{"id":172,"date":"2010-08-05T19:43:20","date_gmt":"2010-08-05T19:43:20","guid":{"rendered":"http:\/\/www.slyman.org\/blog\/?p=172"},"modified":"2013-06-07T20:09:56","modified_gmt":"2013-06-07T20:09:56","slug":"on-blackberry-communications-security","status":"publish","type":"post","link":"https:\/\/slyman.org\/blog\/2010\/08\/on-blackberry-communications-security\/","title":{"rendered":"On Blackberry communications security"},"content":{"rendered":"<h2>Blackberry security &#8211; Statement from RIM:<\/h2>\n<p>From <a href=\"http:\/\/timesofindia.indiatimes.com\/india\/BlackBerry-refuses-to-help-on-security\/articleshow\/6253969.cms\" target=\"_blank\">&#8220;The Times of India&#8221; &#8211; Blackberry refuses to help on security<\/a><\/p>\n<blockquote>\n<p>NEW DELHI: The stand-off  between the Indian government and BlackBerry manufacturer Research in  Motion (RIM) intensified on Tuesday, with  RIM stating that it would not &#8220;compromise the integrity and security of the  <em>BlackBerry Enterprise Solution<\/em>&#8220;. It added that &#8220;RIM would simply be  unable to accommodate any request for a copy of a customer&#8217;s <em>encryption<\/em> key since at no time does RIM, or any wireless network operator, ever  possess a copy of the key&#8221;.<\/p>\n<p>Security agencies are concerned  that BlackBerry&#8217;s encrypted services could pose a national security  threat. They have been seeking access to these services.<\/p>\n<p>However, in a statement titled &#8220;Customer Update&#8221;, RIM said, &#8220;The <em> BlackBerry security architecture for enterprise customers<\/em> is based on a  symmetric key system whereby the customer creates their own key and only  the customer ever possesses a copy of their encryption key. RIM does  not possess a master key, nor does any back door exist in the system  that would allow RIM or any third party to gain unauthorized access <em>to  the key or corporate data<\/em>.&#8221;<\/p>\n<p>&#8220;The BlackBerry security  architecture<em> for enterprise customers<\/em> is purposefully designed to  exclude the capability for RIM or any third party to read encrypted  information under any circumstances. RIM would simply be unable to  accommodate any request for a copy of a customers <em>encryption key<\/em> since  at no time does RIM, or any wireless network operator, ever possess a  copy of the key,&#8221; explained the statement.<\/p>\n<p>It also said that  the location of data centres and the customers choice of wireless  network are &#8220;irrelevant factors from a security perspective since  end-to-end encryption is utilized&#8230;and all data remains encrypted  through all points of transfer between the customers <em>BlackBerry  Enterprise Server<\/em> and the customers device.&#8221;<\/p>\n<\/blockquote>\n<h2>Notes on the above:<\/h2>\n<p>The things that RIM did <strong>not <\/strong>say about security in their carefully worded statement are perhaps as noteworthy as the things they did say.\u00a0 After a brief perusal of <a href=\"http:\/\/docs.blackberry.com\/en\/admin\/deliverables\/4133\/BB_Ent_Soln_Security_4.1.6_STO.pdf\" target=\"_blank\">RIM&#8217;s own security documentation<\/a> and various statements quoted in the news, I came to the conclusion that:<\/p>\n<ul>\n<li>RIM rightly states they never have access to the <strong>encryption<\/strong> key.\u00a0 However, they say nothing about the <strong>decryption\/authentication<\/strong> key(s).\u00a0 In other words, RIM cannot overcome the integrity and authenticity assurance features in their communications security design, but they might potentially be able to breach the confidentiality of data transmitted via their own servers.<\/li>\n<li><strong>Corporate\/ Enterprise<\/strong> data is outside RIM&#8217;s control and RIM might never see those data, but this does not tell us anything about data transmitted to\/from <strong>personal<\/strong> Blackberry devices.\u00a0 These data, apparently, travel to the device either via RIM&#8217;s own servers in Canada or in RIM&#8217;s servers in the UK.\u00a0 They have not stated that they do not have access to these data.<\/li>\n<\/ul>\n<p>In other words, there is an easy solution to the crisis:<\/p>\n<ul>\n<li>RIM should grant legal wiretaps as justified by legitimate  law-enforcement agencies according to internationally agreed standards.