All Digital Tools

Sort by Technology

5 views

Sort by Technology

Sort by Purpose

Sort by Organization

Sort by Country

Sort by Target Group

TechnologyPurposeOrganizationTool/project (Click to open) 👆Country of OriginTarget group/intended userWebsiteDescription

Crisp

Social mediaContent moderators

Crisp delivers complete intelligence for Trust & Safety and Policy teams on the individuals and groups manipulating social media, video sharing, gaming, dating, review, and other specialty platforms by providing: Crip infiltrates bad actors "from the outside in" across the surface, deep, and dark web to gather intelligence. The AI uses the information to predict what they will do, so platforms have actionable intelligence to prevent child endangerment.

Cybertip Canada

Internet Service Providers

Cleanfeed Canada blocks customer access to known non-Canadian websites that are hosting child pornography to reduce Canadian's exposure to child abuse images and create a disincentive for those who access and distribute child pornography.

Eckerd Connect

Social services

Using a predictive analytics model that builds assessments after amassing historical data, Eckerd used RSF to identify the children who could only be returned to their parents with a heightened level of scrutiny by caseworkers.

Thorn

Search engine companies

The Keyword Hub allows technology companies to share search terms used to find child sexual abuse material (CSAM) with other companies allowing all parties to be better at stopping users seeking CSAM.

Yoti

Private individualsSocial media

Yoti is an identity platform, for identifying yourself digitally, and supports choosing what information to share and verify. For example user's can verify their age online, while not revealing other information about themselves.

Cybertip Canada

Social mediaSearch engine companies

Rather than waiting for Project Arachnid to detect material and send a notice, industry can use Shield by Project Arachnid to quickly detect known CSAM on their service, which will, in turn, speed up its removal. Industry members that do not wish to interact directly with Shield by Project Arachnid can register their service/domain with the Canadian Centre to have any notices sent directly to them instead of being sent to their hosting provider. Other industries, such as filtering providers, can download real-time lists of URLs that are believed to currently contain CSAM for filtering purposes.

EOKM and Web-IQ

HashCheckServer is a tool for hosting providers to prevent the uploading of known child sexual exploitation material. To prevent the uploading of known child sexual exploitation material, hosting parties needed to be part of the solution as they provide one of the gateways to publishing CSAM. Based on this knowledge, EOKM took the initiative to help hosting parties to prevent the uploading of known CSAM and to identify existing material on their servers so that it can be deleted. Following this initiative, EOKM asked Web-IQ to develop software that allows hosting parties to check whether an image appears in the police’s database of known CSAM.

Google

Content moderators

The Content Safety API sorts through many images and prioritizes the most likely child sexual abuse material (CSAM) content for review. The classifier can target content that has not been previously confined as CSAM.

Google/Youtube

Social media

CSAI Match is used to surface potential child sexual abuse images (CSAI) for YouTube uploads as well as partner submissions.

Krunam

Social media

Krunam provides breakthrough technology that identifies and classifies previously unknown CSAM images and video at scale. Our CSAM classifier protects your online community, your employees, your brand’s reputation, and, last but not least, millions of children around the world.

NetClean

Corporations and Organizations in general

NetClean ProTective is a technical solution used to protect business mobile devices by blocking access to URLs known to contain child sexual abuse material (CSAM). The uniquely combined and continually updated URL list, from some of the world’s primary sources, makes it an effective protective solution.

Videntifier Technologies

Law enforcement

Large-scale video identification, which allows searching databases of videos. Videntifier TM Forensic, radically improves the forensic video identification process, by providing law enforcement agencies with a robust, fast and easy-to-use video identification system. Using this ser-vice, a single mouse-click is sufficient to automatically scan an entire storage device and classify all videos.

Internet Watch Foundation (IWF)

Potential perpetrators

An automated device that detects potential offenders and refers them to support (e.g. self-help programmes) through the Lucy Faithfull Foundation.

Internet Watch Foundation (IWF)

Child Sexual Abuse Material (CSAM) platforms

IWF has a project to develop chatbot technology to engage with individuals searching for CSAM, encouraging them to seek help to change. IWF’s chatbot will be deployed in a targeted manner on platforms known by IWF to be used by individuals seeking or at risk of accessing CSAM and engage with them in order to signpost to LFF resources.

SafeToNet

Children

SafeToNet is pioneering technology that educates children “in-the-moment” as they use their device. It is a safeguarding assistant that helps them become responsible and safe digital citizens. Its power lies in a smart keyboard that detects risks in real-time. It steers children away from trouble by filtering harmful outgoing messages before they can be sent and any damage can be done. SafeToNet helps prevent sexting, bullying, abuse and aggression.

Thorn

Child Sexual Abuse Material (CSAM) platforms

Thorn runs the country’s most extensive online deterrence program, communicating directly with people searching for CSAM, disrupting their sense of anonymity and encouraging them to seek help. By suggesting help resources, we aim to change behavior and increase accountability. We are constantly testing messaging, identifying the best tactics to reach and persuade specific sub-groups, and capturing aggregate data to inform future research.

DeafKidz International

Children

Interactive, accessible digital platform to help deaf children stay safe from online abuse and exploitation. Through educational games, children will learn to protect themselves from online risks, e.g. exploring what an inappropriate chat conversation might look like, the warning signs of abusers.

Internet Watch Foundation (IWF)

Internet Service Providers

The Internet Watch Foundation's URL List is a database of known child sextral abuse material (CSAM) sites to assist with blocking and filtering.

None in Three (University of Huddersfield)

Potential perpetrators

Working in partnership with the Universidade Estadual de Londrina (UEL) and Promundo, both in Brazil, the team, led by Professor Adele Jones and Professor Patricia Tzortzopoulos, will conduct research into online child sexual exploitation and abuse (CSEA). They will use the findings to develop and evaluate ‘Emilio’, an educational video game targeted specifically at young males considered to be at risk of engaging in online abusive behaviour. The game will aim to head off potential online CSEA at its roots by addressing its underlying drivers among those most amenable to change, the young. Because young people are still developing, it is easier to help them modify their thinking patterns and to make the link between emotion and behaviour; essential for violence prevention.

Suojellaan Lapsia Ry

Potential perpetrators

ReDirection is a self-help programme that works to prevent the consumption of CSAM on the Dark Web, which builds on the Finnish government’s accredited New Direction rehabilitation programme for sex offenders. The project will also reveal new information about these searchers and their pathways to CSAM access and use by providing targeted support for these individuals.

University of Kent

Children

A culturally sensitive digital "serious" game that educates children about online child sexual exploitation and trafficking, with built-in evaluation and at-source reporting.