• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

UAE (Dubai) & Saudi Arabia To Ban BlackBerry Services With India To Follow

August 4, 2010

Views: 15,792

Well there’s been a lot of news these past few days so it was pretty tough to choose what to cover today, anyway I chose this story as it interests me and could be a real problem for RIM the makers of the popular (and fastest growing) BlackBerry smart-phone device.

The latest news is due to the fact that many of the BlackBerry services such as BBM (BlackBerry Messenger) run on a proprietary network BIS (BlackBerry Internet Services) they fall foul of wiretapping laws which require that governments have access to all communications if so required.

We did cover a story a while back about UAE Telco Etisalat Installing Spyware On Users Blackberries, perhaps that was their first step to mitigate against the communications via BlackBerry devices that rendered them untraceable.

The United Arab Emirates outlined plans Sunday to block BlackBerry e-mail, messaging and Web browsing services in a crackdown that could jeopardize efforts to establish the country as an international business hub.

The government cited a potential security threat because encrypted data sent on the devices is moved abroad, where it cannot be monitored for illegal activity. But the decision — quickly followed by a similar move in Saudi Arabia — raises questions about whether the conservative Gulf nations are trying to further control content they deem politically or morally objectionable.

BlackBerry phones have a strong following in the region, not only among foreign professionals in commercial centers such as Dubai and Abu Dhabi, but also among youth who see their relatively secure communication channels as a way to avoid unwanted government attention.

“The authorities have used a variety of arguments, like it can be used by terrorists” to justify the crackdown, said Christopher Davidson, a professor at the University of Durham in Britain, who has written extensively about the region. “Yes that’s true, but it can also be used by civil society campaigners and activists.”

The United States said they are ‘disappointed‘ with this decision, but with them rejecting Huawei’s take-over bids for US companies citing ‘national security threats’ I don’t think they have much to be disappointed about.

I think from a government perspective it’s a fair request, but then for all the countries where privacy advocacy is rife – putting a government approved backdoor in the BlackBerry OS might be a VERY bad idea. Then you have the whole headache of multiple OS versions for different countries with different levels of wiretapping ability.

The UAE’s decision will prevent hundreds of thousands of BlackBerry users from accessing e-mail and the Web on their handsets starting in October. It’s unclear whether the ban will extend to foreign visitors with roaming services, including the roughly 100,000 passengers who pass through the region’s busiest airport in Dubai each day.

The ban risks further damaging the UAE’s reputation as a relatively easy place to do business.

Dubai, one of seven hereditary sheikdoms in the federation, in particular has sought to turn itself into a global finance, trade and tourism hub. But its reputation has been tarnished by a credit crisis that has left the emirate more than $100 billion in debt.

Residents say the BlackBerry crackdown will only do more harm, making foreign businesses think twice before setting up shop in the country.

“They’ll think now they’ve banned the BlackBerry, maybe next time it’ll be the Internet,” said Shakir Mahmood, a Dubai-based debt collector and BlackBerry user originally from Iraq.

This isn’t the first time BlackBerry and Emirati officials have had run-ins over security and the popular handsets, a fixture in professionals’ pockets and purses the world over.

Last year, BlackBerry maker Research in Motion Ltd. criticized a directive by the UAE state-owned mobile operator Etisalat telling the company’s BlackBerry users to install software described as an “upgrade” required for “service enhancements.”

The latest addition to this is India joining the party, again citing regulatory concerns regarding the proprietary BlackBerry services.

They all have to consider how this will effect International business relations as most of the business World is already utilising BIS or BES (BlackBerry Enterprise Services) although perhaps these restrictions will only apply to BIS and not private enterprise connections – although that hasn’t been made clear yet.

Anyway I have a feeling we’ll be seeing more coverage on this and possibly more countries joining the cause like the recent Google Wi-fi scanning fiasco.

Source: Yahoo! News

Related Posts:

  • An Introduction To Web Application Security Systems
  • Privacy Implications of Web 3.0 and Darknets
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • European Commission Pushing For Encryption Backdoors
  • US Voting Machines Hacked At DEF CON - Every One
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Legal Issues, Privacy Tagged With: blackberry, Legal Issues, Privacy, wiretapping



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,365

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,181

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,441

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,383

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,263

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,161

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,435,862)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,108)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,574)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,369)
  • Password List Download Best Word List – Most Common Passwords (934,688)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,416)
  • Hack Tools/Exploits (674,330)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,463)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy