Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

You Have No Privacy
Townhall.com ^ | December 3, 2011 | Floyd and Mary Beth Brown

Posted on 12/03/2011 7:56:05 AM PST by Kaslin

If you are like us, every day you pick up a smartphone and you send email, visit with friends on Facebook, send a text message or even log into your bank's website and pay a bill. These modern day conveniences have become routine.

We all believe that our passwords are secure, our data is protected, and life is easier if we don't have to write a check to pay a bill or dig around and find a stamp to send a friend a quick note.

But this morning we are no longer sure. The tech world is in a fury, which we believe will soon break out into society at large, about a little-known software program call Carrier IQ. Over the Thanksgiving weekend a 25-year-old programmer by the name of Trevor Eckhart posted a video on YouTube which graphically displays how our naïve beliefs of privacy are just plain wrong.

The video, which lasts 17 minutes and starts slowly because he methodically goes through the privacy statements on his cell phone, is frightening. If you watch it, you will never look at your smartphone the same again. We have posted the video at Floydreports.com if you want to watch.

The program, Carrier IQ cannot be turned off. But it tracks your every move. Dial a friend's phone, it sends the number off to someone. Send or receive a text message and the message is recorded and sent off. Call up your bank or another website in the allegedly secure https: mode which we have been told is secure, and Carrier IQ is there recording your username, password and any other move you make on your phone.

Rather than calling them smartphones, we should be calling them people monitors. The only action you take which it cannot record is a thought in your head that you refuse to express. These phones are even capable of recording what you say. Scary is not the word for it.

Trevor Eckhart even takes pains to turn of the GPS function for use by Google maps and search and then he demonstrates how Carrier IQ still is logging your position.

Now what can you do about it? The program can only be removed if you hack or as they say "root" your phone. But beware – rooting your phone likely violates the contract you have signed with your carrier, and it clearly voids any manufacturers’ warranty you may have on the device.

Since the video was first posted, others have gone to work and exposed how in addition to Android phones, the Carrier IQ software is also present on I Phones with iOS3 operating system and above.

The privacy issues surrounding smartphones have been numerous, but the exposure of Carrier IQ brings the threat to an entirely new level. Chances are if you have a smartphone, you have no privacy around or while using the device. Be careful.

Makes you understand why criminals all use burner phones.


TOPICS: Culture/Society; Editorial; Front Page News
KEYWORDS: android; bigbrother; carrieriq; cellphone; cellphones; corruption; criminals4privacy; eckhart; fraud; gps; ios3smartphone; iphone; keylogger; lping; policehaters; privacy; smartphone; smartphones; somethingtohide; trevoreckhart; waronterror
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-83 next last

1 posted on 12/03/2011 7:56:06 AM PST by Kaslin
[ Post Reply | Private Reply | View Replies]

To: Kaslin

Facebook and the like are security risks for bigger reasons.

They provide a pathway for takeover of your computer.

This means more than access to personal and private info, it means potential use of your system as a storage and messaging center for criminals and foreign entities.

I also don’t use a smartphone.....


2 posted on 12/03/2011 8:09:04 AM PST by G Larry ("I dream of a day when a man is judged by the content of his Character.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

Every time you requet a URL and visit a website a record of your visit is kept by your ISP.

This is only as private as it takes someone who knows what they are doing to hack it or for the IPS to give it up.

Is anyone surprised at this? You shouldn’t be.

Now thay are putting smart meters on your house so they do not have to send oput the meter reader. Theycan tell when you go on vacation or when you are using the air conditioner. You are photographed everywhere you go by speed camera’s Traffic light Camera’s, security camera’s, Your cell phone can be tracked, your automobile can be tracked,with it’s onboard phone, If you have a wreck the on board system notifies the police while you sit there with the air bag in your face.Your conversations can be listened to while you drive down the road.

Privacy? Maybe in your bedroom if you keep the curtains drawn, put the phone and TV in another room and are quiet.


3 posted on 12/03/2011 8:12:27 AM PST by Venturer
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

Might make a good alibi, though, for someone thinking ahead. All you need is a reliable accomplice who can take your smartphone for a very traceable outing, complete with FB comments, while you head in the other direction to commit whatever mayhem you had in mind.


4 posted on 12/03/2011 8:12:52 AM PST by A_perfect_lady (Islam is as Islam does.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

This is frustrating, and scary, downright 1984-ish, but, what can we do? Simply shun all the technological advances we’ve had for the last 100 years? Move to a cabin in the woods with no power and hunt, fish, and gather again for sustenance?

Even sending a paper check through the mail has your account number on it.


5 posted on 12/03/2011 8:16:38 AM PST by RockinRight (If you're waiting to drink until you find pure water, you're going to die of dehydration.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

6 posted on 12/03/2011 8:16:44 AM PST by Liberty Valance (Keep a simple manner for a happy life :o)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

So what was the intent of Carrier IQ? We know its capability, but who dreamed it up and why?


