Loading ...
Sorry, an error occurred while loading the content.

Fwd: Big Brother *IS* Watching You, Through Your Cell Phone and Blackberry

Expand Messages
  • Kris Millegan
    ... Begin forwarded message: Subject: Big Brother *IS* Watching You, Through Your Cell Phone and Blackberry Carrier IQ: Researcher Trevor Eckhart Outs Creepy,
    Message 1 of 2 , Dec 1, 2011
    • 0 Attachment


      Begin forwarded message:

      Subject: Big Brother *IS* Watching You, Through Your Cell Phone and Blackberry

      Carrier IQ: Researcher Trevor Eckhart Outs Creepy, Hidden App Installed On Smartphones

      http://www.huffingtonpost.com/2011/11/30/carrier-iq-trevor-eckhart_n_1120727.html?ref=technology&icid=maing-grid10%7Chtmlws-main-nb%7Cdl1%7Csec1_lnk3%7C116806

      A security researcher has posted a video detailing hidden software installed on smart phones that logs numerous details about users' activities.

      In a 17-minute video posted Monday on YouTube, Trevor Eckhart shows how the software – known as Carrier IQ – logs every text message, Google search and phone number typed on a wide variety of smart phones - including HTC, Blackberry, Nokia* and others - and reports them to the mobile phone carrier.

      The application, which is labeled on Eckhart’s HTC smartphone as "HTC IQ Agent," also logs the URL of websites searched on the phone, even if the user intends to encrypt that data using a URL that begins with "HTTPS," Eckhart said.

      The software always runs when Android operating system is running and users are unable to stop it, Eckhart said in the video.

      "Why is this not opt-in and why is it so hard to fully remove?" Eckhart wrote at the end of the video.

      In a post about Carrier IQ on his website, Eckhart called the software a "rootkit," a security term for software that runs in the background without a user's knowledge and is commonly used in malicious software.

      Eckhart's video is the latest in a series of attacks between him and the company. Earlier this month, Carrier IQ sent a cease and desist letter to Eckhart claiming he violated copyright law by publishing Carrier IQ training manuals online. But after the Electronic Frontier Foundation, a digital rights group, came to Eckhart’s defense, the company backed off its legal threats.

      The Electronic Frontier Foundation said the software that Eckhart has publicized "raises substantial privacy concerns" about software that "many consumers don’t know about."

      --------------------
       

      Founded in 2005 and with a management team steeped in the mobile telecoms industry, Carrier IQ is privately held and funded by some of the leading players in the venture capital industry. The company is headquartered in Mountain View, California with offices in USA, UK and Malaysia.

      Board of Directors
      Larry Lenhart, President and CEO, Carrier iQ
      Bruce Leak
      Jon Feiber, Mohr Davidow Ventures
      Martin Gibson, Accel Partners
      Bruce Sachs, Charles River Ventures
      Dominic Endicott*, Nauta Capital
      Matthew Cowan, Bridgescale Partners
      *Dominic Endicott
      Nauta Capital

      Dominic has over 20 years of global management and consulting experience, across North America, Europe and Latin America. He manages Nauta Capital’s operations in North America, and is Nauta’s representative on the Carrier IQ Board.  He previously managed North American operations for Cluster Consulting, a company owned by the founders of Nauta, and acquired in 2000 by Diamond Technology Partners. As a consultant with ... <CIA and Homeland Security subcontractor>  BOOZ ALLEN**, Dominic has worked extensively with global wireless operators, their suppliers and content partners. Dominic has a degree in Economics from the London School of Economics, and a Master’s degree in management from MIT’s Sloan School.  Nauta's US operations are based in Boston, and its European operations are based in Barcelona.

      http://en.wikipedia.org/wiki/Booz_Allen_Hamilton

      **Booz Allen Hamilton is majority owned by private equity firm The Carlyle Group  ...  with longstanding relationships with federal intelligence agencies, with current and former employees including former Director of Central Intelligence, R. James Woolsey, former CIA employee Miles Copeland, Jr., former NRO Director Keith R. Hall, former NSA Director Mike McConnell, who was the second Director of National Intelligence, and former DIA, NGA and the current for the Director of National Intelligence, James R. Clapper

      <[Alumni include] Dov ZakheimUnder Secretary of Defense (Comptroller) (2001–04) <<suspected Israeli agent, under whom trillions of dollars suddenly "vanished" from the Pentagon's books just before 9/11>>

      Investigative journalist Tim Shorrock [reports] that Booz Allen was a sub-contractor with two programs at the U.S. National Security Agency (NSA), called Trailblazer and Pioneer Groundbreaker.

