The UK has not ordered Facebook to provide law enforcement agencies with a way to access end-to-end encrypted messages on WhatsApp, Sky News has learnt, despite a legal power which could allow it to do so in secret.
However, the power may be used to prevent Facebook from applying the same encryption protocol to its other services, something the company plans to do despite concerns the move will blind it to child predators' grooming victims over its platform.
The notice would allow Facebook to use a potentially weaker form of encryption to protect users' messages, while also forcing the company to retain the ability to monitor those messages and be able to deliver decrypted conversations in response to a warrant - something it cannot do with WhatsApp.
According to sources with direct knowledge of discussions between the government and the company, the legal instrument - officially known as a Technical Capability Notice (TCN) - was not used to force Facebook to include what critics describe as a "backdoor" to access specific WhatsApp messages, because no technological mechanism exists to bypass the encryption protocol that WhatsApp uses.
As one former senior civil servant explained to Sky News, there are two key reasons why the government did not issue a TCN to Facebook regarding WhatsApp - despite repeated complaints about the service from successive home secretaries.
The first was that "there isn't a reasonable method yet" for the company to provide lawful authorities access to the content of targeted messages, simply as a matter of how the technology functions.
A key legal test in the legislation requires it must be "reasonably practicable" for the communications provider to comply with a TCN in order for one to be issued.
However, the encryption protocol that Facebook uses - the Signal protocol, which is becoming an industry standard - has been robustly designed and repeatedly audited by cryptographers to ensure it prevents third parties from accessing the message content.
The second reason, the former civil servant added, was political: "We aren't sure TCNs will work on American companies, and politicians tend not to want to try and find out."
While the technological challenge posed by messages encrypted using the Signal protocol is currently insurmountable, the fear about US-based companies dismissing complaints from foreign jurisdictions appears to be shrinking.
According to sources with knowledge of diplomatic meetings between political envoys from the Five Eyes intelligence alliance, concerns about Facebook's plans are gaining the crucial support of the American government.
Through its own monitoring, Facebook submits thousands of reports to US authorities every year about predators using its platforms to attempt to groom children online, and millions of reports about images and videos featuring child abuse.
These child protection authorities estimate that 70% of Facebook's reports will be lost if the company allows predators and their potential victims to communicate using an end-to-end encrypted service that the company itself can no longer monitor.
Facebook has not disputed this figure, although it argues that it can use the same tools that it uses with WhatsApp - looking for indications of child abuse in the metadata of messages - to detect and tackle predators.
In response to England's children's commissioner, who on Tuesday expressed her concern the company's encryption plans would put children at risk, a spokesperson for the company said: "Child exploitation and grooming have no place on our platforms.
"Facebook has led the industry in developing new ways to prevent, detect, and respond to abuse and we will continue to work with law enforcement to combat criminal activity.
"End-to-end encryption is already the leading technology used by many services to keep people safe and, when we roll it out on our other messaging services, we will build on our strong anti-abuse capabilities at WhatsApp.
"For example, through a combination of advanced technology and user reports, WhatsApp bans around 250,000 accounts each month suspected of sharing child exploitative imagery."
Security sources who spoke to Sky News said there is an important difference between Facebook banning users based on abuse content contained in profile pictures and group names - or on other metadata signals the company could develop - and law enforcement agencies being able to safeguard children and bring prosecutions against offenders with evidence in court.
They added there was also a very significant difference between WhatsApp and Facebook's other services. People talking on WhatsApp have almost always been introduced through some other way. The chance of a child predator randomly typing in a phone number and finding a vulnerable child who will respond to them is extremely low.
However, Facebook as a platform is designed to help users find other people who have similar characteristics to them. If a Facebook user acts like a vulnerable child, then the platform will introduce them to vulnerable children - something child predators are known to take advantage of.
According to Home Office policy advisers, if the UK's new Online Harms bill doesn't introduce an obligation for Facebook to retain its own ability to monitor for child abuse - potentially by making its chief executive, Mark Zuckerberg, personally liable in incidents where the lack of this ability interrupts an investigation - then a TCN could be used to effectively issue an injunction against the company rolling out end-to-end encryption across its social networking services.
There is a concern that such a TCN may not successfully impact the company's decision to implement the encryption if it was made in isolation by the British government, but it could be successful if similar actions were taken by multiple countries working in concert.
To this end, the British government has engaged in a diplomatic strategy of signing multiple joint statements challenging Facebook's plans and conducting envoys to the US.
Sky News has spoken to multiple people with knowledge of these envoys to the US, where British officials have addressed technology companies - including Facebook - and American politicians about the issues of encrypted communications and terrorist content on social media.
Those on the British government side complained to Sky News that - over the course of several years - they have seen "no meaningful progress" on the encryption issue, even as the companies adopted novel technologies to tackle the spread of terrorist propaganda and child abuse material on their platforms.
"End-to-end encryption was always the elephant in the room" at talks on countering this material, one participant told Sky News, while another described the companies as "difficult and intransigent" from the UK government's perspective.
Civil society organisations and technology industry representatives expressed similar disappointment in the value of these meetings, saying that governments were refusing to acknowledge that the technological challenges posed by extremist content were very different to the challenges posed by end-to-end encryption - and alleging an ulterior purpose for the complaints in the government desire to collect public communications.
Chloe Squires, director of national security at the Home Office, provided written testimony to the US Senate last December "to make clear why this is such an important issue for the UK government", in a statement which repeatedly referenced Facebook moving its social networking services to use end-to-end encryption.
In her letter, Ms Squires explained how TCNs worked: "Technical capability notices can't be used to require companies to provide unfettered access to the communications of their users. However, they can provide a legal basis to ask a company to establish a lawful access mechanism to encrypted communications."
She added: "The technical difference we are talking about is whether the provider of a service retains a technical capability to access the content of communications that are already encrypted over that service. It is not the difference between messages being end-to-end encrypted or not encrypted at all."
Preceding Ms Squires' testimony, an open letter addressed directly to Mr Zuckerberg, and signed by British, American, and Australian officials, stated: "Companies should not deliberately design their systems to preclude any form of access to content, even for preventing or investigating the most serious crimes.
"We therefore call on Facebook and other companies to [...] not to implement the proposed changes until you can ensure that the systems you would apply to maintain the safety of your users are fully tested and operational."
Broader international agreement on the issue was stated in a Council of the European Union conclusion on combating child sexual abuse, which urged technology companies "to ensure lawful access for law enforcement [...] to digital evidence, including when encrypted".
The most recent joint statement regarding Facebook's plans was published this October, signed by all of the members of the Five Eyes intelligence alliance, as well as a coalition including India and Japan.
In the eyes of the British government, each of these statements has moved the debate on in terms of the language used to explain the risks posed by Facebook's plans, and to express the coalition's desire that those plans be halted, as well as through the number of international signatories who could potentially issue similar orders to Facebook within their own jurisdictions.
As a Home Office spokesperson told Sky News: "We remain deeply concerned that Facebook's end-to-end encryption plans will remove their ability to proactively detect and report child sexual exploitation and abuse."
"We are not alone in these concerns. International governments, child protection organisations and, most recently, the Children's Commissioner have all called on Facebook not to press ahead, putting millions of children's safety at risk," they added.
Follow this link:
UK has not ordered 'backdoor access' to WhatsApp messages - but could issue injunction against Facebook's encryption plans - Sky News
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]