Technology | Purpose | Organization | Tool/project (Click to open) ๐ | Country of Origin | Target group/intended user | Website | Description |
---|---|---|---|---|---|---|---|
Data analysis and management | Perpetrator investigation | Crisp | Platform Risk Intelligence | USA | Social mediaContent moderators | www.crispthinking.com | Crisp delivers complete intelligence for Trust & Safety and Policy teams on the individuals and groups manipulating social media, video sharing, gaming, dating, review, and other specialty platforms by providing: Crip infiltrates bad actors "from the outside in" across the surface, deep, and dark web to gather intelligence. The AI uses the information to predict what they will do, so platforms have actionable intelligence to prevent child endangerment. |
Data analysis and management | Data analysis for content blocking/removalChild abuse material removal and blocking | Cybertip Canada | Cleanfeed Canada | Canada | Internet Service Providers | www.cybertip.ca | Cleanfeed Canada blocks customer access to known non-Canadian websites that are hosting child pornography to reduce Canadian's exposure to child abuse images and create a disincentive for those who access and distribute child pornography. |
Data analysis and management | Data management and analysis | Eckerd Connect | Rapid Safety Feedback | USA | Social services | eckerd.org | Using a predictive analytics model that builds assessments after amassing historical data, Eckerd used RSF to identify the children who could only be returned to their parents with a heightened level of scrutiny by caseworkers. |
Data analysis and management | Consumption of child abuse material prevention | Thorn | TC Keyword Hub | USA | Search engine companies | thorn-hub.com | The Keyword Hub allows technology companies to share search terms used to find child sexual abuse material (CSAM) with other companies allowing all parties to be better at stopping users seeking CSAM. |
Data analysis and management | Grooming detection/prevention | Yoti | Yoti | UK | Private individualsSocial media | www.yoti.com | Yoti is an identity platform, for identifying yourself digitally, and supports choosing what information to share and verify. For example user's can verify their age online, while not revealing other information about themselves. |
Image and video detection/classification | Data analysis for content blocking/removalChild abuse material removal and blocking | Cybertip Canada | Shield by Project Arachnid | Canada | Social mediaSearch engine companies | projectarachnid.ca | Rather than waiting for Project Arachnid to detect material and send a notice, industry can use Shield by Project Arachnid to quickly detect known CSAM on their service, which will, in turn, speed up its removal. Industry members that do not wish to interact directly with Shield by Project Arachnid can register their service/domain with the Canadian Centre to have any notices sent directly to them instead of being sent to their hosting provider. Other industries, such as filtering providers, can download real-time lists of URLs that are believed to currently contain CSAM for filtering purposes. |
Image and video detection/classification | Child abuse material removal and blocking | EOKM and Web-IQ | EOKM HashCheckServer | Netherlands | HashCheckServer is a tool for hosting providers to prevent the uploading of known child sexual exploitation material. To prevent the uploading of known child sexual exploitation material, hosting parties needed to be part of the solution as they provide one of the gateways to publishing CSAM. Based on this knowledge, EOKM took the initiative to help hosting parties to prevent the uploading of known CSAM and to identify existing material on their servers so that it can be deleted. Following this initiative, EOKM asked Web-IQ to develop software that allows hosting parties to check whether an image appears in the policeโs database of known CSAM. | ||
Image and video detection/classification | Data analysis for content blocking/removalChild abuse material removal and blocking | Content Safety API | USAGlobalSwitzerland | Content moderators | blog.google | The Content Safety API sorts through many images and prioritizes the most likely child sexual abuse material (CSAM) content for review. The classifier can target content that has not been previously confined as CSAM. | |
Image and video detection/classification | Child abuse material removal and blocking | Google/Youtube | CSAI Match | USAGlobal | Social media | www.youtube.com | CSAI Match is used to surface potential child sexual abuse images (CSAI) for YouTube uploads as well as partner submissions. |
Image and video detection/classification | Child abuse material removal and blocking | Krunam | Krunam | USA | Social media | krunam.co | Krunam provides breakthrough technology that identifies and classifies previously unknown CSAM images and video at scale. Our CSAM classifier protects your online community, your employees, your brandโs reputation, and, last but not least, millions of children around the world. |
