Below is a collection of reports and research related to child sexual abuse with a focus on technology and the internet. All resources have been reviewed by the Stella Polaris team. To read more about inclusion criteria and tags, go to About Stella Polaris Knowledge Center.
Bracket Foundation and UNICRI Centre for AI and Robotics
This report explores the current forms of AI-generated CSAM in the form of images, video and text. Pulling together perspectives and data from law enforcement, tech companies, civil society, and caregivers, this report aims to provide a comprehensive overview of the escalating danger and suggest potential mitigation strategies.
World Childhood Foundation
In June 2024, World Childhood Foundation invited stakeholders within child rights, AI, academia, pricate sector and cybersecurity among others to join in a one- day conference on using AI to combat child sexual abuse.
This paper presents an automated tool designed to analyze children's sexual abuse reports. By automating the analysis process of abuse complaints, the tool significantly reduces the risk of exposure to harmful content by categorizing the reports on three dimensions: Subject, Degree of Criminality, and Damage.
This paper proposes an approach to detection of online sexual predatory chats and abusive language using the open-source pretrained Llama 2 7B-parameter model, recently released by Meta GenAI. We fine-tune the LLM using datasets with different sizes, imbalance degrees, and languages (i.e., English, Roman Urdu and Urdu). Based on the power of LLMs, our approach is generic and automated without a manual search for a synergy between feature extraction and classifier design steps like conventional methods in this domain. Experimental results show a strong performance of the proposed approach, which performs proficiently and consistently across three distinct datasets with five sets of experiments. This study's outcomes indicate that the proposed method can be implemented in real-world applications (even with non-English languages) for flagging sexual predators, offensive or toxic content, hate speech, and discriminatory language in online discussions and comments to maintain respectful internet or digital communities.
University of Pennsylvania Columbia University
This study elicited Black and Latinx primary caregivers' viewpoints regarding child abuse and neglect while living in underserved communities to highlight considerations for designing an ML-based model for detecting child abuse and neglect in emergency departments (EDs) with implications for racial bias reduction and future interventions.
B. S. Abdur Rahman Crescent Institute of Science and Technology
For a long time, legal entities have developed and used crime prediction methodologies. The techniques are frequently updated based on crime evaluations and responses from scientific communities. There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level. Child maltreatment is not adequately addressed because children are voiceless. As a result, the possibility of developing a model for predicting child abuse was investigated in this study. Various exploratory analysis methods were used to examine the city of Chicagoβs child abuse events. The data set was balanced using the Borderline-SMOTE technique, and then a stacking classifier was employed to ensemble multiple algorithms to predict various types of child abuse. The proposed approach successfully predicted crime types with 93% of accuracy, precision, recall, andΒ F1-Score. The AUC value of the same was 0.989.
King Faisal Specialist Hospital and Research Centre Princess Nora bint Abdul Rahman University Mississippi State University
Child abuse is a major problem in most of the developing and developed countries. Medical practitioners and law enforcement authorities have often tried to tackle the problem using several conventional approaches. Nevertheless, there are other modern methods to screen, detect, and predict child abuse using artificial intelligence (AI). Therefore, this article aimed to critically review the currently available AI tools including data mining, computer-aided drawing systems, self-drawing tools, and neural networks used in child abuse screening.
BI Norwegian Business School, Norwegian University of Science and Technology
This literary review details how the development of digital technology and services impacts both the possibilities for access and sharing of child sexual abuse materials (CSAM) and the possibilities for perpetrators to establish contact. The report underlines the need for collaboration between the private sector, civil society and law enforcement as a way of making bespoke technology available and share relevant information and intelligence.
Technological University Dublin
This paper proposes a CSAM detection intelligence algorithm based on natural language processing and machine learning techniques ([2]). The CSAM detection model is not only used to remove CSAM on online platforms, but can also help determine perpetrator behaviours, provide evidences, and extract new knowledge for hotlines, child agencies, education programs and policy makers.
