Feeds

Phorm protestors picket BT AGM

Walking the streets to protest against data pimping

Boost IT visibility and business value

Attendees at BT's Annual General Meeting today will have to run the gauntlet of an anti-Phorm protest outside the event at the Barbican, London.

Protestors will hear from Baroness Miller, who is tomorrow meeting the Home Office to outline her objections to BT's trial of the snooping technology without informing users.

BT conducted two trials with Phorm which gave the former spyware company access to thousands of BT customers' browsing history without telling them. Phorm aims to use anonymised browsing information to sell more targeted advertising. BT insists the secret trial was legal, even though it appears to breach UK wiretap laws.

The secret trial came to light when Reg reader Stephen noticed his browser making unauthorised connections with a server he didn't recognise. He contacted BT and was told the server had nothing to do with them and he had probably picked up some malware. BT denied having done any deal with Phorm, although Phorm admitted the server was theirs and was being used to collect browsing information.

Despite legal concerns, the Information Commissioner's Office, the Home Office and several police forces have all passed the buck when asked if they would investigate the trials. Several other ISPs other than BT have shown an interest in the technology and potential new revenue stream.

But campaigner Alex Hanff, who helped organise the protest, has a meeting later today with City of London police. Hanff will hand over a dossier of evidence to police so they can consider whether charges should be brought.

Alex Hanff told the Register: "It's not quite as busy as we hoped. But we've had a very positive reaction from shareholders and have been handing out flyers. We've got at least one person inside the meeting who might get to ask a question."

An e-petition on the 10 Downing Street website has already gained more than 15,000 signatures.

All our coverage is here. ®

Seven Steps to Software Security

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.