For years, critics have bemoaned the sad state of security updates available to hundreds of millions of owners of mobile devices running Google's Android operating system. Now, federal regulators are investigating whether Google, Apple, and the rest of the players in the mobile industry are doing everything they can to keep their customers safe.
Further Reading
"There have recently been a growing number of vulnerabilities associated with mobile operating systems that threaten the security and integrity of a user’s device and all the personal, sensitive data on it," Jon Wilkins, chief of the FCC's Wireless Telecommunications Bureau, wrote in a letter to carriers. "One of the most significant to date is a vulnerability in the Android component called 'Stagefright.' It may have the ability to affect close to 1 billion Android devices around the world. And there are many other vulnerabilities that could do just as much harm."
Further Reading
Feet to the fire
Some of the information the FCC is demanding from carriers includes:
- The period of time that a specific device model will be supported for security updates, including the frequency or timing of security updates;
- The Company’s process for developing a security update to address the vulnerability, including whether and how any other entity identified in [a previous]
response ... was involved in developing or testing the security update; and - If a security update for the vulnerability was not deployed to end-user devices, whether the company notified consumers that the specific device model would not receive a security update for the vulnerability.
Information the FTC is demanding from OS and hardware makers includes:
- the factors that they consider in deciding whether to patch a vulnerability on a particular mobile device;
- detailed data on the specific mobile devices they have offered for sale to consumers since August 2013;
- the vulnerabilities that have affected those devices; and
- whether and when the company patched such vulnerabilities.
It may seem unfair that Apple and its partners are among those receiving the same scrutiny when the company's iOS is widely regarded as the model for timely mobile security updates. There's some legitimacy here, but at the same time, the responses are likely to provide a stark contrast with those coming from Google and its partners.
In 2013, the American Civil Liberties Union asked the FCC to take action against the four major US carriers for selling millions of Android phones that never, or only rarely, received updates. More than three years later, the availability of timely updates hasn't shown much improvement, in part because carriers blame the delays on manufacturers and vice versa. The coordinated probe of OS developers, carriers, and device makers may not lead to a longterm solution either, but the feds should at least be commended for giving it a try.
Promoted Comments
The kind of back and forth blame has gotten kind of perverse now. Motorola developed an Android 6.0 for the 2014 Moto X (they released it for the unlocked Moto X, but not the carrier ones), but declined to give it to carriers to undergo certification because they didn't want to pay the cost of certifying the patch to the carriers. So when you go to Motorola, they tell you the carrier is preventing them from releasing it (even though the update is complete). And when you go to the carriers, they tell you that Motorola never sent them an update to certify.
You must login or create an account to comment.