Feeds

RIM's backdoor sniffed by BBM-snooping Indian spooks

BlackBerry biz pushes BES access headache to operators

Next gen security for virtualised datacentres

Research In Motion is finally set to offer the Indian authorities a permanent system for access to its consumer-focused messaging services with the installation of new Mumbai-based servers.

The Times of India was given a government briefing on the matter. It claimed that the servers have been inspected by government officials and that permission would shortly be granted by the BlackBerry maker for lawful interception of messages if the intelligence agencies there suspect terrorist or other serious illegal activity is being conducted via the platform.

The news comes a few months after a Wall Street Journal report claimed that a monitoring facility had already opened in Mumbai to deal with any requests from the authorities. The Reg is still waiting to hear back from RIM on whether the two stories are linked.

It is also believed that RIM was co-operating with the authorities before this on ad hoc requests to access any email or BBM messages sent over its consumer service.

The Indian reports also claim that the government has backed down on its demands to gain access to BlackBerry Enterprise Service (BES) messages. RIM rightly always maintained that it couldn’t provide access to content running on its corporate service because it didn’t hold the encryption keys – they reside with the sponsoring organisation or business.

Intelligence Bureau director Nehchal Sandhu admitted to the paper that such corporate communications were not of “high concern” anyway from a security standpoint.

However, RIM has reportedly reached an agreement with the government which effectively pushes responsibility for providing access to BES communications down to the service provider level.

The report said that the government would be tapping up mobile operators like Vodafone, Airtel and RCom for a list of the approximately 5,000 BES servers in the country and their locations.

However, while the deal will enable RIM to comply with local laws while washing its hands of the tricky BES problem, it remains unclear how the network operators will be any more able to provide access to BES – given that the encryption keys remain in the hands of their customers.

It’s not all about RIM, of course. The report revealed that the Nokia Push Mail service would be targeted next by the Department of Telecommunications.

Other online communications giants including Yahoo!, Google and Skype are also thought to be in dialogue with the authorities over providing more local services which can be brought under the same strict guidelines. ®

Next gen security for virtualised datacentres

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?