WhatsApp Is A Vehicle For Illegal Content

Child sexual abuse imagery is spreading on WhatsApp, the Meta-owned end-to-end encrypted messaging platform. Indeed, has been a 25% increase in child abuse imagery recorded by the UK police in the last few years. 

Now, child protection campaigners are advocating  for changes to encryption that would give law enforcement agencies the ability to access these types of messages as part of efforts to fight the spread of illegal and abusive  material.

The Internet Watch Foundation (IWF), a child safety group, has accused WhatsApp's parent company, Meta, of failing to put the mechanisms in place necessary to stop the spread of such material on WhatsApp.

A counter argument is that secure messaging platforms are vital to protect vulnerable people, including younger users, and that there is currently no viable technology that could create a backdoor into encryption for law-enforcement, without ultimately breaking encryption and impacting user privacy and safety.

IWF has also said that new mechanisms are needed that might stop the spread of illegal material, like the content sent to the disgraced former BBC news presenter, Huw Edwards. In a recent Court, hearing Edwards admitted having indecent imagery of children, which were shared with him on WhatsApp.

Nobody outside the conversation is able to access encrypted messages, including the service provider. 

IWF is challenging Meta to do more to protect children and put mechanisms in place. Dan Sexton, IWF’s Chief Technology Officer, told the BBC that Meta was "choosing not to" ensure indecent imagery could not spread in the wake of the Edwards case. "I'd like to ask this question: how is Meta going to prevent this from happening again? What is stopping those images being shared again on that service today, tomorrow, and the next day?

In response, a WhatsApp spokesperson has defended the app's current safety measures, saying that other messaging apps "don’t have the safety measures we have developed." Furthermore, WhatsApp say that users have the "ability to report directly to WhatsApp so we can ban any user who shares this heinous material and report them" to the National Centre for Missing and Exploited Children.

This conflict is unlikely to go away, even following the introduction of specific child protection measures in the UK Online Safety legislation last year.

"Right now, there is nothing stopping those exact images and videos of those children being shared on that platform, even though we know about it, and they know about it, and the police know about it," IWF's Sexton said.

NSPCC   |  IWF   |   Google   |   BBC   |   Gaydio   |   Independent   |    Yahoo   |   

Image: Myriams-Fotos

You Might Also Read: 

Instagram & Facebook Are Addictive For Children:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Threat Intelligence: Most Prevalent Malware Rankings
How Can You Scan Your Mac For Existing Malware? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.

True Corporation

True Corporation

True Corporation is Thailand’s leading Telecom-Tech company, empowering people and businesses with connected solutions that advance society sustainably.