‘Five Eyes’ nations hand tech giants encryption ultimatum
Industry given final warning as governments declare they are ready to legislate for backdoor access
The 'Five Eyes' governments of the UK, US, Canada, Australia, and New Zealand have challenged tech companies to voluntarily create backdoor access to their systems, or be compelled to by law.
Encryption, deployed by companies such as WhatsApp and Google to guarantee user privacy, poses a significant challenge to combating serious crimes and terrorism, the five nations' interior ministers agreed at a two-day summit on Australia's Gold Coast last week.
"Encryption is vital to the digital economy and a secure cyberspace, and to the protection of personal, commercial and government information," the five ministers, including the UK's home secretary Sajid Javid, said in a joint statement.
"However, the increasing use and sophistication of certain encryption designs present challenges for nations in combating serious crimes and threats to national and global security.
"Many of the same means of encryption that are being used to protect personal, commercial and government information are also being used by criminals, including child sex offenders, terrorists and organized crime groups to frustrate investigations and avoid detection and prosecution."
If the industry does not "voluntarily establish lawful access solutions to their products" the statement continued, "we may pursue technological, enforcement, legislative or other measures" to guarantee entry.
The Five Country Ministerial (FCM), which concluded this weekend, also saw the five nations discuss intelligence sharing, and how to most-effectively remove illegal and harmful content from the internet.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Despite being spurned by tech companies for consultations over how best to manage online spaces, the ministers agreed to another joint statement reiterating their commitment to ridding the internet of "child predators, terrorists, violent extremists and other illicit actors".
They called for the industry to implement functions that prevent illicit content from being uploaded in the first place, and build user safety into the design of all online platforms, among a host of other demands.
This tougher stance, on both encryption and illicit online content, follows the European Union's (EU's) soundings in August that it would draw up new laws to fine companies like YouTube and Facebook for failing to remove extremist material within an hour.
"We cannot afford to relax or become complacent in the face of such a shadowy and destructive phenomenon," said European commissioner for the security union Julian King.
The principles agreed at the FCM, particularly around encryption, have reignited a debate centring on privacy versus security - with law enforcement agencies increasingly frustrated at being unable to access communications seized as part of their investigations.
The UK's National Crime Agency (NCA) said in its annual assessment of serious crime earlier this year that encryption impacts how effective law enforcement organisations can be in gathering intelligence and collecting evidence.
But former home secretary Amber Rudd, as with her successor Sajid Javid, had gone one step further to suggest tech companies should insert backdoor access into their products - undermining the principles of encryption entirely.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Manufacturers report millions in losses as downtime wreaks havoc on operationsNews UK manufacturers are losing up to £736 million every week due to downtime, according to new research, with outages lasting for several days on end.
-
Microsoft gives OpenAI restructuring plans the green lightNews The deal removes fundraising constraints and modifies Microsoft's rights to use OpenAI models and products
-
Foreign states ramp up cyberattacks on EU with AI-driven phishing and DDoS campaignsNews ENISA warns of hacktivism, especially through DDoS attacks
-
A new 'top-tier' Chinese espionage group is stealing sensitive datanews Phantom Taurus has been operating for two years and uses custom-built malware to maintain long-term access to critical targets
-
‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategyNews Paul Chichester, director of operations at the UK’s National Cyber Security Centre, urged businesses to keep closer tabs on geopolitical events to gauge potential cyber threats.
-
Three ways to evolve your security operationsWhitepaper Why current approaches aren’t working
-
Beat cyber criminals at their own gameWhitepaper A guide to winning the vulnerability race and protection your organization
-
Quantifying the public vulnerability market: 2022 editionWhitepaper An analysis of vulnerability disclosures, impact severity, and product analysis
-
Same cyberthreat, different storyWhitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
-
Business value of ServiceNow security operationsWhitepaper Experience transformational gains from automating workflows and data-sharing among IT, security, and risk teams to rapidly remediate threats