Consumer Watchdog wants probe of Carrier IQ, carriers
The software maker has turned mobile phones into spy phones, the consumer group says
IDG News Service - Consumer Watchdog has called for a U.S. government investigation of Carrier IQ, the maker of tracking software for mobile phones, and its users.
The consumer group on Friday sent letters to U.S. Attorney General Eric Holder and U.S. Federal Communications Commission Chairman Julius Genachowski asking their agencies to investigate the software developer, mobile operating system makers Google and Apple, and mobile carriers.
"The device many of us carry in our pockets has, simply put, been turned into a virtual spy phone," John Simpson, Consumer Watchdog's Privacy Project director, said in an email.
Carrier IQ's software may be secretly installed on 140 million mobile phones, Simpson wrote in his letter to the FCC. The software has the ability to track phone numbers dialed, keystrokes, user location and the URLs of websites the user visits, Simpson wrote.
The use of Carrier IQ's software by mobile carriers "could be one of history's largest examples of federal wiretapping law violations," Simpson wrote.
Carrier IQ has denied collecting detailed information about individual phone users. The software measures mobile-phone network performance in an effort to help carriers deliver better service, and the company "vigorously" disagrees that it has violated wiretap laws, the company said.
"While a few individuals have identified that there is a great deal of information available to the Carrier IQ software inside the handset, our software does not record, store or transmit the contents of SMS messages, email, photographs, audio or video," the company said in a statement. "For example, we understand whether an SMS was sent accurately, but do not record or transmit the content of the SMS. We know which applications are draining your battery, but do not capture the screen."
Carrier IQ follows privacy laws and honors the privacy policies of its carrier customers, the company said.
Representatives of Apple and Google didn't immediately respond to a request for comments on Consumer Watchdog's call for an investigation.
In November, security researcher Trevor Eckhart issued a report on Carrier IQ's software, calling it a rootkit that could be used to log detailed information about a mobile-phone user's activities. Carrier IQ threatened to sue Eckhart, but later backed off.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is email@example.com.
- Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns
- Goodbye 2011 ... What a year!
- Sprint disables Carrier IQ software on its handsets
- Iran tricked U.S. spy drone into landing in country, report says
- FBI never sought Carrier IQ data, director says
- Carrier IQ moves to allay fears of its tracking software
- FBI rejects FOIA request for Carrier IQ info
- Google's Schmidt calls Carrier IQ software a keylogger
- Carrier IQ downplays 2010 patent request
- 8 companies hit with lawsuit over Carrier IQ software
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts