8 companies hit with lawsuit over Carrier IQ software
It's the third lawsuit to be filed since privacy controversy started last week
Computerworld - Apple is one of eight companies that have been named in another class-action lawsuit filed over the use of Carrier IQ software in mobile handsets.
The lawsuit was filed last Friday in U.S. District Court for the District of Delaware and accuses Carrier IQ, three wireless carriers, and four handset makers of violating the Federal Wiretap Act, the Stored Electronic Communications Act, and the Federal Computer Fraud and Abuse Act.
The complaint (download pdf) was filed on behalf of four individuals, who are described in court papers as owners of mobile handsets with Carrier IQ software on them. Those named in the lawsuit besides Apple and Carrier IQ, are AT&T, Sprint, T-Mobile, HTC, Samsung and Motorola. All of these companies have admitted that their handsets include Carrier IQ software.
The carriers have insisted that the software is being used only for network diagnostics purposes while the handset makers have claimed that they integrated Carrier IQ in their devices only because the carriers specifically asked them to.
This is at least the third publicly known lawsuit seeking class-action status that has been filed over the Carrier IQ issue since a major controversy over its software erupted late last month.
Carrier IQ, based in Mountain View, Calif., sells software designed to help wireless service providers and device makers identify and diagnose service and quality-related problems, such as dropped calls and battery drain. The software can be used to collect data for analyzing service quality, device quality and what Carrier IQ calls mobile customer experience.
The company has been in the middle of a raging controversy after a security researcher last month said the software could be used to conduct surreptitious and highly intrusive tracking of Android, BlackBerry and other smartphone users. The researcher, Trevor Eckhart, described the software as a keystroke logging rootkit that is hard-to-detect, hard-to-remove and programmed to run by default on millions of handsets without the users' knowledge.
Carrier IQ and the wireless carriers have disputed that description, and even some security analysts have said it is inaccurate to describe the company's software as a keylogger and a rootkit.
Even so, the concerns raised by Eckhart's disclosure don't show any signs of abating. Questions about its use by carriers have been raised by U.S. lawmakers by regulators in Europe. On Friday, Rep. Edward Markey, (D-Mass.), expressed concerns over the software and asked the FTC to investigate the company.
Apple, which plans to issue an update to remove Carrier IQ software from all its iPhone handsets, on Monday declined to comment on the lawsuit citing the ongoing litigation. Carrier IQ said it has not seen or been served on any lawsuit, and therefore could not comment on the allegations.
An AT&T spokesman said the company did not have a comment on the lawsuit. Sprint, HTC, Samsung and T-Mobile did not immediately respond to a request for comment.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns
- Goodbye 2011 ... What a year!
- Sprint disables Carrier IQ software on its handsets
- Iran tricked U.S. spy drone into landing in country, report says
- FBI never sought Carrier IQ data, director says
- Carrier IQ moves to allay fears of its tracking software
- FBI rejects FOIA request for Carrier IQ info
- Google's Schmidt calls Carrier IQ software a keylogger
- Carrier IQ downplays 2010 patent request
- 8 companies hit with lawsuit over Carrier IQ software
Read more about Privacy in Computerworld's Privacy Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts