What is it?
End-to-end encryption (E2EE) is a term used to describe technology that blocks or prevents any third party from viewing, reading, or becoming aware of information that one individual has sent to another via the Internet.
NCMEC's Position:
End-to-end encryption should not be adopted without implementation of technological solutions, exceptions, or other proven strategies for preventing, detecting, disrupting, and reporting child sexual exploitation.
Why does it matter?
Online platforms’ adoption of E2EE on their communication services (such as chat and messaging platforms) prevents them from detecting illegal activity within encrypted environments, including the online sexual exploitation of children through the distribution of child sexual abuse material (CSAM), enticement, and sextortion.
What context is relevant?
Online platforms—including services that allow text, image, voice, and video communication between users—are frequently used by offenders to request and distribute CSAM and to manipulate, or “groom,” children for sexual purposes. When platforms are not subject to E2EE, content can be screened specifically to detect, report, and remove CSAM and the sexual enticement of children online. On platforms that use E2EE and have not implemented other detection technology or strategies, isolated screening cannot occur, so child sexual exploitation activity remains undetected, unreported, and is not removed.
What does the data reveal?
NCMEC expects reporting of online child sexual exploitation to decrease or lack information needed to identify a victimized child or investigate an offender when platforms adopt E2EE without implementing other measures to detect harmful conduct. While E2EE is not new, its broad adoption as a default feature on social media platforms with very large numbers of users is more recent and increasing. As more platforms adopt E2EE, NCMEC will have more data to share regarding the impact on online child sexual exploitation.
Law enforcement around the world—and offenders themselves—acknowledge that platforms with E2EE are frequently used for child sexual exploitation. However, because alternative technology and strategies are not in place to prevent, detect, deter, and report child sexual exploitation, that conduct is hidden and offenders are anonymized by E2EE and almost never discovered.
What have survivors said about it?
Survivors of online child sexual exploitation have identified distribution of CSAM depicting them as a significant ongoing harm that continues long after the exploitation occurred. Detecting, reporting, and removing online CSAM is important to protecting survivors, whether identified or still unidentified, from this continued victimization and also protects survivors’ privacy.
As a survivor, when I hear about E2EE I don't feel safe. I feel terrified. I feel immense anxiety about the possibilities that E2EE provides to predators. If platforms are unable to screen for CSAM, they won't find the CSAM. That doesn't mean it's not there. This must not be an "out of sight, out of mind" issue. E2EE will lead to fewer reports, but it will not lead to fewer victims.
- Survivor
Victims, like me, of familial child sexual abuse material will never be free from the circulation of our abuse if encryption continues to protect predators.
- Survivor
I want the brilliant minds behind E2EE and other rapidly developing technology to use their gifts of creativity and knowledge for the greater good. Do not stop creating these amazing technologies. While you do continue to create and adapt, please uplift the voices of survivors. Together, we can create a solution to any problem. We do not need to give up on adapting E2EE and other technologies so that they can protect the privacy of the average user while also prioritizing the safety of all. We need to protect our children through preventative measures when developing new technology.
- Survivor
What drives opposing viewpoints?
E2EE is often promoted as a pro-privacy measure to protect user communications from unintended and unauthorized access. Calls to oppose E2EE, create child sexual exploitation exceptions, or adopt additional technological solutions or other strategies to counter child sexual exploitation are often met with “slippery-slope” arguments. E2EE proponents also raise concerns over the possibility that measures intended specifically to counter child sexual exploitation might be corrupted by oppressive government regimes or other bad actors to target users engaged in unrelated activities, such as political dissent or free press.