      [Another Booz Allen project is] known as PISCES (Personal Identification Secure Comparison and Evaluation System), the “terrorist interdiction system” matching passengers inbound for the United States against facial images, fingerprints and biographical information at airports in high-risk countries. A high-speed data network permits U.S. authorities to be informed of problems with inbound passengers. Although PISCES was operational in the months prior to September 11, it apparently failed to detect any of the terrorists involved in the attack.

      Privacy advocates have alleged that the PISCES system is deployed in various countries that are known for human rights abuses (ie Pakistan and Iraq) and that facilitating them with an advanced database system capable of storing biometric details of travelers (often without consent of their own nationals) poses a danger to human rights activists and government opponents.

      http://www.huffingtonpost.com/2011/07/11/booz-allen-hamilton-hack_n_895147.html

      A group of hackers who have taken credit for several high-profile data breaches in said Monday it had done it again, this time infiltrating the network of a government contractor and releasing what it says are thousands of military email addresses.

      Calling the hack "Military Meltdown Monday," the hacker group claimed to have penetrated a computer server of Booz Allen Hamilton and released a list of more than 90,000 military email addresses and encrypted passwords ...

      The hacker group also said Monday that Anonymous has uncovered "all sorts of other shady practices" by Booz Allen, including potentially illegal surveillance systems, corruption between company and government officials, and warrantless wiretapping.

      "All of this, of course, taking place behind closed doors, free from any public knowledge or scrutiny," the group said.

      http://www.carrieriq.com/company/privacy.htm

      CARRIER IQ
      Privacy and Security
      Carrier IQ enables mobile operators, mobile device manufacturers, application vendors and other participants in the Mobile Ecosystem to deliver high quality products and services, based on what you want, where you want and to work and perform the way you expect.

      In providing our products and services, Carrier IQ enables our customers to gather information on Mobile User Experiences. Carrier IQ's products were developed from inception to respect and protect user privacy and security. We have established "Best Practices" approach to privacy and security. Our products are designed and configured to work within the privacy policies of our end customers and include functions such as anonymization and encryption. When Carrier IQ's products are deployed, data gathering is done in a way where the end user is informed or involved.

      With deployment on over 130 million phones globally, we have considerable experience in protecting the privacy of the end user and doing so in a highly secure manner. Information transmitted from enabled mobile devices is stored in a secure data center facility that meets or exceeds industry best practice guidelines for security policies and procedures.

      Our data gathering and data storage policies are built from industry best practice. Our products allow us to address privacy & security requirements that vary country-by-country and customer-by-customer. There are a variety of techniques involved in protection of privacy and in implementation of security policy, including anonymization of certain user-identifiable data, aggregation of data and encryption of data, etc.

      We work in partnership with our customers to ensure compliance with their data collection and protection policies. While much of the data we gather data is already available through alternate methods, we make it more efficient and useful – aimed at improving products, services and quality for the end user.

       
      Along with DOMINIC ENDICOTT {see above], NAUTA's principals include:
       
       
      Quote to note: "has served clients including VODAFONE"

      CIA and NSA had Vodaphone tap Greek leaders, journalists

      March 9, 2006 2:15 AM
       
      The mobile phones of Greek prime minister Costas Caramanlis and top government and security officials were tapped by unknown individuals <sic> during the Athens 2004 Olympics and for nearly a year after, the government said yesterday.

      "The people [under surveillance] included the prime minister himself and other members of the government," government spokesman Theodoros Roussopoulos told a news conference.

      The list of about 100 people whose telephones were tapped included the ministers of foreign affairs, defence, public order and justice.  Most of Greece's top military and police officers were also targeted, as were foreign ministry officials, a US embassy number and the prime minister's wife, Natasha.

      ...The government revealed that the phone tappers used interceptors traced to the vicinity of the US embassy.
      Senior Vodaphone network administrator who inserted tracking software into Vodaphone system supposedly committed suicide;
      Part of the government's investigation will re-examine the supposed suicide of Kostas Tsalikidis, 39, Vodafone Greece's head of network design. Tsalikidis was found hanged in his Athens flat on March 9, only two days after Vodafone Greece identified and removed the eavesdropping software from its systems...
       
      Vodafone is a British company, comparable to Sprint in the United States. Testifying before a Greek parliamentary committee, Koronias insisted that no-one in the U.K. could have had any connection to the ultra-sophisticated spyware.
      'Only Ericsson's staff could have set up such a device,' he said.  Ericsson furiously countered that Vodafone not only knew about the illegal software but had activated it at the request of British intelligence agents.
      Ericsson, the company that produces the software used by Vodafone, issued an announcement clarifying that two types of software were employed for tapping the phone conversations.  The first one employed legally had been developed by Ericsson and had been installed in Vodafone, yet it was not activated. The second software, which was of unknown origins (it had not been developed by Ericsson) had been illegally installed in Vodafone’s system to activate the legal software and erase the traces of the phone-tapping.
      This is, by any measure, a troubling admission -- especially since Ericsson manufactures many mobile phones used in the United States
       
      Vodaphone insists they were never informed of this "feature" in Ericsson phones, although Ericsson executive Bill Zikou has testified that the company disclosed the truth via its sales force and instruction manuals.
      American security expert John Brady Kiesling reveals some surprising details about the eavesdropping malware embedded in Ericsson equipment:

      Built into the Ericsson (Sweden) software that runs the Vodafone (UK-owned) mobile telephony network switching system in Greece, and similar GSM service providers around the world, is a little-known "Legal Interception" software package designed to be used by law enforcement authorities.  This software allows incoming and outgoing conversations from allegedly up to 5000-6000 mobile phone numbers to be recorded, on presentation of a valid judicial warrant. [A friend in telecoms claims governments require that telephone companies give law enforcement authorities the capability to monitor up to 5% of active calls as one precondition for an operating license].
       
      However, to unlock and use the eavesdropping package, the company must pay Ericsson a hefty fee (allegedly four million euros). The Greek government allegedly refused to pay this fee, despite its desire for wiretapping capability during the 2004 Athens Summer Olympics. One reason was that a clear legal basis for such eavesdropping was not yet in place..

      Apparently someone persuaded a Vodafone or Ericsson employee with access to the switching network to install a software parasite in at least 4 and possibly more of the 22 call management centers that Vodafone operates in Greece.
       
      ....
      Perhaps most disturbing of all, Vodaphone eliminated the spyware from its system before Greek intelligence could conduct an examination. Greek spy chief Ioannis Korantis testified that this move amounted to destruction of evidence.

      In 1999, the Village Voice published a piece alleging a connection between American intelligence and Ericsson -- which, it seems, supplied telecom technology to Iraq.  According to the Voice, the American agency in question was not NSA or CIA or DIA, as you might surmise, but a little-known group called SCS -- Special Collection Services.
       
      According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm...
       
      More:
      Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, "It would be classified and we would not be able to talk about it."

    • Robert
      Searching on remove android carrier iq just now, I found the following allegations. Rim Blackberry and Nokia say they have never used Carrier IQ or that sort
      Message 2 of 2 , Dec 1, 2011
      • 0 Attachment
        Searching on "remove android carrier iq" just now, I found the following allegations.

        Rim Blackberry and Nokia say they have never used Carrier IQ or that sort of logging.

        Apple says one version of iphone software had Carrier IQ, but subsequently and currently not, and then the media says there is no way to save that software version, which I think was 3.

        Android users have a lot of choices on how to get rid of Carrier IQ, usually for a nominal $0.99 or $1.00 unschtuppered info superhighway vehicle registration fee.

        https://www.google.com/search?q=remove+android+carrier+iq 

        -Bob

        --- In cia-drugs@yahoogroups.com, Kris Millegan <roadsend@...> wrote:
        Begin forwarded message:

        Subject: Big Brother *IS* Watching You, Through Your Cell Phone and Blackberry

        Carrier IQ: Researcher Trevor Eckhart Outs Creepy, Hidden App Installed On Smartphones

        http://www.huffingtonpost.com/2011/11/30/carrier-iq-trevor-eckhart_n_1120727.html?ref=technology&icid=maing-grid10%7Chtmlws-main-nb%7Cdl1%7Csec1_lnk3%7C116806

        A security researcher has posted a video detailing hidden software installed on smart phones that logs numerous details about users' activities.

