CAUGHT? Comcast Appears to Be Filing Anti-Net Neutrality Petitions In Their Customers’ Names to the FCC
Comcast is allegedly using their customers’ personal info and then using a program and filing anti-Net Neutrality petitions on behalf of their customers to the FCC.
A post on 4Chan’s /pol/ explained in brief what is happening currently with individuals, the post reads:
“COMBATS BEGINS DOXXING CUSTOMERS
THIS IS NOT A DRILL
500,000 COMBATS NAMES AND ADDRESSES FED TO BOTNET POSTING ANTI-NET NEUTRALITY COMMENTS TO FEDERAL WEBSITE
THEY’RE USING THEIR OWN CUSTOMER’S INFORMATION TO KILL NET NEUTRALITY
IS YOUR NAME ON THE LIST?”
Comcast is using customers’ personal info, feeding it into a program, and filing anti-Net Neutrality petitions on behalf of you to the FCC. pic.twitter.com/WYk9j119DK
— /pol/ News Forever (@polNewsForever) May 24, 2017
A Twitter user named Benn Jordan (@bennjordan) tweeted out:
“Loving this new @XFINITY feature where @comcast files anti-net neutrality comments to the FCC using your name and last service address.”
— Benn Jordan (@bennjordan) May 23, 2017
The following is an excerpt from the aforementioned website describing what exactly is happening:
The FCC recently set up a “Notice of Proposed Rulemaking” (NPRM) to solicit public comments on their plan to end net neutrality rules. To file a comment in the NPRM, people have to submit their name and address to a public docket. But, since the comment period began, almost half a million identical and perfectly formatted comments have been submitted to the docket, sometimes even in alphabetical order, in what looks like an automated “cut and copy” fashion, using the names and addresses of people from hijacked lists. People’s names and addresses are being publicly listed alongside a political message, without their permission. The comment text is associated with a non-public petition by a relatively unknown group. Journalists and Internet users are helping to identify dozens of people who did not knowingly sign the petition.
For more on this topic, visit the website.