Technological University Dublin
In this paper, we propose a novel model based on artificial intelligence algorithms to automatically detect CSA text messages in dark web forums. Our algorithms have achieved impressive results in detecting CSAM in dark web, with a recall rate of 89%, a precision rate of 92.3% and an accuracy rate of 87.6%. Moreover, the algorithms can predict the classification of a post in just 1 microsecond and 0.3 milliseconds on standard laptop capabilities. This makes it possible to integrate our model into social network sites or edge devices to for real-time CSAM detection.
Technological University Dublin
The research team proposed a CSAM detection intelligence system. The system uses a manually labelled dataset to train, evaluate and select an efficient CSAM classification model. By identifying CSAM creators and victims through CSAM posts on the dark web, we proceed to analyze the material with a classifier, visualizing and uncovering information concerning the behaviors of CSAM creators and victims.
This report aims to help Trust & Safety teams better understand the challenges presented by the GenAI ecosystem, by providing: β’ A primer on GenAI functionality and its impact on Trust & Safety; β’ Examples of GenAI exploitation, resulting in the mass creation of dangerous content across a range of abuse areas; β’ A review and analysis of emerging trends in child predator activity to create GenAI-produced CSAM, and the dissemination of new exploitative methodologies that enable additional threat actors to engage in online harm at scale; β’ A regulatory overview examining platform accountability for GenAI-produced malicious content.
This report provides an initial assessment of the threat landscape emanating from online child predator communities as they focus attention on the creation of the production of child sexual abuse material (CSAM) at scale. This report offers a sample of: β’ Trending behavioral developments within child predator communities as they assess GenAI; β’ A review of the generation of GenAI image-based CSAM and the methods employed to produce it by threat actors; β’ A brief on the generation of GenAI text-based CSAM and the methods employed to produce it; β’ AI models that are in circulation to allow specific types of CSAM to be produced; β’ Legal context of the GenAI CSAM.
In 2023, the Internet Watch Foundation (IWF) has been investigating its first reports of child sexual abuse material (CSAM) generated by artificial intelligence (AI). In total, 20,254 AI-generated images were found to have been posted to one dark web CSAM forum in a one-month period. Of these, 11,108 images were selected for assessment by IWF analysts. The report details the growing issue of AI generated CSAM and recommends actions to be taken by government, law enforcement and tech companies.
About Childhood's work to prevent and stop child sexual abuse.
Summary of the WeProtect Global Alliance on global trends related to child sexual abuse and exploitation.
This article applied a phenomenological approach to discuss and provide recommendations for key ethical issues related to machine learning-based risk models development and evaluation: (1) biases in the data; (2) clinical documentation system design issues; (3) lack of centralized evidence base for child abuse and neglect; (4) lack of "gold standard "in assessment and diagnosis of child abuse and neglect; (5) challenges in evaluation of risk prediction performance; (6) challenges in testing predictive models in practice; and (7) challenges in presentation of machine learning-based prediction to clinicians and patients.
The report examines how biometric (facial) search combined with voice can be used to identify abuse survivors and perpetrators, by searching for matches in other child sexual abuse material videos.
A study of what police officers believe they need to more effectively counter child sexual abuse material. The main training/support mentioned that organisations should provide included: communication, training on different types of perpetrators, and psychological support.
Adhiyamaan College of Engineering
A report on a downloadable AI that analyses browser history to assess the risk that a child may be sexually exploited. The report does not provide concrete figures on how well the tool works.
AI is tested to classify the age of children. Worked reasonably well for ages 10-20, with a mean error of about 2.5 years. The AI worked less well for children 0-10.
Compilation on how policies on children's online safety can be developed.
The aim of this research is to identify biometric traits of dorsal hand images, which are the most commonly documented aspect of perpetrator in child sexual abuse imagery. In this work, the researchers propose hand-based person identification by learning both global and local deep feature representations. Using Global and Part-Aware Network (GPA-Net), the researchers created global and local branches on the conv-layer for learning robust discriminative global and part-level features. Similar research has been conducted at Auckland University.
The focus of the present report is to provide an insight into grooming and sexual extortion of children in Sweden. The report presents judgments from court cases decided in 2020 and 2021 concerning children who have been subjected to internet-related sexual offenses. Judgments are public documents produced by the by the court and contain, for example, evidence and the court's reasoning in a specific case
Zurich Institute of Forensic Medicine
Finding sperm cells under an optical microscope is a task which is time-consuming and difficult for a human being. This study shows how convolutional neural networks can be used to speed up the process. Two networks were tested based on the VGG19 architecture with a resulting accuracy of over 90%. Human oversight is still necessary to rule out false positives. The oversight is aided by a simple visual guide that can be provided to the overseeing experts which helps determine the accuracy of any given result.
