Carrier IQ – Part Of The Solution, Not Part Of The Problem

Continued from Page 1

The software doesn’t pass on the content of the failed message or dropped calls. It just passes on the network and handset diagnostics around the dropped call or failed message. The information is placed into an encrypted database from which analysis and inquiry can be made. Furthermore, none of this information is ever sold to third parties.

Operators can look at where dropped calls are happening and the time of day and then install additional equipment to prevent or at least lower the incidence of those dropped calls.  I’ve seen “low signal strength” on my handset in some locations but later on, I all of a sudden notice that “high signal strength” at that same location once improvements were made in the network.

Device Analysis

According to Dan Rosenberg, an independent security researcher, “Since the beginning of the media frenzy over Carrier IQ, I have repeatedly stated that based on my knowledge of the software, claims that keystrokes, SMS bodies, email bodies and other data of this nature are being collected are erroneous.”

Manufacturers are able to analyse how the devices are performing, such as what applications are more prevalent and how much of the different resources in the phone are being used. They can then improve power management and determine how to improve the handset so the user experience is better.

So, the next time you see a segment on Brian Williams Nightly News or read a piece stating that performance and behavior of smartphones is being monitored, you should think, “Of course they are monitoring the performance and behavior in my smartphone! How else are they going to fix it when it doesn’t work?”

Wireless operators and handset manufacturers don’t want or need to gather information about what you’re doing unless there is either a court order or a terrorist threat. They simply want to build great smartphones and offer the best network quality of service possible.

The next time you see the FBI is able to stop someone from doing something to interrupt the safety and lives of U.S. citizens or in drug trafficking, you’ll likely be thrilled that their devices have monitoring software and the ability for the network operator to track phones when under a court order or in the interests of national security.

At the same time, we have to make sure that such monitoring is kept confidential for the 99.9 percent of people like you and me who simply want to enjoy the benefits of owning and using a mobile device.

Page: 1 2

J Gerry Purdy, eWEEK USA 2012. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Tech Minister Admits UK Social Media Ban For Under-16s “On The Table”

Following Australia? Technology secretary Peter Kyle says possible ban on social media for under-16s in…

2 days ago

Northvolt Appoints Restructuring Expert For Main Battery Plant

Restructuring expert appointed to oversea Northvolt's main facility in northern Sweden, amid financial worries

2 days ago

CMA Halts Google Anthropic Investigation

British competition watchdog decides Alphabet's partnership with AI startup Anthropic does not qualify for investigation

2 days ago

Germany “Deeply Concerned” After Damage To Two Undersea Cables

Possible sabotage? Two undersea cables in the Baltic sea have been severely damaged, triggering security…

2 days ago