Carrier IQ moves to allay fears of its tracking software
Releases 19-page document that explains how the software works, and what it tracks
Computerworld - Carrier IQ last night released a document describing its technology in what appears to be a belated attempt to quell continuing concerns over its controversial tracking software.
The 19-page Carrier IQ document offers the most detailed explanation yet of how the tracking software works and how wireless carriers are using it.
The move is the latest by Carrier IQ to rebut a report published late last month by security researcher Trevor Eckhart contending that wireless carriers could use the Carrier IQ software to conduct surreptitious and highly intrusive tracking of Android, BlackBerry and other smartphone users.
The Carrier IQ document lists specific information that wireless carriers can gather from mobile handsets using the Carrier IQ software. It also provides details on how the software is deployed on mobile devices.
In the document, dubbed Understanding Carrier IQ Technology, the company said it "wants to let consumers know exactly what it is that our software does, the security measures we have in place, and our commitment through our software design and processes to protecting consumers' privacy while improving consumers' experience."
Experts say that it remains an open question as to whether that assurance is enough to quell the concern.
Carrier IQ controversy began with Eckhart's disclosure that the software could be used to gather and track all sorts of personal data from Android-powered handsets and virtually any other mobile device.
In a video posted on YouTube, Eckhart displayed what he said was evidence of Carrier IQ's software capturing his every keystroke and even recording the content of his SMS messages and his search queries.
Eckhart's disclosure ignited an immediate firestorm of concern and criticism from consumers, U.S. lawmakers and European Union regulators.
Carrier IQ and several wireless carriers and handset makers have admitted that the software is installed in handsets sold to sonsumers, but insist that it is benign and designed primarily to collect data for optimizing network and device performance.
Carrier IQ has said its software is typically either preloaded on handsets supplied by wireless carriers or is more deeply embedded into the device by the device makers.
Both the preloaded version and the embedded version are designed to allow wireless carriers to capture certain metrics, such as dropped calls, service interruptions or battery use, the document said.
The embedded version of the technology can be used to gather a lot more detailed information from the device than the preloaded version, and requires a Carrier IQ API to interface with the mobile device, according to the company.
Carrier IQ lists more than 225 separate pieces of information that wireless carriers can gather from mobile devices using the software -- all of it strictly related to network and device performance, the document says.
- Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns
- Goodbye 2011 ... What a year!
- Sprint disables Carrier IQ software on its handsets
- Iran tricked U.S. spy drone into landing in country, report says
- FBI never sought Carrier IQ data, director says
- Carrier IQ moves to allay fears of its tracking software
- FBI rejects FOIA request for Carrier IQ info
- Google's Schmidt calls Carrier IQ software a keylogger
- Carrier IQ downplays 2010 patent request
- 8 companies hit with lawsuit over Carrier IQ software
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts