1.
Introduction ^
2.
What is Spyware? ^
2.1.
Classifications of Spyware ^
2.2.
Motives Behind Using Spyware ^
3.1.
Evidence 1 ^
“You agree that EA may collect, use, store and transmit technical and related information that identifies your computer (including the Internet Protocol Address), operating system, Application usage (including but not limited to successful installation and/or removal), software, software usage and peripheral hardware, that may be gathered periodically to facilitate the provision of software updates, dynamically served content, product support and other services to you, including online services. EA may also use this information combined with personal information for marketing purposes and to improve our products and services. We may also share that data with our third party service providers in a form that does not personally identify you. IF YOU DO NOT WANT EA TO COLLECT, USE, STORE, TRANSMIT OR DISPLAY THE DATA DESCRIBED IN THIS SECTION, PLEASE DO NOT INSTALL OR USE THE APPLICATION. This and all other data provided to EA and/or collected by EA in connection with your installation and use of this Application is collected, used, stored and transmitted in accordance with EA’s Privacy Policy located at www.ea.com. To the extent that anything in this section conflicts with the terms of EA’s Privacy Policy, the terms of the Privacy Policy shall control”.18
3.2.
Evidence 2 ^
“…[this software] monitors all of your Internet behaviour, including both the normal web browsing you perform, and also the activity you may have through secure sessions, such as when filling a shopping basket or filling out an application form that may contain personal financial and health information”22
4.
Spyware Detection ^
4.1.
Detecting Spyware from the EULAs ^
License Analyzer24 is a web based tool that helps users to detect or at least suspect the presence of spyware in a EULA. The method used by License Analyzer is to match and flag some keywords that mostly signify spyware with its database. License Analyzer also rates the complexity of the language used in the EULAs and the likelihood of the presence of spyware by displaying relevant statistics. The EULA in question is copied and pasted in the web-based field of the analyzer and a button is clicked for the analysis to begin. Within a few seconds or minutes a breakdown of the analysis is displayed. License Analyzer is to date in Beta release25 but is a good tool for detecting the presence of spyware in the EULAs.
4.2.
Detecting Spyware during Installation ^
5.
Discussion and Future Work ^
6.
Conclusion ^
- 1 Daniels, J., Scumware.biz Educates about Dangers of Adware/Scumware, Computer Security Update, (5)2, (2004).
- 2 “Inside Spyware: A Guide to Finding, Removing and Preventing Online Pests,” Intranet Journal (2002).
- 3 Short for Remote Administration Trojan.
- 4 Carfarchio, P., The Challenge of Non-Viral Malware, PestPatrol White Paper, (2002).
- 5 Millet, L., Friedman, B., Felten, E., Cookies and Web browser design: toward realizing informed consent online, ACM, Proceeding CH1, P.1 (2001).
- 6 Millet, L., Friedman, B., Felten, E., Cookies and Web browser design: toward realizing informed consent online, ACM, Proceeding CH1, P.1 (2001).
- 7 Matin, D., Wu, H., Alsaid, A., Hidden Surveillance by web sites: Web bugs in contemporary use, ACM, Communication of the ACM, p.260, (2003).
- 8 Ferrer, D., Mead, M., Uncovering the Spy Network, Computers in Libraries, (23)5, p.16. (2003).
- 9 Wildstrom, S., How to Stymie the Snoop in Your PC, BusinessWeek, p. 28 (2004).
- 10 Radcliff, D., Spyware, Network World, (21)4, p. 51. (2004).
- 11 Foster, E. The Spy Who Loves You, Infoworld, (24)20, p. 60. (2002).
- 12 Anonymous Spyware: Spycatcher New Media Age, p. 25. (2004).
- 13 Doyle, E., Not All Spyware is as Harmless as Cookies: Block it or Your Business Could Pay Dearly, Computer Weekly, November 25, p. 32. (2003).
- 14 Network of compromised computers.
- 15 McDowel M., National Cyber Alert System, Cyber Security Tip ST04-015, http://www.us-cert.gov/cas/tips/ST04-015.html, (2004), last viewed February 6, 2012.
- 16 Walker J., EA’s Origin EULA Proves Even more Sinister , http://www.rockpapershotgun.com/2011/08/24/eas-origin-eula-proves-even-more-sinister/ (2011), last viewed February 6, 2012.
- 17 Origin is a digital distribution, digital rights management system from Electronic Arts (a major American developer, marketer and distributor of video games) that allows users to purchase games on the internet for PC and mobile platforms, and download them with the Origin client.
- 18 Walker J., EA’s Origin EULA Proves Even more Sinister, http://www.rockpapershotgun.com/2011/08/24/eas-origin-eula-proves-even-more-sinister/ (2011), last viewed February 6, 2012. See item 5 for further explanation.
- 19 Walker, J., EA’s Origin EULA Proves Even more Sinister, http://www.rockpapershotgun.com/2011/08/24/eas-origin-eula-proves-even-more-sinister/ (2011), last viewed February 6, 2012.
- 20 A type of spyware, see 2.1 above for definition.
- 21 Desautels, E., End User License Agreements: Security and Privacy Implications, US-Cert, p2 (2005).
- 22 See item 5 for further explanation.
- 23 Boldt M., Wieslander, J. , Investigating Spyware in Peer-to-Peer Tools. Blekinge Institute of Technology, (2003).
- 24 www.spywareguide.com/analyze, last viewed January 4, 2012.
- 25 www.spywareguide.com/analyze, last viewed January 4, 2012.
- 26 Boldt, M., Jacobsson. A., Lavesson, N., Davidsson, P., Automated Spyware Detection Using End User License Agreements, 2nd International Conference on Information Security and Assurance, Busan, Korea, (2008).
- 27 Boldt, M., Jacobsson. A., Lavesson, N., Davidsson, P., Automated Spyware Detection Using End User License Agreements, 2nd International Conference on Information Security and Assurance, Busan, Korea, p. 4(4.5) (2008).
- 28 Campbell, A., Coulson, G., Kounavis, M., Managing Complexity: Middleware Explained. IT Professional, IEEE Computer Society, 1:5, p. 22−28. (1999).
- 29 Boldt, M., Wieslander J., Investigating Spyware in Peer-to-Peer Tools, Blekinge Institute of Technology, (2003).
- 30 Chou. W., Inside SSL: the secure layer protocol, IEEE Computer Society, IT Professional, p. 47-52 (2002).