All Digital Tools

Sort by Purpose

5 views

Sort by Purpose

Sort by Organization

Sort by Crime Phase

Sort by Target Group

Sort by Country

Purpose
Organization
Tool/project (Click to open) 👆
Country of Origin
Target group/intended user
Crime Phase
Website
Description
🤝Agency/organization collaboration

Interpol, Inspectoratul General AL Politiei, ZiuZ Visual Intelligence, NCIS Norway

CPORT
🇳🇱Netherlands
Law enforcement
⚖️Prosecution🚨Detection
projectcport.com

Project CPORT is funded by the European Union. It is a 2-year project that started in Jan 2023. The CPORT portal allows law enforcement agencies to access ICCAM – a database used by national hotlines to process and exchange reports of child sexual abuse material (CSAM) submitted by the public worldwide. The ICCAM platform is hosted by INTERPOL and is an important channel into INTERPOL’s international child sexual exploitation database and list of known domains disseminating severe abuse material (IWOL).

🤝Agency/organization collaboration🖼️Child abuse material removal and blocking

ZiuZ Forensic, Web-IQ, Timelex, DFKI, INHOPE

AviaTor Project
🇳🇱Netherlands
Law enforcement
⚖️Prosecution
www.aviatorproject.com

The AviaTor project is funded by the European Union and is currently in its final phase. The project started in 2019 and will end in 2024. The project aimed to build a prioritisation tool / database for law enforcement processing NCMEC reports (also known as industry reports or Cyber tipline referrals). The AviaTor database provides law enforcement with the tooling to prioritise these reports. AviaTor stands for Augmented Visual Intelligence and Targeted Online Research – meaning that the AviaTor database has the functionality to use visual intelligence as well as OSINT and hash matching to de-duplicate and prioritise reports. AviaTor is currently used by 19 national law enforcement agencies.

📊Data analysis for content blocking/removal🖼️Child abuse material removal and blocking

Cybertip Canada

Shield by Project Arachnid
🇨🇦Canada
Social mediaSearch engine companies
🔍Prevention
projectarachnid.ca

Rather than waiting for Project Arachnid to detect material and send a notice, industry can use Shield by Project Arachnid to quickly detect known CSAM on their service, which will, in turn, speed up its removal. Industry members that do not wish to interact directly with Shield by Project Arachnid can register their service/domain with the Canadian Centre to have any notices sent directly to them instead of being sent to their hosting provider. Other industries, such as filtering providers, can download real-time lists of URLs that are believed to currently contain CSAM for filtering purposes.

📊Data analysis for content blocking/removal🖼️Child abuse material removal and blocking

Cybertip Canada

Project Arachnid
🇨🇦Canada
Law enforcement
🚨Detection
projectarachnid.ca

Project Arachnid is a platform for reducing the availability of child sexual abuse material (CSAM) which includes crawling the internet for known CSAM using digital fingerprints as well as providing an API for industry members to improve upon and accelerate the detection of this harmful material on their own networks.

🖼️Child abuse material removal and blocking

Dartmouth College

eGlyph
🇺🇸USA
Social mediaLaw enforcement
🚨Detection
www.counterextremism.com

eGlyph is a robust-hashing algorithm that can identify previously tagged images,video, and audio. eGlyph extends photoDNA which operates only on images.

🖼️Child abuse material removal and blocking

EOKM and Web-IQ

EOKM HashCheckServer
🇳🇱Netherlands
🔍Prevention

HashCheckServer is a tool for hosting providers to prevent the uploading of known child sexual exploitation material. To prevent the uploading of known child sexual exploitation material, hosting parties needed to be part of the solution as they provide one of the gateways to publishing CSAM. Based on this knowledge, EOKM took the initiative to help hosting parties to prevent the uploading of known CSAM and to identify existing material on their servers so that it can be deleted. Following this initiative, EOKM asked Web-IQ to develop software that allows hosting parties to check whether an image appears in the police’s database of known CSAM.

🖼️Child abuse material removal and blocking

Facebook

Camera Vision
🇺🇸USA🌍Global
Facebook products
🚨Detection
research.fb.com

Camera Vision is a machine learning tool that identifies images that contain both nudity and a child.

