Tool/project (Click to open) ๐ | Organization | Technology | Purpose | Country of Origin | Target group/intended user | Crime Phase | Website | Description | Date tool added to database |
|---|---|---|---|---|---|---|---|---|---|
Access Data Group | Data analysis and management | Perpetrator investigation | USA | Law enforcement | Prosecution | www.exterro.com | Quin-C is a digital investigation software solution that provides a customizable UI to allow advanced data vizualisation, processing and analysis. | Aug 19, 2022 12:33 PM | |
Access Data Group | Data analysis and management | Perpetrator investigationData management and analysis | USA | Law enforcement | Prosecution | www.exterro.com | FTK is a database driven solution that processes and indexes large amounts of data up-front to allow efficient filtering and searching. Users interact with FTK via a web interface which allows them to conduct computer | Aug 19, 2022 12:33 PM | |
Aiba AI | Text analysis/processing | Grooming detection/prevention | Global | Social mediaChildren | Detection | aiba.ai | Amanda is a proactive safety platform designed to protect children in social environments by detecting grooming and making accurate profiling of age and gender. Amanda uses key stroke dynamics and metadata from chats to determine the gender and age group of users. By analyzing writing style, Amanda can identify if users are who they claim to be. Amanda also analyzes messages using methods such as stylometry, behavioral patterns, text, and image to continuously assess the risk of the conversation. This analysis results in a continuous risk score that enables real-time prioritization of potentially dangerous conversations. | Apr 17, 2023 10:26 AM | |
Amazon | Facial/object detection | Identification | USAGlobal | Law enforcementContent moderators | Prosecution | aws.amazon.com | Rekognition Image is an image recognition service that detects objects, scenes, and faces; extracts text; recognizes celebrities; and identifies inappropriate content in images. It also allows you to search and compare faces. Rekognition Image is based on the same deep learning technology developed by Amazon's computer vision scientists to analyze billions of images daily for Prime Photos. This service only requires users to pay for the number of images, or minutes of video, | Aug 19, 2022 12:34 PM | |
Belkasoft Evidence Center | Device extraction/search | Perpetrator prosecution | USA | Law enforcement | Prosecution | belkasoft.com | Belkasoft Evidence Center is an all-in-one forensic solution for acquiring, locating, extracting, and analyzing digital evidence stored inside computers and mobile devices, RAM and cloud. The tool kit extracts digital evidence from multiple sources by analysing hard drives, drive images, cloud, memory dumps, iOS, Blackberry | Aug 19, 2022 12:34 PM | |
BlueBear | Image and video detection/classification | Perpetrator prosecution | Canada | Law enforcement | Prosecution | bb-les.ca | LACE enables investigators to extract more visual data and efficiently categorize vast amounts of image and video data from confiscated devices using | Sep 10, 2021 8:36 AM | |
CameraForensics | Facial/object detection | Identification | UK | Law enforcement | Prosecution | cameraforensics.com | CameraForensics is an online portal allowing users to search for other images on the internet taken with a particular camera to support victim identification investigations. This tool also supports searching geographically for similar and identical images and for various metadata elements. All with the intent of helping investigators link covert and overt (public) personas on the internet. The tool is available via an online user interface and also via a number of products such as Griffeye Analyze, or as a fully integrated solution for agency or country-level databases (via API). | Sep 10, 2021 8:36 AM | |
Child Rescue Coalition | Data analysis and management | Perpetrator investigation | USA | Law enforcement | Prosecution | childrescuecoalition.org | Child Rescue Coalition is a partnership of child exploitation investigators, police officers, digital forensic experts. prosecutors, child welfare agencies, and corporate and private philanthropy who work together to apprehend and convict abusers of children, rescue those in harm's way, and importantly, seek to prevent abuse from happening in the first place. At its core is technology that identifies, monitors, and ranks the online criminal behavior of child predators on peer-to-peer file-sharing and chat networks. | Sep 10, 2021 8:36 AM | |
Child Rescue Coalition | Device extraction/search | Perpetrator prosecution | USA | Law enforcement | Prosecution | childrescuecoalition.org | Neula provides an automated application for locating deleted child abuse content on digital devices.The recovery of deleted files is one of the greatest challenges to effectively prosecuting the abusers of children, many of whom eliminate evidence by deleting large quantities of contraband over time. Forensic analysts can sometimes locate and reconstruct a small percentage of the offending files, but this process is extremely painstaking and time-consuming. Neula provides better insight into the true extent of an individual's criminal behavior, | Sep 10, 2021 8:36 AM | |
