Published on PublicTechnology.net (https://www.publictechnology.net)

Home > End-to-end encryption: ICO says delaying use of technology ‘leaves everyone at risk – including children’

End-to-end encryption: ICO says delaying use of technology ‘leaves everyone at risk – including children’

Written by Sam Trendall on 25 January 2022 in News
News

As government launches comms campaign claiming security function will enable child abusers, data-protection watchdog claims debate is ‘unbalanced’

Credit: PxHere [1]

As the government launches a comms campaign suggesting that end-to-end encryption (E2EE) will enable child abusers, the UK’s data-protection watchdog has claimed that failing to implement the security technology “leaves everyone at risk – including children”.

Government ministers have long voiced strong opposition to E2EE; the newly launched [2] ‘No Place to Hide’ campaign – funded by the government and managed by advertising firm M&C Saatchi – calls on social networks to “confirm they will not implement end-to-end encryption until they have the technology in place to ensure children will not be put at greater risk as a result”.  

Following the launch of the comms initiative, Stephen Bonner, executive director for innovation and technology at the Information Commissioner’s Office, claimed that “the discussion on end-to-end encryption use is too unbalanced to make a wise and informed choice”.

“There is too much focus on the costs without also weighing up the significant benefits,” he said. “E2EE serves an important role both in safeguarding our privacy and online safety. It strengthens children's online safety by not allowing criminals and abusers to send them harmful content or access their pictures or location. It is also crucial for businesses, enabling them to share information securely and fosters consumer confidence in digital services.”


Related content

  • Home secretary signs agreement for access to US tech firms’ data [3]
  • Government badly needs a new message on encryption [4]
  • Amber Rudd: ‘I don’t need to understand encryption to understand it’s helping criminals’ [5]

End-to-end encryption is currently used by a number of major messaging platforms, including Facebook-owned WhatsApp. The No Place to Hide campaign claims that, if plans go ahead to extend E2EE to include Facebook and Instagram messaging services, “14 million reports of suspected child sexual abuse online could be lost each year”. This estimate was provided by US non-profit organisation the National Center for Missing and Exploited Children.

Bonner added: “E2EE is seen by some to hinder the clamp down on child abusers because it leaves law enforcers blind to harmful content. But having access to encrypted content is not the only way to catch abusers. Law enforcers have other methods such as listening to reports of those targeted, infiltrating the groups planning these offences, using evidence from convicted abusers and their systems to identify other offenders.”

The ICO tech chief encouraged the government to direct its efforts towards “maximising law enforcement and innovative techniques”.

He concluded that “until we look properly at the consequences, it is hard to see any case for reconsidering the use of E2EE – delaying its use leaves everyone at risk, including children”.

Documents obtained by Rolling Stone [6] earlier this month revealed that proposals put forward by M&C Saatchi for the No Place to Hide campaign included some dramatic public stunts intended to cause “unease” among passers-by. 

Although the campaign was conceived and funded by the Home Office, its website contains no imagery or reference to the government or any department beyond a small note at the bottom of the page stating: “The campaign is funded by the UK Government and has been developed by a steering group of child safety organisations with support from M&C Saatchi. The steering group has not been paid to take part.”

Three charities – Barnardo’s, The Lucy Faithfull Foundation, and The Marie Collins Foundation – and a cybersecurity company, SafeToNet, are listed as the campaign’s supporting organisations.

 

About the author

Sam Trendall is editor of PublicTechnology. He can be reached on sam.trendall@dodsgroup.com [7].

Tags
Cybersecurity [8]
Data [9]
Leadership [10]
Categories
Business and industry [11]
#block-views-events-popup-block{ position: fixed; bottom: -30px; padding: 25px 22px; width: 360px; max-width: calc(100% - 30px); text-align: center; border-radius: 0 4px 0 0; color: #fff; background: rgb(0, 170, 200) none repeat scroll 0% 0%; -ms-transform: translateY(100%); -webkit-transform: translateY(100%); transform: translateY(100%); -webkit-transition: all .35s ease-in-out; transition: all .35s ease-in-out; z-index: 2; } #block-views-events-popup-block.show{ bottom:10px; transform:none; -webkit-transform:none; } #block-views-events-popup-block a.btn.btn--outlineWhite { border-color: #fff; color: #fff; background: transparent; } #block-views-events-popup-block .events-popup-close{ position: absolute; cursor: pointer; top: -30px; left: 0; height: 32px; padding: 7px 20px; border-radius: 4px 4px 0 0; color: #fff; background: rgb(0, 170, 200) none repeat scroll 0% 0%; font-size: 13px; } #block-views-events-popup-block .events-popup-close .icon--events-popupClose{ padding-left: 10px; font-family: inherit !important; } #block-views-events-popup-block .icon--events-popupClose:before { content: ''; width: 12px; height: 12px; margin: -1px 7px 0 0; background: url(https://www.publictechnology.net/sites/www.publictechnology.net/themes/pubtech_override/img/close-thin.svg) center no-repeat; background-size: 10px; vertical-align: middle; position: absolute; left: 10px; top: 10px; } #block-views-events-popup-block .views-field.views-field-nid .field-content{ display:none; }