        In a 17-minute video posted Monday on YouTube, Trevor Eckhart shows how the software – known as Carrier IQ – logs every text message, Google search and phone number typed on a wide variety of smart phones - including HTC, Blackberry, Nokia* and others - and reports them to the mobile phone carrier.

        The application, which is labeled on Eckhart's HTC smartphone as "HTC IQ Agent," also logs the URL of websites searched on the phone, even if the user intends to encrypt that data using a URL that begins with "HTTPS," Eckhart said.

        The software always runs when Android operating system is running and users are unable to stop it, Eckhart said in the video.

        "Why is this not opt-in and why is it so hard to fully remove?" Eckhart wrote at the end of the video.

        In a post about Carrier IQ on his website, Eckhart called the software a "rootkit," a security term for software that runs in the background without a user's knowledge and is commonly used in malicious software.

        Eckhart's video is the latest in a series of attacks between him and the company. Earlier this month, Carrier IQ sent a cease and desist letter to Eckhart claiming he violated copyright law by publishing Carrier IQ training manuals online. But after the Electronic Frontier Foundation, a digital rights group, came to Eckhart's defense, the company backed off its legal threats.

        The Electronic Frontier Foundation said the software that Eckhart has publicized "raises substantial privacy concerns" about software that "many consumers don't know about."

        --------------------
         

        Founded in 2005 and with a management team steeped in the mobile telecoms industry, Carrier IQ is privately held and funded by some of the leading players in the venture capital industry. The company is headquartered in Mountain View, California with offices in USA, UK and Malaysia.

        Board of Directors
        Larry Lenhart, President and CEO, Carrier iQ
        Bruce Leak
        Jon Feiber, Mohr Davidow Ventures
        Martin Gibson, Accel Partners
        Bruce Sachs, Charles River Ventures
        Dominic Endicott*, Nauta Capital
        Matthew Cowan, Bridgescale Partners
        *Dominic Endicott
        Nauta Capital

        Dominic has over 20 years of global management and consulting experience, across North America, Europe and Latin America. He manages Nauta Capital's operations in North America, and is Nauta's representative on the Carrier IQ Board.  He previously managed North American operations for Cluster Consulting, a company owned by the founders of Nauta, and acquired in 2000 by Diamond Technology Partners. As a consultant with ... <CIA and Homeland Security subcontractor>  BOOZ ALLEN**, Dominic has worked extensively with global wireless operators, their suppliers and content partners. Dominic has a degree in Economics from the London School of Economics, and a Master's degree in management from MIT's Sloan School.  Nauta's US operations are based in Boston, and its European operations are based in Barcelona.

        http://en.wikipedia.org/wiki/Booz_Allen_Hamilton

        **Booz Allen Hamilton is majority owned by private equity firm The Carlyle Group  ...  with longstanding relationships with federal intelligence agencies, with current and former employees including former Director of Central Intelligence, R. James Woolsey, former CIA employee Miles Copeland, Jr., former NRO Director Keith R. Hall, former NSA Director Mike McConnell, who was the second Director of National Intelligence, and former DIA, NGA and the current for the Director of National Intelligence, James R. Clapper

        <[Alumni include] Dov ZakheimUnder Secretary of Defense (Comptroller) (2001–04) <<suspected Israeli agent, under whom trillions of dollars suddenly "vanished" from the Pentagon's books just before 9/11>>

        Investigative journalist Tim Shorrock [reports] that Booz Allen was a sub-contractor with two programs at the U.S. National Security Agency (NSA), called Trailblazer and Pioneer Groundbreaker.

        [Another Booz Allen project is] known as PISCES (Personal Identification Secure Comparison and Evaluation System), the "terrorist interdiction system" matching passengers inbound for the United States against facial images, fingerprints and biographical information at airports in high-risk countries. A high-speed data network permits U.S. authorities to be informed of problems with inbound passengers. Although PISCES was operational in the months prior to September 11, it apparently failed to detect any of the terrorists involved in the attack.

        Privacy advocates have alleged that the PISCES system is deployed in various countries that are known for human rights abuses (ie Pakistan and Iraq) and that facilitating them with an advanced database system capable of storing biometric details of travelers (often without consent of their own nationals) poses a danger to human rights activists and government opponents.

        http://www.huffingtonpost.com/2011/07/11/booz-allen-hamilton-hack_n_895147.html

        A group of hackers who have taken credit for several high-profile data breaches in said Monday it had done it again, this time infiltrating the network of a government contractor and releasing what it says are thousands of military email addresses.

