<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Phone spying busted</title>
	<atom:link href="http://www.epanorama.net/blog/2011/11/30/phone-spying-busted/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 25 Apr 2026 11:56:54 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-1463564</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Dec 2015 23:28:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-1463564</guid>
		<description><![CDATA[AT&amp;T Snaps Up Assets, Talent From Carrier iQ, Phone Monitoring Startup Goes Offline
http://techcrunch.com/2015/12/30/att-snaps-up-assets-talent-from-carrier-iq-as-phone-monitoring-startup-goes-offline/

Remember Carrier iQ? In the years before Edward Snowden’s revelations about the NSA, the name and its software became synonymous with creepy, unseen monitoring of everything that you do on a smartphone on behalf of carriers and phone makers — allegedly in the name of better user experience.

Now the company appears to be no longer.

TechCrunch has confirmed that AT&amp;T has acquired certain software assets from Carrier iQ, along with some staff. The site itself — and the wider company, it seems — has gone offline.

“We’ve acquired the rights to Carrier iQ’s software, and some CIQ employees moved to AT&amp;T,” an AT&amp;T spokesperson tells us. AT&amp;T signed on as a customer years ago to use the CIQ software across phones on its network to troubleshoot wireless quality for its customers, and the spokesperson went on to explain that this still the case.]]></description>
		<content:encoded><![CDATA[<p>AT&amp;T Snaps Up Assets, Talent From Carrier iQ, Phone Monitoring Startup Goes Offline<br />
<a href="http://techcrunch.com/2015/12/30/att-snaps-up-assets-talent-from-carrier-iq-as-phone-monitoring-startup-goes-offline/" rel="nofollow">http://techcrunch.com/2015/12/30/att-snaps-up-assets-talent-from-carrier-iq-as-phone-monitoring-startup-goes-offline/</a></p>
<p>Remember Carrier iQ? In the years before Edward Snowden’s revelations about the NSA, the name and its software became synonymous with creepy, unseen monitoring of everything that you do on a smartphone on behalf of carriers and phone makers — allegedly in the name of better user experience.</p>
<p>Now the company appears to be no longer.</p>
<p>TechCrunch has confirmed that AT&amp;T has acquired certain software assets from Carrier iQ, along with some staff. The site itself — and the wider company, it seems — has gone offline.</p>
<p>“We’ve acquired the rights to Carrier iQ’s software, and some CIQ employees moved to AT&amp;T,” an AT&amp;T spokesperson tells us. AT&amp;T signed on as a customer years ago to use the CIQ software across phones on its network to troubleshoot wireless quality for its customers, and the spokesperson went on to explain that this still the case.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: IWC Portuguese Complications</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-205428</link>
		<dc:creator><![CDATA[IWC Portuguese Complications]]></dc:creator>
		<pubDate>Mon, 03 Mar 2014 02:15:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-205428</guid>
		<description><![CDATA[This information is very important for me, thank you very much for sharing]]></description>
		<content:encoded><![CDATA[<p>This information is very important for me, thank you very much for sharing</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-16926</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Dec 2013 06:53:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-16926</guid>
		<description><![CDATA[New documents show how the NSA infers relationships based on mobile location data
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/

Everyone who carries a cellphone generates a trail of electronic breadcrumbs that records everywhere they go. Those breadcrumbs reveal a wealth of information about who we are, where we live, who our friends are and much more. And as we reported last week, the National Security Agency is collecting location information in bulk — 5 billion records per day worldwide — and using sophisticated algorithms to assist with U.S. intelligence-gathering operations.

How do they do it? And what can they learn from location data? The latest documents show the extent of the location-tracking program we first reported last week.

The NSA doesn’t just have the technical capabilities to collect location-based data in bulk. A 24-page NSA white paper shows that the agency has a powerful suite of algorithms, or data sorting tools, that allow it to learn a great deal about how people live their lives.

Those tools allow the agency to perform analytics on a global scale, examining data collected about potentially everyone’s movements in order to flag new surveillance targets.