7 posted on 12/03/2011 8:20:37 AM PST by umgud
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

So how do I root my smart phone?


8 posted on 12/03/2011 8:21:54 AM PST by muddler (Diligentia, Vis and Celeritas)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

Want to really get creeped out/ go to Spokeo.com and type in your name....


9 posted on 12/03/2011 8:21:54 AM PST by Kozak ("It's not an Election it's a Restraining Order" .....PJ O'Rourke)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin
I think I have all of that and more but still have total privacy. What I wish to share is mine to share, what I have in my head and what is really personal is only mine. You can find out a lot of useless information or MIS-information I have out there about me. But that isn't my PRIVATE information.

I think you can do damage with information if you try. Like SSN and Banking information, but that is a failure by our Government making us just a number, and Banks using poor security. You find that the real hit to you is taking your hard earned money, and your reputation.

Best answer to the problem is I think getting out of a megabank, and getting rid of the credit cards. Then slowly building an alternate address that your MAIL goes to, and NOT the place you LIVE and SLEEP at night.

How To Be Invisible
10 posted on 12/03/2011 8:21:59 AM PST by King_Corey (www.kingcorey.com -- Twitter @KingCorey_Com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

I’m curious...what are you selling?


11 posted on 12/03/2011 8:28:57 AM PST by O6ret (for)
[ Post Reply | Private Reply | To 1 | View Replies]

To: G Larry

I do what I can. I am not on Facebook, I do not Tweet, I am not Linkedin. I use Ixquick for my searches. It doesn’t track your IP, nor are there cookies. My cell phone is ancient. Friends laugh when I flip it open, and have to pull up the antenna! I still don’t feel secure.


12 posted on 12/03/2011 8:29:16 AM PST by Dr. Bogus Pachysandra ( Ya can't pick up a turd by the clean end!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Kaslin

The Founders met in taverns and back rooms so they wouldn’t be spotted by the British, who had Tory spies everywhere.

The lack of cyber privacy is the more reason to meet your friends face-to-face ... like at the pistol range.


13 posted on 12/03/2011 8:36:52 AM PST by DNME (A monarch's neck should always have a noose around it. It keeps him upright. - Robert Heinlein)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

Here’s my understanding of the iPhones “tracking”. It does not track the user, it tracks a file. It’s debatable how much difference there is in that distinction.

In other word, tracking file GUID Azsdq%guq-00, does not equal tracking John Smith, sim card number, and phone number, who lives at, etc etc.


14 posted on 12/03/2011 8:37:36 AM PST by moehoward
[ Post Reply | Private Reply | To 1 | View Replies]

To: RockinRight
Well, I use a smart phone (iphone) and before this story I dismised this stuff as no big deal but this is over the top. This is wire tapping pure and simple. I'm now officially tired of hearing about this sneaky crap monitoring my phone.

While I always hesitate to say we need legislation, but in this case I think we do. We need to make secret collecting of data from private phones absolutely illegal and subject to criminal prosecution as well as civil litigation. If any data no matter for what purpose was taken off of my phone without my consent I should be able to sue their asses off then have the DA hit them with criminal charges. In the day of the old land lines if some company figured out a way to monitor your phone without your knowledge they would have been thrown in the slammer so fast they would not know what hit them. How is this any different other than it's clearly worse as they are deliberately collecting secure information.

15 posted on 12/03/2011 8:42:03 AM PST by precisionshootist
[ Post Reply | Private Reply | To 5 | View Replies]

To: Kaslin

I love my Western Electric telephones. Some of them are older than I am, and still work.


16 posted on 12/03/2011 8:45:04 AM PST by Olog-hai
[ Post Reply | Private Reply | To 1 | View Replies]

To: Abathar; Abcdefg; Abram; Abundy; albertp; Alexander Rubin; Allosaurs_r_us; amchugh; ...



Libertarian ping! Click here to get added or here to be removed or post a message here!

17 posted on 12/03/2011 8:48:53 AM PST by bamahead (Few men desire liberty; most men wish only for a just master. -- Sallust)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

You Have No Privacy
Companies such as Acxiom and Choice point has ALL information on you and it’s for sale.


18 posted on 12/03/2011 8:56:43 AM PST by Vaduz
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

I believe that we went thru a similar problem about 10 years ago. The answer was to encrypt you messages. Everything, that hits the Internet is scrutenized.


19 posted on 12/03/2011 9:16:07 AM PST by Citizen Tom Paine (An old sailor sends)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaslin

As example of encryptian software is “PGP® Desktop Email from Symantec is email encryption software that offers automatic email encryption, without affecting the end-user experience.”

I have no connection with them, they are just one example.


20 posted on 12/03/2011 9:19:03 AM PST by Citizen Tom Paine (An old sailor sends)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-83 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson