Gov accuses Whatsapp of creating security 'black hole'

Gov ramps up pressure on app to hand over encrypted messages - report

The government has reportedly accused WhatsApp of creating a "black hole" in security intelligence by refusing to give it access to people's encrypted messages.

This is according to Sky News, which quoted an anonymous security source, who claimed that terrorists are "frequent users" of encrypted apps because they know no one can read their messages.

"It is crucially important that we can access their communications - and when we can't, it can provide a black hole for investigators," the source added.

Other platforms such as iMessage and Telegram also protect messages using encryption and do not allow the government access to the information.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

WhatsApp does, however, allow authorities to see other information such as an account name, when the account was created, the last know IP address used to access the service and the email address associated with each account.

However, WhatsApp made it clear it wants to protect its users, and this means messages must stay encrypted and hidden from authorities, just as they should remain protected from potential criminals.

"Naturally, people have asked what end-to-end encryption means for the work of law enforcement," the company explains on a statement on its website. "WhatsApp appreciates the work that law enforcement agencies do to keep people safe around the world.

"We carefully review, validate, and respond to law enforcement requests based on applicable law and policy, and we prioritise responses to emergency requests."

The news comes after Theresa May stressed the importance for technology companies to do more to help the government identify security threats following the Parsons Green tube station bomb attack last week.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/data-insights/data-management/354423/eu-us-data-transfer-tools-used-by-facebook-ruled-legal
data management

EU-US data transfer tools used by Facebook ruled legal

19 Dec 2019
Visit/server-storage/network-attached-storage-nas/354221/synology-dva3219-review-an-ideal-cctv-system
network attached storage (NAS)

Synology DVA3219 review: An ideal CCTV system

28 Nov 2019
Visit/backup/33385/arcserve-udp-9240dr-review-beef-up-your-backups
backup

Arcserve UDP 9240DR review: Beef up your backups

4 Apr 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020