jQuery(window).load(function() { if(jQuery('#event-popup-nid').length){ var eventId = jQuery('#event-popup-nid').text(); jQuery.cookie('eventPageId',eventId); var countCurrentValue = parseInt(jQuery.cookie('countCurrentName')) || 1; var combinedValueValue = eventId+'-'+countCurrentValue; var countCurrentValue = parseInt(jQuery.cookie('countCurrentName')) || 1; jQuery.cookie('combinedValueName',combinedValueValue); const result = combinedValueValue.split('-'); if( result[1] <= 3 ) { jQuery('section#block-views-events-popup-block').addClass('show'); countCurrentValue = parseInt(result[1]) + 1; jQuery.cookie('countCurrentName',countCurrentValue); combinedValueValue = eventId+'-'+countCurrentValue; jQuery.cookie('combinedValueName',combinedValueValue); } jQuery('.events-popup-close').click(function(){ jQuery('section#block-views-events-popup-block').removeClass('show'); }); } });

(function(e,t,o,n,p,r,i){e.visitorGlobalObjectAlias=n;e[e.visitorGlobalObjectAlias]=e[e.visitorGlobalObjectAlias]||function(){(e[e.visitorGlobalObjectAlias].q=e[e.visitorGlobalObjectAlias].q||[]).push(arguments)};e[e.visitorGlobalObjectAlias].l=(new Date).getTime();r=t.createElement("script");r.src=o;r.async=true;i=t.getElementsByTagName("script")[0];i.parentNode.insertBefore(r,i)})(window,document,"https://diffuser-cdn.app-us1.com/diffuser/diffuser.js","vgo"); vgo('setAccount', '253344499'); vgo('setTrackByDefault', true); vgo('process');
Close
Sign up for our free daily newsletter
Register here
6472
Dods PublicTechnology.net is a Merit Group plc title

Quick Links

  • Home
  • News
  • Opinion
  • Features
  • Private Sector Insight
  • Cyber Week
  • White Papers
  • Events
  • On Demand Webinars
  • Partner Directory
  • About
  • Contact

Services

Dods People Dods Political Intelligence Dods ResearchDods EventsDods Training

Media & Publishing

PoliticsHome Parliament MagazineHolyroodThe House MagazineCivil Service WorldTraining Journal

About Dods

Dods Group Part of Merit Group Privacy Policy Terms & Conditions Advertising Sponsorship
Privacy PolicyTerms & ConditionsAdvertisingSponsorship Subscriptions
  • Registered office: 11th Floor
  • The Shard
  • 32 London Bridge Street
  • London SE1 9SG
  • Company number: 04267888
  • © Merit Group plc 2021

Source URL: https://www.publictechnology.net/articles/news/end-end-encryption-ico-says-delaying-use-technology-%E2%80%98leaves-everyone-risk-%E2%80%93-including

Links
[1] https://pxhere.com/
[2] https://www.publictechnology.net/articles/news/home-office-spearhead-anti-encryption-public-comms-campaign
[3] https://www.publictechnology.net/articles/news/home-secretary-signs-agreement-access-us-tech-firms%E2%80%99-data
[4] https://www.publictechnology.net/articles/opinion/government-badly-needs-new-message-encryption
[5] https://www.publictechnology.net/articles/news/amber-rudd-%E2%80%98i-don%E2%80%99t-need-understand-encryption-understand-it%E2%80%99s-helping-criminals%E2%80%99
[6] https://www.rollingstone.com/culture/culture-news/revealed-uk-government-publicity-blitz-to-undermine-privacy-encryption-1285453/
[7] mailto:sam.trendall@dodsgroup.com
[8] https://www.publictechnology.net/tags/cybersecurity
[9] https://www.publictechnology.net/tags/data
[10] https://www.publictechnology.net/tags/leadership
[11] https://www.publictechnology.net/categories/business-and-industry