Risk
4/5/2011
02:41 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Feds Probe Mobile App Privacy

Pandora, an online music service, got hit with a subpoena that appears to be part of an investigation into the information sharing processes of apps that run on Apple and Android mobile platforms.

Best Mobile Apps For Busy Professionals
(click image for larger view)
Slideshow: Best Mobile Apps For Busy Professionals
Federal prosecutors in New Jersey are investigating how mobile apps use personal data, according to an unnamed source cited in a story by the Wall Street Journal.

A spokesperson for the Office of the U.S. Attorney in New Jersey declined to comment, citing a policy of not discussing any ongoing investigation.

But on Monday, Pandora, an online music service that distributes mobile music apps, confirmed that earlier this year it had been "served with a subpoena to produce documents in connection with a federal grand jury, which we believe was convened to investigate the information sharing processes of certain popular applications that run on the Apple and Android mobile platforms."

Pandora revealed that it had received the subpoena in a financial filing with the SEC. The company noted that while it was not a specific target in the investigation, it could nonetheless incur costs to comply with the subpoena and might be dragged into litigation.

The revelation follows a series of reports by the Wall Street Journal about online privacy. In October, the paper found that the 10 most popular Facebook apps were sending Facebook UIDs (user IDs) to at least 25 data collection and advertising firms. In December, it found that 56 out of 101 popular smartphone apps transmitted the phone's unique device ID number without consent and that almost as many transmitted location data.

These findings have piqued the interested of regulators at the Federal Trade Commission and the Department of Justice and have prompted at least one lawsuit already.

The Federal Trade Commission has been backing a do-not-track proposal and legislators like Senator Jay Rockefeller say that basic privacy rules are necessary. In all likelihood, the era of self-regulation for mobile and online apps will soon end.

While privacy rules may provide a framework to punish those acting in bad faith, they're not likely to ensure individual privacy. Without a complete source code review by a third-party -- something that's not likely to happen -- it's relatively easy for an ill-intentioned developer to spirit information out of a user's phone. A simple method would be to cache sensitive data and transmit it, perhaps in encrypted or obfuscated form, a month or two after installation.

Even with a mobile operating system like Android, which requires users to authorize network access in apps, the fundamental problem is that personal and financial data be used both legitimately and illegitimately and it's not always possible to divine intent from raw data.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2227
Published: 2014-07-25
The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file.

CVE-2014-5027
Published: 2014-07-25
Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page.

CVE-2014-5100
Published: 2014-07-25
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_...

CVE-2014-5101
Published: 2014-07-25
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authn...

CVE-2014-5102
Published: 2014-07-25
SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.