Leaked Memo Confirms Apple, Nokia & RIM Gave Indian Gov't Backdoors

from the though,-that-should-have-been-known-already dept

Way back in the beginning of 2008, we wrote about how the Indian government was demanding that various mobile suppliers provide backdoors so it could intercept emails and text messages. In 2010, we wrote about further demands to spy on Gmail and Skype. Finally, at the end of 2010, the fact that various providers were providing backdoors to the Indian government was effectively revealed when the government complained that RIM’s backdoor didn’t really reveal everything. So, I’m not entirely sure why people are surprised that a leaked memo has revealed that at least Apple, Nokia and RIM all provided the Indian government with backdoors, and those are being used regularly in a surveillance dragnet.

Where it gets potentially more interesting is the report that the government then used such access to intercept emails from US government officials, including the “US-China Economic and Security Review Commission” — “a U.S. government body with a mandate to monitor, investigate and report to Congress on ‘the national security implications of the bilateral trade and economic relationship’ between the U.S. and China.” Kinda says something when the US commission on security issues can’t even secure their own email from snooping foreign governments, huh?

Filed Under: , , , ,
Companies: apple, nokia, rim

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Leaked Memo Confirms Apple, Nokia & RIM Gave Indian Gov't Backdoors”

Subscribe: RSS Leave a comment
31 Comments
Anonymous Coward says:

Only Playing At Security

See, most parts of the US government are only playing at computer security. They do not really mean it. Snooping by foreign governments or any company is quite all right. So they use pathetically insecure stuff like Windows and mobile phones. Real computer security is too much like hard work for the poor darlings.

For those few members of the US government who are actually serious about computer security, there is Security-Enhanced Linux from the Central Security Service of the National Security Agency. Google is your friend.

Violated (profile) says:

The 4th

I for one would not want to use any device for which I am “spied upon”

At least in the United States you have the 4th amendment namely “protection from unreasonable search and seizure” which grants your privacy and anonymity. Then again these who do the spying would say that is one law and we can name another.

The funny part about India is that it would be the vast innocent majority who are being watched. The real terrorists are the ones who have good reason to come hard encrypted to avoid all monitoring.

Still even the most secure system is flawed by the dumb users who do not follow security protocol.

Some Other AC (profile) says:

Re: Re: The 4th

As an IT professional for a large corporation, I picked up a saying when working with internal users and external customers.
PICNIC
Problem In Chair, Not In Computer!
Does not matter if Linux(users are generally smarter, but not always), Mac(users think they are invincible), or Windows(mostly clueless with a decent batch that have common sense).

Gwiz (profile) says:

Re: Re: Re: The 4th

PICNIC
Problem In Chair, Not In Computer!

Hehe. When I was a programmer/analyst and first line support for a 60+ engineering department in the 90’s I used a couple of similar lines:

– The problem is somewhere between the chair and keyboard.

– That appears to be an eye-dee-ten-tee error. (ID10T)

– Take two reboots and call me in the morning.

Anonymous Coward says:

Re: Re: Re: The 4th

PICNIC, yep I used that too a lot, but I stop once I realized I was in a chair too.

I saw countless sys admins complain about how people shared their passwords, or didn’t change them often enough or couldn’t remember the 20 characters long passwords, or forgot to use encryption or hit the wrong button, but it was rare to see someone actually think about the why people did those things and think of a better way that was more natural on how people behaved, you see on that front programmers are no better than the RIAA or the MPAA, the problem is often in the chair for certain, but not always.

John Doe says:

Re: The 4th

Are you new here? We no longer have the 4th amendment. It has effectively been repealed. The US is spying on anyone and everyone at will with no consequence. Now they can even use the US Army against a US citizen on US soil. We cringe when the Chinese or others do this, but soon we will have our own Tiananmen square.

Adam says:

Backdoors have keys, of course. How long will it be before someone leaks the key or a hacker, now knowing it’s there finds it, and these back doors start getting used for nefarious purposes (not that I think government spying is legitimate). I find it hard to imagine too, that these back doors are individualized to devices; I suspect that means that listeners do so from a provider’s domain and get everyone on line.

Freedom says:

Open Source...

One of the reasons I like Android is because you can get a build of the OS that is entirely open source and if wanted even compile it yourself. Is that 100% foolproof, heck no, but it is better than a 100% closed eco system that Apple, RIM, and Microsoft use where you can’t see ANYTHING under the hood.

In a perfect world, all the hardware and software would be open source. The thought of hardware back doors makes me sad, but I’m sure they exist as well, if nothing else as a way to piggyback in a monitoring app or something like that.

Freedom

Overcast (profile) says:

To add:

Yeah – here’s who you are trusting your stuff with – potentially.

http://en.wikipedia.org/wiki/2001_anthrax_attacks

“Bruce Edwards Ivins, became a focus of investigation around April 4, 2005. Ivins was a scientist who worked at the government’s biodefense labs at Fort Detrick in Frederick, Maryland. On April 11, 2007, Ivins was put under periodic surveillance and an FBI document stated that “Bruce Edwards Ivins is an extremely sensitive suspect in the 2001 anthrax attacks”. On July 27, 2008, Ivins killed himself with an overdose of acetaminophen.”

Yep – trustworthy indeed. I wonder if some of these guys are on the take and expose secrets against various politicians for pay from competitors?

terrybbarton says:

Simple Fix

To stop secret things from going on in your phone such as this, is exactly why there should be phones that ship with BOTH software AND hardware that is entirely open. Ideally including a DRM free, open source app store. Then the snooping and malicious acts would at least have to be done by a service provider/carrier or at the other end.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...