Google's Schmidt calls Carrier IQ software a keylogger
It actually records keystrokes, he says at a conference in the Netherlands
Computerworld - Google Executive Chairman Eric Schmidt today distanced his company from Carrier IQ's software, even as he described the technology as a keylogger. Schmidt's comments came at an Internet freedom conference in the Netherlands.
A Reutersstory from The Hague quotes Schmidt as saying that Carrier IQ's software is a keylogger that "actually does keep your keystrokes."
"We certainly don't work with them and we certainly don't support it," Schmidt said.
It was not immediately clear whether Schmidt's description of Carrier IQ as a keylogger was based on independent knowledge of the software or on recent claims by security researcher Trevor Eckhart.
Eckhart in November released a report in which he described Carrier IQ's software as a keylogger that could be used by wireless carriers to do extensive and surreptitious tracking of mobile users.
Eckhart's report raised a firestorm of controversy and resulted in several lawsuits against wireless carriers and handset makers, including AT&T, Sprint, T-Mobile, HTC, Samsung and Apple. It has also prompted calls from lawmakers for an investigation of Carrier IQ's software by the U.S. Federal Trade Commission.
Carrier IQ and the carriers themselves have insisted that the software is used only for network diagnostics and quality of service purposes. Carrier IQ has emphatically denied that its software is a keylogger.
A handful of security researchers who analyzed Carrier IQ's software agreed with the company and said it does not appear to be as nefarious as initially feared.
Schmidt's comments, therefore, are likely to again spark debate over just how intrusive Carrier IQ's software really is. Handsets based on Google's Android operating system were among those identified by Eckhart as carrying carrier IQ software.
Schmidt today made it clear that Google itself has nothing to do with the controversial software. "Android is an open platform, so it's possible for people to build software that's actually not very good for you, and this appears to be one," Reuters reported.
Carrier IQ did not immediately respond to a request for comment on Schmidt's comments.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns
- Goodbye 2011 ... What a year!
- Sprint disables Carrier IQ software on its handsets
- Iran tricked U.S. spy drone into landing in country, report says
- FBI never sought Carrier IQ data, director says
- Carrier IQ moves to allay fears of its tracking software
- FBI rejects FOIA request for Carrier IQ info
- Google's Schmidt calls Carrier IQ software a keylogger
- Carrier IQ downplays 2010 patent request
- 8 companies hit with lawsuit over Carrier IQ software
Read more about Privacy in Computerworld's Privacy Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts