WhatsApp Is A Vehicle For Illegal Content

Child sexual abuse imagery is spreading on WhatsApp, the Meta-owned end-to-end encrypted messaging platform. Indeed, has been a 25% increase in child abuse imagery recorded by the UK police in the last few years. 

Now, child protection campaigners are advocating  for changes to encryption that would give law enforcement agencies the ability to access these types of messages as part of efforts to fight the spread of illegal and abusive  material.

The Internet Watch Foundation (IWF), a child safety group, has accused WhatsApp's parent company, Meta, of failing to put the mechanisms in place necessary to stop the spread of such material on WhatsApp.

A counter argument is that secure messaging platforms are vital to protect vulnerable people, including younger users, and that there is currently no viable technology that could create a backdoor into encryption for law-enforcement, without ultimately breaking encryption and impacting user privacy and safety.

IWF has also said that new mechanisms are needed that might stop the spread of illegal material, like the content sent to the disgraced former BBC news presenter, Huw Edwards. In a recent Court, hearing Edwards admitted having indecent imagery of children, which were shared with him on WhatsApp.

Nobody outside the conversation is able to access encrypted messages, including the service provider. 

IWF is challenging Meta to do more to protect children and put mechanisms in place. Dan Sexton, IWF’s Chief Technology Officer, told the BBC that Meta was "choosing not to" ensure indecent imagery could not spread in the wake of the Edwards case. "I'd like to ask this question: how is Meta going to prevent this from happening again? What is stopping those images being shared again on that service today, tomorrow, and the next day?

In response, a WhatsApp spokesperson has defended the app's current safety measures, saying that other messaging apps "don’t have the safety measures we have developed." Furthermore, WhatsApp say that users have the "ability to report directly to WhatsApp so we can ban any user who shares this heinous material and report them" to the National Centre for Missing and Exploited Children.

This conflict is unlikely to go away, even following the introduction of specific child protection measures in the UK Online Safety legislation last year.

"Right now, there is nothing stopping those exact images and videos of those children being shared on that platform, even though we know about it, and they know about it, and the police know about it," IWF's Sexton said.

NSPCC   |  IWF   |   Google   |   BBC   |   Gaydio   |   Independent   |    Yahoo   |   

Image: Myriams-Fotos

You Might Also Read: 

Instagram & Facebook Are Addictive For Children:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Threat Intelligence: Most Prevalent Malware Rankings
How Can You Scan Your Mac For Existing Malware? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

GB Group (GBG)

GB Group (GBG)

GBG is a global technology specialist in fraud, location and identity data intelligence.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

Kerberus Cyber Security

Kerberus Cyber Security

Kerberus Cyber Security (formerly MintDefense) is a leading innovator in Web3 user security, dedicated to safeguarding digital assets and transactions through its flagship product, Sentinel3.