Officials say Google, Apple sending mixed signals on tracking
IDG News Service - Representatives of Apple and Google denied that they are collecting the personal information of owners of smartphones running their operating systems, but a U.S. senator questioned whether those denials were accurate during a hearing Tuesday.
Apple appears to have made conflicting statements about the location information its smartphones and tablets collect, Senator Al Franken, a Minnesota Democrat, said during a hearing of the Senate Judiciary Committee's privacy and technology subcommittee.
Apple CEO Steve Jobs, in a response to a recent controversy about smartphone tracking, said the company's collection of Wi-Fi hotspots and cell tower locations "are not telling you anything about your location," Franken noted. Yet, Apple has also said the collected information will "help your iPhone rapidly and accurately calculate its location," he said.
"It doesn't appear that both of these statements could be true at the same time," Franken added.
The anonymous data Apple collects doesn't contain any information about individual customers, said Guy "Bud" Tribble, Apple's vice president of software technology. However, when that information is downloaded to an iPhone, the smartphone can pinpoint its own location, he said.
The Apple database is "only about the cell phone towers and Wi-Fi hotspots," Tribble said.
Both Apple and Google are releasing "confusing" information about what location data they collect, Franken said. "They both said, 'Yes, we're getting location, but it's not your location,'" he said. "Whose location is it?"
In many cases, the location information smartphones collect, outside of GPS, can be accurate to within 100 feet of the device, said Ashkan Soltani, an independent privacy and security researcher. Using Wi-Fi and cell-phone location databases, Soltani's smartphone was able to pinpoint his location within 20 feet in a Senate office building, he said.
"Depending on how you want to slice it, I would consider that my location," Soltani said. "It's really difficult to call this stuff anonymous. Making these claims is not really sincere."
Franken also questioned whether Apple could be the subject of a U.S. Federal Trade Commission enforcement action for continuing to collect location information after telling customers it would not collect location information if they turned off the option in their phone settings.
The continued collection of location information was a "bug" that Apple has fixed in the iOS, Tribble said.
Senators suggested new laws may be needed to govern the collection of data over mobile phones, even though Google and Apple both have privacy requirements for application providers. Currently, the sharing of location information from mobile operators and apps providers to third parties is a "wild West" with few restrictions in place, said Senator Richard Blumenthal, a Connecticut Democrat.
- Leverage the Power of APIs to Turbocharge Your Mobile Strategy: 7 Steps to a Successful API Program In this guide, Intel® Services-which offers industry-leading API management solutions for over 150 top enterprises, including Best Buy, Netflix, Expedia, ESPN, and The...
- Mission Critical Cloud Powers Freesat Website, Mobile App When subscription-free satellite TV service Freesat needed a scalable, cost-effective infrastructure it found the disaster recovery and security features it needed with Peer...
- Bring Your Own Device: From Security to Success Download this e-Book to learn best practices for executing a BYOD policy.
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- API Management: The Key to Improving the Consumer Travel Experience Join PhoCusWright's Senior Technology Analyst, Norm Rose, as he shares his insights on how travel suppliers and intermediaries can improve industry data flow...
- Don't Believe the Hype: Not All Containers are Created Equal Hear executives discuss the 3 C's of Secure Mobility-content, credentials, and configurations-and learn the inherent security risks to your organization of using MDM... All Mobile/Wireless White Papers | Webcasts