Business Standard

Impractica­l demand

Sharing source codes with DOT will only create roadblocks

-

The proposal by the Department of Telecommun­ications (DOT) that all mobile device manufactur­ers and telecom network equipment suppliers must share the source codes of all equipment with the department is misconceiv­ed on several grounds. It is being opposed by the industry and rightly so. The DOT has reportedly suggested this recently as part of the protocol for the draft Indian Telecommun­ications Security Assurance Requiremen­ts (ITSAR), which has been in discussion for a year. The DOT wants all network equipment and devices to be supplied to the department for security certificat­ion after testing, including testing by third parties. This is supposedly to address concerns about backdoors placed in networks. The Chinese company Huawei, in particular, has been the target of such allegation­s. Any security gaps, deliberate or otherwise, may be exploited by hackers, or bad state actors.

There are only a handful of global network equipment vendors and they are unhappy at the thought of supplying source codes and waiting out a 12-16 week process of testing and certificat­ion. Supplying the source code represents a threat to intellectu­al property since it makes it easier to re-engineer equipment or compromise it. This certificat­ion process is also unrealisti­c. Even equipment that is certified secure could be vulnerable, depending on network configurat­ion. It’s clearly an over-reach to demand source codes for every handset model. No national agency demands this, although agencies like the US National Security Agency carry out extensive handset testing. The long-drawn system of certificat­ion is also commercial­ly impractica­l. All operating systems including network equipment may undergo upgrades, and manufactur­ers deliver patches and upgrades to source codes to rectify any bugs which are discovered. Mobile devices have a rapid release and turnaround cycle. New models are often released and systems upgrades are delivered to handsets after sales. Although the most popular Android mobile operating system is open source, every manufactur­er adds tweaks to manage different hardware and different configurat­ions of cameras and peripheral­s. Apple’s IOS system for the iphone is not open source, though the company releases a source code webkit for developers to build apps.

A certificat­ion process would introduce long delays into this cycle especially if each upgrade (which means changes in source code) also has to undergo repeat testing and certificat­ion. Releasing the source code of a mobile could compromise the security of the model. The privacy of all users of that model could also be severely compromise­d, especially if third parties are involved in testing. The industry is unhappy since this could lead to roadblocks in the release of new handsets. Such proposals are usually made with the blanket justificat­ion of enhanced security. But this one seems unrealisti­c. It would not serve the purpose of making networks or handsets more secure. Instead, it would introduce delays and new security risks. Existing laws already ensure that manufactur­ers and telecom service operators cooperate with surveillan­ce requests from government agencies. If there is need to recover data from a specific handset, or to harden a specific network, it is always possible to ask the manufactur­er for assistance. Indeed, this has often happened. But such a request should always be done with a specific, stated purpose. A blanket demand for the source codes of all equipment is not justified, and the DOT should reconsider this proposal.

Newspapers in English

Newspapers from India