EFF wants your help in finding out what Carrier IQ is actually monitoring

Carrier IQ file format reverse-engineered.

The Electronic Frontier Foundation (EFF) needs your help in finding out exactly what the Carrier IQ software embedded into millions of handsets actually does on specific handsets.

To create transparency for the public that has been monitored by the more intrusive variants of this software, we will need a comprehensive library of these Profiles, and to know which ones were pushed to which phones at what times. Profiles are stored in different locations in different versions of the Carrier IQ software, and in many cases, a phone may need to be jailbroken or rooted before the profile can be extracted.

If you have a rooted/jailbroken phone, and can find a Profile on it, please send us 1) a copy of the Profile, 2) which phone and network it was from, and 3) where on the phone's file system you found it. You can send us this information in an email at iqiq@eff.org or in a git remote we can pull from.

EFF volunteer Jered Wierzbicki reverse engineered the file format and has written a program for parsing it called IQIQ. Information on this can be found on the EFF website. There's also a lot of information on the XDA Developers forum on methods of finding Carrier IQ data.