📊Data analysis for content blocking/removal🖼️Child abuse material removal and blocking

Google

Content Safety API
🇺🇸USA🌍Global🇨🇭Switzerland
Content moderators
🔍Prevention
blog.google

The Content Safety API sorts through many images and prioritizes the most likely child sexual abuse material (CSAM) content for review. The classifier can target content that has not been previously confined as CSAM.

🖼️Child abuse material removal and blocking

Google/Youtube

CSAI Match
🇺🇸USA🌍Global
Social media
🔍Prevention
www.youtube.com

CSAI Match is used to surface potential child sexual abuse images (CSAI) for YouTube uploads as well as partner submissions.

🖼️Child abuse material removal and blocking

Krunam

Krunam
🇺🇸USA
Social media
🔍Prevention
krunam.co

Krunam provides breakthrough technology that identifies and classifies previously unknown CSAM images and video at scale. Our CSAM classifier protects your online community, your employees, your brand’s reputation, and, last but not least, millions of children around the world.

🖼️Child abuse material removal and blocking

Microsoft

PhotoDNA for Video
🇺🇸USA
Law enforcement
🚨Detection
news.microsoft.com

PhotoDNA for Video builds on PhotoDNA technology, bringing all the benefits of PhotoDNA to the video environment.

🖼️Child abuse material removal and blocking

Microsoft

PhotoDNA
🇺🇸USA
Law enforcement
🚨Detection
www.microsoft.com

PhotoDNA Cloud Service enables businesses to protect their assets, interests, and customers by autornaticuliy detecting and reporting the distribution of child sexual exploitation and abuse images.

🖼️Child abuse material removal and blocking

NetClean

NetClean Protective
🇸🇪Sweden
Corporations and Organizations in general
🔍Prevention
www.netclean.com

NetClean ProTective is a technical solution used to protect business mobile devices by blocking access to URLs known to contain child sexual abuse material (CSAM). The uniquely combined and continually updated URL list, from some of the world’s primary sources, makes it an effective protective solution.

🖼️Child abuse material removal and blocking

Qumodo

Vigil AI
🇬🇧UK
Law enforcement
🚨Detection
qumo.do

Vigil At automatically detects, evaluates and categorizes child sexual abuse imagery. Thu system is capable of determining the severity of the sexual act in the image (Using the legacy UK 1-5 Category SAP Scale or the current UK 3 Categories A-C). The tool is available as part of Qumodo Classify, via a Cloud API or via a stand alone API for tools such as Griffeye Analyze. The tool scales linearly and can categorize millions of images per hour

🖼️Child abuse material removal and blocking

Qumodo

Qumodo Classify
🇬🇧UK
Law enforcementContent moderators
⚖️Prosecution🚨Detection
qumo.do

Qumodo Classify is a software product which dramatically speeds up image categorization for content moderation for law enforcement purposes white reducing the psychological impact on the users, saving both time and money. This tool has been specialty designed around the latest AI technology, as well as 21 core psychology principals to form an effective Human/ AI team. As well as reducing the psychological impact on the user, the tool is designad to prevent human bias from influencing the system and creates the ability for the software to learn new abilities over time, further reducing the time needed to manually classify large amounts of data. When paired with the Vigil AI Classifier (vigil.ai) it becomes a powerful tool in the fight against child sexual exploitation and abuse (CSEA) content.

🖼️Child abuse material removal and blocking

Thorn

Global child abuse material classifier development programme
🇺🇸USA
Law enforcement
🚨Detection
www.end-violence.org

The programme is developing artificial intelligence classifiers, which are working on automating the detection of CSAM, creating a global standard for labeling, connecting, and organizing the world's data to help identify victims faster.

🖼️Child abuse material removal and blocking

Thorn

Safer
🇺🇸USA
Content moderatorsSocial media
🚨Detection
safer.io

Safer is a child sexual abuse material (CSAM) detection, review, removal and reporting pipeline. It allows small and medium sized companies to have the same CSAM fighting tools as the largest ones.

🖼️Child abuse material removal and blocking

Web-IQ

LIBRA serverless image detection
🇳🇱Netherlands
Law enforcement
🚨Detection

WebIQ has developed a serverless CSA detection AI, that scans websites and hashes images, and compares the hash to know CSA images. If there is a match, an automatic Notice of Takedown is sent to the host of the server of the website.

