|Technology||Organization||Tool/project (Click to open) 👆||Country of Origin||Target group/intended user||Crime Phase||Website||Description|
Access Data Group
FTK is a database driven solution that processes and indexes large amounts of data up-front to allow efficient filtering and searching. Users interact with FTK via a web interface which allows them to conduct computer forensic investigations. The product provides file filtering, search functionality and access to remote systems on the network as well as helps law enforcement, corporate security and IT professionals locate, analyze and evaluate the evidentiary value of files, folders and computers
Access Data Group
Quin-C is a digital investigation software solution that provides a customizable UI to allow advanced data vizualisation, processing and analysis.
Child Rescue Coalition
Child Rescue Coalition is a partnership of child exploitation investigators, police officers, digital forensic experts. prosecutors, child welfare agencies, and corporate and private philanthropy who work together to apprehend and convict abusers of children, rescue those in harm's way, and importantly, seek to prevent abuse from happening in the first place. At its core is technology that identifies, monitors, and ranks the online criminal behavior of child predators on peer-to-peer file-sharing and chat networks.
Social mediaContent moderators
Crisp delivers complete intelligence for Trust & Safety and Policy teams on the individuals and groups manipulating social media, video sharing, gaming, dating, review, and other specialty platforms by providing: Crip infiltrates bad actors "from the outside in" across the surface, deep, and dark web to gather intelligence. The AI uses the information to predict what they will do, so platforms have actionable intelligence to prevent child endangerment.
Global Emancipation Network
Law enforcementChild sexual abuse investigators
Global Emancipation Network is excited to announce the latest counter-trafficking tool in our arsenal: Artemis. We teamed up with our friends at Splunk, Accenture, and Graphistry to produce a first-of-its-kind trafficking content classifier. Artemis is a proactive, automated solution for counter-human trafficking stakeholders to increase efficiency in investigations and disruptions by identifying high-risk establishments, individuals, and content. Our initial pilot focused on the illicit massage industry, categorizing massage businesses based on customer activity, staffing, location, services offered, imagery, and disciplinary actions. Using this data and advanced analytics, we created risk scores and tiers for targeted action.
Hubstream lntelligence is a customizable web application for understanding and taking appropriate action on investigative data. Data from online and off-line sources becomes integrated with a user's overall intelligence capability. Through smart linking, modern visualization and analytic techniques, as well as actionable dashboards, users can more quickly drive investigative leads through mission-critical workflows. The software helps drive operations and triage process national and international case referrals, victim identification workflows, and automated intelligence gathering from open source and proprietary intelligence.
Hunchly is a web capture tool that automatically collects, documents, and annotates every web page you visit to create a transparent audit trail for online investigations.
IBM i2 Analyst's Notebook is a visual analysis tool that helps turn data into intelligence. The solution provides features such as connected network visualizations, social network analysis, and geospatial or temporal views to help users uncover hidden connections and patterns in data. These insights aid in identifying and disrupting criminal, cyber and fraudulent threats.
i2 iBridge connects to select enterprise databases with search/query capabilities to return analysis-ready data. i2 information Exchange for Analysis Search for Analyst's Notebook connects to/searches multiple sources at once to retrieve analysis-ready data.
Magnet Forensic's AXIOM tool set uses Al, automation, advanced searching techniques, modern data visualization and more to help investigative teams find digital evidence and understand the story it is telling.
Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.
Instead of logging in to separate data systems, agents, detectives and investigators can conduct a single search for a suspect, target, or location and return data from all relevant systems. Palantir Gotham featres intuitive, user-friendly interface backed by powerful data integration software providing access to art available information related to an investigation in one place. Data is secured at a granular level (down to individual attributes describing each piece of data), ensuring that users can only see information for which they are authorized. Users can also collaborate on investigations and share information. Palantir Gotham can integrate data in any format, including existing case management systems, evidence management systems, arrest records, warrant data, subpoenaed data, record managements system (RSS) or other crime-reporting data, Computer- Aided Dispatch (CAD) data, federal repositories, gang intelligence, suspicious activity reports, Automated License Plate Reader (ALPR) data, and unstructured dat such as'document repositories and emails. Access restrictions can be applied broadly based on the data source, or granularly, down to individually securing attributes and metadata (e.g., a building's address or the timestamp associated with a photograph) These permissions govern how users access data All interactions, including searching, viking, and editing data, are recorded in a tamper-evident audit log.