Child Rescue Coalition | Data analysis and management | Data management and analysisPerpetrator prosecution | USA | Law enforcement | Prosecution | www.end-violence.org | Automating the handling of evidence โincluding chat logs, data and videos โ for live streaming abuse cases. Because mobile applications are often used to share CSAM and groom children, this solution will also help collect data against suspects with a sexual interest in children. | Nov 25, 2021 1:30 PM | |
Clearview AI | Facial/object detection | Identification | USA | Law enforcement | Prosecution | www.clearview.ai | Clearview AI acts as a search engine of publicly available images โ now more than ten billion -- to support investigative and identification processes by providing for highly accurate facial recognition across all demographic groups. Similar to other search engines, which pull and compile publicly available data from across the Internet into an easily searchable universe, Clearview AI compiles only publicly available images from across the Internet into a proprietary image database to be used in combination with Clearview AI's facial recognition technology. When a Clearview AI user uploads an image, Clearview AIโs proprietary technology processes the image and returns links to publicly available images that contain faces similar to the person pictured in the uploaded image. | Mar 31, 2022 7:56 AM | |
Crisp | Data analysis and management | Perpetrator investigation | USA | Social mediaContent moderators | Prevention | www.crispthinking.com | Crisp delivers complete intelligence for Trust & Safety and Policy teams on the individuals and groups manipulating social media, video sharing, gaming, dating, review, and other specialty platforms by providing: | Sep 14, 2021 7:56 AM | |
Cybertip Canada | Data analysis and management | Child abuse material removal and blocking | Canada | Internet Service Providers | Prevention | www.cybertip.ca | Cleanfeed Canada blocks customer access to known non-Canadian websites that are hosting child pornography to reduce Canadian's exposure to child abuse images and create a disincentive for those who access and distribute child pornography. | Sep 10, 2021 8:36 AM | |
Cybertip Canada | Image and video detection/classification | Child abuse material removal and blocking | Canada | Law enforcement | Detection | projectarachnid.ca | Project Arachnid is a platform for reducing the availability of child sexual abuse material (CSAM) which includes crawling the internet for known CSAM using digital fingerprints as well as providing an API for industry members to improve upon and accelerate the detection of this harmful material on their own networks. | Sep 10, 2021 8:36 AM | |
Cybertip Canada | Image and video detection/classification | Child abuse material removal and blocking | Canada | Social mediaSearch engine companies | Prevention | projectarachnid.ca | Rather than waiting for Project Arachnid to detect material and send a notice, industry can use Shield by Project Arachnid to quickly detect known CSAM on their service, which will, in turn, speed up its removal. | Nov 30, 2021 9:10 AM | |
Dartmouth College | Image and video detection/classification | Child abuse material removal and blocking | USA | Social mediaLaw enforcement | Detection | www.counterextremism.com | eGlyph is a robust-hashing algorithm that can identify previously tagged images,video, and audio. eGlyph extends photoDNA which operates only on images. | Sep 10, 2021 8:36 AM | |
DeafKidz International | Grooming detection/prevention | UK | Children | Prevention | deafkidzinternational.org | Interactive, accessible digital platform to help deaf children stay | Nov 25, 2021 1:35 PM | ||
Eckerd Connect | Data analysis and management | Data management and analysis | USA | Social services | Prevention | eckerd.org | Using a predictive analytics model that builds assessments after amassing historical data, Eckerd used RSF to identify the children who could only be returned to their parents with a heightened level of scrutiny by caseworkers. | Sep 14, 2021 7:41 AM | |
EOKM and Web-IQ | Image and video detection/classification | Child abuse material removal and blocking | Netherlands | Prevention | HashCheckServer is a tool for hosting providers to prevent the uploading of known child sexual exploitation material. | Nov 30, 2021 9:28 AM | |||
Europol | Agency/organization collaboration | Europe | Law enforcement | Prosecution | www.europol.europa.eu | The Europol Platform for Experts (EPE) is a secure, collaborative web platform for specialists in a variety of law enforcement areas. | Oct 11, 2021 7:48 AM | ||
Exchange Initiative | Facial/object detection | Identification | USA | Private individuals | Detection | traffickcam.com | TraffickCam allows anyone with a smartphone to fight sex trafficking when they travel by uploading photos of hotel rooms to a law enforcement database. Photos | Sep 10, 2021 8:36 AM | |
