Is the Blackberry email a security threat?
DEBATE

Explore Business Standard
DEBATE

'India has successfully cracked terrorist cases by tracking and intercepting email' India's security agencies were the first to successfully use cyberforensics, around 1996-97, to track email and cellphone communications of the LTTE and the LeT. LeT attacks in the country, for instance, were solved when the Hotmail and Yahoo accounts of those in charge of the LeT logistics were monitored "" this was made easier by the fact that the state-owned VSNL was the monopoly ISP in the country. Even the Red Fort attack was solved when the emails on the terrorists' laptops were later traced. In comparison, security agencies in countries like the US restricted themselves at that time, through Project Echelon, to monitoring international phone calls to/from the US "" this was not very efficient and there were huge backlogs in the analysis. |
| From the late 1990s, the US and the UK eased the legal restrictions on snooping on email and phone calls. The FBI-developed IP-packet sniffing tools CARNIVORE, and later, OMNIVORE were installed on all ISPs in the US to track suspicious email traffic. After 9/11, all legal restrictions preventing snooping without reasonable cause were lifted. In this context, the Indian security agencies' demand to intercept Blackberry email or to ask Blackberry to deposit its decryption keys with them is hardly unacceptable (the ISP licence does not allow encryption beyond 40 bits unless the decryption keys are deposited with the security agencies on demand). |
| There are four major types of RIM's BlackBerry services being provided in India, viz (a) Voice communication to or from another device, whether the latter is a BlackBerry or not; (b) SMS & MMS to or from another device, whether the latter is a BlackBerry or not; (c) E-Mail between two BlackBerry Devices; (d) E-Mail between a BlackBerry and a non-BlackBerry. Of these, (a), (b) and (d) can technically "" and legally "" be intercepted by Indian security agencies even today, since they pass through an Indian mobile network (Airtel, Vodafone, Reliance) in a reformatted form. It is only (c) that cannot easily be intercepted by Indian security agencies. Theoretically, security agencies can send letters rogatory to RIM since their servers are located outside India, but this takes too long. Nor is RIM willing to locate its servers in India (allowing interception) since the costs are not justifiable on commercial grounds. |
| That said, it is unlikely a terrorist, smuggler or hawala operator in India would use a Blackberry "" while a Blackberry is traced to a user, the same cannot be said about throwaway Hotmail and Yahoo addresses accessed from a cybercafe. After the emails of some terrorists were intercepted in the late 1990s, they have adopted another strategy. A group of them create a webmail address and agree on a password. Thereafter they type their messages, but instead of sending them, they save them in the 'drafts' folder "" no internet traffic is generated and other terrorists just log on and check the 'drafts' folder for messages. Others use steganographic techniques, which allows concealing encrypted messages in video/audio/pictures that can be exchanged in open forum chatrooms or on sites like Orkut and Facebook. |
| The author, an alumnus of Carnegie Mellon and IIT Kanpur, heads a group on C4ISRT (Command, Control, Communications and Computers Intelligence, Surveillance, Reconnaissance and Targeting) in South Asia |
First Published: Apr 02 2008 | 12:00 AM IST