For example, one NSA program, code-named Fast Follower, was developed to allow the NSA to identify who might have been assigned to tail American case officers at stations overseas. By correlating an officer’s cellphone signals to those of foreign nationals in the same city, the NSA is able to figure out whether anyone is moving in tandem with the U.S. officer.]]></description>
		<content:encoded><![CDATA[<p>New documents show how the NSA infers relationships based on mobile location data<br />
<a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/" rel="nofollow">http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/</a></p>
<p>Everyone who carries a cellphone generates a trail of electronic breadcrumbs that records everywhere they go. Those breadcrumbs reveal a wealth of information about who we are, where we live, who our friends are and much more. And as we reported last week, the National Security Agency is collecting location information in bulk — 5 billion records per day worldwide — and using sophisticated algorithms to assist with U.S. intelligence-gathering operations.</p>
<p>How do they do it? And what can they learn from location data? The latest documents show the extent of the location-tracking program we first reported last week.</p>
<p>The NSA doesn’t just have the technical capabilities to collect location-based data in bulk. A 24-page NSA white paper shows that the agency has a powerful suite of algorithms, or data sorting tools, that allow it to learn a great deal about how people live their lives.</p>
<p>Those tools allow the agency to perform analytics on a global scale, examining data collected about potentially everyone’s movements in order to flag new surveillance targets.</p>
<p>For example, one NSA program, code-named Fast Follower, was developed to allow the NSA to identify who might have been assigned to tail American case officers at stations overseas. By correlating an officer’s cellphone signals to those of foreign nationals in the same city, the NSA is able to figure out whether anyone is moving in tandem with the U.S. officer.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-16925</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 05 Dec 2013 08:56:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-16925</guid>
		<description><![CDATA[NSA tracking cellphone locations worldwide, Snowden documents show
http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html

The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.

The records feed a vast database that stores information about the locations of at least hundreds of millions of devices, according to the officials and the documents, which were provided by former NSA contractor Edward Snowden. New projects created to analyze that data have provided the intelligence community with what amounts to a mass surveillance tool.

The NSA does not target Americans’ location data by design, but the agency acquires a substantial amount of information on the whereabouts of domestic cellphones “incidentally,” a legal term that connotes a foreseeable but not deliberate result.

One senior collection manager, speaking on the condition of anonymity but with permission from the NSA, said “we are getting vast volumes” of location data from around the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones.

U.S. officials said the programs that collect and analyze location data are lawful and intended strictly to develop intelligence about foreign targets.

The NSA has no reason to suspect that the movements of the overwhelming majority of cellphone users would be relevant to national security. Rather, it collects locations in bulk because its most powerful analytic tools — known collectively as CO-TRAVELER — allow it to look for unknown associates of known intelligence targets by tracking people whose movements intersect.

CO-TRAVELER and related tools require the methodical collection and storage of location data on what amounts to a planetary scale.

“One of the key components of location data, and why it’s so sensitive, is that the laws of physics don’t let you keep it private,”

The number of Americans whose locations are tracked as part of the NSA’s collection of data overseas is impossible to determine from the Snowden documents alone, and senior intelligence officials declined to offer an estimate.

“It’s awkward for us to try to provide any specific numbers,”]]></description>
		<content:encoded><![CDATA[<p>NSA tracking cellphone locations worldwide, Snowden documents show<br />
<a href="http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html" rel="nofollow">http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html</a></p>
<p>The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.</p>
<p>The records feed a vast database that stores information about the locations of at least hundreds of millions of devices, according to the officials and the documents, which were provided by former NSA contractor Edward Snowden. New projects created to analyze that data have provided the intelligence community with what amounts to a mass surveillance tool.</p>
<p>The NSA does not target Americans’ location data by design, but the agency acquires a substantial amount of information on the whereabouts of domestic cellphones “incidentally,” a legal term that connotes a foreseeable but not deliberate result.</p>
<p>One senior collection manager, speaking on the condition of anonymity but with permission from the NSA, said “we are getting vast volumes” of location data from around the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones.</p>
<p>U.S. officials said the programs that collect and analyze location data are lawful and intended strictly to develop intelligence about foreign targets.</p>
<p>The NSA has no reason to suspect that the movements of the overwhelming majority of cellphone users would be relevant to national security. Rather, it collects locations in bulk because its most powerful analytic tools — known collectively as CO-TRAVELER — allow it to look for unknown associates of known intelligence targets by tracking people whose movements intersect.</p>
<p>CO-TRAVELER and related tools require the methodical collection and storage of location data on what amounts to a planetary scale.</p>
<p>“One of the key components of location data, and why it’s so sensitive, is that the laws of physics don’t let you keep it private,”</p>
<p>The number of Americans whose locations are tracked as part of the NSA’s collection of data overseas is impossible to determine from the Snowden documents alone, and senior intelligence officials declined to offer an estimate.</p>
<p>“It’s awkward for us to try to provide any specific numbers,”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Gamber Johnson</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-16924</link>
		<dc:creator><![CDATA[Gamber Johnson]]></dc:creator>
		<pubDate>Sun, 28 Jul 2013 02:07:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-16924</guid>
		<description><![CDATA[i want to put a weather balloon up in the sky. What is the best GPS tracking device i can you. I want to track it on my computer while it is in the air. so whats the best GPS and where can i get it.Plus the price you want to say.]]></description>
		<content:encoded><![CDATA[<p>i want to put a weather balloon up in the sky. What is the best GPS tracking device i can you. I want to track it on my computer while it is in the air. so whats the best GPS and where can i get it.Plus the price you want to say.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-16923</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 09 Oct 2012 09:40:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-16923</guid>
		<description><![CDATA[Flaws allow 3G devices to be tracked
http://www.scmagazine.com.au/News/317819,flaws-allow-3g-devices-to-be-tracked.aspx