Image and video detection/classification | Child abuse material removal and blocking | USAGlobal | Facebook products | Detection | research.fb.com | Camera Vision is a machine learning tool that identifies images that contain both nudity and a child. | Sep 10, 2021 8:36 AM | ||
Freedom Signal | Text analysis/processing | Identification | USA | Law enforcement | Detection | freedomsignal.org | Freedom Signal is an online platform to help advocates develop ongoing relationships with through texting. | Sep 13, 2021 8:03 AM | |
Global Emancipation Network | Data analysis and management | Perpetrator investigationIdentification | Global | Law enforcementChild sexual abuse investigators | Detection | www.globalemancipation.ngo | Global Emancipation Network is excited to announce the latest counter-trafficking tool in our arsenal: Artemis. We teamed up with our friends at Splunk, Accenture, and Graphistry to produce a first-of-its-kind trafficking content classifier. Artemis is a proactive, automated solution for counter-human trafficking stakeholders to increase efficiency in investigations and disruptions by identifying high-risk establishments, individuals, and content. Our initial pilot focused on the illicit massage industry, categorizing massage businesses based on customer activity, staffing, location, services offered, imagery, and disciplinary actions. Using this data and advanced analytics, we created risk scores and tiers for targeted action. | Sep 14, 2021 8:23 AM | |
Global Emancipation Network | Data analysis and managementImage and video detection/classification | Perpetrator investigationIdentificationAgency/organization collaboration | Global | Law enforcementChild sexual abuse investigators | Detection | www.globalemancipation.ngo | Global Emancipation Network grants Minerva access to organizations with valid counter-trafficking missions in order to host and explore millions of trafficking-related data records and use customized search, alerting, geo-location and other platform capabilities. Using Splunk Enterprise and third-party integrated technologies, Minerva protects case-sensitive information and monitors usage patterns to help keep user information private, safe and secure. Leading public, private and nonprofit organizations have already been accepted to the platform as early users. | Sep 14, 2021 8:09 AM | |
Image and video detection/classification | Child abuse material removal and blocking | USAGlobalSwitzerland | Content moderators | Prevention | blog.google | The Content Safety API sorts through many images and prioritizes the most likely child sexual abuse material (CSAM) content for review. The classifier can target | Sep 10, 2021 8:36 AM | ||
Google/Youtube | Image and video detection/classification | Child abuse material removal and blocking | USAGlobal | Social media | Prevention | www.youtube.com | CSAI Match is used to surface potential child sexual abuse images (CSAI) for YouTube uploads as well as partner submissions. | Sep 10, 2021 8:36 AM | |
Griffeye | Image and video detection/classification | Perpetrator investigation | Sweden | Law enforcement | Prosecution | www.griffeye.com | Analyze DI allows users to import, process and review complex information as well as pre-categorise known data and correlate metadata with open sources on the | Sep 10, 2021 8:36 AM | |
Griffeye | Data analysis and management | Data management and analysis | Sweden | Law enforcement | Prosecution | www.griffeye.com | Analyze Collaboration Server is a central repository for storing and sharing information. Analyze Collaboration Server Enterprise enables organizations to store and access all the relevant material they have ever collected. The software facilitates image and video processing via a custom user interface, allowing investigators to work with a central store of case data. The Griffeye AI is made up of two core solutions: The CSA classifier, which has been trained on real CSA case data, and the Object classifier, which can detect various objects and details in images. | Sep 10, 2021 8:36 AM | |
Hubstream | Data analysis and management | Perpetrator investigation | USA | Law enforcement | Prosecution | www.hubstreamsoftware.com | Hubstream lntelligence is a customizable web application for understanding and taking appropriate action on investigative data. Data from online and off-line sources becomes integrated with a user's | Sep 10, 2021 8:36 AM | |
Hubstream | Data analysis and management | Agency/organization collaboration | USA | Law enforcement | Prosecution | www.hubstreamsoftware.com | Hubstream Intelligence Fabric is an automation and data sharing service that powers national and international collaboration and distribution of mission-critical | Sep 10, 2021 8:36 AM | |
Hunch.ly | Data analysis and management | Perpetrator investigation | Canada | Law enforcement | Prosecution | hunch.ly | Hunchly is a web capture tool that automatically collects, documents, and annotates every web page you visit to create a transparent audit trail for online investigations. | Sep 10, 2021 8:36 AM | |
IBM i2 | Data analysis and management | Perpetrator investigation | UK | Law enforcement | Prosecution | i2group.com | IBM i2 Analyst's Notebook is a visual analysis tool that helps turn data into intelligence. The solution provides features such as connected network visualizations, social network analysis, and geospatial or temporal views to help users uncover hidden connections and patterns in data. These insights aid in identifying and disrupting criminal, cyber and fraudulent threats. | Sep 10, 2021 8:36 AM | |
IBM i2 | Data analysis and management | Perpetrator investigation | UK | Law enforcement | Prosecution | www.ibm.com | i2 iBridge connects to select enterprise databases with search/query capabilities to return analysis-ready data. i2 information Exchange for Analysis Search for Analyst's Notebook connects to/searches multiple sources at once to retrieve analysis-ready data. | Sep 10, 2021 8:36 AM | |
International Association of Internet Hotlines (INHOPE) | Child abuse material removal and blocking | Netherlands | Corporations and Organizations in generalPrivate individuals | Detection | inhope.org | The ESCAPE project, funded by End Violence Against Children (EVAC) represents INHOPE's vision to put an eco-system in place ensuring that every industry stakeholder and each member of the public around the globe has the option and awareness to report child sexual abuse material (CSAM) encountered online. | Nov 25, 2021 1:38 PM | ||
Internet Watch Foundation (IWF) | Child abuse material removal and blocking | Global | Internet Service Providers | Prevention | www.iwf.org.uk | The Internet Watch Foundation's URL List is a database of known child sextral abuse material (CSAM) sites to assist with blocking and filtering. | Sep 10, 2021 8:36 AM | ||
Internet Watch Foundation (IWF) | Child abuse material removal and blocking | Global | Internet Service Providers | Detection | www.iwf.org.uk | The Internet Watch Foundation's Hash List is a hash database of known child sexual abuse material (CSAM) available for service providers to automatically match known images before they appear on a service and remove illegal images already on services. | Sep 10, 2021 8:36 AM | ||
Internet Watch Foundation (IWF) | Text analysis/processing | Consumption of child abuse material prevention | Global | Potential perpetrators | Prevention | annualreport2020.iwf.org.uk | An automated device that detects potential offenders and refers | Nov 25, 2021 1:47 PM | |
Internet Watch Foundation (IWF) and NetSweeper | Child abuse material removal and blocking | Global | Internet Service ProvidersLaw enforcement | Detection | www.iwf.org.uk | The Internet Watch Foundation and Netsweeper Hash List is a collaboration between the two organisations to block and filter child sexual abuse material (CSAM) on the internet. | Sep 10, 2021 8:36 AM | ||
Interpol | Image and video detection/classification | Perpetrator investigationAgency/organization collaboration | Global | Law enforcement | Prosecution | www.interpol.int | Our International Child Sexual Exploitation (ICSE) image and video database is an intelligence and investigative tool, which allows specialized investigators to share data on cases of child sexual abuse. | Nov 26, 2021 8:23 AM | |
Interpol | Agency/organization collaboration | Global | Law enforcement | Prosecution | www.end-violence.org | INTERPOL will bring the most advanced technology to investigators of online CSEA through its new DevOps Group Project. The initiative will facilitate research and development by an expert group of investigators, non-governmental organisations, academia, and information technology companies, and extend solutions to specialised officers worldwide via INTERPOLโs secure channels. Headquartered in France, this project has a global reach. | Nov 25, 2021 1:44 PM | ||
Interpol, Inspectoratul General AL Politiei, | Image and video detection/classification | Agency/organization collaboration | Netherlands | Law enforcement | ProsecutionDetection | projectcport.com | Project CPORT is funded by the European Union. It is a 2-year project that started in Jan 2023. The CPORT portal allows law enforcement agencies to access ICCAM โ a database used by national hotlines to process and exchange reports of child sexual abuse material (CSAM) submitted by the public worldwide. The ICCAM platform is hosted by INTERPOL and is an important channel into INTERPOLโs international child sexual exploitation database and list of known domains disseminating severe abuse material (IWOL). | Jan 30, 2024 10:01 AM | |
Krunam | Image and video detection/classification | Child abuse material removal and blocking | USA | Social media | Prevention | krunam.co | Krunam provides breakthrough technology that identifies and classifies previously unknown CSAM images and video at scale. Our CSAM classifier protects your online community, your employees, your brandโs reputation, and, last but not least, millions of children around the world. | Oct 21, 2021 11:06 AM | |
Luxan | Facial/object detection | Identification | USA | Law enforcement | Prosecution | www.luxand.com | Luxand's technology detects facial features quickly and reliably. The SOK processes an image, detect-s human faces within it, and returns the coordinates of 70 facial feature points including eyes, eye contours, eyebrows, Iip contours, nose tip, and so on. | Sep 10, 2021 8:36 AM | |
