Carrier IQ's own marketing claims undercut its defense
Company's marketing info suggests tools can do more than diagnose operational issues
Computerworld - An increasingly besieged Carrier IQ (CIQ) yesterday insisted that its software is designed only to help wireless carriers diagnose operational problems on networks and mobile devices. But its own marketing material for one of the products raises doubts about that claim.
The IQ Insight Experience Manager is one in a suite of five similar products sold by CIQ. An online datasheet describes it as customer experience profiling software that gives carriers detailed views of how consumers interact with their phones at "any level of granularity from the entire population, to comparative groups, down to individual users, all at the touch of a button."
The datasheet explains how the software can give carriers a "precise view" of customer interaction -- even when the phone is not communicating with the network.
Users of Carrier IQ's Insight Experience Manager can capture a "vast array" of data including screen transitions, button presses and service interactions, according to the material. Carriers can "task" phones dynamically over the air to optimize data selection. That data can be updated in real-time and aggregated in the company's Mobile Service Intelligence Platform.
In the datasheet, CIQ describes Insight Experience Manager as revenue-boosting technology that carriers can use to "view application and device feature usage, such as camera, music, messaging, browser and TV." It also describes how the product can help carriers identify how users respond to mobile advertising.
That description appears to be at odds with the company's depictions of its products after security researcher Trevor Eckhart published a report disclosing how Carrier IQ's software could be used by carriers and device makers to conduct surreptitious and highly intrusive tracking of Android and other smartphone users.
Eckhart described the software as a hard-to-detect -- and equally hard-to-remove -- rootkit that could be used by carriers and phone makers to collect almost any kind of data from a mobile phone without the user's knowledge. Eckhart said his research showed that Carrier IQ's software was often enabled to run by default on several mobile devices, including those from Samsung, HTC, RIM and others.
After his report was published, AT&T, Sprint and T-Mobile confirmed their use of the software but insisted it was only to improve wireless network and device performance.
On Thursday, Carrier IQ released an updated version of a statement it had made earlier. That statement described CIQ software as something that can be used to "measure and summarize" device performance to help carriers deliver better service.
- Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns
- Goodbye 2011 ... What a year!
- Sprint disables Carrier IQ software on its handsets
- Iran tricked U.S. spy drone into landing in country, report says
- FBI never sought Carrier IQ data, director says
- Carrier IQ moves to allay fears of its tracking software
- FBI rejects FOIA request for Carrier IQ info
- Google's Schmidt calls Carrier IQ software a keylogger
- Carrier IQ downplays 2010 patent request
- 8 companies hit with lawsuit over Carrier IQ software
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts