Carrier IQ: Senate Demands Answers
By Ed Hansberry
InformationWeek
Given the software has been demonstrated to collect certain keystrokes, intercept SMS messages, and even record information in browsers that should be encrypted, it is easy to see how Internet privacy issues are raised. As Mathew Schwartz wrote Thursday, these actions might run afoul of wire tap laws as well.
Senator Franken has asked Carrier IQ to respond to a series of questions, and then ever so politely ended the letter with "I appreciate your prompt attention to this matter." Translated into English that means "you need to drop whatever you are doing and respond to this letter or face a Senatorial subpoena."
[Carrier IQ is an insane breach of enterprise trust, says IT leader Jonathan Feldman. See what he says must change, in Carrier IQ: Mobile App Crap Must Stop. ]
To make sure Carrier IQ understands this is not the usual government inquiry, Franken writes that the logging and transmitting of data "may violate federal privacy laws, including the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act. This is potentially a serous matter."
The letter goes on to pose a number of questions, like are user's locations logged, is the content of inbound and outbound emails and SMS messages logged, are search queries logged, etc.?
Senator Franken wants to know what is transmitted off of the phone to carriers, Carrier IQ's servers, phone manufacturers, operating system providers, or third parties.
The deadline for answering this letter is December 14. Depending on what the answers are, Carrier IQ may satisfy the senate committee, but I don't think there are any answers that will satisfy users. At this point, what carrier or manufacturer would still want this software on their phones?
Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).
| To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. |
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.



Subscribe to RSS