a nonexclusive, worldwide, perpetual, irrevocable, transferable, sub-licensable, royalty-free, fully paid-up license to use and exploit the Feedback for any purpose.

Who is responsible for what I see and do on the Site?

Any information or Content publicly posted or privately transmitted through the Site is the sole responsibility of the person from whom such Content originated, and you access all such information and Content at your own risk, and we aren’t liable for any errors or omissions in that information or Content or for any damages or loss you might suffer in connection with it. We cannot control and have no duty to take any action regarding how you may interpret and use the Content or what actions you may take as a result of having been exposed to the Content, and you hereby release us from all liability for you having acquired or not acquired Content through the Site. We can’t guarantee the identity of any users with whom you interact in using the Site and are not responsible for which users gain access to the Site.

You are responsible for all Content you contribute, in any manner, to the Site, and you represent and warrant you have all rights necessary to do so, in the manner in which you contribute it.

The Site may contain links or connections to third-party websites or services that are not owned or controlled by Constella. When you access third-party websites or use third-party services, you accept that there are risks in doing so, and that Constella is not responsible for such risks.

Constella has no control over, and assumes no responsibility for, the content, accuracy, privacy policies, or practices of or opinions expressed in any third-party websites or by any third party that you interact with through the Site. In addition, Constella will not and cannot monitor, verify, censor or edit the content of any third-party site or service. We encourage you to be aware when you leave the Site and to read the terms and conditions and privacy policy of each third-party website or service that you visit or utilize. By using the Site, you release and hold us harmless from any and all liability arising from your use of any third-party website or service.

Your interactions with organizations and/or individuals found on or through the Site, including payment and delivery of goods or services, and any other terms, conditions, warranties or representations associated with such dealings, are solely between you and such organizations and/or individuals. You should make whatever investigation you feel necessary or appropriate before proceeding with any online or offline transaction with any of these third parties. You agree that Constella shall not be responsible or liable for any loss or damage of any sort incurred as the result of any such dealings.

If there is a dispute between participants on the Site, or between users and any third party, you agree that Constella is under no obligation to become involved. In the event that you have a dispute with one or more other users, you release Constella, its directors, officers, employees, agents, and successors from claims, demands, and damages of every kind or nature, known or unknown, suspected or unsuspected, disclosed or undisclosed, arising out of or in any way related to such disputes and/or our Site. You shall and hereby do waive California Civil Code Section 1542 or any similar law of any jurisdiction, which says in substance: “A general release does not extend to claims that the creditor or releasing party does not know or suspect to exist in his or her favor at the time of executing the release and that if known by him or her, would have materially affected his or her settlement with the debtor or released party.”

Will Constella ever change the Site?

We’re always trying to improve our Site, so it may change over time. We may suspend or discontinue any part of the Site, or we may introduce new features or impose limits on certain features or restrict access to parts or all of the Site. We reserve the right to remove any Content from the Site at any time, for any reason (including, but not limited to, if someone alleges you contributed that Content in violation of these Terms), in our sole discretion, and without notice.

Does the Site cost anything?

The Site may be free or we may elect to charge a fee for using portions of the Site. If you are using a free version of the Site, we will notify you before any Site you are then using begins carrying a fee, and if you wish to continue using that portion of the Site, you must pay all applicable fees for that portion of the Site and may be required to agree to additional terms.

What if I want to stop using the Site?

You’re free to do that at any time; please refer to our Privacy Policy, as well as the licenses above, to understand how we treat information you provide to us after you have stopped using our Site.

Constella is also free to terminate (or suspend access to) your use of the Site for any reason in our discretion, including your breach of these Terms. Constella has the sole right to decide whether you are in violation of any of the restrictions set forth in these Terms.

Provisions that, by their nature, should survive termination of these Terms shall survive termination. By way of example, all of the following will survive termination: any obligation you have to indemnify us, any limitations on our liability, any terms regarding ownership or intellectual property rights, and terms regarding disputes between us, including without limitation the arbitration agreement.

What else do I need to know?

Warranty Disclaimer. Constella and its licensors, suppliers, partners, parent, subsidiaries or affiliated entities, and each of their respective officers, directors, members, employees, consultants, contract employees, representatives and agents, and each of their respective successors and assigns (Constella and all such parties together, the “Constella Parties”) make no representations or warranties concerning the Site, including without limitation regarding any Content contained in or accessed through the Site, and the Constella Parties will not be responsible or liable for the accuracy, copyright compliance, legality, or decency of material contained in or accessed through the Site or any claims, actions, suits procedures, costs, expenses, damages or liabilities arising out of use of, or in any way related to your participation in, the Site. The Constella Parties make no representations or warranties regarding suggestions or recommendations of services or products offered or purchased through or in connection with the Site. THE SITE AND CONTENT ARE PROVIDED BY CONSTELLA (AND ITS LICENSORS AND SUPPLIERS) ON AN “AS-IS” BASIS, WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR THAT USE OF THE SITE WILL BE UNINTERRUPTED OR ERROR-FREE. SOME STATES DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, SO THE ABOVE LIMITATIONS MAY NOT APPLY TO YOU.

