☰
  • Home
  • About Stella Polaris
    • Introduction to AI and Child Sexual Abuse
    • About Childhood
    • About Stella Polaris
  • Reports and Articles
    • All Reports
    • Research papers on Child Sexual Abuse and AI
    • Reports by Childhood
  • Common AI Technologies
    • Natural Language Processing
    • Data Analysis
    • Machine Learning
    • Deep Learning
    • Neural Networks
    • Robotics
    • Computer Vision
  • Digital Tools Database
  • Contact Us
  • Support Us!
πŸ€–

AI projects

Projects where advanced AI is central

Stella Polaris Knowledge Center
Stella Polaris Knowledge Center

All Digital Tools

AviaTor Project
AviaTor Project
πŸ‡³πŸ‡±Netherlands

The AviaTor project is funded by the European Union and is currently in its final phase. The project started in 2019 and will end in 2024. The project aimed to build a prioritisation tool / database for law enforcement processing NCMEC reports (also known as industry reports or Cyber tipline referrals). The AviaTor database provides law enforcement with the tooling to prioritise these reports. AviaTor stands for Augmented Visual Intelligence and Targeted Online Research – meaning that the AviaTor database has the functionality to use visual intelligence as well as OSINT and hash matching to de-duplicate and prioritise reports. AviaTor is currently used by 19 national law enforcement agencies.

ZiuZ Forensic, Web-IQ, Timelex,Β DFKI, INHOPE

🀝Agency/organization collaborationπŸ–ΌοΈChild abuse material removal and blocking
πŸ–ΌοΈImage and video detection/classification
βš–οΈProsecution
Camera Vision
Camera Vision
πŸ‡ΊπŸ‡ΈUSA🌍Global

Camera Vision is a machine learning tool that identifies images that contain both nudity and a child.

Facebook

πŸ–ΌοΈChild abuse material removal and blocking
πŸ–ΌοΈImage and video detection/classification
🚨Detection
CameraForensics
CameraForensics
πŸ‡¬πŸ‡§UK

CameraForensics is an online portal allowing users to search for other images on the internet taken with a particular camera to support victim identification investigations. This tool also supports searching geographically for similar and identical images and for various metadata elements. All with the intent of helping investigators link covert and overt (public) personas on the internet. The tool is available via an online user interface and also via a number of products such as Griffeye Analyze, or as a fully integrated solution for agency or country-level databases (via API).

CameraForensics

πŸ†”Identification
πŸ”ŽFacial/object detection
βš–οΈProsecution
Clearview AI
Clearview AI
πŸ‡ΊπŸ‡ΈUSA

Clearview AI acts as a search engine of publicly available images – now more than ten billion -- to support investigative and identification processes by providing for highly accurate facial recognition across all demographic groups. Similar to other search engines, which pull and compile publicly available data from across the Internet into an easily searchable universe, Clearview AI compiles only publicly available images from across the Internet into a proprietary image database to be used in combination with Clearview AI's facial recognition technology. When a Clearview AI user uploads an image, Clearview AI’s proprietary technology processes the image and returns links to publicly available images that contain faces similar to the person pictured in the uploaded image.

Clearview AI

πŸ†”Identification
πŸ”ŽFacial/object detection
βš–οΈProsecution
Content Safety API
Content Safety API
πŸ‡ΊπŸ‡ΈUSA🌍GlobalπŸ‡¨πŸ‡­Switzerland

The Content Safety API sorts through many images and prioritizes the most likely child sexual abuse material (CSAM) content for review. The classifier can target content that has not been previously confined as CSAM.

Google

πŸ–ΌοΈChild abuse material removal and blocking
πŸ–ΌοΈImage and video detection/classification
πŸ”Prevention
Krunam
Krunam
πŸ‡ΊπŸ‡ΈUSA

Krunam provides breakthrough technology that identifies and classifies previously unknown CSAM images and video at scale. Our CSAM classifier protects your online community, your employees, your brand’s reputation, and, last but not least, millions of children around the world.

Krunam

πŸ–ΌοΈChild abuse material removal and blocking
πŸ–ΌοΈImage and video detection/classification
πŸ”Prevention
Luxan Face SDK
Luxan Face SDK
πŸ‡ΊπŸ‡ΈUSA

Luxand's technology detects facial features quickly and reliably. The SOK processes an image, detect-s human faces within it, and returns the coordinates of 70 facial feature points including eyes, eye contours, eyebrows, Iip contours, nose tip, and so on.

Luxan

πŸ†”Identification
πŸ”ŽFacial/object detection
βš–οΈProsecution
Palantir Gotham
Palantir Gotham
πŸ‡ΊπŸ‡ΈUSA

Instead of logging in to separate data systems, agents, detectives and investigators can conduct a single search for a suspect, target, or location and return data from all relevant systems. Palantir Gotham featres intuitive, user-friendly interface backed by powerful data integration software providing access to art available information related to an investigation in one place. Data is secured at a granular level (down to individual attributes describing each piece of data), ensuring that users can only see information for which they are authorized. Users can also collaborate on investigations and share information. Palantir Gotham can integrate data in any format, including existing case management systems, evidence management systems, arrest records, warrant data, subpoenaed data, record managements system (RSS) or other crime-reporting data, Computer- Aided Dispatch (CAD) data, federal repositories, gang intelligence, suspicious activity reports, Automated License Plate Reader (ALPR) data, and unstructured dat such as'document repositories and emails. Access restrictions can be applied broadly based on the data source, or granularly, down to individually securing attributes and metadata (e.g., a building's address or the timestamp associated with a photograph) These permissions govern how users access data All interactions, including searching, viking, and editing data, are recorded in a tamper-evident audit log.