Devices trackable over any 3G network.

New privacy threats have been uncovered by security researchers that could allow every device operating on 3G networks to be tracked.

The vulnerabilities could be exploited with cheap commercial off-the-shelf technology to reveal the location of phones and other 3G-capable devices.

The flaws affected the latest 3G networks that were hardened by discarding GSM interoperable networks that were long known to be vulnerable to interception techniques.

Attackers did not need to perform cryptographic operations nor possess security keys to instigate the attacks.

“[These] kind of vulnerabilities usually look trivial once uncovered but often remain unnoticed for [a] long time, since they do not involve fancy cryptography but are caused by errors in the protocol logic,&quot; the researchers wrote in a paper.

The 3G global industry watchdog, the 3GPP, is investigating the research. It was reportedly informed of the flaws about six months ago, but lengthy revision processes for global mobile phone protocols could explain why fixes have not been circulated and implemented.

Two attacks were conducted using off-the-shelf kit and a rooted — or modified — femtocell unit which broadcasted a 3G signal. The attacks were made by intercepting, altering and injecting 3G Layer-3 messages into communication between the base station and mobile phones in both directions.

One attack, the IMSI paging attack, forced mobile devices to reveal the static identity (TMSI) in response to a temporary number (IMSI) paging request which contained the IMSI, a number which was assumed was known to the attacker.

This would reveal the presence of devices in a monitored area, breaking anonymity and ‘unlinkability’ by revealing the IMSI and TMSI correlation.

In the Authentication and Key Agreement (AKA) protocol attack, the same authentication request would be injected to all phones in range causing all but the targeted device – which would return a Mac failure -- to respond with synchronisation failures.

The researchers wrote that the attacks could be used to track staff movements within a building.

&quot;If devices with wider area coverage than a femtocell are used, the adversary should use triangulation to obtain finer position data.”]]></description>
		<content:encoded><![CDATA[<p>Flaws allow 3G devices to be tracked<br />
<a href="http://www.scmagazine.com.au/News/317819,flaws-allow-3g-devices-to-be-tracked.aspx" rel="nofollow">http://www.scmagazine.com.au/News/317819,flaws-allow-3g-devices-to-be-tracked.aspx</a></p>
<p>Devices trackable over any 3G network.</p>
<p>New privacy threats have been uncovered by security researchers that could allow every device operating on 3G networks to be tracked.</p>
<p>The vulnerabilities could be exploited with cheap commercial off-the-shelf technology to reveal the location of phones and other 3G-capable devices.</p>
<p>The flaws affected the latest 3G networks that were hardened by discarding GSM interoperable networks that were long known to be vulnerable to interception techniques.</p>
<p>Attackers did not need to perform cryptographic operations nor possess security keys to instigate the attacks.</p>
<p>“[These] kind of vulnerabilities usually look trivial once uncovered but often remain unnoticed for [a] long time, since they do not involve fancy cryptography but are caused by errors in the protocol logic,&#8221; the researchers wrote in a paper.</p>
<p>The 3G global industry watchdog, the 3GPP, is investigating the research. It was reportedly informed of the flaws about six months ago, but lengthy revision processes for global mobile phone protocols could explain why fixes have not been circulated and implemented.</p>
<p>Two attacks were conducted using off-the-shelf kit and a rooted — or modified — femtocell unit which broadcasted a 3G signal. The attacks were made by intercepting, altering and injecting 3G Layer-3 messages into communication between the base station and mobile phones in both directions.</p>
<p>One attack, the IMSI paging attack, forced mobile devices to reveal the static identity (TMSI) in response to a temporary number (IMSI) paging request which contained the IMSI, a number which was assumed was known to the attacker.</p>
<p>This would reveal the presence of devices in a monitored area, breaking anonymity and ‘unlinkability’ by revealing the IMSI and TMSI correlation.</p>
<p>In the Authentication and Key Agreement (AKA) protocol attack, the same authentication request would be injected to all phones in range causing all but the targeted device – which would return a Mac failure &#8212; to respond with synchronisation failures.</p>
<p>The researchers wrote that the attacks could be used to track staff movements within a building.</p>
<p>&#8220;If devices with wider area coverage than a femtocell are used, the adversary should use triangulation to obtain finer position data.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-16922</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 20 Sep 2012 11:15:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-16922</guid>
		<description><![CDATA[&#039;We will find you&#039; marketing gone wild: Candy bars that guarantee stalkers
http://www.networkworld.com/community/blog/marketing-gone-wild-candy-bars-stalk-you

