Governments Urge Facebook To Create Backdoor Access To Encrypted Messages

The US Attorney General, along with officials from the United Kingdom and Australia,are  asking Facebook to delay plans for end-to-end encryption across its messaging services. 

The open letter, dated 4 October, is jointly signed by the UK’s home secretary, Priti Patel (pictured) the US attorney general, William Barr, the US acting secretary of homeland security and the Australian minister for home affairs. 

The letter calls on Facebook to prioritise public safety in designing its encryption by enabling law enforcement to gain access to illegal content in a manageable format and by consulting with governments ahead of time to ensure the changes will allow this access. 

While the letter acknowledges that Facebook, which owns Facebook Messenger, WhatsApp, and Instagram, captures 99% of child exploitation and terrorism-related content through its own systems, it also notes that "mere numbers cannot capture the significance of the harm to children."

"Risks to public safety from Facebook’s proposals are exacerbated in the context of a single platform that would combine inaccessible messaging services with open profiles, providing unique routes for prospective offenders to identify and groom our children," the letter reads.

It will call on Facebook not to “proceed with its plan to implement end-to-end encryption across its messaging services without ensuring that there is no reduction to user safety and without including a means for lawful access to the content of communications to protect our citizens”.

The US and UK announced the signing of a “world-first” data access agreement that will allow law enforcement agencies to demand certain data directly from the other country’s tech firms without going through their governments first. The agreement is designed to facilitate investigations related to terrorism, child abuse and exploitation, and other serious crimes. The draft open letter was first reported by BuzzFeed. The governments’ request will reignite a longstanding debate over how to balance privacy with public safety.

Zuckerberg defended his decision to encrypt the company’s messaging services despite concerns about its impact on child exploitation and other criminal activity.

Speaking Thursday 3rd October in a live-streamed version of the company’s weekly internal Q&A session, said child exploitation risks weighed “most heavily” on him when he was making the decision and pledged steps to minimise harm.
Also on Thursday, a Facebook spokesperson said in a statement: “We strongly oppose government attempts to build backdoors because they would undermine the privacy and security of people everywhere.”

What are Facebook’s planned changes?
Facebook’s messaging app WhatsApp already employs end-to-end encryption, shielding the content of its 1.5bn users’ messages from the company itself. In March 2019, Zuckerberg announced plans to integrate Facebook’s other messaging apps, Facebook Messenger and Instagram, with WhatsApp and incorporate end-to-end encryption across the entire service. 

Facebook’s move to expand the use of encryption followed a year in which the company came under global criticism for its failure to protect the data of its users, and it was branded as a pivot toward a “privacy-focused communications platform”.
But law enforcement agencies have long looked askance at encrypted communications, which they argue protect criminals and terrorists while stymying investigators.

The letter specifically focuses on the threat of child sexual exploitation and abuse, noting that Facebook’s combination of encrypted messaging and open profiles could provide “unique routes for prospective offenders to identify and groom our children”.

“In 2018, Facebook made 16.8 million reports to the US National Center for Missing & Exploited Children, more than 90% of the 18.4 million total reports that year,” the letter states. “NCMEC estimates that 70% of Facebook’s reporting, 12 million reports globally, would be lost [if Facebook implements encryption as planned].”

Privacy v Public Safety
The letter asserts that the governments “support strong encryption” while also demanding “a means for lawful access to the content of communications”, an apparent reference to a so-called “backdoor” into the encrypted communications.
Governments have often proposed such backdoors as a compromise measure, but some security experts argue that it is impossible to provide limited access to encrypted communication without weakening privacy overall.

Privacy advocates have pushed back on the idea that a government backdoor was needed to keep people safe.

“When a door opens for the United States, Australia, or Britain, it also opens for North Korea, Iran, and hackers that want to steal our information,” said Neema Singh Guliani, the senior legislative counsel for the American Civil Liberties Union (ACLU).

“Companies should resist these repeated attempts to weaken encryption that reliably protects consumers’ sensitive data from identity thieves, credit card fraud, and human rights abusers.”

The ex-NSA whistleblower Edward Snowden, now safely in exile in Moscow, criticised the governments’ request on Twitter, “If Facebook agrees, it may be the largest overnight violation of privacy in history.”

Guardian:         Buzzfeed

You Might Also Read:

Quantum Computing Will Break Encryption:

WhatsApp Implements Encryption:

 

 

 

« The Future Of Cyber Security Is AI
The Strange Case Of The The Missing Crypto-Queen »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.