Security

Cyber-crime

Europol says mobile roaming tech is making its job too hard

Privacy measures apparently helping criminals evade capture


Top Eurocops are appealing for help from lawmakers to undermine a privacy-enhancing technology (PET) they say is hampering criminal investigations – and it's not end-to-end encryption this time. Not exactly.

Europol published a position paper today highlighting its concerns around SMS home routing – the technology that allows telcos to continue offering their services when customers visit another country.

Most modern mobile phone users are tied to a network with roaming arrangements in other countries. EE customers in the UK will connect to either Telefónica or Xfera when they land in Spain, or T-Mobile in Croatia, for example.

While this usually provides a fairly smooth service for most roamers, Europol is now saying something needs to be done about the PETs that are often enabled in these home routing setups.

According to the cops, they pointed out that when roaming, a suspect in a criminal case who's using a SIM from another country will have all of their mobile communications processed through their home network.

If a crime is committed by a Brit in Germany, for example, then German police couldn't issue a request for unencrypted data as they could with a domestic operator such as Deutsche Telekom.

Now, it wouldn't be a law enforcement complaint against tech if encryption wasn't mentioned at least somewhere, and there's no need to worry since we're not deviating from the norm today.

The specific part of home routing that's causing all the fuss is the service-level encryption used when enabling home routing by the network operator. Law enforcement can see a suspect communicating from a device that may provide evidence of a crime being committed, but as ever, encryption stymies their ability to access it in a usable way.

Europol said: "For service-level encryption, the subscriber (user) equipment exchanges session-based encryption keys with the service provider in the home network. If PET is enabled, the visiting network no longer has access to the keys used by the home network and therefore data in the clear cannot be retrieved."

One exception to home routing being a cop blocker is when a domestic service provider has a cooperation agreement with the network provider of another country that forbids the enabling of PETs in home routing.

If this cooperation agreement isn't in place, the only alternative left for law enforcement is to issue a European Investigation Order (EIO), but responses for these can take up to 120 days, which isn't ideal when you want to catch a drug dealer who's only in the country for a weekend.

"A solution to the situation described above is urgently necessary. Under home routing, the current investigatory powers of public authorities should be retained and a solution must be found that enables lawful interception of suspects within their territory," reads Europol's paper.

"In addition, an optimal solution should not impede secure communications disproportionately, ensure the confidentiality of criminal investigations, and ultimately enable member states to execute their legal jurisdictional prerogative to execute investigatory powers. 

"Moving forward, the design and implementation of (new) technologies should be done in the manner that ensure lawful access to data necessary for investigatory powers to carry out their obligations."

Next steps

Two possible solutions were suggested, but the wording of the paper clearly favored a legal ban on PETs (service-level encryption) in home routing over making it possible for one EU member state to request the comms from another country.

The first, seemingly preferred option would remove the additional encryption layer implemented when home routing was active and simply keep the same level of comms encryption as the suspect would enjoy in their home country.

"This solution is technically feasible and easily implemented," Europol said. "This solution maintains the current level of security, including privacy, and is equal for roamers and local users.

"National authorities supervising the telecommunication market can enforce an EU regulation mandating the design of the network in this manner."

Various drawbacks were highlighted with the second suggestion. Having another EU member state aware that a person of interest is walking within their borders "might not always be desirable" from an operation perspective, Europol said.

It also warned that there is no established method for sharing and interpreting the data requested by law enforcement authorities.

There is one that was developed for EIOs but cops are concerned this could lead to scenarios where law enforcement efforts are dependent on foreign service providers, which isn't ideal.

"With this position paper, Europol wishes to open the debate on this technical issue, which at present is severely hampering law enforcement's ability to access crucial evidence," it said.

"A solution must be found that enables a country's authorities to lawfully intercept the communications of a suspect within their territory, while not impeding secure communications disproportionately.

"The paper offers key elements which should be considered as part of the societal response, looking at operational, technical, privacy and policy aspects." ®

Send us news
36 Comments

Uncle Sam pulls $2.4B Leidos deal to support CISA after rival alleges foul play

Nightwing claims insider intel helped secure lucrative CISA work but US says decision is unrelated

'We still have embeds in CISA': CTO of Brit cyber agency talks post-Trump relationship with US counterpart

Both agencies seem unbothered despite tech world's clear concerns for US infoseccers

Microsoft tries to knife passwords once and for all - at least for consumers

PLUS: AirPlay exploits; Six-year old backdoor opens; Raytheon settles federal charges; and more!

As US vuln-tracking falters, EU enters with its own security bug database

EUVD comes into play not a moment too soon

British govt agents step in as Harrods becomes third mega retailer under cyberattack

Experts suggest the obvious: There is an ongoing coordinated attack on UK retail sector

Pentagon declares war on 'outdated' software buying, opens fire on open source

(If only that would keep folks off unsanctioned chat app side quests)

Infosec pros tell Trump to quit bullying Chris Krebs – it's undermining security

Top voices warn that political retaliation puts democracy and national defense at risk

Enterprise tech dominates zero-day exploits with no signs of slowdown

As Big Tech gets used to the pain, smaller vendors urged to up their game

Attackers pwn charter airline helping Trump's deportation campaign

Intruders claim they stole GlobalX's flight records and manifests

Britain's cyber agents and industry clash over how to tackle shoddy software

Providers argue that if end users prioritized security, they'd get it

Samsung admits Galaxy devices can leak passwords through clipboard wormhole

PLUS: Microsoft fixes messes China used to attack it; Mitre adds ESXi advice; Employee-tracking screenshots leak; and more!

Everyone's deploying AI, but no one's securing it – what could go wrong?

Crickets as senior security folk asked about risks at NCSC conference