Magnet Forensics | Data analysis and management | Perpetrator investigation | Canada | Law enforcement | Prosecution | www.magnetforensics.com | Magnet Forensic's AXIOM tool set uses Al, automation, advanced searching techniques, modern data visualization and more to help investigative teams find | Sep 10, 2021 8:36 AM | |
Maltego | Data analysis and management | Perpetrator investigation | South Africa | Law enforcement | Prosecution | www.paterva.com | Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between | Sep 10, 2021 8:36 AM | |
MICRO SYSTEMATION | Device extraction/search | Perpetrator investigation | Sweden | Law enforcement | Prosecution | www.msab.com | XRY is a purpose built software based solution set complete with all the necessary tools for recovering data from mobile devices in a forensically secure manner. The software is delivered through four primary platforms: MSAB Office, MSAB Field, MSAB Kiosk and MSAB Tablet. | Sep 10, 2021 8:36 AM | |
Microsoft | Image and video detection/classification | Child abuse material removal and blocking | USA | Law enforcement | Detection | news.microsoft.com | PhotoDNA for Video builds on PhotoDNA technology, bringing all the benefits of PhotoDNA to the video environment. | Sep 10, 2021 8:36 AM | |
Microsoft | Image and video detection/classification | Child abuse material removal and blocking | USA | Law enforcement | Detection | www.microsoft.com | PhotoDNA Cloud Service enables businesses to protect their assets, interests, and customers by autornaticuliy detecting and reporting the distribution of child sexual exploitation and abuse images. | Sep 10, 2021 8:36 AM | |
NetClean | Image and video detection/classification | Perpetrator investigation | Sweden | Corporations and Organizations in general | Detection | www.netclean.com | NetClein ProActive works similarly to an anti-virus program but instead of detecting a virus, ProActive detects images and videos that law enforcement agencies have classified as child sexual abuse material. | Sep 10, 2021 8:36 AM | |
NetClean | Image and video detection/classification | Child abuse material removal and blocking | Sweden | Corporations and Organizations in general | Prevention | www.netclean.com | NetClean ProTective is a technical solution used to protect business mobile devices by blocking access to URLs known to contain child sexual abuse material (CSAM). The uniquely combined and continually updated URL list, from some of the worldโs primary sources, makes it an effective protective solution. | Nov 18, 2021 10:30 AM | |
None in Three (University of Huddersfield) | Grooming detection/prevention | UK | Potential perpetrators | Prevention | www.noneinthree.org | Working in partnership with the Universidade Estadual de Londrina (UEL) and Promundo, both in Brazil, the team, led by Professor Adele Jones and Professor Patricia Tzortzopoulos, will conduct research into online child sexual exploitation and abuse (CSEA). They will use the findings to develop and evaluate โEmilioโ, an educational video game targeted specifically at young males considered to be at risk of engaging in online abusive behaviour. | Nov 25, 2021 1:52 PM | ||
Oxygen Forensic | Device extraction/search | Perpetrator prosecution | USA | Law enforcement | Prosecution | www.oxygen-forensic.com | Oxygen Forensic Detective offers data extraction from iOS, Android, Windows Phone, BlackBerry devices, feature phones, media, and SIM cards as well as cloud services and drones. The software imports numerous backups and images, including iTunes, Android and BlackBerry backups, JTAG and Chip-off images, and many others. Oxygen Forensics Detective uses several proprietary methods to bypass or disable screen locks on mobile devices, including Samsung, LG, Motorola, and Chinese chipset ones. | Sep 10, 2021 8:36 AM | |
Palantir | Data analysis and management | Perpetrator investigation | USA | Law enforcement | Prosecution | www.palantir.com | Instead of logging in to separate data systems, agents, detectives and investigators can conduct a single search for a suspect, target, or location and return data from all relevant systems. | Sep 10, 2021 8:36 AM | |
Paliscope | Data analysis and management | Perpetrator investigation | Sweden | Law enforcement | Prosecution | www.paliscope.com | Paliscope software allows users to conduct online investigations and quickly and easily collect open source data for review and analysis using third party services to correlate and find more data on the Clearnet and Darknet. | Sep 10, 2021 8:36 AM | |
Paliscope | Data analysis and management | Data management and analysis | Sweden | Law enforcement | Detection | www.paliscope.com | YOSE is an AI-driven search engine that lets you instantly track down intelligence within any file typeโeven from the largest, most unstructured stockpiles of locally stored data. | Oct 27, 2021 9:30 AM | |
