- Nov242020Anna Borgström
- Nov122020Anna Borgström
- Nov022020Anna Borgström
With one eye on the current trends and one eye on the future, we shaped this year’s Brighthood conference around the UN’s Sustainable Development Goal 16.2, which aims to end all forms of abuse, exploitation and violence against children.
- Oct232020Guest Writer
This is the conundrum that we are dealing with – technology is making our jobs more difficult and informing us at the same time. The law enforcement community needs to adopt to these challenges, and we need to be willing to try to learn new technology.
- Oct152020Anna Borgström
Our focus this year was on the UN’s Sustainable Development Goals 16.2, and the fact that we have entered a decade of action. We have less than ten years to scale up and galvanise more support for increased and sustained action to meet these goals.
- Sep212020Anna Borgström
- Aug282020Guest Writer
- Jul282020Guest Writer
Child sexual abuse material is today stored on all possible devices and shared in all sorts of fora on the internet. The nature of sharing information follows the development of technology which throws up new challenges for law enforcement.
One of the main drivers behind the development of NetClean ProTective is to limit revictimisation of exploited children. But, what do we mean when we talk about revictimisation?
- Jun122020Guest Writer
The technological development that is having the single most impact on child sexual abuse investigations is Artificial Intelligence (AI). I have used AI for many years now and in the past two or three years there have been some incredible developments.
- Jun052020Anna Borgström
Often, child sexual abuse survivors will say that the dissemination of images and films online affects them differently than the hands on abuse did, and this is because the material can live on forever on the internet, it never goes away – unless we do something about it.
As mobile phones are increasingly being used to produce, consume, share and store child sexual abuse material, it has become increasingly important to do what we can to disrupt this trend. Employers who provide their work force with mobile phones are one of the stakeholders in this effort.
- May132020Anna Borgström
Many businesses have policies and action plans in place to stop employees from consuming child sexual abuse material. This however must be followed up by effective policy compliance.
- May072020Guest Writer
Telia Company’s human rights commitments cover a number of responsible business focus areas, including one on freedom of expression (led by me, Patrik Hiselius) and one on children’s rights (led by me, Heddy Ring). In this blog we share with you how our interests merge.
- Apr152020Guest Writer
Today is the fastest day of technological evolution for the rest of your life; today is also the slowest day of technological evolution for the rest of your life. This provides us with incredible possibilities.
Will we expand the life of every human on the planet and eradicate diseases that have plagued mankind? Can we ensure modern education for every child on the planet, lift the remaining 10% of the planet out of poverty, and reverse the implications of climate change? While we cannot predict the future, we can say that technology will play a significant role in these efforts.
- Apr072020Anna Borgström
Today, more than ever, we must take stock of leadership models and how existing and developing leaders respond to crises, such as climate change and the future of our children online.
What happens to the consumption of child sexual abuse material when millions of people work from home?
Work computers are used to download, consume and share child sexual abuse material, and we know that this criminal behaviour increases when employees remove computers from the office. As the Coronavirus has restricted our daily life and many employees now work from home, we risk seeing an increase in this behaviour.
To effectively fight the spread of child sexual abuse material, different technologies must be applied by all by all who use the internet and have an interest in making it a safe space for future generations, which includes viable business planning.
Binary hashing is used to fingerprint and discover online child sexual abuse material on a content level, i.e. it identifies the actual images and videos depicting child sexual abuse. Hashing technology is a secure, fast and reliable technology that is used in various ways, e.g. in detection tools, digital investigation tools and crawlers.
- Mar252020Anna Borgström
Due to the closing of schools as a result of the Corona virus, experts agree that children will have an increased online presence and will be at an inadvertent risk. This week the FBI warned parents, educators, caregivers, and children about the dangers of online sexual exploitation and signs of child abuse.
- Mar092020Guest Writer
Digital development has enabled offenders to produce and share child sexual abuse material at a previously impossible scale. In addition, the last decade’s development of social media platforms and gaming platforms has enabled offenders to reach children directly, and abuse them over the internet without meeting them in person, adding a new dimension to this crime. Live-streaming services, examined closer in this report, has pushed this development further.