\u00a0  (So far as I am aware, no international conventions exist yet to govern  such disclosures.)\u00a0 In other cases, RIM should continue protecting and  developing their security infrastructure, and the privacy of their  law-abiding clients.<\/li>\n<li>Governments should stop knocking on RIM&#8217;s door, asking for data that only corporations can provide.\u00a0 Those governments should instead put pressure on the corporations controlling their own Enterprise Blackberry servers, to release any data those governments suspect to be related to criminal activity.\u00a0 RIM should restrict Blackberry Enterprise Solution sales to those customers with the culture, resources and infrastructure to make legitimate disclosures, and not make inappropriate disclosures of employee data (i.e., if RIM has reason to suspect that a potential Blackberry Enterprise Solution customer could not support the dual principles of data protection and legitimate disclosure, the sale should not go ahead.)<\/li>\n<\/ul>\n<p>Of course, this leads us back into the standard debate, of the proper boundaries between individual rights to privacy and governmental responsibilities to assuring security to their people.\u00a0 There are potential dangers on all sides.\u00a0 If governments are given too much scope for snooping on private data, we might soon find <a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/england\/london\/8584484.stm\">government agents using their privileges for inappropriate purposes<\/a> &#8211; or using purported <em>criminal investigations<\/em> as a premise for extorting trade secrets from foreign corporations to divulge these secrets to domestic industries and give the latter an unfair advantage.\u00a0 On the other hand, how are we to know that the concerns of the Indian, Saudi Arabian and U.A.E. governments are not fully legitimate?<\/p>\n<p>Considering the apparent advantages of RIM&#8217;s technology, in integrity and authentication, and for public servants and enterprises at least, the benefits of confidentiality; governments, enterprises and individuals should all favour RIM&#8217;s Blackberry encryption technology over and above their competition.\u00a0 If only the rest of the internet followed RIM&#8217;s lead, we might see an end to spam, and <a title=\"O2 condemns lawyers targeting alleged file-sharers\" href=\"http:\/\/news.bbc.co.uk\/1\/hi\/technology\/8570913.stm\" target=\"_blank\">innocent pensioners in Britain might stop being accused of downloading contraband copies of pornography<\/a>; at least, until the bad guys find a way to circumvent RIM&#8217;s technology.\u00a0 <a title=\"Secretary of State Hillary Clinton in BlackBerry talks\" href=\"http:\/\/www.bbc.co.uk\/news\/technology-10886413\" target=\"_blank\">We might yet see the beginning of international agreement on the legitimate rights of governments and individuals<\/a>; and it might start from one of the most unlikely of sources &#8211; a trade dispute over RIM&#8217;s access to emerging markets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A commentary on the governmental pressure on <a title=\"Research In Motion\" href=\"http:\/\/en.wikipedia.org\/wiki\/Research_In_Motion\" target=\"_blank\">RIM<\/a> over Blackberry communications security. <a href=\"https:\/\/slyman.org\/blog\/2010\/08\/on-blackberry-communications-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[70,17],"tags":[23,16,22,19,15,18,17,21,20],"class_list":["post-172","post","type-post","status-publish","format-standard","hentry","category-politics","category-security","tag-authentication","tag-blackberry","tag-confidentiality","tag-india","tag-rim","tag-saudi-arabia","tag-security","tag-spam","tag-united-arab-emirates"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/posts\/172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/comments?post=172"}],"version-history":[{"count":2,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/posts\/172\/revisions"}],"predecessor-version":[{"id":2936,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/posts\/172\/revisions\/2936"}],"wp:attachment":[{"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/media?parent=172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/categories?post=172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/slyman.org\/blog\/wp-json\/wp\/v2\/tags?post=172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}