JUSTIN HAYNES 100098026 COMP 2903 JODREY SCHOOL OF COMPUTER SCIENCE ACADIA UNIVERSITY OCTOBER 26, 2010 R.I.M. in India.

Slides:



Advertisements
Similar presentations
Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
Advertisements

Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
IT Industry & Cloud Computing. Trends ‘2011- The year of high salaries and immense job opportunities for IT job seekers’ (Source – Blog.Timesjobs.com)
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Atlas Products International Secure Data Exchange (SDX) Today’s agenda Who is Atlas? Why Secure Data Exchange? About Atlas SDX Using Atlas SDX Deployment.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Andrew Schroeder Networking Aspects of Cloud Computing.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Skype Created By Niklas Zennstrom in 2003 Today more than 370 Million people are registered globally. Skype is currently the largest international voice.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
United Nations Development Program India Coordination & Decision Support System (CDSS) on External Assistance Department of Economic Affairs Ministry of.
Proximus Push solutions Welcome Direct & BlackBerry.
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
8/10/2015Windows 71 George South. 8/10/2015Windows Windows Vista Windows Vista was released in January 2007 some five years after Windows XP Vista.
Copyright © 2002 ACNielsen a VNU company 3CX Introduction & Sales Presentation.
CLOUD COMPUTING Michael Gumbleton. Preview What is the cloud Internet facts DrawbacksSolutionFutureConclusion.
Operating Systems Chapter 4.
Presentation By Deepak Katta
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Development of the Internet and the effects on mass media and society Presented by Katie Felong.
Social impacts of the use of it By: Mohamed Abdalla.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Cyber Crimes.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Professor Peter Swire The Privacy Project.
PARTNERS IN PROVIDING EQUAL ACCESS FOR THE DEAF TO YOUR BUSINESS 9/19/2015.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
What is Android……? Android is an Operating System (OS) created by Google to run on any small electronic devices such as cell phones, e- books, Media Internet.
Brought to you by ince, an integrated communications agency Powered by intralinks SECURE ENTERPRISE COLLABORATION IN THE CLOUD.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
+ New Media Production CA ~ Siri By Eva Lucey. + Introduction to Siri Apple’s latest iPhone feature – New Application First seen in October 2011 – iPhone.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
KRISHNA The State of Mobile Security in India The 23 rd IFIP World Computer Congress 2015 October 5 A Market Analysis and Recommendations for Enterprises.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
George Yauneridge. Overview  Basic Security  Selecting a Provider  Cloud Computing Security Threats  Cloud Computing Security Practices  Conclusion.
BLACKBERRY TECHNOLOGY PRESENTED BY SHAIK TABREZ (09J01A1225 )
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Tata Indicom Blackberry Bold 9650, the first combined CDMA-GSM smartphone. The smartphone offers global roaming, an optical trackpad and enhanced wi-fi.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
IPv6 Transition for Curacao
“Information Assurance” BlackBerry’s Privacy and Security
File Management in the Cloud
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Blackberry.
COMPUTER PRIVACY.
The protection of the computing device has become the primary focus of the users. With the advancement in technology computer and its threats are also.
Call AVG Antivirus Support | Fix Your PC
How to install Kaspersky Antivirus. About Kaspersky Antivirus: Kaspersky Antivirus has many features which includes real time protection, removal of rootkits,
Computers in Mobile Devices
Introduction to Networks
Information Systems for Health:
ONLINE SECURE DATA SERVICE
Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.
Presentation transcript:

JUSTIN HAYNES COMP 2903 JODREY SCHOOL OF COMPUTER SCIENCE ACADIA UNIVERSITY OCTOBER 26, 2010 R.I.M. in India

Agenda Introduction Problem faced by RIM Impact on the people of India Requirements of the Government Resolution Positions Conclusion Questions

The Problem 2008 Tata Teleservices delay deployment Encrypted on device  sent encrypted U.A.E. started talks, fired up India National security  terrorism  Repeat of 2008 Mumbai attack  Prepaid use Flirtation / Pornography Criticism of leadership Government wants real time access

Impact on the People 1 million Blackberry users in India India has second largest mobile phone market Government could access user’s private information

Government Requirements Real time access Protect national security Pressure to comply:  Nokia set up by November 5 th  Google and Skype to follow Canadian Government offer RIM assistance in negotiations.  North American already has access via warrants.

Resolution 60 days for security agencies to try and gain access, run by ISP. RIM offered to find a balance between security and privacy DECLINED, Oct. 31 deadline extended 3 months RIM introduced manual access to messenger service  Automatic to come Interception server to be installed  Through Indian ISP  Easier to gain access to ISP than RIM

Personal Position Indian government should have access when needed Should have a server ran through ISP + for taking security concerns serious

Alternative Positions 1. RIM does not comply, Indian government should not have real time access to RIM data. 2. RIM products will not be available in India. Only allow those that choose to comply fully.

Objections/Risks RIM built the device. Security threat for RIM to release encoding information. Internet Service Providers will be held responsible for the data. Government will have complete access. Will cost RIM money.

Conclusion India is concerned about national security. RIM does not want India to access it’s servers. RIM will continue to work with India. RIM will set up a interception server within an Indian ISP. India will have real time access to data through ISP. India will be able to see data coming in and out of country through RIM, Nokia, eventually Google, and Skype.

Thank You Questions? References: Primary article: cleId=2549 (Oct. 15, 2010) cleId=2549 Referenced:  permanent-blackberry-solution-from-rim-pillai-says.html (Bloomberg Businessweek, Oct. 18, 2010) permanent-blackberry-solution-from-rim-pillai-says.html  reprieve-in-india/article / (Globe and Mail, Oct 28, 2010) reprieve-in-india/article /  (CNET, Oct. 19, 2010)