Carrier IQ – Part Of The Solution, Not Part Of The Problem

Continued from Page 1

The software doesn’t pass on the content of the failed message or dropped calls. It just passes on the network and handset diagnostics around the dropped call or failed message. The information is placed into an encrypted database from which analysis and inquiry can be made. Furthermore, none of this information is ever sold to third parties.

Operators can look at where dropped calls are happening and the time of day and then install additional equipment to prevent or at least lower the incidence of those dropped calls.  I’ve seen “low signal strength” on my handset in some locations but later on, I all of a sudden notice that “high signal strength” at that same location once improvements were made in the network.

Device Analysis

According to Dan Rosenberg, an independent security researcher, “Since the beginning of the media frenzy over Carrier IQ, I have repeatedly stated that based on my knowledge of the software, claims that keystrokes, SMS bodies, email bodies and other data of this nature are being collected are erroneous.”

Manufacturers are able to analyse how the devices are performing, such as what applications are more prevalent and how much of the different resources in the phone are being used. They can then improve power management and determine how to improve the handset so the user experience is better.

So, the next time you see a segment on Brian Williams Nightly News or read a piece stating that performance and behavior of smartphones is being monitored, you should think, “Of course they are monitoring the performance and behavior in my smartphone! How else are they going to fix it when it doesn’t work?”

Wireless operators and handset manufacturers don’t want or need to gather information about what you’re doing unless there is either a court order or a terrorist threat. They simply want to build great smartphones and offer the best network quality of service possible.

The next time you see the FBI is able to stop someone from doing something to interrupt the safety and lives of U.S. citizens or in drug trafficking, you’ll likely be thrilled that their devices have monitoring software and the ability for the network operator to track phones when under a court order or in the interests of national security.

At the same time, we have to make sure that such monitoring is kept confidential for the 99.9 percent of people like you and me who simply want to enjoy the benefits of owning and using a mobile device.

Page: 1 2

J Gerry Purdy, eWEEK USA 2012. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Tesla Posts Biggest Revenue Drop Since 2012

Elon Musk firm touts cheaper EV models, as profits slump over 50 percent in the…

2 days ago

Apple iPhone Q1 Sales In China Fall 19 Percent, Says Counterpoint

Bad news for Tim Cook, as Counterpoint records 19 percent fall in iPhone sales in…

2 days ago

President Biden Signs TikTok Ban Or Divest Bill Into Law

TikTok pledges to challenge 'unconstitutional' US ban in the courts, after President Joe Biden signs…

2 days ago

UK CMA Seeks Feedback On Microsoft, Amazon AI Partnerships

British regulator invites feedback on major partnerships Microsoft and Amazon have struck with smaller AI…

3 days ago

Google Fires More Staff Over Israel Protest

Another 20 staff have been fired by Google over Israel protest and their “completely unacceptable…

3 days ago

Australian PM Hits Out At Elon Musk Over Knife Attack Video

Censorship row brewing down under, after the Australian Prime Minister calls Elon Musk an 'arrogant…

3 days ago