Message encryption a problem – Rudd – BBC News


BBC News
Message encryption a problem - Rudd
BBC News
The major technology companies must step up their fight against extremism or face new laws, the home secretary has told the BBC. Amber Rudd said technology companies were not doing enough to beat the enemy on the internet. Encryption tools used by ...
'Real People' Don't Need Encrypted Messaging Services, Claims UK Home SecretaryMac Rumors
You're wrong, Amber Rudd encryption is for 'real people'New Scientist
UK home secretary Amber Rudd says 'real people' don't need end-to-end encryptionBusiness Insider
Telegraph.co.uk -Wired.co.uk -BBC -Telegraph.co.uk
all 74 news articles »

Read the rest here:
Message encryption a problem - Rudd - BBC News

We don’t want to ban encryption, but our inability to see what terrorists are plotting undermines our security – Telegraph.co.uk

Awful terror attacks this year have confirmed again how terrorists use internet platforms to spread their vile ideology, and to inspire and to plan their acts of violence.

Nearly every plot we uncover has a digital element to it. Go online and you will find your own do-it-yourself jihad at the click of a mouse. The tentacles of Daesh (Isil) recruiters in Syria reach back to the laptops in the bedrooms of boys and increasingly girls in our towns and cities up and down the country. The purveyors of far-Right extremism pump out their brand of hate across the globe, without ever leaving home.

The scale of what is happening cannot be downplayed. Before he mowed down the innocents on Westminster Bridge and stabbed Pc Keith Palmer, Khalid Masood is thought to have watched extremist videos. Daesh claim to have created 11,000 new social media accounts in May alone. Our analysis shows that three-quarters...

Originally posted here:
We don't want to ban encryption, but our inability to see what terrorists are plotting undermines our security - Telegraph.co.uk

Ex-NSA boss questions encrypted message access laws proposed by Malcolm Turnbull – ABC Online

Updated August 01, 2017 07:34:44

The Federal Government's bid to force tech companies to reveal terrorists' secret conversations could be unachievable, according to the former deputy director of the US National Security Agency (NSA).

Chris Inglis had a 28-year career with the NSA and now advises private companies on how to detect Edward Snowden-style leakers within their ranks.

He told the ABC the Turnbull Government's bid to access encrypted messages sent by terrorists and other criminals is to be admired, but the technology may prove problematic.

"I don't know how feasible it is to achieve the kind of access the Government might want to have under the rule of law, the technology is tough to get exactly right," Mr Inglis told the ABC.

"But the Government is honour-bound to try to pursue both the defence of individual rights and collective security."

Encrypted messages affect close to 90 per cent of ASIO's priority cases and the laws would be modelled on Britain's Investigative Powers Act, which obliges companies to cooperate.

Technology experts, like adjust professor at the Centre for Internet Safety Professor Nigel Phair, have questioned how these laws would really work.

"From a technical perspective we are looking at very high-end computing power that makes it really, really difficult to decrypt a message on the fly, it's just not a simple process," he said.

Facebook has already indicated it will resist the Government's laws, saying weakening encryption for intelligence agencies would mean weakening it for everyone.

"Because of the way end-to-end encryption works, we can't read the contents of individual encrypted messages," a spokesman said.

But Mr Inglis said technology companies would not need to create a so-called backdoor to messages, but rather allow intelligence agencies to exploit vulnerabilities.

The NSA was criticised in May after it was revealed it knew about a vulnerability in Microsoft's system, but exploited it rather than reporting it to the company.

"Here's the dirty little secret: most of these devices already have what might be technically described as a backdoor their update mechanisms, their patch mechanisms," he said.

"My read on what you are trying to do is to put that issue on the table and say, 'we are not going to create backdoors, but we are going to try and use the capabilities that already exist'."

Mr Inglis said the Australian Government was pushing for legal powers the US Government had not called for.

"We have not had as rich a debate as what I sense is going on in Australia," he said.

"The Government by and large has not stepped in and directed that we are either going to seek a solution, we are still trying to find a voluntary way forward."

When Prime Minister Malcolm Turnbull announced the legislation, he noted strong libertarian tendencies of US-based technology companies.

Mr Inglis said Australia was "in the middle of the pack" when it came to cyber security planning.

