WhatsApp Is A Vehicle For Illegal Content

Child sexual abuse imagery is spreading on WhatsApp, the Meta-owned end-to-end encrypted messaging platform. Indeed, has been a 25% increase in child abuse imagery recorded by the UK police in the last few years. 

Now, child protection campaigners are advocating  for changes to encryption that would give law enforcement agencies the ability to access these types of messages as part of efforts to fight the spread of illegal and abusive  material.

The Internet Watch Foundation (IWF), a child safety group, has accused WhatsApp's parent company, Meta, of failing to put the mechanisms in place necessary to stop the spread of such material on WhatsApp.

A counter argument is that secure messaging platforms are vital to protect vulnerable people, including younger users, and that there is currently no viable technology that could create a backdoor into encryption for law-enforcement, without ultimately breaking encryption and impacting user privacy and safety.

IWF has also said that new mechanisms are needed that might stop the spread of illegal material, like the content sent to the disgraced former BBC news presenter, Huw Edwards. In a recent Court, hearing Edwards admitted having indecent imagery of children, which were shared with him on WhatsApp.

Nobody outside the conversation is able to access encrypted messages, including the service provider. 

IWF is challenging Meta to do more to protect children and put mechanisms in place. Dan Sexton, IWF’s Chief Technology Officer, told the BBC that Meta was "choosing not to" ensure indecent imagery could not spread in the wake of the Edwards case. "I'd like to ask this question: how is Meta going to prevent this from happening again? What is stopping those images being shared again on that service today, tomorrow, and the next day?

In response, a WhatsApp spokesperson has defended the app's current safety measures, saying that other messaging apps "don’t have the safety measures we have developed." Furthermore, WhatsApp say that users have the "ability to report directly to WhatsApp so we can ban any user who shares this heinous material and report them" to the National Centre for Missing and Exploited Children.

This conflict is unlikely to go away, even following the introduction of specific child protection measures in the UK Online Safety legislation last year.

"Right now, there is nothing stopping those exact images and videos of those children being shared on that platform, even though we know about it, and they know about it, and the police know about it," IWF's Sexton said.

NSPCC   |  IWF   |   Google   |   BBC   |   Gaydio   |   Independent   |    Yahoo   |   

Image: Myriams-Fotos

You Might Also Read: 

Instagram & Facebook Are Addictive For Children:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Threat Intelligence: Most Prevalent Malware Rankings
How Can You Scan Your Mac For Existing Malware? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.