CybersecurityRIM proposes industry encryption forum to demands for access to e-mail, messages

Published 27 August 2010

RIM has proposed that an industry forum be established to help governments manage lawful intercept, in the hope of forestalling India’s threatened ban, due this coming Wednesday; the proposed body would be led by RIM, but the company is hoping that others companies threatened by bans — Google, Skype, and others — will join in

RIM has proposed that an industry forum be established to help governments manage lawful intercept, in the hope of forestalling India’s threatened ban. The proposed body would be led by RIM, but the company is hoping that others will join in. There is strength in numbers and India has made it clear that Skype and Google are next in the firing line (“Indian government: Google, Skype will follow BlackBerry in being forced to open networks,” 16 August 2010 HSNW), so RIM would like such powerful allies at the table beside them rather than watching from the sidelines.

Bill Ray writes that it remains to be seen whether this is enough to stop India pulling the plug this coming Wednesday.

India is not the first government to demand access to messages encrypted by RIMs servers, but its demands do seem to go further than other countries in a similar situation, and that might make resolving the issue impossible.

Ray notes that many governments resent not being able to intercept messages destined for BlackBerry handsets. The UAE and Saudi Arabia both threatened bans on BlackBerry devices unless some sort of lawful intercept was arranged, and both backed down after coming to an agreement with RIM.

India’s demands are more intrusive and less palatable to the Canadian company behind the BlackBerry service, which might mean a million Indians lose connectivity next Wednesday.

There are two distinct kinds of BlackBerry user: employees of a company that runs its own BlackBerry Enterprise Server (BES), and ordinary members of the public who buy a BlackBerry handset and sign up to the service, then forward their existing email accounts to one provided and hosted by RIM.

Ray writes that it is those members of the public that have been the focus up to this point, as e-mails sent to the RIM-hosted BES are encrypted before being forwarded to the handset. That encryption is, in this context, unbreakable, but if you get a copy of the message before it is encrypted then there is no problem. If the server is located in a friendly country then that can be arranged — lawful intercept will permit the government to copy messages just like every other e-mail service. If the server is in a less agreeable country, however, then it gets more difficult.

Ray notes that this is exactly the same as checking a Gmail account over an SSL connection, which is why RIM is hoping companies like Google will join its new body.

Singling out and banning one solution, such as the BlackBerry solution, would be ineffective and counter-productive,” RIM said. “It would be ineffective because anyone perpetrating the misuse of the technology would continue to have easy access to other wireless and wireline services that utilize strong encryption and are readily available in the market today.”

The UAE and Saudi Arabia dropped their threats once RIM promised to put servers in their respective countries. This, however, does not solve the problem of the corporate BES user, whose communication is encrypted from their own office to their own handset, and ca not be usefully intercepted en route.

Ray notes that larger corporations may find themselves required to open their BES server to investigation, where an employee is suspected of a serious crime, but there is a significant risk of the employee getting wind of the operation — a risk that increases the smaller the company is.

The BES, in the corporate office, shares an encryption key with the BlackBerry handsets it supports (that key is normally exchanged over a wire, or physically typed in at both ends). The key is different for every BlackBerry, and shared with no one else — making it impossible for RIM to decrypt messages in real time as the Indian government is demanding.

Reuters reports that, so far, RIM has offered to provide the IP address of every BES in India, along with the IMEI and PIN for every BlackBerry handset. This still will not allow interception of messages — at best it would mean that Indian security forces could track a specific user (by their IMEI), physically grab their BlackBerry, unlock it using the PIN, and then access the messages. Ray correctly notes that this hardly discreet, and then concludes:

So now we have a proposal for an “Industry Body” to look at the whole issue of how governments intercept encrypted communications — RIM is obviously tired of taking the flak for the whole industry, and hopes to broaden the argument, but Google, Skype and their ilk have little to gain by signing up rather than watching what happens to RIM. India still holds the ultimate sanction of a ban, and we’ll have to wait until next week to see if its prepared to use it.