Back
 JIS  Vol.9 No.1 , January 2018
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
Abstract:
The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”; they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security.
Cite this paper: Endeley, R. (2018) End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger. Journal of Information Security, 9, 95-99. doi: 10.4236/jis.2018.91008.
References

[1]   Yeboah, J. and Ewur, G. (2014) The Impact of WhatsApp Messenger Usage on Students Performance in Tertiary Institutions in Ghana. Journal of Education and Practice, 5, 157-164.

[2]   Sarker, G.R. (2015) Impact of WhatsApp Messenger on the University Level Students: A Sociological Study. International Journal of Natural and Social Sciences, 2, 118-125.

[3]   Jisha, K. and Jebakumar (2014) A Trend Setter in Mobile Communication among Chennai Youth. IOSR Journal of Humanities and Social Science (IOSR-JHSS), 19, 01-06.

[4]   Central Intelligence Agency (2017) The World Factbook. Country Comparison, Internet Users.
https://www.cia.gov/library/publications/the-world-factbook/rankorder/2153rank.html

[5]   Pascual, A. (2013) Data Breaches Becoming a Treasure Trove for Fraudsters, 2013 Identity Fraud Report.
https://www.javelinstrategy.com/coverage-area/2013-identity-fraud-report-data-breaches-becoming-treasure-trove-fraudsters

[6]   Michalas, A. (2017) How WhatsApp Encryption Works—And Why There Shouldn’t Be a Backdoor. The Conversation.
https://theconversation.com/how-whatsapp-encryption-works-and-why-there-shouldnt-be-a-backdoor-75266

[7]   District Attorney New York County (2005) Going Dar: Encryption, Technology and the Balance between Public Safety and Privacy. District Attorney New York County, Washington DC.

[8]   Whittaker, Z. (2017) US Says It Doesn’t Need Secret Court’s Approval to Ask for Encryption Backdoors.
http://www.zdnet.com/article/us-says-it-does-not-need-courts-to-approve-encryption-backdoors

[9]   Ganguly, M. (2017) WhatsApp Design Feature Means Some Encrypted Messages Could Be Read by Third Party.
https://www.theguardian.com/technology/2017/jan/13/whatsapp-design-feature-encrypted-messages

[10]   Lewis, J., Zheng, D. and Carter, W. (2017) The Effect of Encryption on Lawful Access to Communications and Data. Center for Strategic & International Studies. A Report of the CSIS Technology Policy Program.

 
 
Top