Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

RIM Disputes Indian Media – Cannot and Will Not Provide Email Encryption Keys

BlackBerry maker Research In Motion (RIM) is disputing what they call false and misleading information coming out of India, which states that they have reached an agreement with the government to provide the encryption keys to corporate email and instant messages.

BlackBerry maker Research In Motion (RIM) is disputing what they call false and misleading information coming out of India, which states that they have reached an agreement with the government to provide the encryption keys to corporate email and instant messages.

On Thursday, India’s Economic Times ran a story that said RIM has gone a step further in their four-year back and forth with the Indian government, where previously they had established a datacenter in Mumbai to help law enforcement and government officials conduct lawful intercepts and searches, saying the Canadian telecommunications firm would now also offer access to enterprise email.

BlackBerry Encryption Keys to Indian Government“RIM recently demonstrated a solution developed by a firm called Verint that can intercept messages and emails exchanged between BlackBerry handsets, and make these encrypted communications available in a readable format to Indian security agencies, according to an exchange of communications between the Canadian company and the Indian government,” the Economic Times reported

However, in an email to SecurityWeek, RIM outright denied the claims that they were handing over access to enterprise communications. To put it simply, the spokesperson said that RIM cannot provide access to the BlackBerry Enterprise Server protected emails, because they don’t have access to the encryption keys.

“RIM has found it necessary to correct some false and misleading information appearing in the media in India and would like to take an opportunity to set the record straight,” the spokesperson told SecurityWeek in an email Thursday night.

“RIM is providing an appropriate lawful access solution that enables India’s telecom operators to be legally compliant with respect to their BlackBerry consumer traffic, to the same degree as other smartphone providers in India, but this does not extend to secure BlackBerry enterprise communications.”

The statement goes on to say that RIM has explained this issue on several occasions, and as explained in the company’s Lawful Access Principles, “RIM cannot access information encrypted through BlackBerry Enterprise Server as RIM is not ever in possession of the encryption keys.” SecurityWeek covered news from the BlackBerry maker back in August 2010 when it responded to pressure from authorities in India by saying the same thing—it did not have the ability to provide its customers’ encryption keys.

Related Reading: Failure of the BlackBerry PlayBook Means CIOs Need to Plan for an Apple World

Related Reading: Why the BlackBerry PlayBook Shows Us The Future of Enterprise Security — Especially if it Fails

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.