🖼️Child abuse material removal and blocking🆔Identification🆔Copy of Identification

Two hat

Cease.AI
🇨🇦Canada
Law enforcement
🚨Detection
www.twohat.com

Cease.AI for Law Enforcement helps reduce investigator workloads and reduce mental stress by sorting, flagging and removing non-CSAM, allowing investigators to focus their efforts on new child abuse images. investigators upload case images, run their hash lists to eliminate known material, then let the AI identify, suggest a label, and prioritize images that contain previously uncatalogued CSAM.

🖼️Child abuse material removal and blocking🧑‍⚖️Perpetrator prosecution

Videntifier Technologies

Videntifier
🇮🇸Iceland
Law enforcement
🔍Prevention⚖️Prosecution
www.videntifier.com

Large-scale video identification, which allows searching databases of videos. Videntifier TM Forensic, radically improves the forensic video identification process, by providing law enforcement agencies with a robust, fast and easy-to-use video identification system. Using this ser-vice, a single mouse-click is sufficient to automatically scan an entire storage device and classify all videos.

🆔Identification🆔Copy of Identification

Qumodo

Qumodo Discover
🇬🇧UK
Law enforcement
⚖️Prosecution
qumo.do

Qumodo Discover is a search engine for evidence. This technology uses AI to intelligently find connections within digital data at a web scale where users can query the system with an image, and it will find other images containing the same places, people, faces and objects. It has been tested with more than 100 million images and validated in a victim ID environment, with child sexual exploitation and abuse (CSEA). content

🆔Identification🆔Copy of Identification

Semantics 21

S21 LASERi Suite: Laseri-v (Video)
🇬🇧UK
Law enforcement
⚖️Prosecution
www.semantics21.com

S21 Laseri-v is a specialist tool for the mass categorization and analysis of child sexual abuse (CSA) videos. LASERi-v (Videos) contains proprietary workflows and algorithms to perform victim identification and investigation. The application is fully customisable, Project VIC premier certified and used by Police forces across the world for the investigation of child sexual abuse and other major crime types. (S2i LASERi-v (Videos) is available as part of the S2i LASERi suite).

🆔Identification🆔Copy of Identification

Semantics 21

S2i LASERi Suite : Laseri-p (Pictures)
🇬🇧UK
Law enforcement
⚖️Prosecution
www.semantics21.com

The S2i Laseri Suite is a specialist tool for the mass categorization and analysis of child sexual abuse imagery (CSAI) and animation. LASERi-p Pictures) contains proprietary workflows and algorithms to perform victim identification and quality investigations. The application is fully customisable, Project VIC premier certified and used by police forces across the world for the investigation of child sexual abuse and other major crime types. (S21 LASERi-p (Pictures) is available as part of the S21 LASERi suite).

🕵️‍♀️Perpetrator investigation

Griffeye

Analyze D1
🇸🇪Sweden
Law enforcement
⚖️Prosecution
www.griffeye.com

Analyze DI allows users to import, process and review complex information as well as pre-categorise known data and correlate metadata with open sources on the internet.

📊Data analysis for content blocking/removal🕵️‍♀️Perpetrator investigation

NetClean

NetClean Proactive
🇸🇪Sweden
Corporations and Organizations in general
🚨Detection
www.netclean.com

NetClein ProActive works similarly to an anti-virus program but instead of detecting a virus, ProActive detects images and videos that law enforcement agencies have classified as child sexual abuse material.

🕵️‍♀️Perpetrator investigation

Project VIC

Project VIC Ecosystem
🇺🇸USA
Law enforcement
⚖️Prosecution
projectvic.org

Project VIC is a community of investigators, victim identification specialists, application developers, scientists and strategic partners dedicated to developing and levering the newest technologies and victim-centric methods of investigation to improve success rate in rescuing victims of child sexual exploitation and trafficking. Proiect VIC has co-created an ecosystem of shared and standardized technologies specifically chosen to combat crimes involving massive amounts of images and video. Data from these respective technologies is processed using the Project VAC Cloud and redistributed back to the greater community working on crimes against children. The following tools are part of the Project VIC ecosystem: Project VIC Hash Cloud Provided by Project VIC International and Hubstream Inc. hosts over 65 million CSAM and non CSAM hashes- Access encryption Provided by Project VIC. PhotoDNA for Images by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC PhotoDMA for Video by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC Ft Video Fingerprinting by Friend MTB is made available to law enforcement through a sub-license agreement to Project VIC LLC. VICS-Odata Model Licensing is made available to law enforcement through a sub-license agreement with Project VIC LLC international Image Classifies Standard- (IC-3) Machine Learning Modelling is made available through Project VIC International Global Alert System- ViC5 Exif Matching across global platforms to identify similarities in imagery for Victim Identification. License included with ViC5