Population Foundation | Text analysis/processing | Grooming detection/prevention | India | Children | Detection | engochallenge.org | Equipping adolescents with tools, information, and resources to identify and report online CSEA in India, using an artificially intelligent chatbot. | Nov 25, 2021 1:56 PM | |
Predpol | Data analysis and management | Data management and analysis | USA | Law enforcement | Prosecution | www.predpol.com | PredPol uses a machine-learning algorithm to calculate its predictions on where crimes will occur. Historical event datasets are used to train the algorithm for each new city (ideally 2 to 5 years of data). It then updates the algorithm each day with new events as they are received from the department. This information comes from the agencyโs records management system (RMS). | Sep 14, 2021 7:52 AM | |
Project VIC | Data analysis and managementImage and video detection/classification | Perpetrator investigation | USA | Law enforcement | Prosecution | projectvic.org | Project VIC is a community of investigators, victim identification specialists, application developers, scientists and strategic partners dedicated to developing and levering the newest technologies and victim-centric | Sep 12, 2021 9:00 AM | |
Project VIC International | Data analysis and management | IdentificationAgency/organization collaboration | USA | Law enforcement | Prosecution | projectvic.org | By working with local law enforcement, KATALYST will improve forensic | Nov 25, 2021 1:59 PM | |
Qumodo | Image and video detection/classification | Child abuse material removal and blocking | UK | Law enforcement | Detection | qumo.do | Vigil At automatically detects, evaluates and categorizes child sexual abuse imagery. Thu system is capable of determining the severity of the sexual act in the image (Using the legacy UK 1-5 Category SAP Scale or the current UK 3 Categories A-C). | Sep 12, 2021 9:22 AM | |
Qumodo | Image and video detection/classification | Identification | UK | Law enforcement | Prosecution | qumo.do | Qumodo Discover is a search engine for evidence. This technology uses AI to intelligently find connections within digital data at a web scale where users can query the system with an image, and it will find other images containing the same places, people, faces and objects. It has been tested with more than 100 million images and validated in a victim ID environment, with child sexual exploitation and abuse (CSEA). content | Sep 12, 2021 9:14 AM | |
Qumodo | Image and video detection/classification | Child abuse material removal and blocking | UK | Law enforcementContent moderators | ProsecutionDetection | qumo.do | Qumodo Classify is a software product which dramatically speeds up image categorization for content moderation for law enforcement purposes white reducing the psychological impact on the users, saving both time and money. This tool has been specialty designed around the latest AI technology, as well as 21 core psychology principals to form an effective Human/ AI team. As well as reducing the psychological impact on the user, the tool is designad to prevent human bias from influencing the system and creates the ability for the software to learn new abilities over time, further reducing the time needed to manually classify large amounts of data. When paired with the Vigil AI Classifier ( | Sep 12, 2021 9:14 AM | |
Rigr AI | Data analysis and managementFacial/object detection | Perpetrator investigation | Ireland | Law enforcement | Post-crime efforts | rigr.ai | Rigr specializes in deceloping custom made applications specifically enabling AI driven management of sensitive data. For further information on available applications, visit website. | Dec 22, 2023 11:19 AM | |
SafeToNet | Text analysis/processing | Grooming detection/prevention | UK | Children | Prevention | safetonet.com | SafeToNet is pioneering technology that educates children โin-the-momentโ as they use their device. It is a safeguarding assistant that helps them become responsible and safe digital citizens. | Sep 13, 2021 7:57 AM | |
Semantics 21 | Image and video detection/classification | Identification | UK | Law enforcement | Prosecution | www.semantics21.com | S21 Laseri-v is a specialist tool for the mass categorization and analysis of child sexual abuse (CSA) videos. LASERi-v (Videos) contains proprietary workflows | Sep 12, 2021 9:42 AM | |
Semantics 21 | Image and video detection/classification | Perpetrator prosecution | UK | Law enforcement | Prosecution | www.semantics21.com | S21 Laseri-t is a specialist tool for onsite (live box) and bootable (dead box) triage of laptops and computers able to detect and analyse imagery and videos. LASERi-t (Triage) contains prophet workflows and algorithms for intelligence driven search capabilities, compatibility with a wide range of intelligence sources , customisable reporting and both simple and advanced user interface modes for all tiers of users. The application is fully customisable, Project VIC premier certified and used by | Sep 12, 2021 9:36 AM | |
