The request to the Federal Bureau of Investigation was made for "manuals, documents or other written guidance used to access or analyze data gathered by programs developed or deployed by Carrier IQ." The FBI refused, quoting exemption 7(A):
... records or information compiled for law enforcement purposes, but only to the extent that production of such law enforcement records or information . . . could reasonably be expected to interfere with enforcement proceedings.
Three possibilities come from this:
- The G Men already use information collected by Carrier IQ (an activity which Carrier IQ itself vigorously denies any involvement in)
- The Feds realize that there might be a treasure trove of information here, and are planning to make use of it
- Carrier IQ itself is under investigation
This is MuckRock's take on the matter:
What is still unclear is whether the FBI used Carrier IQ's software in its own investigations, whether it is currently investigating Carrier IQ, or whether it is some combination of both - not unlikely given the recent uproar over the practice coupled with the U.S. intelligence communities reliance on third-party vendors. The response would seem to indicate at least the former, since the request was specifically for documents related directly to accessing and analyzing Carrier IQ data.
Whatever the reason for the refusal, it is bound to add more fuel to the argument that collecting information without user opt-in raises some serious privacy concerns.
- So, there’s a rootkit hidden in millions of cellphones
- Carrier IQ patent outlines keylogging and ability to target individual devices
- Android bloatware results in serious security flaws
- Check your Android handset for Carrier IQ rootkit
- How to disable the Carrier IQ ‘rootkit’ on your iPhone
- CarrierIQ: Follow the money and it is the carriers behind it
- Finding and cleaning out your smartphone’s Carrier IQ poison
- Which phones, networks run Carrier IQ mobile tracking software?