        Calling the hack "Military Meltdown Monday," the hacker group claimed to have penetrated a computer server of Booz Allen Hamilton and released a list of more than 90,000 military email addresses and encrypted passwords ...

        The hacker group also said Monday that Anonymous has uncovered "all sorts of other shady practices" by Booz Allen, including potentially illegal surveillance systems, corruption between company and government officials, and warrantless wiretapping.

        "All of this, of course, taking place behind closed doors, free from any public knowledge or scrutiny," the group said.

        http://www.carrieriq.com/company/privacy.htm

        CARRIER IQ
        Privacy and Security

        Carrier IQ enables mobile operators, mobile device manufacturers, application vendors and other participants in the Mobile Ecosystem to deliver high quality products and services, based on what you want, where you want and to work and perform the way you expect.

        In providing our products and services, Carrier IQ enables our customers to gather information on Mobile User Experiences. Carrier IQ's products were developed from inception to respect and protect user privacy and security. We have established "Best Practices" approach to privacy and security. Our products are designed and configured to work within the privacy policies of our end customers and include functions such as anonymization and encryption. When Carrier IQ's products are deployed, data gathering is done in a way where the end user is informed or involved.

        With deployment on over 130 million phones globally, we have considerable experience in protecting the privacy of the end user and doing so in a highly secure manner. Information transmitted from enabled mobile devices is stored in a secure data center facility that meets or exceeds industry best practice guidelines for security policies and procedures.

        Our data gathering and data storage policies are built from industry best practice. Our products allow us to address privacy & security requirements that vary country-by-country and customer-by-customer. There are a variety of techniques involved in protection of privacy and in implementation of security policy, including anonymization of certain user-identifiable data, aggregation of data and encryption of data, etc.

        We work in partnership with our customers to ensure compliance with their data collection and protection policies. While much of the data we gather data is already available through alternate methods, we make it more efficient and useful – aimed at improving products, services and quality for the end user.

         
        Along with DOMINIC ENDICOTT {see above], NAUTA's principals include:
         
         
        Quote to note: "has served clients including VODAFONE"

        CIA and NSA had Vodaphone tap Greek leaders, journalists

        March 9, 2006 2:15 AM
         
        The mobile phones of Greek prime minister Costas Caramanlis and top government and security officials were tapped by unknown individuals <sic> during the Athens 2004 Olympics and for nearly a year after, the government said yesterday.

        "The people [under surveillance] included the prime minister himself and other members of the government," government spokesman Theodoros Roussopoulos told a news conference.

        The list of about 100 people whose telephones were tapped included the ministers of foreign affairs, defence, public order and justice.  Most of Greece's top military and police officers were also targeted, as were foreign ministry officials, a US embassy number and the prime minister's wife, Natasha.

        ...The government revealed that the phone tappers used interceptors traced to the vicinity of the US embassy.
        Senior Vodaphone network administrator who inserted tracking software into Vodaphone system supposedly committed suicide;
        Part of the government's investigation will re-examine the supposed suicide of Kostas Tsalikidis, 39, Vodafone Greece's head of network design. Tsalikidis was found hanged in his Athens flat on March 9, only two days after Vodafone Greece identified and removed the eavesdropping software from its systems...
         
        Vodafone is a British company, comparable to Sprint in the United States. Testifying before a Greek parliamentary committee, Koronias insisted that no-one in the U.K. could have had any connection to the ultra-sophisticated spyware.
        'Only Ericsson's staff could have set up such a device,' he said.  Ericsson furiously countered that Vodafone not only knew about the illegal software but had activated it at the request of British intelligence agents.
        Ericsson, the company that produces the software used by Vodafone, issued an announcement clarifying that two types of software were employed for tapping the phone conversations.  The first one employed legally had been developed by Ericsson and had been installed in Vodafone, yet it was not activated. The second software, which was of unknown origins (it had not been developed by Ericsson) had been illegally installed in Vodafone's system to activate the legal software and erase the traces of the phone-tapping.
        This is, by any measure, a troubling admission -- especially since Ericsson manufactures many mobile phones used in the United States
         
