- Jul282020Guest Writer
Child sexual abuse material is today stored on all possible devices and shared in all sorts of fora on the internet. The nature of sharing information follows the development of technology which throws up new challenges for law enforcement.
One of the main drivers behind the development of NetClean ProTective is to limit revictimisation of exploited children. But, what do we mean when we talk about revictimisation?
- Jun122020Guest Writer
The technological development that is having the single most impact on child sexual abuse investigations is Artificial Intelligence (AI). I have used AI for many years now and in the past two or three years there have been some incredible developments.
- Jun052020Anna Borgström
Often, child sexual abuse survivors will say that the dissemination of images and films online affects them differently than the hands on abuse did, and this is because the material can live on forever on the internet, it never goes away – unless we do something about it.
As mobile phones are increasingly being used to produce, consume, share and store child sexual abuse material, it has become increasingly important to do what we can to disrupt this trend. Employers who provide their work force with mobile phones are one of the stakeholders in this effort.
- May132020Anna Borgström
Many businesses have policies and action plans in place to stop employees from consuming child sexual abuse material. This however must be followed up by effective policy compliance.
- May072020Guest Writer
Telia Company’s human rights commitments cover a number of responsible business focus areas, including one on freedom of expression (led by me, Patrik Hiselius) and one on children’s rights (led by me, Heddy Ring). In this blog we share with you how our interests merge.
- Apr152020Guest Writer
Today is the fastest day of technological evolution for the rest of your life; today is also the slowest day of technological evolution for the rest of your life. This provides us with incredible possibilities.
Will we expand the life of every human on the planet and eradicate diseases that have plagued mankind? Can we ensure modern education for every child on the planet, lift the remaining 10% of the planet out of poverty, and reverse the implications of climate change? While we cannot predict the future, we can say that technology will play a significant role in these efforts.
- Apr072020Anna Borgström
Today, more than ever, we must take stock of leadership models and how existing and developing leaders respond to crises, such as climate change and the future of our children online.
What happens to the consumption of child sexual abuse material when millions of people work from home?
Work computers are used to download, consume and share child sexual abuse material, and we know that this criminal behaviour increases when employees remove computers from the office. As the Coronavirus has restricted our daily life and many employees now work from home, we risk seeing an increase in this behaviour.
To effectively fight the spread of child sexual abuse material, different technologies must be applied by all by all who use the internet and have an interest in making it a safe space for future generations, which includes viable business planning.
Binary hashing is used to fingerprint and discover online child sexual abuse material on a content level, i.e. it identifies the actual images and videos depicting child sexual abuse. Hashing technology is a secure, fast and reliable technology that is used in various ways, e.g. in detection tools, digital investigation tools and crawlers.
- Mar252020Anna Borgström
Due to the closing of schools as a result of the Corona virus, experts agree that children will have an increased online presence and will be at an inadvertent risk. This week the FBI warned parents, educators, caregivers, and children about the dangers of online sexual exploitation and signs of child abuse.
- Mar092020Guest Writer
Digital development has enabled offenders to produce and share child sexual abuse material at a previously impossible scale. In addition, the last decade’s development of social media platforms and gaming platforms has enabled offenders to reach children directly, and abuse them over the internet without meeting them in person, adding a new dimension to this crime. Live-streaming services, examined closer in this report, has pushed this development further.
- Dec182019Anna Borgström
This year NetClean presented a rebranded more international conference in Stockholm. And, with a mind to bring together experts and decision makers, the Brighthood conference (formerly skillnadpåriktigt) was a day full of insight and a much needed knowledge hub.
- Dec052019Anna Borgström
The NetClean Report 2019, the fifth of its kind is now available. This year the report is based on two different enquiries – one with law enforcement and one with businesses. The results, summarised in the report, help us understand the nature of child sexual abuse crime, how it is developing and what we must do to further ensure that we fight it as well as we can.
- Oct082019Anna Borgström
Last week I was invited to speak at the UN Headquarters in New York, where the Working Group for Child Online Safety met for the launch of the new Broadband Commission report. The launch was hosted by Permanent Mission of Sweden, Childhood Foundation USA, Broadband Commission and End Violence Against Children.
- Aug132019Guest Writer
To aid the search for children Europol has set up project “Trace an Object”. It asks the public to view cropped parts of images to see if they recognise objects. This can help place the location of the abuse.
- Jul242019Guest Writer
Self-produced material, whether voluntarily made or produced through grooming and extortion is on the rise. The images fall within a broad spectrum, from everyday holiday snaps to sexual extortion where victims are forced to take images of themselves.
- Jul092019Anna Borgström
In a previous blog we looked at binary hashes. Now we look at PhotoDNA, a different type of hashing technology that calculates hash values based on the visual content of an image.
- Jun052019Guest Writer
The Head of Team, Analysis Project Twins, EC3, at Europol comments on this development, based on Europol’s observations of online communication and organisation.