Gov accuses Whatsapp of creating security 'black hole'

Gov ramps up pressure on app to hand over encrypted messages - report

The government has reportedly accused WhatsApp of creating a "black hole" in security intelligence by refusing to give it access to people's encrypted messages.

This is according to Sky News, which quoted an anonymous security source, who claimed that terrorists are "frequent users" of encrypted apps because they know no one can read their messages.

"It is crucially important that we can access their communications - and when we can't, it can provide a black hole for investigators," the source added.

Other platforms such as iMessage and Telegram also protect messages using encryption and do not allow the government access to the information.

WhatsApp does, however, allow authorities to see other information such as an account name, when the account was created, the last know IP address used to access the service and the email address associated with each account.

However, WhatsApp made it clear it wants to protect its users, and this means messages must stay encrypted and hidden from authorities, just as they should remain protected from potential criminals.

"Naturally, people have asked what end-to-end encryption means for the work of law enforcement," the company explains on a statement on its website. "WhatsApp appreciates the work that law enforcement agencies do to keep people safe around the world.

"We carefully review, validate, and respond to law enforcement requests based on applicable law and policy, and we prioritise responses to emergency requests."

The news comes after Theresa May stressed the importance for technology companies to do more to help the government identify security threats following the Parsons Green tube station bomb attack last week.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021
Misconfigured Git servers lead to Nissan data leak
hacking

Misconfigured Git servers lead to Nissan data leak

7 Jan 2021
BackupAssist teams with Wasabi to offer cheaper backup for businesses
backup

BackupAssist teams with Wasabi to offer cheaper backup for businesses

6 Jan 2021
Data: A resource much too valuable to leave unprotected
Whitepaper

Data: A resource much too valuable to leave unprotected

2 Dec 2020

Most Popular

SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021