Gov accuses Whatsapp of creating security 'black hole'
Gov ramps up pressure on app to hand over encrypted messages - report
The government has reportedly accused WhatsApp of creating a "black hole" in security intelligence by refusing to give it access to people's encrypted messages.
"It is crucially important that we can access their communications - and when we can't, it can provide a black hole for investigators," the source added.
Other platforms such as iMessage and Telegram also protect messages using encryption and do not allow the government access to the information.
WhatsApp does, however, allow authorities to see other information such as an account name, when the account was created, the last know IP address used to access the service and the email address associated with each account.
However, WhatsApp made it clear it wants to protect its users, and this means messages must stay encrypted and hidden from authorities, just as they should remain protected from potential criminals.
"Naturally, people have asked what end-to-end encryption means for the work of law enforcement," the company explains on a statement on its website. "WhatsApp appreciates the work that law enforcement agencies do to keep people safe around the world.
"We carefully review, validate, and respond to law enforcement requests based on applicable law and policy, and we prioritise responses to emergency requests."
The news comes after Theresa May stressed the importance for technology companies to do more to help the government identify security threats following the Parsons Green tube station bomb attack last week.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now