Leaked Memo Confirms Apple, Nokia & RIM Gave Indian Gov't Backdoors
from the though,-that-should-have-been-known-already dept
Way back in the beginning of 2008, we wrote about how the Indian government was demanding that various mobile suppliers provide backdoors so it could intercept emails and text messages. In 2010, we wrote about further demands to spy on Gmail and Skype. Finally, at the end of 2010, the fact that various providers were providing backdoors to the Indian government was effectively revealed when the government complained that RIM's backdoor didn't really reveal everything. So, I'm not entirely sure why people are surprised that a leaked memo has revealed that at least Apple, Nokia and RIM all provided the Indian government with backdoors, and those are being used regularly in a surveillance dragnet.Where it gets potentially more interesting is the report that the government then used such access to intercept emails from US government officials, including the "US-China Economic and Security Review Commission" -- "a U.S. government body with a mandate to monitor, investigate and report to Congress on 'the national security implications of the bilateral trade and economic relationship' between the U.S. and China." Kinda says something when the US commission on security issues can't even secure their own email from snooping foreign governments, huh?
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: backdoors, emails, india, privacy, security
Companies: apple, nokia, rim
Reader Comments
Subscribe: RSS
View by: Time | Thread
Volunteering
But I trust our government. They'll only use it for good; really, they will. They just want to stop terrorists.
[ link to this | view in chronology ]
Re: Volunteering
[ link to this | view in chronology ]
Re: Re: Volunteering
Well, I'm terrified of the TSA. Does that count?
[ link to this | view in chronology ]
Re: Volunteering
https://www.youtube.com/watch?v=qy3eOCkLVaw
Who needs CarrierIQ when you get all data from the source.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
Treason or plain stupidity?
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Response to: Anonymous Coward on Jan 9th, 2012 @ 9:22pm
[ link to this | view in chronology ]
Surveillance from other countries
[ link to this | view in chronology ]
Future headline
[ link to this | view in chronology ]
Re: Future headline
[ link to this | view in chronology ]
Only Playing At Security
For those few members of the US government who are actually serious about computer security, there is Security-Enhanced Linux from the Central Security Service of the National Security Agency. Google is your friend.
[ link to this | view in chronology ]
Re: Only Playing At Security
[ link to this | view in chronology ]
[ link to this | view in chronology ]
The 4th
At least in the United States you have the 4th amendment namely "protection from unreasonable search and seizure" which grants your privacy and anonymity. Then again these who do the spying would say that is one law and we can name another.
The funny part about India is that it would be the vast innocent majority who are being watched. The real terrorists are the ones who have good reason to come hard encrypted to avoid all monitoring.
Still even the most secure system is flawed by the dumb users who do not follow security protocol.
[ link to this | view in chronology ]
Re: The 4th
ut I'd say more than half of the security issues and virus infections out there are due to the dumb piece behind the keyboard.
[ link to this | view in chronology ]
Re: Re: The 4th
PICNIC
Problem In Chair, Not In Computer!
Does not matter if Linux(users are generally smarter, but not always), Mac(users think they are invincible), or Windows(mostly clueless with a decent batch that have common sense).
[ link to this | view in chronology ]
Re: Re: Re: The 4th
Problem In Chair, Not In Computer!
Hehe. When I was a programmer/analyst and first line support for a 60+ engineering department in the 90's I used a couple of similar lines:
- The problem is somewhere between the chair and keyboard.
- That appears to be an eye-dee-ten-tee error. (ID10T)
- Take two reboots and call me in the morning.
[ link to this | view in chronology ]
Re: Re: Re: The 4th
I saw countless sys admins complain about how people shared their passwords, or didn't change them often enough or couldn't remember the 20 characters long passwords, or forgot to use encryption or hit the wrong button, but it was rare to see someone actually think about the why people did those things and think of a better way that was more natural on how people behaved, you see on that front programmers are no better than the RIAA or the MPAA, the problem is often in the chair for certain, but not always.
[ link to this | view in chronology ]
Re: The 4th
[ link to this | view in chronology ]
[ link to this | view in chronology ]
This makes the assumption all governments weren't given the same access to the back door.
Kinda says something new, but that's just my opinion.
[ link to this | view in chronology ]
Leaked Memo
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Open Source...
In a perfect world, all the hardware and software would be open source. The thought of hardware back doors makes me sad, but I'm sure they exist as well, if nothing else as a way to piggyback in a monitoring app or something like that.
Freedom
[ link to this | view in chronology ]
[ link to this | view in chronology ]
We ALL know we can trust government employees - they would never do things like hack into computers using open back-doors or mail out anthrax, of course.
[ link to this | view in chronology ]
Yeah - here's who you are trusting your stuff with - potentially.
http://en.wikipedia.org/wiki/2001_anthrax_attacks
"Bruce Edwards Ivins, became a focus of investigation around April 4, 2005. Ivins was a scientist who worked at the government's biodefense labs at Fort Detrick in Frederick, Maryland. On April 11, 2007, Ivins was put under periodic surveillance and an FBI document stated that "Bruce Edwards Ivins is an extremely sensitive suspect in the 2001 anthrax attacks". On July 27, 2008, Ivins killed himself with an overdose of acetaminophen."
Yep - trustworthy indeed. I wonder if some of these guys are on the take and expose secrets against various politicians for pay from competitors?
[ link to this | view in chronology ]
Simple Fix
[ link to this | view in chronology ]