What do you get when you mix technology with candy bars? In a cool yet creepy marketing campaign, Nestle plans to stalk consumers with a &quot;we will find you&quot; promotion that involves GPS trackers embedded in chocolate bars.

What do you get when you mix technology with candy bars? In a cool yet creepy marketing campaign, Nestle plans to stalk UK consumers. The company kicked off a unique promotion called &quot;We will find you&quot; that involves GPS trackers embedded in chocolate bars. When a winning consumer opens the wrapper, it activates and notifies the prize team who promises to track them down within 24 hours to deliver a check for £10,000.

In an additional chocolate-mixed-with-technology promotion, Nestle is tapping the NFC-enabled mobile phone market. An outdoor campaign involves 3,000 posters with NFC and QR codes.

-&gt; Wonder how long before someone stars running up and down candy store aisles with a metal detector.]]></description>
		<content:encoded><![CDATA[<p>&#8216;We will find you&#8217; marketing gone wild: Candy bars that guarantee stalkers<br />
<a href="http://www.networkworld.com/community/blog/marketing-gone-wild-candy-bars-stalk-you" rel="nofollow">http://www.networkworld.com/community/blog/marketing-gone-wild-candy-bars-stalk-you</a></p>
<p>What do you get when you mix technology with candy bars? In a cool yet creepy marketing campaign, Nestle plans to stalk consumers with a &#8220;we will find you&#8221; promotion that involves GPS trackers embedded in chocolate bars.</p>
<p>What do you get when you mix technology with candy bars? In a cool yet creepy marketing campaign, Nestle plans to stalk UK consumers. The company kicked off a unique promotion called &#8220;We will find you&#8221; that involves GPS trackers embedded in chocolate bars. When a winning consumer opens the wrapper, it activates and notifies the prize team who promises to track them down within 24 hours to deliver a check for £10,000.</p>
<p>In an additional chocolate-mixed-with-technology promotion, Nestle is tapping the NFC-enabled mobile phone market. An outdoor campaign involves 3,000 posters with NFC and QR codes.</p>
<p>-&gt; Wonder how long before someone stars running up and down candy store aisles with a metal detector.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-16921</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Mar 2012 10:27:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-16921</guid>
		<description><![CDATA[Android malware offers to remove Carrier IQ
Sends premium rate text messages instead
http://www.theinquirer.net/inquirer/news/2136822/android-malware-offers-remove-carrier-iq

SECURITY RESEARCHERS have uncovered Android malware that claims to help you out by removing Carrier IQ spyware and unlock hidden functions.

Symantec and F-Secure have released details of scams in which users are tricked into downloading and using an app or web site to supposedly remove or unlock content. They have identified two such Trojans that instead send text messages to premium rate phone numbers.

