Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intellectual Property
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Human Mobility
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Photo: artursfoto / Adobe Stock
Blog Post - Strategic Technologies Blog
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

Scoping Law Enforcement's Encrypted Messaging Problem

April 6, 2018

Mobile messaging applications such as WhatsApp, Facebook Messenger, iMessage, Telegram, Skype, Line, and others are rapidly becoming the dominant mode of communication around the world. Growing demand for instant messaging (IM) means that its share of global message traffic is estimated to grow from 50 percent to 63 percent in the next few years. Instant messaging traffic is expected to grow more than 20 percent annually through 2022, nearly doubling from 2016 to almost 100 trillion messages per year (or almost 274 billion per day).[i] Many of these apps, called over-the-top (OTT) services and applications, have recently moved to adopt end-to-end encryption, making them inaccessible to law enforcement agencies.

Four of the world’s top twelve mobile messaging apps, as measured by monthly active users (MAUs), have enabled unrecoverable end-to-end encryption by default. This means more than 2 billion individuals globally use end-to-end encrypted messaging applications. Many of the largest messaging platforms have adopted end-to-end encryption (E2EE) in the last two years, including WhatsApp, Facebook Messenger (not by default), and Viber. The largest end-to-end encrypted messaging app by number of users is WhatsApp, which implemented E2EE by default in April 2016. Only a quarter of Internet users in the United States use WhatsApp, but for many other countries WhatsApp is a primary mode of communication.[ii] Approximately 38 percent of global Internet users have WhatsApp on their phones. In Latin America and the Middle East about 66 percent of Internet users use WhatsApp.[iii]

Juniper Research estimates that roughly 108 trillion messages were sent 2016.[iv] Almost 90 percent of those messages are instant messages and e-mails, the majority of which are encrypted, often using HTTPS encryption that is accessible to law enforcement through the service provider. Based on the share of messaging platforms that employ end-to-end encryption, we estimate that about 18 percent of total communications traffic uses end-to-end encryption and is inaccessible to law enforcement.

The share of unrecoverable encryption as a share of total communications traffic is likely to grow, as instant messaging becomes increasingly dominant. Meanwhile, growth in e-mail and short message service (SMS) messaging, which are usually accessible to law enforcement agencies, is expected to be flat.

The rapid growth of IM means that its share of global message traffic will increase from 50 percent to 63 percent.[v] These estimates imply that even if the share of instant messages that are end-to- end encrypted remained constant, more than 22 percent of global messaging will be end-to-end encrypted and inaccessible to law enforcement by 2019 as instant messaging becomes an increasingly dominant mode of communication.

Some messaging applications present challenges for law enforcement that are unrelated to encryption. For example, Kik is a messaging platform that is known to be used by child predators, who use it to identify victims and share sexually explicit material. Kik is not end-to-end encrypted, but it does not retain most user data on its servers, making it impossible to service search war-rants.[vi] Telegram, a popular messaging app, supports end-to-end encryption but does not enable it by default. However, law enforcement has struggled to access even unencrypted communications over Telegram, which hosts its data in Switzerland. Telegram is popular with terrorist groups and was used by the jihadi killers of a French priest in August 2016.[vii] Developed by Russian Inter-net entrepreneurs who were forced out of Russia and fled to Germany, Telegram refuses to comply with law enforcement requests for data.[viii]

To learn more about the impact of encryption on law enforcement access to communications and data, you can access our report on the topic here.

The Effect of Encryption on Lawful Access to Communications and Data

In February 2017, we released our report on the impact of encryption on law enforcement access to data. Our research found that the risk to public safety created by encryption has not reached a level that justifies restrictions or design mandates. The encryption issue law enforcement faces, while frustrating, is currently manageable. Alternatives to restriction include international cooperation, expanded use of data analytics, improved law enforcement access capabilities, and regional decryption labs. Such solutions are imperfect, but they face fewer political obstacles than restriction. Law enforcement agencies fear that this situation could change rapidly for the worse, but interim solutions that improve law enforcement’s technical capabilities can provide time to identify sustainable national and international policies on encryption.

