‘Five Eyes’ nations hand tech giants encryption ultimatum

Industry given final warning as governments declare they are ready to legislate for backdoor access

encryption logo

The 'Five Eyes' governments of the UK, US, Canada, Australia, and New Zealand have challenged tech companies to voluntarily create backdoor access to their systems, or be compelled to by law.

Encryption, deployed by companies such as WhatsApp and Google to guarantee user privacy, poses a significant challenge to combating serious crimes and terrorism, the five nations' interior ministers agreed at a two-day summit on Australia's Gold Coast last week.

Advertisement - Article continues below

"Encryption is vital to the digital economy and a secure cyberspace, and to the protection of personal, commercial and government information," the five ministers, including the UK's home secretary Sajid Javid, said in a joint statement.

"However, the increasing use and sophistication of certain encryption designs present challenges for nations in combating serious crimes and threats to national and global security.

"Many of the same means of encryption that are being used to protect personal, commercial and government information are also being used by criminals, including child sex offenders, terrorists and organized crime groups to frustrate investigations and avoid detection and prosecution."

If the industry does not "voluntarily establish lawful access solutions to their products" the statement continued, "we may pursue technological, enforcement, legislative or other measures" to guarantee entry.

Advertisement
Advertisement - Article continues below

The Five Country Ministerial (FCM), which concluded this weekend, also saw the five nations discuss intelligence sharing, and how to most-effectively remove illegal and harmful content from the internet.

Advertisement - Article continues below

Despite being spurned by tech companies for consultations over how best to manage online spaces, the ministers agreed to another joint statement reiterating their commitment to ridding the internet of "child predators, terrorists, violent extremists and other illicit actors".

They called for the industry to implement functions that prevent illicit content from being uploaded in the first place, and build user safety into the design of all online platforms, among a host of other demands.

This tougher stance, on both encryption and illicit online content, follows the European Union's (EU's) soundings in August that it would draw up new laws to fine companies like YouTube and Facebook for failing to remove extremist material within an hour.

"We cannot afford to relax or become complacent in the face of such a shadowy and destructive phenomenon," said European commissioner for the security union Julian King.

The principles agreed at the FCM, particularly around encryption, have reignited a debate centring on privacy versus security - with law enforcement agencies increasingly frustrated at being unable to access communications seized as part of their investigations.

Advertisement - Article continues below

The UK's National Crime Agency (NCA) said in its annual assessment of serious crime earlier this year that encryption impacts how effective law enforcement organisations can be in gathering intelligence and collecting evidence.

But former home secretary Amber Rudd, as with her successor Sajid Javid, had gone one step further to suggest tech companies should insert backdoor access into their products - undermining the principles of encryption entirely.

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now
Advertisement

Recommended

Visit/security/cyber-security/355267/zoom-hires-ex-facebook-cso-to-boost-platform-security
cyber security

Zoom hires ex-Facebook CSO Alex Stamos to boost platform security

8 Apr 2020
Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020
Visit/software/video-conferencing/355229/zoom-we-moved-too-fast
video conferencing

Zoom CEO admits company "moved too fast" as privacy issues mount

6 Apr 2020

Most Popular

Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
Visit/security/cyber-security/355271/microsoft-gobbles-up-corpcom-domain-to-keep-it-from-hackers
cyber security

Microsoft gobbles up corp.com domain to keep it from hackers

8 Apr 2020
Visit/server-storage/servers/355254/a-critical-flaw-in-350000-microsoft-exchange-remains-unpatched
servers

A critical flaw in 350,000 Microsoft Exchange remains unpatched

7 Apr 2020