IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Presidential campaign apps serve as data collection tools

Campaign apps give access to users’ contacts, approximate location, Bluetooth and more

The official app for the Trump campaign is doubling-up as a powerful data collection tool, accessing users'  users’ contacts, location and Bluetooth connection. 

Data collection and targeted online messaging are integral to election cycles. While the 2016 election saw the use of social media platforms to reach voters, the 2020 election cycle has turned to campaign apps promoted by the candidates.

These apps, distributed via the Apple App Store and the Google Play Store, enable the Trump and Biden campaigns to directly to voters and collect huge amounts of user data without relying on social media platforms or exposing themselves to fact-checking.  

The Trump campaign launched its official app in April. Since debuting, users have downloaded the app 780,000 times, according to the measurement service Apptopia. While the app features carefully curated feeds meant to reinforce the Trump campaign’s main talking points, it also serves as a powerful data-collection tool. 

When signing up for the app, users must provide their full name, phone number, email address and zip code, and they are also encouraged to share the campaign app with their existing contacts. The campaign aims to reach likely Trump voters and collect each of these voters’ mobile numbers.

The strategy also includes requesting access to location data, phone identity and control over the device’s Bluetooth functions. 

The Biden campaign launched its own app, though it asks for less information than the Trump campaign’s app. Beyond basic network and notification permissions, the Team Joe Campaign App requests access to users’ contacts. 

According to MIT Technology Review, the Trump campaign app’s use of Bluetooth is especially notable as Bluetooth beacons were recently found in campaign yard signs. As an individual passes a campaign sign with a beacon embedded in it, they’re recorded and identified using Bluetooth.

The campaign uses this data to build a profile, and then uses that profile to target advertising at specific individuals or people like them.

For politicians, individualized campaign apps blur the line between government and private communication. They also allow campaigns and government officials to largely avoid fact-checking. When using such apps, the line between government and campaign isn’t always clear.

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

Qualcomm and Mediatek flaws left millions of Android users at risk
Security

Qualcomm and Mediatek flaws left millions of Android users at risk

22 Apr 2022
Best smartphone 2022: The top handsets from Apple, Samsung, Google and more
Mobile

Best smartphone 2022: The top handsets from Apple, Samsung, Google and more

8 Apr 2022
Google will cull out-of-date Play store apps in bid to improve Android security
Google Android

Google will cull out-of-date Play store apps in bid to improve Android security

7 Apr 2022
Businesses on alert as mobile malware surges 500%
mobile security

Businesses on alert as mobile malware surges 500%

10 Mar 2022

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Europe's first autonomous petrol station opens in Lisbon
automation

Europe's first autonomous petrol station opens in Lisbon

23 May 2022
Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

26 May 2022