The Economist Intelligence Unit
Statistics and baselines for 40 countries on child sexual abuse.
The report describes how virtual avatars of children can be used to train police officers to interview children about sexual abuse. Furthermore, the interviews can be used to create synthetic data from interviews with children.
Auckland University of Technology
The researchers are investigating how well AI can be applied to identify people based solely on the back of their hands. They achieve accuracies of over 99.9%, indicating that such tools can be used to identify perpetrators in child sexual abuse material. Similar projects have been conducted in Lancaster University.
The report describes how computer-generated child abuse material is becoming increasingly common, including through deep fake technology. The author argues that the US law 18 U.S. Code Β§ 2256 should be revised to prohibit computer-generated abuse material as well.
Humboldt Universitat zu Berlin
A report on how deep learning transform models can classify grooming attempts. The authors of the report created a dataset that was then used by Viktor Bowallius and David Eklund in the report Grooming detection of chat segments using transformer models, where an f1 score of 0.98 was achieved.
The article looks at how AI can analyse activity on mobile screens and audio ports, to detect bullying, porn and sexual harassment. Unlike previous experiments, this AI can see all activity as the user sees it, and not just see input in the form of texts or images that are retrieved from the screen and then processed. The model achieves an average accuracy of 88% when classifying texts, such as classifying sexism and racism. Furthermore, the model achieves 95% accuracy in detecting pornography.
Nalla Malla Engineering College, Galgotias University, Vellore Institute of Technology
The report evaluates how well an AI can detect child sexual abuse via surveillance cameras.
Article on how the sexual exploitation of children online, and how it is linked to financial crimes.
Review of police and prosecutors' work against internet-related sexual abuse of children.
A report on secondary school students' experiences of sexual abuse and sexual exploitation in Sweden 2020/2021.
The report is based on 8,484 survey responses from users of abuse material on the dark web and provides unique insight into the behavioural patterns of perpetrators.
Uskudar University Medical Faculty, Istanbul, Turkey
Depression and post-traumatic stress disorder (PTSD) are among the most common psychiatric disorders observed in children and adolescents exposed to sexual abuse. The present study aimed to investigate the effects of many factors such as the characteristics of a child, abuse, and the abuser, family type of the child, and the role of social support in the development of psychiatric disorders using machine learning techniques.
Australian Institute of Criminology
Report by the Australian Institute of Criminology that analyses child sexual abuse (CSA) and financial transactions through machine learning in order to identify characteristics of offenders who live stream CSA in high volumes. The analysis showed that factors such as frequency and monetary value are important and have implications for identifying these crimes among financial transaction data. Furthermore, offenders did not appear to have engaged in violent offending, but rather had a criminal history of low-harm offences.
The report describes an experiment in which algorithms were able to predict whether a child had PTSD or major depression, with 99.2% accuracy, based solely on data about the person and the assault. This meant that no additional information was required beyond what is usually collected in child sexual abuse cases. The results indicate that it is possible to use AI early after an abuse has occurred to predict whether PTSD or major depression is likely to develop.
Report on the extent, nature and consequences of child sexual abuse and exploitation in different contexts. It describes evidence of effective interventions and strategies to prevent and respond to child sexual abuse and exploitation.
In-depth report on the extent, nature and consequences of child sexual abuse and exploitation in different contexts. It describes evidence of effective interventions and strategies to prevent and respond to child sexual abuse and exploitation.
Briefing on the development of online sexual abuse, and what is being done to combat it.
The summary describes key manifestations of sexual exploitation of children (SEC), which includes the exploitation of children in prostitution, the sale and trafficking of children for sexual purposes, online child sexual exploitation (OCSE), the sexual exploitation of children in travel and tourism (SECTT) and some forms of child, early and forced marriages (CEFM).
Article on research into online sexual abuse and how it affects children.
