Feeds

UAE sees security threat in BlackBerrys

Gulf of confusion

Remote control for virtualized desktops

The United Arab Emirates has decided that BlackBerry handsets constitute a threat to national security, and is considering an outright ban.

The UAE regulator has made explicit its fears, in a statement to local media picked up by the Associated Press, that users might "abuse" the BlackBerry service to place their communication beyond the reach of UAE's police and security forces. BlackBerrys do this by storing email on out-of-country servers, and providing a decent level of server-to-handset encryption.

"As a result of how BlackBerry data is managed and stored ... certain BlackBerry applications allow people to misuse the service, causing serious social, judicial and national security repercussions," said the statement, making it clear that having email "managed by a foreign, commercial organisation" was not acceptable.

This follows last year's comedic attempt by state-owned operator Etisalat to slip spyware onto BlackBerry handsets concealed as a network upgrade. That failed, largely because the spyware was riddled with errors and so poorly obfuscated that even your correspondent was able to find the message-intercepting code.

That attempt seriously annoyed RIM, which felt its reputation was under fire. It also made users wary of downloading updates, so it's hard to imagine that a second attempt would be any more successful.

There are, of course, countless ways to communicate over the internet in a secure fashion, but RIM puts secure communications in the hands of every user by default, and various countries have objected to that over the years.

The UAE's regulator's sabre-rattling statement points out that the BlackBerry went on sale before "safety, emergency and national security legislation" was put into place in 2007, but stopped short of calling for an outright ban immediately – presumably in the hope that if it makes enough noise then RIM will come to the table to make a deal. ®

Internet Security Threat Report 2014

More from The Register

next story
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Ofcom snatches 700MHz off digital telly, hands it to mobile data providers
Hungry mobe'n'slab-waving Blighty swallows spectrum
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.