        Vodaphone insists they were never informed of this "feature" in Ericsson phones, although Ericsson executive Bill Zikou has testified that the company disclosed the truth via its sales force and instruction manuals.
        American security expert John Brady Kiesling reveals some surprising details about the eavesdropping malware embedded in Ericsson equipment:

        Built into the Ericsson (Sweden) software that runs the Vodafone (UK-owned) mobile telephony network switching system in Greece, and similar GSM service providers around the world, is a little-known "Legal Interception" software package designed to be used by law enforcement authorities.  This software allows incoming and outgoing conversations from allegedly up to 5000-6000 mobile phone numbers to be recorded, on presentation of a valid judicial warrant. [A friend in telecoms claims governments require that telephone companies give law enforcement authorities the capability to monitor up to 5% of active calls as one precondition for an operating license].
         
        However, to unlock and use the eavesdropping package, the company must pay Ericsson a hefty fee (allegedly four million euros). The Greek government allegedly refused to pay this fee, despite its desire for wiretapping capability during the 2004 Athens Summer Olympics. One reason was that a clear legal basis for such eavesdropping was not yet in place..

        Apparently someone persuaded a Vodafone or Ericsson employee with access to the switching network to install a software parasite in at least 4 and possibly more of the 22 call management centers that Vodafone operates in Greece.
         
        ....
        Perhaps most disturbing of all, Vodaphone eliminated the spyware from its system before Greek intelligence could conduct an examination. Greek spy chief Ioannis Korantis testified that this move amounted to destruction of evidence.

        In 1999, the Village Voice published a piece alleging a connection between American intelligence and Ericsson -- which, it seems, supplied telecom technology to Iraq.  According to the Voice, the American agency in question was not NSA or CIA or DIA, as you might surmise, but a little-known group called SCS -- Special Collection Services.
         
        According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm...
         
        More:
        Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, "It would be classified and we would not be able to talk about it."
        Begin forwarded message:

        Subject: Big Brother *IS* Watching You, Through Your Cell Phone and Blackberry

        Carrier IQ: Researcher Trevor Eckhart Outs Creepy, Hidden App Installed On Smartphones

        http://www.huffingtonpost.com/2011/11/30/carrier-iq-trevor-eckhart_n_1120727.html?ref=technology&icid=maing-grid10%7Chtmlws-main-nb%7Cdl1%7Csec1_lnk3%7C116806

        A security researcher has posted a video detailing hidden software installed on smart phones that logs numerous details about users' activities.

        In a 17-minute video posted Monday on YouTube, Trevor Eckhart shows how the software – known as Carrier IQ – logs every text message, Google search and phone number typed on a wide variety of smart phones - including HTC, Blackberry, Nokia* and others - and reports them to the mobile phone carrier.

        The application, which is labeled on Eckhart's HTC smartphone as "HTC IQ Agent," also logs the URL of websites searched on the phone, even if the user intends to encrypt that data using a URL that begins with "HTTPS," Eckhart said.

        The software always runs when Android operating system is running and users are unable to stop it, Eckhart said in the video.

        "Why is this not opt-in and why is it so hard to fully remove?" Eckhart wrote at the end of the video.

        In a post about Carrier IQ on his website, Eckhart called the software a "rootkit," a security term for software that runs in the background without a user's knowledge and is commonly used in malicious software.

        Eckhart's video is the latest in a series of attacks between him and the company. Earlier this month, Carrier IQ sent a cease and desist letter to Eckhart claiming he violated copyright law by publishing Carrier IQ training manuals online. But after the Electronic Frontier Foundation, a digital rights group, came to Eckhart's defense, the company backed off its legal threats.

        The Electronic Frontier Foundation said the software that Eckhart has publicized "raises substantial privacy concerns" about software that "many consumers don't know about."

        --------------------
         

        Founded in 2005 and with a management team steeped in the mobile telecoms industry, Carrier IQ is privately held and funded by some of the leading players in the venture capital industry. The company is headquartered in Mountain View, California with offices in USA, UK and Malaysia.