Criminals have turned to mobile malware due to the recent increase in the adoption of smartphones. However, it is unclear whether these types of threats will reach the level of significance associated with desktop malware.]]></description>
		<content:encoded><![CDATA[<p>Android malware offers to remove Carrier IQ<br />
Sends premium rate text messages instead<br />
<a href="http://www.theinquirer.net/inquirer/news/2136822/android-malware-offers-remove-carrier-iq" rel="nofollow">http://www.theinquirer.net/inquirer/news/2136822/android-malware-offers-remove-carrier-iq</a></p>
<p>SECURITY RESEARCHERS have uncovered Android malware that claims to help you out by removing Carrier IQ spyware and unlock hidden functions.</p>
<p>Symantec and F-Secure have released details of scams in which users are tricked into downloading and using an app or web site to supposedly remove or unlock content. They have identified two such Trojans that instead send text messages to premium rate phone numbers.</p>
<p>Criminals have turned to mobile malware due to the recent increase in the adoption of smartphones. However, it is unclear whether these types of threats will reach the level of significance associated with desktop malware.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Security trends for 2012 &#171; Tomi Engdahl&#8217;s ePanorama blog</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-16920</link>
		<dc:creator><![CDATA[Security trends for 2012 &#171; Tomi Engdahl&#8217;s ePanorama blog]]></dc:creator>
		<pubDate>Mon, 09 Jan 2012 22:20:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-16920</guid>
		<description><![CDATA[[...] of it will surface. Last year&#8217;s findings have included Location data collecting smart-phones, Carrier IQ phone spying busted and Police Surveillance system to monitor mobile phones. In USA the Patriot Act lets them [...] ]]></description>
		<content:encoded><![CDATA[<p>[...] of it will surface. Last year&#8217;s findings have included Location data collecting smart-phones, Carrier IQ phone spying busted and Police Surveillance system to monitor mobile phones. In USA the Patriot Act lets them [...] </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/11/30/phone-spying-busted/comment-page-1/#comment-16919</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 23 Dec 2011 10:21:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=6857#comment-16919</guid>
		<description><![CDATA[EFF Reverse-engineers Carrier IQ, Requests Help in Deciphering Data
http://phandroid.com/2011/12/22/eff-reverse-engineers-carrier-iq-requests-help-in-deciphering-data/

The Electronic Frontier Foundation, in a continued bid to fight against injustices related to emerging technologies, has cracked open the Carrier IQ software package.

With the help of a few volunteers Carrier IQ has been parsed into its three layers — an app, a database, and a configuration file — and produced an app to uncover exactly what information your handset is collecting. Using the app, IQIQ, the EFF hopes to garner enough user data to blow the thing completely open.

Some Facts About Carrier IQ (architecture)
https://www.eff.org/deeplinks/2011/12/carrier-iq-architecture

Analyzing Carrier IQ Profiles
https://www.eff.org/deeplinks/2011/12/analyzing-carrier-iq-profiles

IQIQ transforms Carrier IQ Profiles from WBXML to human-readable XML.

There are also some examples of default Profiles from some Android-derived smartphones,
https://git.eff.org/?p=iqiq.git;a=tree;f=profiles;hb=master]]></description>
		<content:encoded><![CDATA[<p>EFF Reverse-engineers Carrier IQ, Requests Help in Deciphering Data<br />
<a href="http://phandroid.com/2011/12/22/eff-reverse-engineers-carrier-iq-requests-help-in-deciphering-data/" rel="nofollow">http://phandroid.com/2011/12/22/eff-reverse-engineers-carrier-iq-requests-help-in-deciphering-data/</a></p>
<p>The Electronic Frontier Foundation, in a continued bid to fight against injustices related to emerging technologies, has cracked open the Carrier IQ software package.</p>
<p>With the help of a few volunteers Carrier IQ has been parsed into its three layers — an app, a database, and a configuration file — and produced an app to uncover exactly what information your handset is collecting. Using the app, IQIQ, the EFF hopes to garner enough user data to blow the thing completely open.</p>
<p>Some Facts About Carrier IQ (architecture)<br />
<a href="https://www.eff.org/deeplinks/2011/12/carrier-iq-architecture" rel="nofollow">https://www.eff.org/deeplinks/2011/12/carrier-iq-architecture</a></p>
<p>Analyzing Carrier IQ Profiles<br />
<a href="https://www.eff.org/deeplinks/2011/12/analyzing-carrier-iq-profiles" rel="nofollow">https://www.eff.org/deeplinks/2011/12/analyzing-carrier-iq-profiles</a></p>
<p>IQIQ transforms Carrier IQ Profiles from WBXML to human-readable XML.</p>
<p>There are also some examples of default Profiles from some Android-derived smartphones,<br />
<a href="https://git.eff.org/?p=iqiq.git;a=tree;f=profiles;hb=master" rel="nofollow">https://git.eff.org/?p=iqiq.git;a=tree;f=profiles;hb=master</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