"You are currently working through how to balance individual privacy the defence of liberty as well as we would say in the states and the pursuit of collective security," he said.

"No-one is exempt from the threats that are traversing across the cyber space at this moment in time."

Topics: science-and-technology, defence-and-national-security, security-intelligence, information-and-communication, turnbull-malcolm, government-and-politics, australia, united-states

First posted August 01, 2017 04:44:23

Read more:
Ex-NSA boss questions encrypted message access laws proposed by Malcolm Turnbull - ABC Online

Encryption and terror: how can government get the balance right? – ITProPortal

The emergence of multinational, mass-scale, internet-based social networks at the start of the 21st Century has changed the rules of communication like no other invention since the birth of broadcast radio 100 years previously.

Never before has it been possible for anyone to disseminate information, talk and share on such a mass scale, across the barriers of language and political borders. It's marvellous on so many levels.

But there's a dark side. Add easy-to-use, easy-to-access, high-strength encryption into the equation, as has indeed happened over the last few years, and we have a recipe for disaster. Terrorists and law-breakers are empowered like no previous era - and it may feel like there's no means to stop them without major incursions to civil liberties.

It's very clear that terrorist groups and other criminals are using encryption to organise their activities without fear of being detected, because strong encryption has become so easy.

Encryption proliferation, through popular messaging services - available for free, to anyone - makes it impossible for our security services to exercise their investigatory powers in the digital world in the same way they can in the physical domain.

In the physical domain, we expect privacy, of course. We expect to be able to come into our houses and close the door behind us, and no-one is allowed to come in and bother us. Quite right, too.

Unless we've broken the law and it demands we either be arrested or our property investigated.

Then, those privacy rights are clearly less important than the rule of law.

At that point, as members of a democratic society, we're bound to agree that - having obtained a judicial warrant through the laws we consent to as members of this society - security and law enforcement services ought to be able to bash through people's doors and conduct a thorough search.

But those actions are no longer available to our peacekeepers in the digital realm. The doors they have a legal warrant to breach won't break down. The wire-tap that was obtained through the courts yields only gibberish.

This cannot stand. We can't live safely in a society in which our security forces work blind and deaf.

This weakness for security and privacy are born out of design. The outer layers of the Internet, where social networks and messaging apps exist, have moved faster than its lowest levels.

The technological foundations of the Internet, invented in 1969 to enhance communications between a limited number of academic, corporate and defence systems, as DARPANET have barely moved on.

There was no thought around maintaining personal privacy on these systems back then, nor was there any thought given to the widespread use of sophisticated encryption systems.

Much the same thing is true of our legislature which, in the UK, relies on a complex system of precedents and legal acts, dating back centuries. Many current lawmakers continue to have a weak grasp of technology, and are prone to making over-generalisations that are neither practical, nor ultimately in their nation's best interest.

In short, we need to change the Internet, and our social networks.

We need to retrofit our wonderful, but dated, 1969 communications network with the powers it needs to continue to provide the amazing benefits it has done to date, but with safety and privacy embedded.

We need a blanket policy that will treat everyone the same, and give everyone their rightly deserved privacy.

A mechanism for privacy should be provided at the application layer of the Internet and this involves several steps, and some caveats.

To join future networks, identities ought to be verified. This is a complex area, and the verification credentials required of a 10-year-old girl might not be the same ones required of a 30-year-old man. But the broad proposition is that everyone should have a verifiable identity on the Internet that remains the same throughout one's life, much like your passport.

That, in itself, poses questions about privacy. If I were a young, closeted gay man, for example, then I may be looking for information and connections on the Internet that means a verified identity could threaten my privacy, and have further ramifications for my private life. That needs to be protected against.

Or what if I am now a 40-year-old businesswoman, who perhaps made some regrettable choices in my youth that are shown online? Again, people deserve that degree of privacy, just as they would normally find it in the physical world.

So, everything to be encrypted by law. Everything. Nobody, and no commercial organisation, will be allowed to read or identify your messages, browsing history or any other content you have produced on the Internet through any kind of scanning without your explicit consent.

The proviso is that when your actions and your content are encrypted, very securely, then the keys to that encryption action are retained by the service provider.