        Board of Directors
        Larry Lenhart, President and CEO, Carrier iQ
        Bruce Leak
        Jon Feiber, Mohr Davidow Ventures
        Martin Gibson, Accel Partners
        Bruce Sachs, Charles River Ventures
        Dominic Endicott*, Nauta Capital
        Matthew Cowan, Bridgescale Partners
        *Dominic Endicott
        Nauta Capital

        Dominic has over 20 years of global management and consulting experience, across North America, Europe and Latin America. He manages Nauta Capital's operations in North America, and is Nauta's representative on the Carrier IQ Board.  He previously managed North American operations for Cluster Consulting, a company owned by the founders of Nauta, and acquired in 2000 by Diamond Technology Partners. As a consultant with ... <CIA and Homeland Security subcontractor>  BOOZ ALLEN**, Dominic has worked extensively with global wireless operators, their suppliers and content partners. Dominic has a degree in Economics from the London School of Economics, and a Master's degree in management from MIT's Sloan School.  Nauta's US operations are based in Boston, and its European operations are based in Barcelona.

        http://en.wikipedia.org/wiki/Booz_Allen_Hamilton

        **Booz Allen Hamilton is majority owned by private equity firm The Carlyle Group  ...  with longstanding relationships with federal intelligence agencies, with current and former employees including former Director of Central Intelligence, R. James Woolsey, former CIA employee Miles Copeland, Jr., former NRO Director Keith R. Hall, former NSA Director Mike McConnell, who was the second Director of National Intelligence, and former DIA, NGA and the current for the Director of National Intelligence, James R. Clapper

        <[Alumni include] Dov ZakheimUnder Secretary of Defense (Comptroller) (2001–04) <<suspected Israeli agent, under whom trillions of dollars suddenly "vanished" from the Pentagon's books just before 9/11>>

        Investigative journalist Tim Shorrock [reports] that Booz Allen was a sub-contractor with two programs at the U.S. National Security Agency (NSA), called Trailblazer and Pioneer Groundbreaker.

        [Another Booz Allen project is] known as PISCES (Personal Identification Secure Comparison and Evaluation System), the "terrorist interdiction system" matching passengers inbound for the United States against facial images, fingerprints and biographical information at airports in high-risk countries. A high-speed data network permits U.S. authorities to be informed of problems with inbound passengers. Although PISCES was operational in the months prior to September 11, it apparently failed to detect any of the terrorists involved in the attack.

        Privacy advocates have alleged that the PISCES system is deployed in various countries that are known for human rights abuses (ie Pakistan and Iraq) and that facilitating them with an advanced database system capable of storing biometric details of travelers (often without consent of their own nationals) poses a danger to human rights activists and government opponents.

        http://www.huffingtonpost.com/2011/07/11/booz-allen-hamilton-hack_n_895147.html

        A group of hackers who have taken credit for several high-profile data breaches in said Monday it had done it again, this time infiltrating the network of a government contractor and releasing what it says are thousands of military email addresses.

        Calling the hack "Military Meltdown Monday," the hacker group claimed to have penetrated a computer server of Booz Allen Hamilton and released a list of more than 90,000 military email addresses and encrypted passwords ...

        The hacker group also said Monday that Anonymous has uncovered "all sorts of other shady practices" by Booz Allen, including potentially illegal surveillance systems, corruption between company and government officials, and warrantless wiretapping.

        "All of this, of course, taking place behind closed doors, free from any public knowledge or scrutiny," the group said.

        http://www.carrieriq.com/company/privacy.htm

        CARRIER IQ
        Privacy and Security

        Carrier IQ enables mobile operators, mobile device manufacturers, application vendors and other participants in the Mobile Ecosystem to deliver high quality products and services, based on what you want, where you want and to work and perform the way you expect.

        In providing our products and services, Carrier IQ enables our customers to gather information on Mobile User Experiences. Carrier IQ's products were developed from inception to respect and protect user privacy and security. We have established "Best Practices" approach to privacy and security. Our products are designed and configured to work within the privacy policies of our end customers and include functions such as anonymization and encryption. When Carrier IQ's products are deployed, data gathering is done in a way where the end user is informed or involved.

        With deployment on over 130 million phones globally, we have considerable experience in protecting the privacy of the end user and doing so in a highly secure manner. Information transmitted from enabled mobile devices is stored in a secure data center facility that meets or exceeds industry best practice guidelines for security policies and procedures.

        Our data gathering and data storage policies are built from industry best practice. Our products allow us to address privacy & security requirements that vary country-by-country and customer-by-customer. There are a variety of techniques involved in protection of privacy and in implementation of security policy, including anonymization of certain user-identifiable data, aggregation of data and encryption of data, etc.