🕵️‍♀️Perpetrator investigation🤝Agency/organization collaboration

Interpol

ICSE database
🌍Global
Law enforcement
⚖️Prosecution
www.interpol.int

Our International Child Sexual Exploitation (ICSE) image and video database is an intelligence and investigative tool, which allows specialized investigators to share data on cases of child sexual abuse. Using image and video comparison software, investigators are instantly able to make connections between victims, abusers and places. The database avoids duplication of effort and saves precious time by letting investigators know whether a series of images has already been discovered or identified in another country, or whether it has similar features to other images. It also allows specialized investigators from more than 64 countries to exchange information and share data with their colleagues across the world. By analysing the digital, visual and audio content of photographs and videos, victim identification experts can retrieve clues, identify any overlap in cases and combine their efforts to locate victims of child sexual abuse.

🕵️‍♀️Perpetrator investigation🆔Identification🤝Agency/organization collaboration🆔Copy of Identification

Global Emancipation Network

Minerva
🌍Global
Law enforcementChild sexual abuse investigators
🚨Detection
www.globalemancipation.ngo

Global Emancipation Network grants Minerva access to organizations with valid counter-trafficking missions in order to host and explore millions of trafficking-related data records and use customized search, alerting, geo-location and other platform capabilities. Using Splunk Enterprise and third-party integrated technologies, Minerva protects case-sensitive information and monitors usage patterns to help keep user information private, safe and secure. Leading public, private and nonprofit organizations have already been accepted to the platform as early users. Minerva is equipped with data-processing capabilities to extract and organize information from a variety of data sources. Capabilities include: Advertisement analysis: Analyzes advertisements from the deep and open web, where most trafficking cases originate, and extracts data such as user, location, account and other identifying information. Image processing tools: Processes images of victims to reduce the time users spend analyzing photographs and manually linking them to advertisements. Minerva integrates image analysis tools to tag photographs with characteristics to expedite database search, and reverse image search to identify similar images. Text analysis tools and natural language processing: Extracts text in images from advertisements and flags correlations with missing persons reports and other valuable information. Multi-tenant system informing trend analysis: Allows all Minerva users to store their information securely on the same database at the same time, enabling secure, multi-agency collaboration on shared investigations.

🧑‍⚖️Perpetrator prosecution

BlueBear

BlueBear Lace
🇨🇦Canada
Law enforcement
⚖️Prosecution
bb-les.ca

LACE enables investigators to extract more visual data and efficiently categorize vast amounts of image and video data from confiscated devices using zero false positive visual matching, dramatically reducing (typical 90% case reduction) the time and resources required to bring a case to court. LACE is compatible with international standards for sharing metadata and hash signatures like ICSE, ProjectVic md UK-CAID. LACE Standalone Carver is software used for carving pictures and videos from any digital forensically sound manner. The LACE FORENSIC CARVER recognizes over 180 file types covering image, video, text documents, archive, and database files. Using this light tool, forensic experts will be able to extract evidence and import it using the JSON standard in to all the various tools they choose to use to analyse and review the evidence.

🧑‍⚖️Perpetrator prosecution

Semantics 21

S21 LASERi Suite: Laseri-t (Triage)
🇬🇧UK
Law enforcement
⚖️Prosecution
www.semantics21.com

S21 Laseri-t is a specialist tool for onsite (live box) and bootable (dead box) triage of laptops and computers able to detect and analyse imagery and videos. LASERi-t (Triage) contains prophet workflows and algorithms for intelligence driven search capabilities, compatibility with a wide range of intelligence sources , customisable reporting and both simple and advanced user interface modes for all tiers of users. The application is fully customisable, Project VIC premier certified and used by Police forces across the world for the investigation of child sexual abuse and other major crime types. (S21 LASERi-t Triage) is available as part of the S21 LASERi suite).