If the law enforcement or national security authorities require access to those keys, then the regulated service provider will yield them, for the specific actions for which they have a warrant. Only people with something to hide should have anything to fear - again, only warranted authorities would be allowed access.

This, I believe, is the only solution. We need privacy. We need security. We cannot continue as a free, democratic society without a balance between those two things. At Scentrics, we've put years of research into the problem, and we believe that legitimised key escrow, through agencies regulated by government, as telcos and ISPs already are, is the only solution.

There's no doubt that a transition to such a state will be resisted by some, and from well-meaning intentions. People, by-and-large, don't want to change. There's a knee-jerk lobby ready to resist any change to the status quo perceived as any infringement to existing rights. And not least, be sure that such a change would require a considerable body of legislation, communication and reassurance. It will be a long, hard road.

But consider the alternative. Across most of the Internet, private networks are harvesting everything you do, say and post. And make no mistake that state authorities are not equally interested in probing your digital persona on a mass scale. You have no privacy whatsoever in the current environment. Encryption will change the rules for that engagement - in the favour of private citizens.

The encryption tools we have now are empowering terrorists, who currently face no checks to their organisation, recruitment, and operational efforts. That cannot be allowed. Whereas server-centric encryption against verified identities will make it very hard for them to continue.

What's it to be? The status quo we have at present is entirely untenable. And the terrorists will win if we drag our feet. As for the future we are proposing? It requires compromises, but making rational compromises which balance safety and civil liberties is the very foundation of rational society.

Paran Chandrasekaran, CEO, Scentrics Image Credit: Sergey Nivens / Shutterstock

Continued here:
Encryption and terror: how can government get the balance right? - ITProPortal

Ixia’s Active SSL Sheds Light On Encrypted Traffic – No Jitter

Ixia's Active SSL Sheds Light On Encrypted Traffic By employing a network packet broker, tool can handle decryption/encryption without negatively impacting performance.

By employing a network packet broker, tool can handle decryption/encryption without negatively impacting performance.

Instead of turning a blind eye (literally) to the traffic or overburdening critical tools, Ixia's Active SSL feature lets a network packet broker handle the decrypt/encrypt process without negatively impacting performance.

The job of a network manager is really hard and continues to get harder. Complexity has increased, new devices are connected at an alarming rate, and shadow IT has run amok in most companies. However, no trend has made the network manager's life more challenging than the rise of encrypted traffic.

Encryption is the ultimate Catch-22. At first it seems like a great idea in that SSL hides traffic from the bad guys. But then you quickly realize it enables those same hackers to hide threats from the monitoring and security tools that network managers rely on to manage and protect the network.

One solution is to have the tools decrypt, do whatever they're supposed to do, and then re-encrypt the traffic. But the SSL decryption/encryption process is processor-intensive and can bring the tools to their knees, so many network and security professionals let the encrypted traffic go by and hope and pray it isn't malicious. Last year, a ZK Research study found that almost 50% of organizations admit to turning security features off in favor of performance -- and encrypted traffic is a big contributor to that percentage.

Ixia offers up a better alternative to the encrypted traffic conundrum. Instead of turning a blind eye (literally) to the traffic or overburdening critical tools, Ixia's Active SSL feature lets a network packet broker handle the decrypt/encrypt process without negatively impacting performance.

The past several years has seen an explosion in the number of purpose-built network tools aimed at helping network managers understand what's happening on the network and how to secure it. The resulting tool sprawl has created a surge of interest in network packet brokers, which Ixia describes as a middleman for network monitoring traffic. These devices make adding new tools plug and play, performing the majority of the heavy lifting of traffic so the tools can do what they were meant to do and no more.

Ixia has added the Active SSL feature to its SecureStack software set that runs on its Vision One network packet brokers. Ixia's customers can use the platform to identify performance problems across physical and virtual networks as well as better secure the environment. Active SSL highlights include:

Active SSL also uses something called "ephemeral keys" to provide forward secrecy and protect past and future data exchanges. Ephemeral keys are cryptographic keys generated for each execution of the key establishment process. The use of the ephemeral keys means traffic is un-encrypted, inspected, and re-encrypted before being sent back to the network.