        We work in partnership with our customers to ensure compliance with their data collection and protection policies. While much of the data we gather data is already available through alternate methods, we make it more efficient and useful – aimed at improving products, services and quality for the end user.

         
        Along with DOMINIC ENDICOTT {see above], NAUTA's principals include:
         
         
        Quote to note: "has served clients including VODAFONE"

        CIA and NSA had Vodaphone tap Greek leaders, journalists

        March 9, 2006 2:15 AM
         
        The mobile phones of Greek prime minister Costas Caramanlis and top government and security officials were tapped by unknown individuals <sic> during the Athens 2004 Olympics and for nearly a year after, the government said yesterday.

        "The people [under surveillance] included the prime minister himself and other members of the government," government spokesman Theodoros Roussopoulos told a news conference.

        The list of about 100 people whose telephones were tapped included the ministers of foreign affairs, defence, public order and justice.  Most of Greece's top military and police officers were also targeted, as were foreign ministry officials, a US embassy number and the prime minister's wife, Natasha.

        ...The government revealed that the phone tappers used interceptors traced to the vicinity of the US embassy.
        Senior Vodaphone network administrator who inserted tracking software into Vodaphone system supposedly committed suicide;
        Part of the government's investigation will re-examine the supposed suicide of Kostas Tsalikidis, 39, Vodafone Greece's head of network design. Tsalikidis was found hanged in his Athens flat on March 9, only two days after Vodafone Greece identified and removed the eavesdropping software from its systems...
         
        Vodafone is a British company, comparable to Sprint in the United States. Testifying before a Greek parliamentary committee, Koronias insisted that no-one in the U.K. could have had any connection to the ultra-sophisticated spyware.
        'Only Ericsson's staff could have set up such a device,' he said.  Ericsson furiously countered that Vodafone not only knew about the illegal software but had activated it at the request of British intelligence agents.
        Ericsson, the company that produces the software used by Vodafone, issued an announcement clarifying that two types of software were employed for tapping the phone conversations.  The first one employed legally had been developed by Ericsson and had been installed in Vodafone, yet it was not activated. The second software, which was of unknown origins (it had not been developed by Ericsson) had been illegally installed in Vodafone's system to activate the legal software and erase the traces of the phone-tapping.
        This is, by any measure, a troubling admission -- especially since Ericsson manufactures many mobile phones used in the United States
         
        Vodaphone insists they were never informed of this "feature" in Ericsson phones, although Ericsson executive Bill Zikou has testified that the company disclosed the truth via its sales force and instruction manuals.
        American security expert John Brady Kiesling reveals some surprising details about the eavesdropping malware embedded in Ericsson equipment:

        Built into the Ericsson (Sweden) software that runs the Vodafone (UK-owned) mobile telephony network switching system in Greece, and similar GSM service providers around the world, is a little-known "Legal Interception" software package designed to be used by law enforcement authorities.  This software allows incoming and outgoing conversations from allegedly up to 5000-6000 mobile phone numbers to be recorded, on presentation of a valid judicial warrant. [A friend in telecoms claims governments require that telephone companies give law enforcement authorities the capability to monitor up to 5% of active calls as one precondition for an operating license].
         
        However, to unlock and use the eavesdropping package, the company must pay Ericsson a hefty fee (allegedly four million euros). The Greek government allegedly refused to pay this fee, despite its desire for wiretapping capability during the 2004 Athens Summer Olympics. One reason was that a clear legal basis for such eavesdropping was not yet in place..

        Apparently someone persuaded a Vodafone or Ericsson employee with access to the switching network to install a software parasite in at least 4 and possibly more of the 22 call management centers that Vodafone operates in Greece.
         
        ....
        Perhaps most disturbing of all, Vodaphone eliminated the spyware from its system before Greek intelligence could conduct an examination. Greek spy chief Ioannis Korantis testified that this move amounted to destruction of evidence.

        In 1999, the Village Voice published a piece alleging a connection between American intelligence and Ericsson -- which, it seems, supplied telecom technology to Iraq.  According to the Voice, the American agency in question was not NSA or CIA or DIA, as you might surmise, but a little-known group called SCS -- Special Collection Services.
         
        According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm...
         
        More:
        Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, "It would be classified and we would not be able to talk about it."

      Your message has been successfully submitted and would be delivered to recipients shortly.