To create transparency for the public that has been monitored by the more intrusive variants of this software, we will need a comprehensive library of these Profiles, and to know which ones were pushed to which phones at what times. Profiles are stored in different locations in different versions of the Carrier IQ software, and in many cases, a phone may need to be jailbroken or rooted before the profile can be extracted.
If you have a rooted/jailbroken phone, and can find a Profile on it, please send us 1) a copy of the Profile, 2) which phone and network it was from, and 3) where on the phone's file system you found it. You can send us this information in an email at email@example.com or in a git remote we can pull from.
EFF volunteer Jered Wierzbicki reverse engineered the file format and has written a program for parsing it called IQIQ. Information on this can be found on the EFF website. There's also a lot of information on the XDA Developers forum on methods of finding Carrier IQ data.
- Carrier IQ comes under FTC and FCC scrutiny
- Carrier IQ ‘may have’ collected text messages
- Carrier IQ - The FBI connection
- So, there’s a rootkit hidden in millions of cellphones
- Carrier IQ patent outlines keylogging and ability to target individual devices
- Android bloatware results in serious security flaws
- Check your Android handset for Carrier IQ rootkit
- How to disable the Carrier IQ ‘rootkit’ on your iPhone
- CarrierIQ: Follow the money and it is the carriers behind it
- Finding and cleaning out your smartphone’s Carrier IQ poison
- Which phones, networks run Carrier IQ mobile tracking software?