Some organizations have shied away from encrypting traffic because of the overhead involved in doing so, but the IETF's Transport Layer Security (TLS) 1.0 standard, which uses ephemeral keys, improves both security and performance. With TLS, the use of encrypted traffic will likely accelerate, making Active SSL and other solutions that can help bring light to a growing blind spot.

Follow Zeus Kerravala on Twitter and Google+! @zkerravala Zeus Kerravala on Google+

Read the rest here:
Ixia's Active SSL Sheds Light On Encrypted Traffic - No Jitter

Facebook’s Sheryl Sandberg: WhatsApp metadata informs governments about terrorist activity in spite of encryption – CNBC

"The goal for governments is to get as much information as possible. And so when there are message services like WhatsApp that are encrypted, the message itself is encrypted but the metadata is not, meaning that you send me a message, we don't know what that message says but we know you contacted me," she said.

"If people move off those encrypted services to go to encrypted services in countries that won't share the metadata, the government actually has less information, not more. And so as technology evolves these are complicated conversations, we are in close communication working through the issues all around the world."

Sandberg recently met Rudd and told "Desert Island Discs" that Facebook and the U.K. government are "very aligned in our goals".

"We want to make sure all of us do our part to stop terrorism and so our Facebook policies are very clear. There's absolutely no place for terrorism, hate, calls for violence of any kind. Our goal is to not just pull it off Facebook but to use artificial intelligence and technology to get it before it's even uploaded.

"We are working in collaboration with the other tech companies now, so if a video by a terrorist is uploaded to any of our platforms, we are able to fingerprint it for all the others so that they can't move from platform to platform."

Go here to see the original:
Facebook's Sheryl Sandberg: WhatsApp metadata informs governments about terrorist activity in spite of encryption - CNBC

Ex-NSA chief Chris Inglis backs government’s encryption push against Apple, Facebook – The Australian Financial Review

Former NSA deputy director Chris Inglis says the Australian government is acting reasonably in asking tech companies to be more helpful in cracking terrorists' messages.

The deputy director of the United States' National Security Agency (NSA) during the Edward Snowden leaks has backed the Australian government's push to force tech giants to assist in revealing the content of some encrypted messages, saying the likes of Facebook and Apple could do more to help track terrorists and criminals.

Speaking to The Australian Financial Review ahead of a trip to Australia this week, Chris Inglis, who was the NSA's highest-ranking civilian from 2006 to 2014 says the government's plan to enact law enforcement powers to crack open encryption by the end of the year is an appropriate attempt to strike a balance between protecting privacy and protecting citizens from terrorism.

He says the government's plan will not require the providers of apps such as WhatsApp, Wickr, Telegram Messenger and iMessage to create new so-called back doors into devices and apps, but will simply involve them doing more to open up their systems on request.

"When citizens look to their government they expect them to protect their privacy and also to keep them safe, this is not an either/or proposition. When I hear your Prime Minister and your Attorney-General speaking about this, I don't see them favouring one of these over the other," Inglis says.

"There has been scaremonger comments on these topics, but I haven't heard your government asking for new back doors, they are merely saying that, if there is a capability already there, they would like to use it under the rule of law, which has always been a legitimate government pursuit."

Tech giants such as Facebook and Apple have already asserted they provide as much assistance as they can to law enforcement agencies, both in Australia and globally, and say they are powerless to break the encryption on individual messages.

Prime Minister Malcolm Turnbull raised eyebrows around the world with a comment suggesting the laws of Australia trump the laws of mathematics, which led to Edward Snowden tweeting that such remarks create a "civilizational risk".

Apple chief executive Tim Cook previously wrote an open letter to customers last year after the company refused to build a system to help the FBI unlock the iPhone of a San Bernardino terrorism culprit who jointly killed 14 people.

He said the US government's request to break encryption would require its engineers to weaken the devices for everyone else around the world.

"The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe," Cook wrote.

In July, special adviser to the Prime Minister on cyber security Alastair MacGibbon said he couldn't understand why these companies "viscerally rail against helping protect their customers", and Inglis says he believes that the likes of Apple are balancing their commercial concerns in markets in all corners of the globe against the option of being as open as possible with different governments.

