WhatsApp Is A Vehicle For Illegal Content

Child sexual abuse imagery is spreading on WhatsApp, the Meta-owned end-to-end encrypted messaging platform. Indeed, has been a 25% increase in child abuse imagery recorded by the UK police in the last few years. 

Now, child protection campaigners are advocating  for changes to encryption that would give law enforcement agencies the ability to access these types of messages as part of efforts to fight the spread of illegal and abusive  material.

The Internet Watch Foundation (IWF), a child safety group, has accused WhatsApp's parent company, Meta, of failing to put the mechanisms in place necessary to stop the spread of such material on WhatsApp.

A counter argument is that secure messaging platforms are vital to protect vulnerable people, including younger users, and that there is currently no viable technology that could create a backdoor into encryption for law-enforcement, without ultimately breaking encryption and impacting user privacy and safety.

IWF has also said that new mechanisms are needed that might stop the spread of illegal material, like the content sent to the disgraced former BBC news presenter, Huw Edwards. In a recent Court, hearing Edwards admitted having indecent imagery of children, which were shared with him on WhatsApp.

Nobody outside the conversation is able to access encrypted messages, including the service provider. 

IWF is challenging Meta to do more to protect children and put mechanisms in place. Dan Sexton, IWF’s Chief Technology Officer, told the BBC that Meta was "choosing not to" ensure indecent imagery could not spread in the wake of the Edwards case. "I'd like to ask this question: how is Meta going to prevent this from happening again? What is stopping those images being shared again on that service today, tomorrow, and the next day?

In response, a WhatsApp spokesperson has defended the app's current safety measures, saying that other messaging apps "don’t have the safety measures we have developed." Furthermore, WhatsApp say that users have the "ability to report directly to WhatsApp so we can ban any user who shares this heinous material and report them" to the National Centre for Missing and Exploited Children.

This conflict is unlikely to go away, even following the introduction of specific child protection measures in the UK Online Safety legislation last year.

"Right now, there is nothing stopping those exact images and videos of those children being shared on that platform, even though we know about it, and they know about it, and the police know about it," IWF's Sexton said.

NSPCC   |  IWF   |   Google   |   BBC   |   Gaydio   |   Independent   |    Yahoo   |   

Image: Myriams-Fotos

You Might Also Read: 

Instagram & Facebook Are Addictive For Children:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Threat Intelligence: Most Prevalent Malware Rankings
How Can You Scan Your Mac For Existing Malware? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

SentinelOne

SentinelOne

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.

Creative Network Innovations (CNI)

Creative Network Innovations (CNI)

Creative Network Innovations is a leader in providing advanced IT and cybersecurity solutions.