Mapping of technologies

Business and technology
– mapping of available methods to
stop child sexual abuse

Overview of technologies and methods available to businesses to stop child sexual abuse

The internet is a complex multi-layered place which provides many ways for perpetrators to share child sexual abuse material. Therefore, there is no one technology or solution that alone can police the internet against online child sexual abuse material. To effectively fight the spread of child sexual abuse material, different technologies must be applied by all who use the internet and have an interest in making it a safe space for future generations, which includes viable business planning.

If all businesses and organisations in the world – billions of computers and networks – took appropriate action, the opportunity to find and disrupt the spread of online child sexual material would increase infinitely.

In the case of businesses, the investment, appropriate action, lies in technology. Child sexual abuse crime is a complicated crime, one that is not easy to understand nor fight, but what is clear is that specialist technologies must be applied to stop the dissemination online.

There are a number of technologies that can be applied by businesses, and in this last section of the report we present an overview of technologies and methods available to businesses to stop child sexual abuse material. The articles are a revision and abridgement of longer and more technically detailed articles published here.

Mapping of technologies