Would not be surprised if these types of abuse serve to obfuscate other abusive uses as well and are thus part of the system operating as it should. Flood the internal logging with all kinds of this "low-level" stuff, hiding the high-level warrantless tracking.