_______________________________________________________________________________
[i] Windsor Holden, “A2P Messaging,” Juniper Research, September 19, 2016, https://www.juniperresearch.com/researchstore/content-applications/mobile-online-messaging/sms-rcs-im-markets.
[ii] Statista, “Share of internet users in the United States who use WhatsApp as of August 2017, by gender,” https://www.statista.com/statistics/740654/whatsapp-app-chat-usage-usa/; Simon Kemp, “Digital in 2018: World’s Internet Users Pass the 4 Billion Mark,” We Are Social, January 30, 2018, https://wearesocial.com/blog/2018/01/global-digital-report-2018
[iii] Statista, “Usage Penetration of WhatsApp in Selected Global Regions as of 4th Quarter 2015,” https://www.statista.com/statistics/321460/whatsapp-penetration-regions/
[iv] This includes SMS, multimedia message service (MMS), e-mail, IM, and social media posts. See Holden, “A2P Messaging.”
[v] Calculated by CSIS based on Juniper Research data: Lauren Foye, “Mobile & Online Messaging: SMS, RCS & IMMarkets 2015-2019,” Juniper Research, September 6, 2015, https://www.juniperresearch.com/researchstore/telco-service-providers/a2p-messaging/opportunities-competition-forecasts.
[vi] Department of Homeland Security Office of Intelligence and Analysis, “Going Dark—Covert Messaging Applications and Law Enforcement Implications,” September 29, 2015, https://assets.documentcloud.org/documents/2500347/going-dark-covert-messaging-apps.pdf
[vii] “France Terror: Girl, 16, Investigated over Telegram ‘Attack Plan,’” BBC, August 10, 2016, http://www.bbc.com/news/world-europe-37033271; “TIMELINE: Aaron Driver’s History of Radicalization,” CBC, August 11, 2016, http://www.cbc.ca/news/canada/aaron-driver-timeline-1.3717169.
[viii] Electronic Frontier Foundation, “Secure Messaging Scorecard,” https://www.eff.org/secure-messaging-scorecard
Written By
James Andrew Lewis
Senior Vice President and Director, Strategic Technologies Program
William A. Carter
Adjunct Fellow (Non-resident), Strategic Technologies Program
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173
Related
Cybersecurity and Technology, Intelligence, Surveillance, and Privacy, Strategic Technologies Program, The Effect of Encryption on Lawful Access to Communications and Data

More from this blog

Blog Post
Notes from a CSIS Virtual Event: Cybersecurity in the Quantum Future
In Strategic Technologies Blog
June 30, 2021
Blog Post
The Fragility of Digital Advertising and the Future of the Attention Economy: Part I
In Strategic Technologies Blog
May 24, 2021
Blog Post
6G Is Not A Distant Horizon
In Strategic Technologies Blog
April 28, 2021
Blog Post
Recent Developments in EU Foreign Investment Screening
In Strategic Technologies Blog
April 19, 2021
Blog Post
Beyond U.S.-China Technology Competition
In Strategic Technologies Blog
April 15, 2021
Blog Post
Digitalize Your Wallet (Cash): China’s Digital Currency, Fintech Companies, and Technology Race with the West
In Strategic Technologies Blog
March 5, 2021
Blog Post
The Apples of Discord: A Section 230 Parable
In Strategic Technologies Blog
March 3, 2021
Blog Post
Semiconductors as Natural Resources – Exploring the National Security Dimensions of U.S.-China Technology Competition
In Strategic Technologies Blog
February 17, 2021

Related Content

Blog Post
Recent Developments in Nordic Investment Screening
In Strategic Technologies Blog
April 7, 2020
Commentary
Iraq: The Missing Keystone in U.S. Policy in the Gulf
By Anthony H. Cordesman
April 29, 2021
Commentary
The Crypto Wars Are Over
By James Andrew Lewis
February 4, 2021
Transcript
Global Partnerships to Combat Cybercrime & the Challenge of Going Dark
December 6, 2019
Report
Video Conferencing Technology and Risk
By James Andrew Lewis
December 3, 2020
Report
The Spectrum of Encryption: Safety and Security Considerations
By Lindsey R. Sheppard
August 31, 2020
Congressional Testimony
Enforcing the Ban on Imports Produced by Forced Labor in Xinjiang
Statement by Amy K. Lehr
September 17, 2020
Blog Post
Why Deplatforming Just Isn’t Enough
In Strategic Technologies Blog
February 11, 2021
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2021. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions