Carrier IQ: Just A Little Evil?
By Jonathan Feldman
InformationWeek
Rosenberg's teardown of the Carrier IQ app has yielded highly structured and specific data, and, given his credentials, I'm thinking that he's right. Specifically, he's identified a set of 12 Carrier IQ software "events" ranging from "phone dialer only" keypresses, to SMS events (message length, phone number, status, but no message content), to Web browser events (URL, but no actual page contents). Many of the events have to do with radio management and things that enterprises and customers would want.
Rosenberg is careful to avoid the mob mentality that sprang up over the initial Carrier IQ findings. He is quick to point out that CarrierIQ (on this particular phone) cannot record any keystrokes other than the dialer.
Still, he does point out that, "CarrierIQ can record the URLs that are being visited (including for HTTPS resources)." In a follow-up conversation, I asked Rosenberg what his findings were. He said, "SSL/HTTPS URLs are definitely being captured. The code responsible for submitting HTTP-related metrics to the
CarrierIQ agent resided inside Webkit, the Android browser engine. It's naturally located in code responsible for handling HTTP requests, which is totally blind to whether or not a request is over SSL (the SSL has already been stripped out). So it doesn't care whether a request was HTTP or HTTPS--it will log it regardless." Despite being careful to be non-sensational about this, he says, "This is obviously a legal issue that needs to be explored."
My conclusion: even if Carrier IQ is mostly innocent, it represents a bellwether of things to come.
[ Carrier IQ says it's exempt from wiretap laws, but many lawyers, legislators, and regulators aren't so sure. Learn more: Carrier IQ, Carriers, Manufacturers Hit With Wiretap Lawsuits. ]
In Carrier IQ's case, some sensitive corporate data may be present in "GET" operations via URLs, but as a Doctor Evil, it's just a Mini-Me. "Just a little evil." In all seriousness, however, now that the question of providers collecting sensitive data has sprang up at all, NOW is the time for enterprises to engage in conversations with their carriers about what is acceptable.
We all want good enterprise network management. That's the purpose behind Carrier IQ. And frankly, most of us have made significant investment in network management of OUR enterprise networks. But, just as your enterprise network customers would feel icky about your network operators remote controlling or remote viewing of enterprise desktops without permission and/or transparency surrounding it, carriers must expect that enterprises want transparency and permission surrounding collection of ANY data.
When I wrote my first analysis of the Carrier IQ situation, it wasn't yet known that Apple had CarrierIQ software in early versions of its software. But even after that was made known, there was a BIG DIFFERENCE: a user-controlled off switch.
I also still think that carriers loading up a phone with app crap is a bad idea. I judge phones by defect rates and support burden. My shop supports both Apple and Android platforms, and user issues with Android are FAR higher than those with Apple. This lack of massive support burden is my sole affiliation with Apple. I don't own stock or have any financial interest other than spending money on their products.
Regardless, the model of tight control of firmware prior to end user delivery isn't arriving overnight. In the meantime, it's hard to put Pandora back in the box, even if it's only "mini evil."
There is a huge difference between "rootkit" and "management tool." It's a big difference, but a simple one, and is based on the answer to the question, "Did I agree to let you to do this?" Carriers take note: with the U.S. Senate and European regulators having entered the game, the answer had better be "yes."
Jonathan Feldman is a contributing editor for InformationWeek and director of IT services for a rapidly growing city in North Carolina. Write to him at jf@feldman.org or at @_jfeldman.
In today's uncertain and highly scrutinized financial services industry, achieving effective risk management is vital for survival. The report examines the need for enterprise risk management, the benefits of holistic data management, and ERM best practices. Download the report now. (Free registration required.) Jonathan Feldman is a contributing editor for InformationWeek and director of IT services for a rapidly growing city in North Carolina. Write to him at jf@feldman.org or at @_jfeldman.
Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).
| To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. |
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.



Subscribe to RSS