Paliscope software allows users to conduct online investigations and quickly and easily collect open source data for review and analysis using third party services to correlate and find more data on the Clearnet and Darknet. Findings can be reported and secured with an audit log. Paliscope also provides an easy-to-use OSINT browser with integrated tools to elicit optimal results
Stop the Traffik
Human trafficking is happening in plain sight all around us. Have you ever seen something that looks out of place? Does uncertainty stop you from speaking up? Every human trafficking story, no matter how long or short, whether current or historic, is important and relevant. It may be the missing piece of the puzzle, contributing to a larger and more accurate picture of human trafficking, which can then inform efforts to combat it. Technology places the power to prevent into the hand of a person who holds a mobile device. The STOP APP can be downloaded by anyone, anywhere in the world who has access to a smartphone. The app is anonymous, confidential and secure – it is available in seven languages and allows you to submit suspicious activity quickly by sending text based messages and uploading photos and videos.
The National Center for Missing & Exploited Children (NCMEC)
NCMEC’s CyberTipline is the nation’s (USA’s) centralized reporting system for the online exploitation of children. The public and electronic service providers can make reports of suspected online enticement of children for sexual acts, child sexual molestation, child sexual abuse material, child sex tourism, child sex trafficking, unsolicited obscene materials sent to a child, misleading domain names, and misleading words or digital images on the internet. Through funding from Facebook, NCMEC offers the Case Management Tool (CMT) for domestic and international law enforcement who receive and investigate CyberTipline reports. The CMT allows users to triage, query, organize and refer CyberTipline reports within this web-based interface. NCMEC's Law Enforcement Agency Web Services (LEAWS) allows law enforcement around the world access to CyberTipline report data. This back-end infrastructure allows report data to be ingested by case management tools to allow quicker access, triage and response. NCMEC's ISP Web Services (ISPWS) allows companies around the world report directly to the CyberTipline. This back-end infrastructure allows for easier and automated reporting by companies around the world taking a stand against child sexual exploitation. While companies based in the US are required by law to report to the CyberTipline, any global company may and is welcome to report to the CyberTipline to better protect children and users on their platforms and services. As part of the CyberTipline response process, NCMEC notifies companies and providers when they are hosting CSAM and no suspect or offender is identified. Our analysts use a specialized interface to send notices daily, calling for these providers to remove the content and it includes a follow-up check to ensure the content has in fact been taken down. In 2021, NCMEC sent over 100,000 notices to companies to remove content from their hosting sites.
Thompson Reuters, Mekong Club
Toolkits is designed to help financial institutions fight human trafficking using data. The Toolkit, tailored for use in the Asia Pacific region, includes a set of ‘red flags’ - potential indicators of modern slavery - linked to suspicious patterns in financial transactions, customer data and behaviour. It also includes contextual information and case studies to widen the financial service sectors’ understanding of this multi-faceted crime.
Global Emancipation Network
Law enforcementChild sexual abuse investigators
Global Emancipation Network grants Minerva access to organizations with valid counter-trafficking missions in order to host and explore millions of trafficking-related data records and use customized search, alerting, geo-location and other platform capabilities. Using Splunk Enterprise and third-party integrated technologies, Minerva protects case-sensitive information and monitors usage patterns to help keep user information private, safe and secure. Leading public, private and nonprofit organizations have already been accepted to the platform as early users. Minerva is equipped with data-processing capabilities to extract and organize information from a variety of data sources. Capabilities include: Advertisement analysis: Analyzes advertisements from the deep and open web, where most trafficking cases originate, and extracts data such as user, location, account and other identifying information. Image processing tools: Processes images of victims to reduce the time users spend analyzing photographs and manually linking them to advertisements. Minerva integrates image analysis tools to tag photographs with characteristics to expedite database search, and reverse image search to identify similar images. Text analysis tools and natural language processing: Extracts text in images from advertisements and flags correlations with missing persons reports and other valuable information. Multi-tenant system informing trend analysis: Allows all Minerva users to store their information securely on the same database at the same time, enabling secure, multi-agency collaboration on shared investigations.