"Many of these systems already have what I would describe as an appropriate, well-known back door, whether it's a patching mechanism, or it's a software update mechanism those are back doors," he says.

"Most users have every confidence in the world that those work very appropriately and that only the vendor who services their software is able to replace the software, update the software and change the function of that phone in every way, shape, or form."

Other experts, such as Firstwave Cloud Technology's Simon Ryan have also suggested that it is entirely possible, at least for Facebook, to reveal the contents of private messages.

Inglis is heading to Australia in his role as chair of the strategic advisory board of US-based behaviour analytics cyber security firm Securonix, which is poised to officially open its operations Down Under this week.

His time in office at the NSA ended a year after its former IT contractor Edward Snowden plunged it into crisis by leaking thousands of documents that laid bare the methods and extent of the agency's surveillance programs.

Securonix provides technology, which it says detects malicious behaviour within an organisation or network in real-time, and would theoretically stop the kind of exfiltration of private data accomplished by Snowden.

While saying that he still sits more closely to the black-and-white view that Snowden committed an act of betrayal, Inglis says he now has some empathy with Snowden's purported intention to expose what he believed to be egregious behaviour by the government.

However, he says Snowden's credentials as a principled whistleblower are called into doubt by the fact that he did nothing to raise concerns in less harmful ways prior to leaking information.

"I would feel more sympathetic about him in 2013 if he had exercised one iota of having raised a hand, lodged a concern, kind of thrown a brick through somebody's window with an anonymous note to us, but he did none of those things," Inglis says.

"With allegations like these, you an obligation to actually be factually correct in what you allege is going on, and he was not I think that if you believe in your cause, you should be willing to stand and speak about that in the presence of your peers, and here he is in Moscow, so none of that speaks well of either of his motivation and certainly not of his means."

Inglis was portrayed in the 2016 Oliver Stone movie Snowden, which followed events leading up to the leak, and which he says provided an "egregious misappropriation of the facts" regarding the attitudes at the NSA and of Snowden's importance within it.

In the movie a character in Inglis' role is seen sending Snowden off to head a mission in Hawaii to solve a problem related to China, yet Inglis says the two never met in person, and Snowden was too far removed from the action to be remotely considered for such work.

"I have to imagine that the reason it was portrayed that way was not to make it more interesting, but rather to impress upon the audience that Edward Snowden was somebody that travelled in circles where he would have direct knowledge of the strategies, the means and the conspiracies that are practised by an NSA, and of course he was nowhere near in those places," he says.

"He was an important enough worker that he was hired to do what he did, but he was working at the edge, and many of the things that he saw, he didn't fully understand the context of, and he therefore misdescribed."

Inglis says the sense of shock that permeated the NSA following the leaks had passed by the time he left the agency. He says that he and others within the NSA were comfortable that they were doing the right thing, with noble intentions, and believed they made the scandal worse by mismanaging their external communications before Snowden leaked.

He says the agency should have explained why it had surveillance plans in place and proactively addressed concerns about a lack of controls and restraint.

"If I could go back in time I would address the fact that the government and NSA were not transparent enough the noble purpose and controls were not as well understood as what Snowden was talking about, which was capability, and a capability that you might enjoy never tells the whole story," Inglis says.

"Most of his allegations were taken as revelations and they were not. His allegations were just that. They were facetious and vilified us."

Moving into the present, Inglis says he understands people outside the US viewing its present administration with a sense of worry. However, he believes that the checks and balances in place would not allow an unpredictable president to become a national security risk.

The Trump presidency has been dogged by suggestions that his team has been too close to Moscow since the election campaign, but Inglis says there are enough protections in place that would prevent the President from exceeding his remit.

"If I was still at the NSA, I would have to appreciate the President has a role, and that role within the United States system is that he is not the sole and ultimate authority on how the nation proceeds," he says.

"You have to actually let this play out, because it's still true that the conflict of ideas is one of our best ideas. I'm confident at the end of the day that our system is going to work its way through what looks like some pretty chaotic controversies at a distance, and frankly, most days, close in, feels that way as well.

"There is a genuine battle of ideas taking place as to what is the proper role of government, and the views are extreme. It looks a bit worrisome, both close in and at a distance, but the system has lived through periods where it was equally chaotic before and we worked our way through it. If you believe in the foundations of this particular form of government, as I do, you have to believe that we'll figure it out, that we'll work our way through."

