Carrier IQ moves to allay fears of its tracking software
Releases 19-page document that explains how the software works, and what it tracks
Computerworld - Carrier IQ last night released a document describing its technology in what appears to be a belated attempt to quell continuing concerns over its controversial tracking software.
The 19-page Carrier IQ document offers the most detailed explanation yet of how the tracking software works and how wireless carriers are using it.
The move is the latest by Carrier IQ to rebut a report published late last month by security researcher Trevor Eckhart contending that wireless carriers could use the Carrier IQ software to conduct surreptitious and highly intrusive tracking of Android, BlackBerry and other smartphone users.
The Carrier IQ document lists specific information that wireless carriers can gather from mobile handsets using the Carrier IQ software. It also provides details on how the software is deployed on mobile devices.
In the document, dubbed Understanding Carrier IQ Technology, the company said it "wants to let consumers know exactly what it is that our software does, the security measures we have in place, and our commitment through our software design and processes to protecting consumers' privacy while improving consumers' experience."
Experts say that it remains an open question as to whether that assurance is enough to quell the concern.
Carrier IQ controversy began with Eckhart's disclosure that the software could be used to gather and track all sorts of personal data from Android-powered handsets and virtually any other mobile device.
In a video posted on YouTube, Eckhart displayed what he said was evidence of Carrier IQ's software capturing his every keystroke and even recording the content of his SMS messages and his search queries.
Eckhart's disclosure ignited an immediate firestorm of concern and criticism from consumers, U.S. lawmakers and European Union regulators.
Carrier IQ and several wireless carriers and handset makers have admitted that the software is installed in handsets sold to sonsumers, but insist that it is benign and designed primarily to collect data for optimizing network and device performance.
Carrier IQ has said its software is typically either preloaded on handsets supplied by wireless carriers or is more deeply embedded into the device by the device makers.
Both the preloaded version and the embedded version are designed to allow wireless carriers to capture certain metrics, such as dropped calls, service interruptions or battery use, the document said.
The embedded version of the technology can be used to gather a lot more detailed information from the device than the preloaded version, and requires a Carrier IQ API to interface with the mobile device, according to the company.
Carrier IQ lists more than 225 separate pieces of information that wireless carriers can gather from mobile devices using the software -- all of it strictly related to network and device performance, the document says.
- Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns
- Goodbye 2011 ... What a year!
- Sprint disables Carrier IQ software on its handsets
- Iran tricked U.S. spy drone into landing in country, report says
- FBI never sought Carrier IQ data, director says
- Carrier IQ moves to allay fears of its tracking software
- FBI rejects FOIA request for Carrier IQ info
- Google's Schmidt calls Carrier IQ software a keylogger
- Carrier IQ downplays 2010 patent request
- 8 companies hit with lawsuit over Carrier IQ software
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts