Carrier IQ defends itself, releases 19-page report
In an attempt to defend itself from the whiplashes, Carrier IQ has released a 19 page report explaining its software. With over 150 million mobile phones using the software, much has come from the woodwork about the intent of the software and recently discovered its ability to read text messaging.
In its report, Carrier IQ says the software it develped is intended for mobile carriers to monitor ”when and where calls fail; where customers have problems accessing the network; the reliability and battery performance of their make and model of device; and the interaction of the mobile network with your mobile device – known as network signalling traffic”.
When Michael Morisy, co-founder of MuckRock, requested a Freedom of Information Act (FOIA) release from the Federal Bureau of Investigation on ‘its’ usage of the software–it was quickly rejected. The fact it was turned down shows the software is not being used as intended. If Carrier IQ’s intent was to help mobile carriers on how their network and the devices on their network are performing, then what is the FBI doing with its foot in the door?
Nonetheless (and whether Carrier IQ is a pig in a blanket at this point) the report does show mobile carriers can benefit from its usage. The unfortunate part is carriers can use the software to any extent it wishes and without discretion, as it was designed, leaving grave concern with consumers.
In this document, we want to let consumers to know exactly what it is that our software does, the security measures we have in place, and our commitment through our software design and processes to protecting consumers’ privacy while improving consumers’ experience.
This document outlines the following:
- Details of the Carrier IQ solution and how it is deployed
- How the Carrier IQ software – “IQ Agent”- is loaded on mobile devices
- What information is available to Mobile Network Operators from devices
- How data from mobile devices may be used by Carrier IQ’s customers
- How consumer data is protected through this process