Traitorware: The Firmware that Runs Your Technology May be Reporting You

There is a new term coming from the realms of technology with a Big Brother angle. That term is Traitorware. Traitorware is the new computer code ran in everyday devices that devices that act behind your back to betray your privacy. In other words, they report what you are doing to a higher authority.

We know companies like General Motors has the technology to do this with On-Star. Ford now has a similar system that reports data back to Ford. Microsoft has admitted the Xbox Kinnect snoops around your living room and your bedroom for clues about your lifestyle so they can market to you. Of course, there is talk of your car having a little black box one day that will report to authorities and insurance companies your driving habits. Traitorware has been here for many years; however, the complexity and the level of traitorware has been increasing in recent years.

Early in his presidency, Barack Obama argued in front of a federal court that Americans give up any reasonable expectation of privacy when they use a cell phone. Obama wants to use cell phones to track Americans while making the federal government immune to any lawsuits against it that come about from Obama's desire to kill the Fourth Amendment.

It's not just your cell phone that code is being developed to report your activities back to a higher authority. The Electronic Frontier Foundation has a warning in one of its articles about just how intense Big Brother entry into the world of personal electronics has become.

Your digital camera may embed metadata into photographs with the camera’s serial number or your location. Your printer may be incorporating a secret code on every page it prints which could be used to identify the printer and potentially the person who used it. If Apple puts a particularly creepy patent it has recently applied for into use, you can look forward to a day when your iPhone may record your voice, take a picture of your location, record your heartbeat, and send that information back to the mothership.

Perhaps the most notable example of traitorware was the Sony rootkit. In 2005 Sony BMG produced CD’s which clandestinely installed a rootkit onto PC’s that provided administrative-level access to the users’ computer. The copy-protected music CD’s would surreptitiously install its DRM technology onto PC’s. Ostensibly, Sony was trying prevent consumers from making multiple copies of their CD’s, but the software also rendered the CD incompatible with many CD-ROM players in PC’s, CD players in cars, and DVD players. Additionally, the software left a back door open on all infected PC’s which would give Sony, or any hacker familiar with the rootkit, control over the PC. And if a consumer should have the temerity to find the rootkit and try to remove the offending drivers, the software would execute code designed to disable the CD drive and trash the PC.

Traitorware is sometimes included in products with less obviously malicious intent. Printer dots were added to certain color laser printers as a forensics tool for law enforcement, where it could help authenticate documents or identify forgeries. Apple’s scary-sounding patent for the iPhone is meant to help locate and disable the phone if it is lost of stolen. Don’t let these good intentions fool you—software that hides itself from you while it gives your personal data away to a third party is dangerous and dishonest. As the Sony BMG rootkit demonstrates, it may even leave your device wide open to attacks from third parties.

Traitorware is not some science-fiction vision of the future. It is the present. Indeed, the Sony rootkit dates back to 2005. Apple’s patent application indicates that we are likely to see more traitorware on the horizon. When that happens, EFF will be there to fight it. We believe that your software and devices should not be a tool for gathering your personal data without your explicit consent.


I agree. You should be able to buy devices whether it be a digital camera, computer printer, or car without having to worry about your privacy rights unknowingly being infringed upon. Considering Obama's direction to use technology against the Fourth Amendment, such as in his argument early in his administration on cell phone tracking, we should all be very concerned.