Image and video detection/classification | Child abuse material removal and blocking | NetClean | NetClean Protective | Sweden | Corporations and Organizations in general | www.netclean.com | NetClean ProTective is a technical solution used to protect business mobile devices by blocking access to URLs known to contain child sexual abuse material (CSAM). The uniquely combined and continually updated URL list, from some of the worldโs primary sources, makes it an effective protective solution. |
Image and video detection/classification | Child abuse material removal and blockingPerpetrator prosecution | Videntifier Technologies | Videntifier | Iceland | Law enforcement | www.videntifier.com | Large-scale video identification, which allows searching databases of videos. Videntifier TM Forensic, radically improves the forensic video identification process, by providing law enforcement agencies with a robust, fast and easy-to-use video identification system. Using this ser-vice, a single mouse-click is sufficient to automatically scan an entire storage device and classify all videos. |
Text analysis/processing | Consumption of child abuse material prevention | Internet Watch Foundation (IWF) | reThink Chatbot | Global | Potential perpetrators | annualreport2020.iwf.org.uk | An automated device that detects potential offenders and refers them to support (e.g. self-help programmes) through the Lucy Faithfull Foundation. |
Text analysis/processing | Grooming detection/prevention | SafeToNet | SafeToNet | UK | Children | safetonet.com | SafeToNet is pioneering technology that educates children โin-the-momentโ as they use their device. It is a safeguarding assistant that helps them become responsible and safe digital citizens. Its power lies in a smart keyboard that detects risks in real-time. It steers children away from trouble by filtering harmful outgoing messages before they can be sent and any damage can be done. SafeToNet helps prevent sexting, bullying, abuse and aggression. |
Text analysis/processing | Consumption of child abuse material prevention | Thorn | Deterrence | USA | Child Sexual Abuse Material (CSAM) platforms | www.thorn.org | Thorn runs the countryโs most extensive online deterrence program, communicating directly with people searching for CSAM, disrupting their sense of anonymity and encouraging them to seek help. By suggesting help resources, we aim to change behavior and increase accountability. We are constantly testing messaging, identifying the best tactics to reach and persuade specific sub-groups, and capturing aggregate data to inform future research. |
Grooming detection/prevention | DeafKidz International | DeafKidz Defenders | UK | Children | deafkidzinternational.org | Interactive, accessible digital platform to help deaf children stay safe from online abuse and exploitation. Through educational games, children will learn to protect themselves from online risks, e.g. exploring what an inappropriate chat conversation might look like, the warning signs of abusers. | |
Data analysis for content blocking/removalChild abuse material removal and blocking | Internet Watch Foundation (IWF) | URL List | Global | Internet Service Providers | www.iwf.org.uk | The Internet Watch Foundation's URL List is a database of known child sextral abuse material (CSAM) sites to assist with blocking and filtering. | |
Grooming detection/prevention | None in Three (University of Huddersfield) | Emilio | UK | Potential perpetrators | www.noneinthree.org | Working in partnership with the Universidade Estadual de Londrina (UEL) and Promundo, both in Brazil, the team, led by Professor Adele Jones and Professor Patricia Tzortzopoulos, will conduct research into online child sexual exploitation and abuse (CSEA). They will use the findings to develop and evaluate โEmilioโ, an educational video game targeted specifically at young males considered to be at risk of engaging in online abusive behaviour. The game will aim to head off potential online CSEA at its roots by addressing its underlying drivers among those most amenable to change, the young. Because young people are still developing, it is easier to help them modify their thinking patterns and to make the link between emotion and behaviour; essential for violence prevention. | |
Consumption of child abuse material prevention | Suojellaan Lapsia Ry | ReDirection | Finland | Potential perpetrators | www.end-violence.org | ReDirection is a self-help programme that works to prevent the consumption of CSAM on the Dark Web, which builds on the Finnish governmentโs accredited New Direction rehabilitation programme for sex offenders. The project will also reveal new information about these searchers and their pathways to CSAM access and use by providing targeted support for these individuals. | |
Grooming detection/prevention | University of Kent | โSerious game for a serious issueโ | UK | Children | www.end-violence.org | A culturally sensitive digital "serious" game that educates children about online child sexual exploitation and trafficking, with built-in evaluation and at-source reporting. |
Tags