Project VIC is a community of investigators, victim identification specialists, application developers, scientists and strategic partners dedicated to developing and levering the newest technologies and victim-centric methods of investigation to improve success rate in rescuing victims of child sexual exploitation and trafficking. Proiect VIC has co-created an ecosystem of shared and standardized technologies specifically chosen to combat crimes involving massive amounts of images and video. Data from these respective technologies is processed using the Project VAC Cloud and redistributed back to the greater community working on crimes against children. The following tools are part of the Project VIC ecosystem: Project VIC Hash Cloud Provided by Project VIC International and Hubstream Inc. hosts over 65 million CSAM and non CSAM hashes- Access encryption Provided by Project VIC. PhotoDNA for Images by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC PhotoDMA for Video by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC Ft Video Fingerprinting by Friend MTB is made available to law enforcement through a sub-license agreement to Project VIC LLC. VICS-Odata Model Licensing is made available to law enforcement through a sub-license agreement with Project VIC LLC international Image Classifies Standard- (IC-3) Machine Learning Modelling is made available through Project VIC International Global Alert System- ViC5 Exif Matching across global platforms to identify similarities in imagery for Victim Identification. License included with ViC5
XRY is a purpose built software based solution set complete with all the necessary tools for recovering data from mobile devices in a forensically secure manner. The software is delivered through four primary platforms: MSAB Office, MSAB Field, MSAB Kiosk and MSAB Tablet. MSAB Office is the all-purpose forensic system from MSAB, offering the entire XRY product solution in a single package. With MSAB Office you can go deeper into a mobile device to recover vital data with a choice of Logical, Physical, Cloud, PinPoint and Drone recovery tools for all supported devices. The Office kit works on a PC to produce a secure forensic report containing dat extractions from mobile handsets. MSAB Office allows investigators to access alI possible methods to recover data from a mobile device through XAMN Spotlight, or perform deeper analysis which can be done with XAMI\ Horizon. For organisations who wish to perform digital forensics out of the office environment MSAB Field is a field kit that utilises XRY software, XAMN Spotlight for laptops with deeper analysis performed using XAMN Horizon. For a turnkey forensic solution MSAB Kiosk and MSAB Tablet (touch screen version) are all inclusive hardware and software solutions designed for first responders where mobile data recovery is only one part of the job. These products utilise custom built XRY software and are co1nplete hard\vare solutions with all the tools necessary for recovering data from mobile devices in a forensically secure manner.
Analyze DI allows users to import, process and review complex information as well as pre-categorise known data and correlate metadata with open sources on the internet.
Our International Child Sexual Exploitation (ICSE) image and video database is an intelligence and investigative tool, which allows specialized investigators to share data on cases of child sexual abuse. Using image and video comparison software, investigators are instantly able to make connections between victims, abusers and places. The database avoids duplication of effort and saves precious time by letting investigators know whether a series of images has already been discovered or identified in another country, or whether it has similar features to other images. It also allows specialized investigators from more than 64 countries to exchange information and share data with their colleagues across the world. By analysing the digital, visual and audio content of photographs and videos, victim identification experts can retrieve clues, identify any overlap in cases and combine their efforts to locate victims of child sexual abuse.
Corporations and Organizations in general
NetClein ProActive works similarly to an anti-virus program but instead of detecting a virus, ProActive detects images and videos that law enforcement agencies have classified as child sexual abuse material.
Child abuse material removal and blocking
Consumption of child abuse material prevention
Data management and analysis