Risk
4/5/2011
02:41 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Feds Probe Mobile App Privacy

Pandora, an online music service, got hit with a subpoena that appears to be part of an investigation into the information sharing processes of apps that run on Apple and Android mobile platforms.

Best Mobile Apps For Busy Professionals
(click image for larger view)
Slideshow: Best Mobile Apps For Busy Professionals
Federal prosecutors in New Jersey are investigating how mobile apps use personal data, according to an unnamed source cited in a story by the Wall Street Journal.

A spokesperson for the Office of the U.S. Attorney in New Jersey declined to comment, citing a policy of not discussing any ongoing investigation.

But on Monday, Pandora, an online music service that distributes mobile music apps, confirmed that earlier this year it had been "served with a subpoena to produce documents in connection with a federal grand jury, which we believe was convened to investigate the information sharing processes of certain popular applications that run on the Apple and Android mobile platforms."

Pandora revealed that it had received the subpoena in a financial filing with the SEC. The company noted that while it was not a specific target in the investigation, it could nonetheless incur costs to comply with the subpoena and might be dragged into litigation.

The revelation follows a series of reports by the Wall Street Journal about online privacy. In October, the paper found that the 10 most popular Facebook apps were sending Facebook UIDs (user IDs) to at least 25 data collection and advertising firms. In December, it found that 56 out of 101 popular smartphone apps transmitted the phone's unique device ID number without consent and that almost as many transmitted location data.

These findings have piqued the interested of regulators at the Federal Trade Commission and the Department of Justice and have prompted at least one lawsuit already.

The Federal Trade Commission has been backing a do-not-track proposal and legislators like Senator Jay Rockefeller say that basic privacy rules are necessary. In all likelihood, the era of self-regulation for mobile and online apps will soon end.

While privacy rules may provide a framework to punish those acting in bad faith, they're not likely to ensure individual privacy. Without a complete source code review by a third-party -- something that's not likely to happen -- it's relatively easy for an ill-intentioned developer to spirit information out of a user's phone. A simple method would be to cache sensitive data and transmit it, perhaps in encrypted or obfuscated form, a month or two after installation.

Even with a mobile operating system like Android, which requires users to authorize network access in apps, the fundamental problem is that personal and financial data be used both legitimately and illegitimately and it's not always possible to divine intent from raw data.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.