Limitation of Liability. TO THE FULLEST EXTENT ALLOWED BY APPLICABLE LAW, UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY (INCLUDING, WITHOUT LIMITATION, TORT, CONTRACT, STRICT LIABILITY, OR OTHERWISE) SHALL ANY OF THE CONSTELLA PARTIES BE LIABLE TO YOU OR TO ANY OTHER PERSON FOR (A) ANY INDIRECT, SPECIAL, INCIDENTAL, PUNITIVE OR CONSEQUENTIAL DAMAGES OF ANY KIND, INCLUDING DAMAGES FOR LOST PROFITS, BUSINESS INTERRUPTION, LOSS OF DATA, LOSS OF GOODWILL, WORK STOPPAGE, ACCURACY OF RESULTS, OR COMPUTER FAILURE OR MALFUNCTION, (B) ANY SUBSTITUTE GOODS, SERVICES OR TECHNOLOGY, (C) ANY AMOUNT, IN THE AGGREGATE, IN EXCESS OF ONE-HUNDRED ($100) DOLLARS OR (D) ANY MATTER BEYOND OUR REASONABLE CONTROL. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL OR CERTAIN OTHER DAMAGES, SO THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU.

Indemnity. You agree to indemnify and hold the Constella Parties harmless from and against any and all claims, liabilities, damages (actual and consequential), losses and expenses (including attorneys’ fees) arising from or in any way related to any claims relating to (a) your use of the Site, and (b) your violation of these Terms. In the event of such a claim, suit, or action (“Claim”), we will attempt to provide notice of the Claim to the contact information we have for your account (provided that failure to deliver such notice shall not eliminate or reduce your indemnification obligations hereunder).

Assignment. You may not assign, delegate or transfer these Terms or your rights or obligations hereunder, or any account, in any way (by operation of law or otherwise) without Constella prior written consent. We may transfer, assign, or delegate these Terms and our rights and obligations without consent.

Choice of Law. These Terms are governed by and will be construed under the Federal Arbitration Act, applicable federal law, and the laws of the State of California, without regard to the conflicts of laws provisions thereof.

Arbitration Agreement. Please read the following ARBITRATION AGREEMENT carefully because it requires you to arbitrate certain disputes and claims with Constella and limits the manner in which you can seek relief from Constella. Both you and Constella acknowledge and agree that for the purposes of any dispute arising out of or relating to the subject matter of these Terms, Constella’s officers, directors, employees and independent contractors (“Personnel”) are third-party beneficiaries of these Terms, and that upon your acceptance of these Terms, Personnel will have the right (and will be deemed to have accepted the right) to enforce these Terms against you as the third-party beneficiary hereof.

(a) Arbitration Rules; Applicability of Arbitration Agreement. The parties shall use their best efforts to settle any dispute, claim, question, or disagreement arising out of or relating to the subject matter of these Terms directly through good-faith negotiations, which shall be a precondition to either party initiating arbitration. If such negotiations do not resolve the dispute, it shall be finally settled by binding arbitration in Santa Clara County, California. The arbitration will proceed in the English language, in accordance with the JAMS Streamlined Arbitration Rules and Procedures (the “Rules”) then in effect, by one commercial arbitrator with substantial experience in resolving intellectual property and commercial contract disputes. The arbitrator shall be selected from the appropriate list of JAMS arbitrators in accordance with such Rules. Judgment upon the award rendered by such arbitrator may be entered in any court of competent jurisdiction.

(b) Costs of Arbitration. The Rules will govern payment of all arbitration fees. Constella will pay all arbitration fees for claims less than seventy-five thousand ($75,000) dollars. Constella will not seek its attorneys’ fees and costs in arbitration unless the arbitrator determines that your claim is frivolous.

(c) Small Claims Court; Infringement. Either you or Constella may assert claims, if they qualify, in small claims court in Santa Clara County, California or any United States county where you live or work. Furthermore, notwithstanding the foregoing obligation to arbitrate disputes, each party shall have the right to pursue injunctive or other equitable relief at any time, from any court of competent jurisdiction, to prevent the actual or threatened infringement, misappropriation or violation of a party’s copyrights, trademarks, trade secrets, patents or other intellectual property rights.

(d) Waiver of Jury Trial. YOU AND CONSTELLA WAIVE ANY CONSTITUTIONAL AND STATUTORY RIGHTS TO GO TO COURT AND HAVE A TRIAL IN FRONT OF A JUDGE OR JURY. You and Constella are instead choosing to have claims and disputes resolved by arbitration. Arbitration procedures are typically more limited, more efficient, and less costly than rules applicable in court and are subject to very limited review by a court. In any litigation between you and Constella over whether to vacate or enforce an arbitration award, YOU AND CONSTELLA WAIVE ALL RIGHTS TO A JURY TRIAL, and elect instead to have the dispute be resolved by a judge.

(e) Waiver of Class or Consolidated Actions. ALL CLAIMS AND DISPUTES WITHIN THE SCOPE OF THIS ARBITRATION AGREEMENT MUST BE ARBITRATED OR LITIGATED ON AN INDIVIDUAL BASIS AND NOT ON A CLASS BASIS. CLAIMS OF MORE THAN ONE CUSTOMER OR USER CANNOT BE ARBITRATED OR LITIGATED JOINTLY OR CONSOLIDATED WITH THOSE OF ANY OTHER CUSTOMER OR USER. If however, this waiver of class or consolidated actions is deemed invalid or unenforceable, neither you nor Constella is entitled to arbitration; instead, all claims and disputes will be resolved in a court as set forth in (g) below.

(f) Opt-out. You have the right to opt-out of the provisions of this Section by sending written notice of your decision to opt-out to the following address: Constella Intelligence, Inc., 289 S. San Antonio Road, Suite 110, Los Altos, CA 94022, Attn: General Counsel, postmarked within thirty (30) days of first accepting these Terms. You must include (i) your name and residence address, (ii) the email address and/or telephone number associated with your account, and (iii) a clear statement that you want to opt out of these Terms’ arbitration agreement.

(g) Exclusive Venue. If you send the opt-out notice in (f), and/or in any circumstances where the foregoing arbitration agreement permits either you or Constella to litigate any dispute arising out of or relating to the subject matter of these Terms in court, then the foregoing arbitration agreement will not apply to either party, and both you and Constella agree that any judicial proceeding (other than small claims actions) will be brought in the state or federal courts located in, respectively, Santa Clara County, California, or the federal district in which that county falls.

(h) Severability. If the prohibition against class actions and other claims brought on behalf of third parties contained above is found to be unenforceable, then all of the preceding language in this Arbitration Agreement section will be null and void. This arbitration agreement will survive the termination of your relationship with Constella.

Miscellaneous. You will be responsible for paying, withholding, filing, and reporting all taxes, duties, and other governmental assessments associated with your activity in connection with the Site, provided that the Constella may, in its sole discretion, do any of the foregoing on your behalf or for itself as it sees fit. The failure of either you or us to exercise, in any way, any right herein shall not be deemed a waiver of any further rights hereunder. If any provision of these Terms are found to be unenforceable or invalid, that provision will be limited or eliminated, to the minimum extent necessary, so that these Terms shall otherwise remain in full force and effect and enforceable. You and Constella agree that these Terms are the complete and exclusive statement of the mutual understanding between you and Constella and that these Terms supersede and cancel all previous written and oral agreements, communications, and other understandings relating to the subject matter of these Terms. You hereby acknowledge and agree that you are not an employee, agent, partner, or joint venture of Constella, and you do not have any authority of any kind to bind Constella in any respect whatsoever.

Except as expressly set forth in the section above regarding the arbitration agreement, you and Constella agree there are no third-party beneficiaries intended under these Terms.

Six Steps Protect Corporations From Digital Risk

6 Steps for Digital Risk Protection to Safeguard Your Data

Improve your cybersecurity hygiene and reduce exposure.

Digital risk means compromised credentials or other sensitive data falls into the wrong hands, and it can have serious financial consequences as well as negatively impact your brand reputation.

Protect your employees and organization from digital risk such as credential theft and data leakage that could lead to account takeover, ransomware, and other cyber threats by employing these 6 Steps for digital risk protection:

Prevent identity thieves from impersonating key staff and executives.

Mandate the use of virtual private networks (VPNs), password management applications that automatically change passwords, and multifactor authentication (MFA). Secure, encrypted, remote access to the company’s network reduces the potential for unauthorized access.

Protect corporate brands from online disinformation campaigns.

Continuously monitoring the internet and the Dark Web for organized activity that impersonates or misrepresents your brand. Advance warning alerts protect your corporate reputation from digital risk before it’s too late.

Protect personally identifiable information (PII) for Key Employees and their families.

Proactive employee monitoring uncovers employee compromised credentials for sale on the Dark Web – before phone numbers, locations, and other information can be used to build impersonation profiles.

Minimize ransomware and ATO attacks by securing sensitive employee data and accounts.

Wherever that data might reside. Corporate computers, tablets, and smartphones need standardized security directed by a centralized internal authority. Strongly consider extending protection to personal devices for executives and essential staff.

Strictly segregate corporate and personal devices and accounts.

Avoid using personal laptops or devices for work purposes to ensure that poor digital risk protection & data hygiene outside the office does not put your business at risk.

Mandate cybersecurity awareness training of all employees.

Ongoing training and regular reviews will combat compliance fatigue. Consider ongoing incentives to ensure continued good practices and rapid recognition and reporting for suspicious emails, texts, files, or activity.

Finally, treat this process as a continuous cycle for digital risk protection and reduction rather than a final checklist. Go back to the beginning regularly, starting with a Cyber Exposure Risk Assessment to see if you or your company is at risk.

These steps’ powerful benefits include:

  • Corporate and personal protection for brand equity, finances, credit ratings, and reputation
  • Fewer spam and phishing emails
  • Lower risk of account compromise or credential theft
  • Better control over personal and corporate data usage across the internet

Find out if you have been exposed – FREE.


CHECK YOUR EXPOSURE RISK