Scientific report on a study at Karolinska Institutet where an online-based CBT (cognitive behavioural therapy) programme is offered to people who produce, view and distribute child sexual abuse on the darknet. The study has received funding and capacity support from Childhood.
A report providing an overview of child sexual abuse, with a focus on the internet and the impact of covid-19.
University of Edinburgh and George Mason University
A systematic literature review of the technologies that offenders of online child sexual exploitation material (CSEM) make use of. The literature review shows that offenders tend not to be βearly adoptersβ of new technologies, but rather continue to use trusted technologies even after higher functioning options are introduced. In addition to technologies utilised to access CSEM, offenders also employ countermeasures in order to avoid detection, for example encryption and anonymous browsers that protect the userβs identity and physical place such as the Tor browser. The researchers found that only a few offenders encrypt manually. With encryption built-in to technologies and the ability to use the Tor browser to visit traditional (non-dark) websites, much of the prior research into countermeasures is dated and may not be indicative of current behaviours.
The article explores how facial recognition systems using machine learning can flag material depicting victims or criminals known by law enforcement. The system can also filter and group images that belong to the same case, which makes police officersβ work of going through child sexual abuse material (CSAM) more efficient as they do not need to jump in blindly without knowledge of what could be found or if there are any linking factors. Facial recognition systems have improved significantly in the past few years, especially when applied in uncontrolled circumstances, for example when a personβs face is seen from the side or in motion. Moreover, the systems have also become better at identifying and matching faces of children at different ages, which was almost impossible for the technology a few years ago. Today, systems designed specifically for CSAM exist and their impact has been transformative for the police forces embracing them.
Delayed disclosure of childhood sexual abuse can range from one year to disclosure in adulthood, to no disclosure at all. Against this background, the βDraw-A-Personβ intervention has been developed by psychologists in order to detect indicators of sexual abuse in childrenβs self-portraits. In the present study, a convolutional neural network (CNN) was deployed to detect such indicators through image analysis. While human experts outperformed the CNN, the system still demonstrated high accuracy, suggesting that CNNs, when further developed, have potential to detect child sexual abuse.
ITU/UNESCO Broadband Commission for Sustainable Development
The report describes causes and effects of the risks that children are exposed to online. It also proposes specific solutions that can prevent the risks. Child online safety is the global goal to be achieved through multistakeholder cooperation.
Report discussing practical and cost-effective solutions to break the cycle of sexual violence against children.
A survey of what efforts currently exist in AI to counter and prevent child sexual abuse, and what AI could be used for.
The Economist Intelligence Unit
Statistics and baselines for 40 countries on child sexual abuse.
The idea for Stella Polaris emerged from a roundtable meeting in autumn 2019 that brought together leading experts in AI and child safety.
University of New Haven / Digital Forensic Research Workshop
This survey investigates what value those investigating CSAM ascribe to the different tools and technologies they use in their work. Effective tools are crucial not only for detection but also for reducing the potential harm of being exposed to such material over long periods of time. The survey found that filtering technologies are more important than safe viewing technologies and that false positives are a bigger problem than false negatives. As far as resources are concerned there is still a lack of personnel, time, and money in the field. Furthermore, it was found that practitioners are still not up-to-date on data science and AI; something which should be improved in order to deal with the large amount of data that they face. The biggest need practitioners have which AI can help with is tools that automatically detect child nudity, age, and skin tones.
Institute of Electrical and Electronics Engineers (IEEE) and Mississippi State University
Therabot is a socially assistive robot designed to provide therapeutic support at home and in counselling settings. As it is specifically designed for those living with post-traumatic stress disorder (PTSD) it is suitable for children who have been subjected to sexual abuse. The robot resembles an animal and was developed through an iterative design process; both therapists and trauma survivors were consulted. Through touch sensing Therabot can deduce the userβs stress level and provide support accordingly. The researchers plan on developing the robot further by integrating AI in order to allow the robot to adapt and customise its interactions to the preferences of each user.
Department of Psychology, University of Gothenburg
This study aims to describe online offenders' interactions with actual children when inciting them to engage in online sexual activity.
Analysis of how well AI can predict the risk of child maltreatment (Predicitve Risk Modelling PRM), based on such a tool used in New Zealand.