Palantir

πŸ•΅οΈβ€β™€οΈPerpetrator investigation
πŸ“ŠData analysis and management
βš–οΈProsecution
Predpol
Predpol
πŸ‡ΊπŸ‡ΈUSA

PredPol uses a machine-learning algorithm to calculate its predictions on where crimes will occur. Historical event datasets are used to train the algorithm for each new city (ideally 2 to 5 years of data). It then updates the algorithm each day with new events as they are received from the department. This information comes from the agency’s records management system (RMS). PredPol uses ONLY 3 data points – crime type, crime location, and crime date/time – to create its predictions. No personally identifiable information is ever used. No demographic, ethnic or socio-economic information is ever used. This eliminates the possibility for privacy or civil rights violations seen with other intelligence-led policing models.

Predpol

πŸ—ƒοΈData management and analysis
πŸ“ŠData analysis and management
βš–οΈProsecution
Qumodo Discover
Qumodo Discover
πŸ‡¬πŸ‡§UK

Qumodo Discover is a search engine for evidence. This technology uses AI to intelligently find connections within digital data at a web scale where users can query the system with an image, and it will find other images containing the same places, people, faces and objects. It has been tested with more than 100 million images and validated in a victim ID environment, with child sexual exploitation and abuse (CSEA). content

Qumodo

πŸ†”Identification
πŸ–ΌοΈImage and video detection/classification
βš–οΈProsecution
ReKognition - video/image analysis
ReKognition - video/image analysis
πŸ‡ΊπŸ‡ΈUSA🌍Global

Rekognition Image is an image recognition service that detects objects, scenes, and faces; extracts text; recognizes celebrities; and identifies inappropriate content in images. It also allows you to search and compare faces. Rekognition Image is based on the same deep learning technology developed by Amazon's computer vision scientists to analyze billions of images daily for Prime Photos. This service only requires users to pay for the number of images, or minutes of video, being analyzed and the face data being stored for facial recognition_ There are no minimum fees or upfront commitmenim. Rekognition Video is a video recognition service that extracts motion-based context from stored or live-stream videos and allows them to be analysed. It detects activities; understands the movement of people in frame: and recognizes objects, celebrities, and inappropriate content in videos stored in Amazon S3 and live video streams from Acuity. Rekognition Video also detects persons and tracks them through the video even when their faces are not visible, or as the whole person might go in and out of the scene_ For example r this could be used in an application that sends a real time notification when someone delivers a package to your door. Rekognition Video allows you also to index metadata, like objects, activities, scene, celebrities, and faces to simply video search. With Amazon Rekognition, you only pay for the number of images, or minutes of video, you analyze and the face data you store for facial recognition. There are no minimum fees or upfront commitments.

Amazon

πŸ†”Identification
πŸ”ŽFacial/object detection
βš–οΈProsecution
Safer
Safer
πŸ‡ΊπŸ‡ΈUSA

Safer is a child sexual abuse material (CSAM) detection, review, removal and reporting pipeline. It allows small and medium sized companies to have the same CSAM fighting tools as the largest ones.

Thorn

πŸ–ΌοΈChild abuse material removal and blocking
πŸ–ΌοΈImage and video detection/classification
🚨Detection
TraffickCam
TraffickCam
πŸ‡ΊπŸ‡ΈUSA

TraffickCam allows anyone with a smartphone to fight sex trafficking when they travel by uploading photos of hotel rooms to a law enforcement database. Photos uploaded to the free TraffickCam app are added to an enormous database of hotel room images. Federal, state and local law enforcement securely submit photos of hotel rooms used in the advertisement of sex trafficking victims to TraffickCam. Features such as patterns in the carpeting, furniture, room accessories and window views are matched against the database of traveler images to provide law enforcement with a list of potential hotels where the photo may have been taken to identify location of victims.

Exchange Initiative

πŸ†”Identification
πŸ”ŽFacial/object detection
🚨Detection
Vigil AI
Vigil AI
πŸ‡¬πŸ‡§UK

Vigil At automatically detects, evaluates and categorizes child sexual abuse imagery. Thu system is capable of determining the severity of the sexual act in the image (Using the legacy UK 1-5 Category SAP Scale or the current UK 3 Categories A-C). The tool is available as part of Qumodo Classify, via a Cloud API or via a stand alone API for tools such as Griffeye Analyze. The tool scales linearly and can categorize millions of images per hour

Qumodo

πŸ–ΌοΈChild abuse material removal and blocking
πŸ–ΌοΈImage and video detection/classification
🚨Detection
πŸ‘‰
www.childhood.org

Foother

ChildhoodChildhood
Childhood
linkedinlinkedin
linkedin
My AIMy AI
My AI
FacebookFacebook
Facebook

Blasieholmstorg 8, 111 48 Stockholm

+46(0)8-551 175 00

info@childhood.org