Feeds

Phorm protestors picket BT AGM

Walking the streets to protest against data pimping

3 Big data security analytics techniques

Attendees at BT's Annual General Meeting today will have to run the gauntlet of an anti-Phorm protest outside the event at the Barbican, London.

Protestors will hear from Baroness Miller, who is tomorrow meeting the Home Office to outline her objections to BT's trial of the snooping technology without informing users.

BT conducted two trials with Phorm which gave the former spyware company access to thousands of BT customers' browsing history without telling them. Phorm aims to use anonymised browsing information to sell more targeted advertising. BT insists the secret trial was legal, even though it appears to breach UK wiretap laws.

The secret trial came to light when Reg reader Stephen noticed his browser making unauthorised connections with a server he didn't recognise. He contacted BT and was told the server had nothing to do with them and he had probably picked up some malware. BT denied having done any deal with Phorm, although Phorm admitted the server was theirs and was being used to collect browsing information.

Despite legal concerns, the Information Commissioner's Office, the Home Office and several police forces have all passed the buck when asked if they would investigate the trials. Several other ISPs other than BT have shown an interest in the technology and potential new revenue stream.

But campaigner Alex Hanff, who helped organise the protest, has a meeting later today with City of London police. Hanff will hand over a dossier of evidence to police so they can consider whether charges should be brought.

Alex Hanff told the Register: "It's not quite as busy as we hoped. But we've had a very positive reaction from shareholders and have been handing out flyers. We've got at least one person inside the meeting who might get to ask a question."

An e-petition on the 10 Downing Street website has already gained more than 15,000 signatures.

All our coverage is here. ®

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.