Read the original:
Ex-NSA chief Chris Inglis backs government's encryption push against Apple, Facebook - The Australian Financial Review

Commissioners need to rethink encryption – LancasterOnline

Note: The following letter was sentFriday to Lancaster County Commissioners Dennis Stuckey, Craig Lehman and Josh Parsons.

I strongly urge you to reconsider the decision to encrypt police department radio transmissions before this change takes place in November.

First, the health and safety of both our Lancaster County community and the law enforcement officials who protect it are paramount.

Second, essential to the well-being of our county must be a government system that values public accessibility, transparency and accountability.

These two truths must find a way to co-exist.

Certainly, a healthy democracy and an informed citizenry here do not depend solely on public and news media access to Lancaster County police radio broadcasts. Both are, however, seriously diminished when the publics right to know is further eroded something that is becoming alarmingly common in our commonwealth and across this country.

Our newspaper has long relied on police communication to provide the public with emergency information. I consider a scanner as essential to my job as a wrench to a plumber, a longtime television journalist in Oklahoma wrote to me last Sunday. He reached out in support of LNPs July 5 editorial opposing encryption.

Think snowstorms. Vehicular accidents. Road closings. Gas leaks. Homicides. Violent protests.

Radio access enables news outlets to work hand-in-hand with first responders to keep the public away from dangerous situations, Melissa Melewsky, media law counsel for the Pennsylvania NewsMedia Association, noted in a recent LNP article. Total encryption addresses a problem that doesnt exist where the media is concerned.

West Hempfield Township Police Chief Mark Pugliese I, who chairs the county chiefs Police Advisory Board to Lancaster County-Wide Communications and represents the county Chiefs of Police Association on this issue, appears to agree.

Referring to events worldwide and expressing concern for police safety, he told you its not unusual for officers today to be ambushed. But he also acknowledged that were not getting that so much in Lancaster County.

Additionally, the chief spoke about incidents here where the public or the media interfered with investigations, in some cases by getting to crime scenes more quickly than police.

When pressed by an LNP reporter, Chief Pugliese could not cite a single situation in Lancaster County where the media interfered at a crime scene.

The chief says he is not anti-media.

Nor am I anti-law enforcement.

When the earth rumbles or a gun fires, citizens rely on police and other first responders to courageously address the emergency. They expect us in the news media to tell them what is happening. Shutting off access to information feeds distrust and anxiety; it fuels the spread of misinformation by social media commenters unbound by the journalistic standards of citing sources and confirming details.

Chief Pugliese said that the removal of public and media access to police broadcasts will make it incumbent on police to improve the lines of communication.

Experience suggests to me that will not happen; I dont see that as law enforcements primary role, and I dont see how it does either. Access to timely and accurate information that serves the public interest will suffer as a result.

Like law enforcement, we in the news media must be allowed to do the work we are trained to do. It is incumbent upon us to get it right and to be held accountable if we dont.

While all three of you are and must be concerned about police safety, Commissioner Lehman has said that blocking police communication might give officers a false sense of security and further isolate them from the community. Hes suggested a compromise of encrypting public transmissions, but allowing access to the news media.

It is certainly a better option.

I was at home July 2 and only yards away from the horrific Manor Township gas explosion that killed one man and injured others as it leveled a house, severely damaged neighboring homes and, in seconds, rattled the psyche of an entire community.

Frightened neighbors ran outside their homes, erroneously speculating about the cause of the blast. I called the newsroom and was accurately informed that it was a gas explosion. Then I walked to the scene to join my newspaper colleagues in probing more deeply as we talked with witnesses, questioned officials and provided real-time information that a county wanted and needed in that moment.

Fire and ambulance dispatches, the ones that guided us that day, are not part of the planned encryption here. At least not yet. As Chief Pugliese noted, the scrambling of police communication, and that of fire and ambulance, is becoming the national norm.

I dont think thats the way to go. I do believe a compromise can be struck, one that will allow law enforcement to do its work, and enable those of us in the news media to do ours.

We both exist, after all, to serve our Lancaster County community to the very best of our abilities.

