Feeds

UAE sees security threat in BlackBerrys

Gulf of confusion

3 Big data security analytics techniques

The United Arab Emirates has decided that BlackBerry handsets constitute a threat to national security, and is considering an outright ban.

The UAE regulator has made explicit its fears, in a statement to local media picked up by the Associated Press, that users might "abuse" the BlackBerry service to place their communication beyond the reach of UAE's police and security forces. BlackBerrys do this by storing email on out-of-country servers, and providing a decent level of server-to-handset encryption.

"As a result of how BlackBerry data is managed and stored ... certain BlackBerry applications allow people to misuse the service, causing serious social, judicial and national security repercussions," said the statement, making it clear that having email "managed by a foreign, commercial organisation" was not acceptable.

This follows last year's comedic attempt by state-owned operator Etisalat to slip spyware onto BlackBerry handsets concealed as a network upgrade. That failed, largely because the spyware was riddled with errors and so poorly obfuscated that even your correspondent was able to find the message-intercepting code.

That attempt seriously annoyed RIM, which felt its reputation was under fire. It also made users wary of downloading updates, so it's hard to imagine that a second attempt would be any more successful.

There are, of course, countless ways to communicate over the internet in a secure fashion, but RIM puts secure communications in the hands of every user by default, and various countries have objected to that over the years.

The UAE's regulator's sabre-rattling statement points out that the BlackBerry went on sale before "safety, emergency and national security legislation" was put into place in 2007, but stopped short of calling for an outright ban immediately – presumably in the hope that if it makes enough noise then RIM will come to the table to make a deal. ®

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE & Vodafone will let you BONK on the TUBE – with Boris' blessing
Transport for London: You can pay, but don't touch
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
Google eyes business service in latest Fiber trials
Lucky Kansas City buggers to host yet another pilot program
Huawei exec: 'Word of mouth' will beat Apple and Samsung in Europe
World Mobile Telephone Factory No.3 won't fling the big bucks around just yet
Brazilian president signs internet civil rights law
Marco Civil bill enshines 'net neutrality', 'privacy' as law
DeSENSORtised: Why the 'Internet of Things' will FAIL without IPv6
What's stopping a tinyputer invasion? An IP address shortage, says Cisco
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.