Feeds

India claims access to BlackBerry comms

Long way from resolution, with only weeks to go

High performance access to file storage

The Indian government is claiming that RIM has offered it access to instant messaging conversations within hours of a request, though access to email remains unresolved with time running out.

India told Reuters that RIM has offered to provide transcripts of instant messaging sessions, with real-time interception available by the end of the year. But RIM still has to sort out lawful intercept to BlackBerry email by the end of October or face a nationwide ban, while BlackBerry users in UAE are looking at a ban starting at the end of this week unless RIM manages the impossible, and quickly.

The UAE will instruct network operators to block BlackBerry communications, including web browsing, email and messaging, from next Monday (11 October) unless it gets lawful access to all communications before then. Apparently this is affecting sales of BlackBerrys in the region.

Messaging services are routed through RIM's servers, so can be intercepted, as can email services hosted by the company. But where a company has set up its own BlackBerry Enterprise Server (BES) the encryption key is only shared between that server and the handset, so interception is all but impossible for RIM or anyone else.

Still, reality cuts little slack with politicians who are more concerned with listening in on criminals than understanding the intricacies of modern cryptography - as evidenced by the various calls insisting that RIM should be forced to hand over the mythical "master key" that would allow government's lawful intercept.

Last month RIM's CEO suggested that governments set up national registers and ask their citizens to submit encryption keys, pointing out that any government that wishes to eavesdrop on its citizens should make the request of those citizens, not an out-of-country supplier of IT kit.

It's a suggestion of which other governments might like to take note. The Obama administration is already making noises about requiring facilities for lawful intercept to be provided by every company involved in communications within the USA - but then it's much easier to bully IT companies than an entire electorate. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.