Barbara Hough Roda is executive editor of LNP and LancasterOnline. Email: broda@LNPnews.com; phone, 717-481-7335; Twitter, @BarbRodaLNP.

Originally posted here:
Commissioners need to rethink encryption - LancasterOnline

Ditching WhatsApp encryption will help terrorists: Facebook COO – Economic Times

SAN FRANCISCO: Responding to a call that Facebook should do away with the encryption that prevents police from accessing WhatsApp data, the company's top executive has said such a move would make it difficult to track terrorists if government gets such access.

The call for ditching the WhatsApp encryption emerged after five people were killed in an attack on March 22 when Khalid Masood ploughed his car into crowds on the bridge and tried to storm the Parliament. Masood is said to have used WhatsApp minutes before carrying out the attack.

"The goal for governments is to get as much information as possible, and so when there are message services like WhatsApp that are encrypted the message itself is encrypted but the metadata is not. Meaning that when you send me a message we don't know what that message says but we know that you contacted me," Express.co.uk quoted Sheryl Sandberg, Chief Operating Officer Facebook, as saying on Saturday.

"If people move off those encrypted services and go to encrypted services in countries that won't share the metadata the government actually has less information, not more. And so as technology evolves these are complicated conversations. We are in close conversations working through the issues all around the world," she added.

With the growing terror attacks in London and Europe, social media has come under severe criticism for not doing enough to curb online terrorism. Facebook hired an online army of more than 7,000 people which is assigned to crack down on terrorists using the site.

Facebook also has 4,500 people who work to stop any attempt from extremists to hijack the site and the company plans to hire 3,000 more later this year.

"Our Facebook policies are very clear. There is absolutely no place for terrorism, hate or calls for violence of any kind. Our goal is to not just pull it off Facebook but to use artificial intelligence technology to get it before it is even uploaded," Sandberg said.

"We are working in collaboration with other tech companies now so if a video is uploaded to any of our platforms we are able to fingerprint it for all the others so they can't move from platform to platform," she added.

See the rest here:
Ditching WhatsApp encryption will help terrorists: Facebook COO - Economic Times

Sheryl Sandberg defends WhatsApp’s end-to-end encryption policy – The Drum

Facebook's chief operating officer Sheryl Sandberg has responded to the suggestion that messaging apps and social networks should remove end-to-end encryption implying such a move would be a step backwards for governments looking to monitor extremism online.

The executive tackled the issue on Sunday's edition of Desert Island Discs on BBC Radio 4. She said that if Facebook-owned WhatsApp was to ditch encryption, which prevents authorities from seeing the messages users are sending to each other, then people would turn to alternative encrypted platforms; leaving governments with even less information as a result.

"The goal for governments is to get as much information as possible, and so when there are message services like WhatsApp that are encrypted the message itself is encrypted but the metadata is not. Meaning that when you send me a message we don't know what that message says but we know that you contacted me," she explained.

Following extremist attacks at London Bridge and nearby Borough Market earlier this year, British prime minister Theresa May accused tech giants of having provided a safe space for terrorism to breed. Home Secretary Amber Rudd, meanwhile, said she believed intelligence services should have the ability to get access to encrypted platforms like WhatsApp.

Facebook has stood firm on its belief that protecting private communications is one of its core principles.

"If people move off those encrypted services and go to encrypted services in countries that won't share the metadata the government actually has less information, not more," Sandberg added.

The Facebook lead admitted that as technology continues to evolve there are "complicated conversations" to be had and that her company is working closely with authorities on such issues.

Last month Facebook announced an anti-terror counterspeech programme in the UK. As part of the initiative the company will give anti-terror groups free advertising credits to promote their messages to individuals that might be at risk of radicalisation.

Speaking on the subject, Sandberg said: "Our Facebook policies are very clear. There is absolutely no place for terrorism, hate or calls for violence of any kind. Our goal is to not just pull it off Facebook but to use artificial intelligence technology to get it before it is even uploaded."

"We are working in collaboration with other tech companies now so if a video is uploaded to any of our platforms we are able to fingerprint it for all the others so they can't move from platform to platform," she added.

Read more here:
Sheryl Sandberg defends WhatsApp's end-to-end encryption policy - The Drum