Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

RIM Statement on India’s Demands for Access to Messaging Services – “No Ability to Provide its Customers’ Encryption Keys”

“Contrary to any rumors, the security architecture is the same around the world and RIM truly has no ability to provide its customers’ encryption keys.”

Authorities in India, in and effort to keep militants and spies off its mobile networks, is demanding access to email and messaging services provided by Research In Motion, maker of BlackBerry.

India has given Research In Motion a deadline of August 31st to comply with a request to gain access to encrypted BlackBerry messaging services within India.

“Contrary to any rumors, the security architecture is the same around the world and RIM truly has no ability to provide its customers’ encryption keys.”

Authorities in India, in and effort to keep militants and spies off its mobile networks, is demanding access to email and messaging services provided by Research In Motion, maker of BlackBerry.

India has given Research In Motion a deadline of August 31st to comply with a request to gain access to encrypted BlackBerry messaging services within India.

India’s demands come after Saudi Arabia demanded similar access and according to reports, RIM has agreed to provide government authorities codes for BlackBerry Messenger users in Saudi Arabia.

RIM, while trying to cooperate with governments, says they don’t really have a way to provide customer encryption keys.

RIM issued the following statement late Thursday night.

Although RIM cannot disclose confidential regulatory discussions that take place with any government, RIM assures its customers that it genuinely tries to be as cooperative as possible with governments in the spirit of supporting legal and national security requirements, while also preserving the lawful needs of citizens and corporations. RIM has drawn a firm line by insisting that any capabilities it provides to carriers for “lawful” access purposes be limited by four main principles:

1) The carriers’ capabilities be limited to the strict context of lawful access and national security requirements as governed by the country’s judicial oversight and rules of law.

Advertisement. Scroll to continue reading.

2) The carriers’ capabilities must be technology and vendor neutral, allowing no greater access to BlackBerry consumer services than the carriers and regulators already impose on RIM’s competitors and other similar communications technology companies.

3) No changes to the security architecture for BlackBerry Enterprise Server customers since, contrary to any rumors, the security architecture is the same around the world and RIM truly has no ability to provide its customers’ encryption keys. Also driving RIM’s position is the fact that strong encryption is a fundamental commercial requirement for any country to attract and maintain international business anyway and similarly strong encryption is currently used pervasively in traditional VPNs on both wired and wireless networks in order to protect corporate and government communications.

4) RIM maintains a consistent global standard for lawful access requirements that does not include special deals for specific countries.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...