> "At one point or more of that process, access to the encrypted communication is essential for intelligence and law enforcement," he said.
> "If there are encryption keys then those encryption keys have to be put at the disposal of the authorities."
The last part of the quote muddies the water a bit. Maybe they are interested in cooperation from companies with control of endpoint software (Apple, Google, Microsoft) to extract the keys?