Below is a compilation of digital tools that can be used to combat child sexual abuse. For increased accessibility, tools have been labeled with what purpose they fulfill, what type of technology they use, and what crime phase they can be used in. The purpose, technology and crime phase categories are listed below, and by clicking on the categories, you get a filtered view of them. Below the categories, you can find the entire database of all tools. You can use the different buttons to sort the database based on different attributes. For more info and contact see:
Purpose
Child abuse material removal and blocking
Consumption of child abuse material prevention
Identification
Grooming detection/prevention
Data management and analysis
Perpetrator investigation
Perpetrator prosecution
Agency/organization collaboration
Technology
Device extraction/search
Facial/object detection
Text analysis/processing
Image and video detection/classification
Data analysis and management
Uses AI
AI projects
Quin-C
Quin-C
Forensic Toolkit (FTK)
Forensic Toolkit (FTK)
Access Data Group
In use
ReKognition - video/image analysis
ReKognition - video/image analysis
Digital evidence extraction
Digital evidence extraction
BlueBear Lace
BlueBear Lace
CameraForensics
CameraForensics
Child Protection System
Child Protection System
Neula
Neula
Project NEMESIS: Justice Through Technology
Project NEMESIS: Justice Through Technology
Child Rescue Coalition
In development
Clearview AI
Clearview AI
Platform Risk Intelligence
Platform Risk Intelligence
Cleanfeed Canada
Cleanfeed Canada
Project Arachnid
Project Arachnid
Shield by Project Arachnid
Shield by Project Arachnid
eGlyph
eGlyph
Dartmouth College
In use
DeafKidz Defenders
DeafKidz Defenders
Rapid Safety Feedback
Rapid Safety Feedback
EOKM HashCheckServer
EOKM HashCheckServer
Europol Platform for Experts
Europol Platform for Experts
TraffickCam
TraffickCam
Camera Vision
Camera Vision
Victim Outreach
Victim Outreach
Artemis
Artemis
Global Emancipation Network
In use
CSAI Match
CSAI Match
Analyze D1
Analyze D1
Analyze Collaboration Server
Analyze Collaboration Server
Hubstream Intelligence
Hubstream Intelligence
Hubstream Intelligence Fabric
Hubstream Intelligence Fabric
Hunch.ly
Hunch.ly
Analyst's Notebook
Analyst's Notebook
i2 iBridge
i2 iBridge
ESCAPE
ESCAPE
International Association of Internet Hotlines (INHOPE)
In use
URL List
URL List
Internet Watch Foundation (IWF)
In use
Hash List
Hash List
CSAM consumption prevention chatbot
CSAM consumption prevention chatbot
Internet Watch Foundation (IWF)
In development
reThink Chatbot
reThink Chatbot
Internet Watch Foundation (IWF)
In development
Hash list IWF and NetSweeper
Hash list IWF and NetSweeper
ICSE database
ICSE database
DevOps Group Project
DevOps Group Project
Luxan Face SDK
Luxan Face SDK
Magnet AXIOM
Magnet AXIOM
Maltego
Maltego
MSAB Mobile Forensics
MSAB Mobile Forensics
PhotoDNA for Video
PhotoDNA for Video
PhotoDNA
PhotoDNA
NetClean Proactive
NetClean Proactive
NetClean Protective
NetClean Protective
Emilio
Emilio
Oxygen Forensic Detective
Oxygen Forensic Detective
Palantir Gotham
Palantir Gotham
Paliscope
Paliscope
Yose
Yose
SnehAI: A Companion to Empower and Protect
SnehAI: A Companion to Empower and Protect
Predpol
Predpol
Project VIC Ecosystem
Project VIC Ecosystem
KATALYST
KATALYST
Project VIC International
In use
Qumodo Discover
Qumodo Discover
Qumodo Classify
Qumodo Classify
SafeToNet
SafeToNet
S21 LASERi Suite: Laseri-v (Video)
S21 LASERi Suite: Laseri-v (Video)
S21 LASERi Suite: Laseri-t (Triage)
S21 LASERi Suite: Laseri-t (Triage)
S2i LASERi Suite : Laseri-p (Pictures)
S2i LASERi Suite : Laseri-p (Pictures)
STOP app
STOP app
Traffik Analysis Hub
Traffik Analysis Hub
ReDirection
ReDirection
Project DRAGON-S
Project DRAGON-S
Aselo: Bringing Modern Technology to Child Helplines
Aselo: Bringing Modern Technology to Child Helplines
LESP's Hash Query
LESP's Hash Query
NCMEC Hash Sharing Platform
NCMEC Hash Sharing Platform
The National Center for Missing & Exploited Children (NCMEC)
CyberTipline
CyberTipline
The National Center for Missing & Exploited Children (NCMEC)
In use
Toolkit
Toolkit
Deterrence
Deterrence
TC Keyword Hub
TC Keyword Hub
Spotlight
Spotlight
Global child abuse material classifier development programme
Global child abuse material classifier development programme
Child Abuse Image Database (CAID)
Child Abuse Image Database (CAID)
“Serious game for a serious issue”
“Serious game for a serious issue”
Videntifier
Videntifier
Videntifier Technologies
In use
LIBRA serverless image detection
LIBRA serverless image detection
‣
USA
USA
Quin-C
Forensic Toolkit (FTK)
ReKognition - video/image analysis
Digital evidence extraction
Child Protection System
Neula
Platform Risk Intelligence
eGlyph
Camera Vision
TraffickCam
Rapid Safety Feedback
Content Safety API
Hubstream Intelligence Fabric
Hubstream Intelligence
CSAI Match
Project VIC Ecosystem
Predpol
Palantir Gotham
Oxygen Forensic Detective
PhotoDNA
PhotoDNA for Video
Luxan Face SDK
Safer
Spotlight
TC Keyword Hub
Deterrence
Toolkit
Victim Outreach
Krunam
Project NEMESIS: Justice Through Technology
KATALYST
Global child abuse material classifier development programme
CyberTipline
LESP's Hash Query
NCMEC Hash Sharing Platform
Clearview AI
UK
UK
CameraForensics
i2 iBridge
Analyst's Notebook
SafeToNet
Qumodo Classify
Qumodo Discover
Vigil AI
STOP app
S2i LASERi Suite : Laseri-p (Pictures)
S21 LASERi Suite: Laseri-t (Triage)
S21 LASERi Suite: Laseri-v (Video)
Yoti
DeafKidz Defenders
Emilio
“Serious game for a serious issue”
Project DRAGON-S
Child Abuse Image Database (CAID)
Aselo: Bringing Modern Technology to Child Helplines
Iceland
Iceland
Finland
Finland
‣