Shall governments have access to encrypted messaging apps content?
RealTyme
Session 250
As governments balance national security imperatives with privacy obligations, the debate over access to encrypted messaging platforms intensifies—especially in an era of AI-driven threats and looming post-quantum risks. This session will explore the real-world implications of this debate, moving beyond the binary question of “yes” or “no” to focus on the future of trusted, sovereign, and resilient government communication systems.
Drawing on insights and feedback from the recent ITU Academy training on secure government communication, this discussion will highlight the evolving threat landscape, including the misuse of AI in communication platforms, the importance of data sovereignty, and the challenge of preparing for post-quantum encryption standards.
Participants will hear field reflections from government officials, learn about practical alternatives to direct content access (such as sovereign infrastructure and AI misuse detection), and engage in a forward-looking conversation on how states can govern communications without compromising trust, privacy, or sovereignty.



-
C1. The role of governments and all stakeholders in the promotion of ICTs for development
-
C2. Information and communication infrastructure
-
C4. Capacity building
-
C5. Building confidence and security in use of ICTs
-
C7. ICT applications: benefits in all aspects of life — E-government
-
C7. ICT applications: benefits in all aspects of life — E-learning
ITU Acadmy Course Description
As governments increasingly rely on digital communication tools, emerging threats from AI-driven cyberattacks and post-quantum decryption risks pose significant challenges. This three-hour interactive training is designed for government officials, cybersecurity leaders, and policymakers seeking to enhance data sovereignty, compliance, and secure communication strategies in a rapidly evolving digital landscape.
Participants will explore:
The Legacy Challenge – How outdated GSM networks and consumer messaging apps create security vulnerabilities.
The Data Ownership Challenge – The risks of AI-driven data processing, cloud jurisdiction issues, and compliance gaps.
Future-Proofing Government Communication – Best practices for secure collaboration, AI-enabled threat mitigation, and preparing for post-quantum encryption.
Through real-world case studies, hands-on exercises, and expert insights, attendees will develop practical strategies to protect their digital identities, sensitive government data, and critical communication infrastructure.
-
Goal 9: Build resilient infrastructure, promote sustainable industrialization and foster innovation
-
Goal 10: Reduce inequality within and among countries
Does this course have any restrictions?
By nationality
Angola, Bangladesh, Benin, Burkina Faso, Burundi, Cambodia, Central African Republic, Chad, Comoros, Democratic Republic of the Congo, Djibouti, Eritrea, Ethiopia, Gambia, Guinea (Republic of), Guinea-Bissau, Haiti, Kiribati, Lao People’s Democratic Republic, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritania, Mozambique, Nepal, Niger, Rwanda, São Tomé & Príncipe, Senegal, Sierra Leone, Solomon Islands, Somalia, Sudan, South Sudan, Timor-Leste, Togo, Tuvalu, Uganda, Tanzania, Zambia, Belize, Cabo Verde, Cuba, Dominica, Dominican Republic, Grenada, Fiji, Jamaica, Maldives, Marshall Islands, Mauritius, Micronesia, Papua New Guinea, Samoa, St. Lucia, St. Vincent & Grenadines, Suriname, Timor-Leste, Tonga, Vanuatu