Last year, we published a report on global encryption policy, making the joke that it’s like the movie Groundhog Day: the same conversations, debates, and bad ideas just keep coming up. Well, it’s February, and we have another one. This year, it’s a doozy: it’s not just the ideas in play — it’s much closer to actually impacting the data security of a broad swath of people around the world.
On Friday, the Washington Post reported that the UK government had secretly ordered Apple to create a backdoor enabling them to access all encrypted iCloud data worldwide. The unprecedented demand, issued under the UK's Investigatory Powers Act (2016), requires Apple to provide blanket access rather than just assistance in specific cases.
Apple cannot comment on the order, but there is speculation that they could stop offering strong encryption in the UK, which would not satisfy the order, or even withdraw from the market entirely rather than compromise the security of the 2.35 billion iOS and 100 million MacOS devices around the world.
Our report from a year ago, Reframing the Conversation: A Deep Dive into the Encryption Debate, discusses exactly why this would put security, privacy, communications, free speech, and financial transactions in danger. Not to mention the gigabytes of cat videos stored on iCloud! Granting such access would set a dangerous precedent, undermining security globally and opening the door for authoritarian regimes to demand similar access. If Apple has to comply, other countries will be quick to demand equal access, forcing the company to choose between global compliance or withdrawing encrypted storage and services entirely.
While we acknowledge law enforcement’s concerns that encryption can hinder criminal investigations, we also know that it also protects everyone from criminals. Just last December, traditional proponents of encryption backdoors seem to have changed their mind, highlighting massive hacks by suspected Chinese government agents, who breached the biggest communications companies and listened in on calls at will. In a joint December press briefing on the case with FBI leaders, a Department of Homeland Security official urged Americans not to rely on standard phone service for privacy and to use encrypted services when possible. Law enforcement from Canada, New Zealand, Australia, and others agreed. The UK is the odd man out among their closest allies.
We call on stakeholders - Apple, the UK government, privacy and security advocates - to oppose this order, and to all for smarter solutions for law enforcement challenges. There are practical, incremental approaches that can help law enforcement catch online criminals. I hope that by next Groundhogs Day, the UK and global discussion has chosen another path and protected my (and your) online data and communications.
Read Next
Special Episode: A Look at Cyber Policy in 2026 (DCP S2 E12)
For our second special episode of the Distilling Cyber Policy podcast, Alex and Jen from the Center are joined by experts to try and predict the future of cyber policy in the coming year, while reflecting on some of their previous prediction.
Offensive Cyber Operations with Stacy O’Mara and Leonard Bailey (DCP S2 11)
Offensive cyber activity has become a central policy conversation as governments worldwide rethink what tools are necessary to counter increasingly sophisticated threats.
2025 Year in Review: Advancing Cybersecurity Through Collaboration
In 2025, the cybersecurity ecosystem became more complex and we’ve seen governments rethink critical policy frameworks. Nonetheless, the Center has remained steadfast in strengthening cybersecurity through policy, collaboration, and education.
