Do-Not-Call site has AT&T web bug

Trust us - we're a phone company


The FTC's popular Do Not Call page has been a runaway hit with US consumers, with over five million signing up to avoid spam calls from telemarketers. But the web site hides a little secret: a web bug.

Most users won't be aware that the registry hosts a one pixel by one pixel image: a popular tracking ploy. And where does trail lead but back to AT&T, one of the most persistent telemarketers.

The FTC confirmed that AT&T Managed Services is its contractor, and hosts the website. When we asked if the FTC would consider removing the bug, they promised to call us back.

"How could this not be a conflict of interest?" asks James 'Kibo' Parry, who drew our attention to the tracking device. "It seems highly questionable for the 'Do Not Call' Web site to be providing visitor statistics to (or at least collecting visitor statistics via) a phone company.

"Undoubtedly the Federal government has bought Web hosting from AT&T from many years, and they're probably a very good hosting company for large-scale projects like this.

"But in this case, it seems like a major conflict of interest to place this "do not call" list in the care of a company that is in the business of selling their services through telemarketing (most of the telemarketing calls I get are from phone companies), and of course AT&T sells phone service to other companies who use the phone to call people.

"The important thing to understand is that it would be in AT&T's interest to know as much as possible about the popularity of the 'do not call' list and the demographic makeup of its members in advance of the list's publication and distribution to AT&T's competitors. For AT&T to know 'this list is going to be extraordinarily popular' in advance of the FTC releasing that news, or for AT&T to know "households in New York are more likely to be on this list than households in California" before their competitors do, that's worth money,"
says Parry.

AT&T, he notes, is notorious for aggressive marketing and "they seem to be going out of their way to share certain data (via the Web bug) with a second division of that same company for unknown reasons. There isn't any evidence proving they _are_ up to anything improper, but this relationship between the FTC and AT&T fails to avoid the potential for impropriety."

There is a clear conflict of interest here between the FTC wanting to regulate the activity of corporations such as AT&T, and AT&T being put in charge of collecting and maintaining this list, he says.

Here's the offending code:-

< IMG BORDER="0" NAME="DCSIMG" WIDTH="1px" HEIGHT="1px" src="https://g6589dcs.nyc2.aens.net/DCS000003_6D4Q/njs.gif?dcsuri=/nojavascript">

"I think you're barking up the wrong tree, Mr Orlowski," an FTC spokesperson told us when asked about the relationship.

Another spokesperson pointed us to the contract and said that AT&T Government Solutions was not permitted to share information with AT&T, the phone company. The site is managed by AT&T Managed Services.

AT&T Government Solutions won the $3.5 million contract to build the registry in February. The FTC says the process fulfilled tendering requirements but would not disclose who else had bid. ®


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021