Semantics 21 | Image and video detection/classification | Identification | UK | Law enforcement | Prosecution | www.semantics21.com | The S2i Laseri Suite is a specialist tool for the mass categorization and analysis of child sexual abuse imagery (CSAI) and animation. LASERi-p Pictures) contains proprietary workflows and algorithms to perform victim identification and quality investigations. The application is fully customisable, Project VIC premier certified and used by police forces across the world for the investigation of child sexual abuse and other major crime types. (S21 LASERi-p (Pictures) is available as part | Sep 12, 2021 9:30 AM | |
Stop the Traffik | Data analysis and management | Perpetrator investigation | UK | Private individuals | Detection | www.stopthetraffik.org | Human trafficking is happening in plain sight all around us. Have you ever seen something that looks out of place? Does uncertainty stop you from speaking up? | Sep 14, 2021 8:05 AM | |
Stop The Traffik, IBM | Data analysis and management | Agency/organization collaboration | Canada | Child sexual abuse investigatorsLaw enforcement | Prosecution | www.stopthetraffik.org | STOP THE TRAFFIK and our long-term technology partner, IBM, have created the first ever international data hub to facilitate the sharing of information about human trafficking across all industries and sectors. The Traffik Analysis Hub (TAHub) is a partnership that includes financial institutions, NGOs, law enforcement and government agencies who are all unified by the common goal of sharing data to stop human trafficking. Using advanced cognitive technologies developed by IBM, the TAHub will facilitate the sharing of information quickly and easily and combine multiple data sets in one secure system. | Sep 14, 2021 8:51 AM | |
Suojellaan Lapsia Ry | Consumption of child abuse material prevention | Finland | Potential perpetrators | Prevention | www.end-violence.org | ReDirection is a self-help programme that works to prevent the | Nov 25, 2021 2:07 PM | ||
Swansea University | Text analysis/processing | Grooming detection/prevention | UK | Law enforcement | Detection | www.swansea.ac.uk | Tools based on integrating AI/Linguistics that enable law enforcement to spot | Nov 25, 2021 2:20 PM | |
Tech Matters | Child abuse material removal and blocking | UK | Private individualsChildren | Detection | www.end-violence.org | Customisable, open-source contact centre platform that allows children and youth to reach out to helplines via voice, SMS, webchat, WhatsApp, and Facebook Messenger if they come across CSAM | Nov 25, 2021 2:10 PM | ||
The National Center for Missing & Exploited Children (NCMEC) | Identification | USA | Law enforcement | Prosecution | www.missingkids.org | NCMEC offer the Law Enforcement Services Portal (LESP) which serves as a resource and access to several resources of NCMEC directly from the field. One feature is the Hash Query section, in which law enforcement officers in the field may query hash values from active investigations against the NCMEC system to learn if NCMEC knows the child depicted to be identified, and/or whether that hash value has been seen at NCMEC before. | Feb 14, 2022 9:22 AM | ||
The National Center for Missing & Exploited Children (NCMEC) | Child abuse material removal and blocking | USA | Social mediaContent moderators | Detection | NCMEC hosts the NGO hash sharing platform, which includes MD5 and SHA1 hash values, as well as pDNA signatures, of images and videos tagged as Child Sexual Abuse Material by NCMEC, Internet Watch Foundation and the Canadian Centre for Child Protection. These hashes and signatures are made available to ESPs and other industry partners for free, for their use in their voluntary initiatives to detect, report and remove CSAM files on their services and platforms. | Feb 14, 2022 8:52 AM | |||
The National Center for Missing & Exploited Children (NCMEC) | Data analysis and management | Perpetrator investigationAgency/organization collaboration | USA | Law enforcement | Prosecution | www.missingkids.org | NCMECโs CyberTipline is the nationโs (USAโs) centralized reporting system for the online exploitation of children. The public and electronic service providers can make reports of suspected online enticement of children for sexual acts, child sexual molestation, child sexual abuse material, child sex tourism, child sex trafficking, unsolicited obscene materials sent to a child, misleading domain names, and misleading words or digital images on the internet. | Feb 14, 2022 8:36 AM | |
Thompson Reuters, Mekong Club | Data analysis and management | Perpetrator investigation | USAGlobal | Financial institutions | Detection | www.trust.org | Toolkits is designed to help financial institutions fight human trafficking using data. | Sep 14, 2021 9:01 AM | |
Thorn | Text analysis/processing | Consumption of child abuse material prevention | USA | Child Sexual Abuse Material (CSAM) platforms | Prevention | www.thorn.org | Thorn runs the countryโs most extensive online deterrence program, communicating directly with people searching for CSAM, disrupting their sense of anonymity and encouraging them to seek help. By suggesting help resources, we aim to change behavior and increase accountability. We are constantly testing messaging, identifying the best tactics to reach and persuade specific sub-groups, and capturing aggregate data to inform future research. | Sep 13, 2021 7:50 AM | |
Thorn | Data analysis and management | Consumption of child abuse material prevention | USA | Search engine companies | Prevention | thorn-hub.com | The Keyword Hub allows technology companies to share search terms used to find child sexual abuse material (CSAM) with other companies allowing all parties to be | Sep 12, 2021 9:52 AM | |
Thorn | Data analysis and management | Identification | USA | Law enforcement | Detection | spotlight.thorn.org | Spotlight is a web-based application that helps law enforcement prioritize leads in their sex trafficking investigations. There are over 150,000 escort ads posted daily; Spotlight takes this massive amount of data and turns it into an asset for law enforcement. To date Spotlight has helped law enforcement identify an average of 8 children per day and has saved up to 60% of critical investigative time. | Sep 12, 2021 9:48 AM | |
Thorn | Image and video detection/classification | Child abuse material removal and blocking | USA | Content moderatorsSocial media | Detection | safer.io | Safer is a child sexual abuse material (CSAM) detection, review, removal and reporting pipeline. It allows small and medium sized companies to have the same CSAM fighting tools as the largest ones. | Sep 12, 2021 9:42 AM | |
Thorn | Image and video detection/classification | Child abuse material removal and blocking | USA | Law enforcement | Detection | www.end-violence.org | The programme is developing artificial intelligence classifiers, which are working on automating the detection of CSAM, creating a global standard for labeling, connecting, and organizing the world's data to help identify victims faster. | Nov 25, 2021 2:13 PM | |
Two hat | Image and video detection/classification | Child abuse material removal and blockingIdentification | Canada | Law enforcement | Detection | www.twohat.com | Cease.AI for Law Enforcement helps reduce investigator workloads and reduce mental stress by sorting, flagging and removing non-CSAM, allowing investigators to focus their efforts on new child abuse images. investigators upload case images, run their hash lists to eliminate known material, then let the AI identify, suggest a label, and prioritize images that contain previously uncatalogued CSAM. | Sep 12, 2021 9:55 AM | |
UK Home Office | Perpetrator prosecution | UK | Law enforcement | Prosecution | assets.publishing.service.gov.uk | CAID is two core databases; one is an image database to support analysing digital images and videos to support investigations. The second is a hash database that provides law enforcement with categorised image and video hashes to support CAID User Orgs when forensically examining evidence on seized devices. | Nov 26, 2021 1:53 PM | ||
University of Kent | Grooming detection/prevention | UK | Children | Prevention | www.end-violence.org | A culturally sensitive digital "serious" game that | Nov 25, 2021 2:18 PM | ||
Videntifier Technologies | Image and video detection/classification | Child abuse material removal and blockingPerpetrator prosecution | Iceland | Law enforcement | PreventionProsecution | www.videntifier.com | Large-scale video identification, which allows searching databases of videos. | Dec 8, 2021 8:30 AM | |
Web-IQ | Image and video detection/classification | Child abuse material removal and blocking | Netherlands | Law enforcement | Detection | WebIQ has developed a serverless CSA detection AI, that scans websites and hashes images, and compares the hash to know CSA images. If there is a match, an automatic Notice of Takedown is sent to the host of the server of the website. | Sep 10, 2021 8:36 AM | ||
Yoti | Data analysis and management | Grooming detection/prevention | UK | Private individualsSocial media | Prevention | www.yoti.com | Yoti is an identity platform, for identifying yourself digitally, and supports choosing what information to share and verify. For example user's can verify their age online, while not revealing other information about themselves. | Nov 2, 2021 9:08 AM | |
ZiuZ Forensic, Web-IQ, Timelex,ย DFKI, INHOPE | Image and video detection/classification | Agency/organization collaborationChild abuse material removal and blocking | Netherlands | Law enforcement | Prosecution | www.aviatorproject.com | The AviaTor project is funded by the European Union and is currently in its final phase. The project started in 2019 and will end in 2024. The project aimed to build a prioritisation tool / database for law enforcement processing NCMEC reports (also known as industry reports or Cyber tipline referrals). The AviaTor database provides law enforcement with the tooling to prioritise these reports. AviaTor stands for Augmented Visual Intelligence and Targeted Online Research โ meaning that the AviaTor database has the functionality to use visual intelligence as well as OSINT and hash matching to de-duplicate and prioritise reports. AviaTor is currently used by 19 national law enforcement agencies. | Jan 30, 2024 9:56 AM |


.png&w=1080&q=75)

