Amanda is a proactive safety platform designed to protect children in social environments by detecting grooming and making accurate profiling of age and gender. Amanda uses key stroke dynamics and metadata from chats to determine the gender and age group of users. By analyzing writing style, Amanda can identify if users are who they claim to be. Amanda also analyzes messages using methods such as stylometry, behavioral patterns, text, and image to continuously assess the risk of the conversation. This analysis results in a continuous risk score that enables real-time prioritization of potentially dangerous conversations.
Rekognition Image is an image recognition service that detects objects, scenes, and faces; extracts text; recognizes celebrities; and identifies inappropriate content in images. It also allows you to search and compare faces. Rekognition Image is based on the same deep learning technology developed by Amazon's computer vision scientists to analyze billions of images daily for Prime Photos. This service only requires users to pay for the number of images, or minutes of video,
being analyzed and the face data being stored for facial recognition_ There are no minimum fees or upfront commitmenim.
Rekognition Video is a video recognition service that extracts motion-based context from stored or live-stream videos and allows them to be analysed. It detects activities; understands the movement of people in frame: and recognizes objects, celebrities, and inappropriate content in videos stored in Amazon S3 and live video streams from Acuity.
Rekognition Video also detects persons and tracks them through the video even when their faces are not visible, or as the whole person might go in and out of the scene_ For example r this could be used in an application that sends a real time notification when someone delivers a package to your door. Rekognition Video allows you also to index metadata, like objects, activities, scene, celebrities, and faces to simply video search. With Amazon Rekognition, you only pay for the number of images, or minutes of video, you analyze and the face data you store for facial recognition. There are no minimum fees or upfront commitments.
Belkasoft Evidence Center is an all-in-one forensic solution for acquiring, locating, extracting, and analyzing digital evidence stored inside computers and mobile devices, RAM and cloud. The tool kit extracts digital evidence from multiple sources by analysing hard drives, drive images, cloud, memory dumps, iOS, Blackberry
and Android backups. Graykey, UFED, OFB, Elcomsoft, JTAG md chip-off dumps. Evidence Centre analyses the dat:a source and lays ouc the most forensically important artefacts for an investigator to review.
FTK is a database driven solution that processes and indexes large amounts of data up-front to allow efficient filtering and searching. Users interact with FTK via a web interface which allows them to conduct computer
forensic investigations. The product provides file filtering, search functionality and access to remote systems on the network as well as helps law enforcement, corporate security and IT professionals locate, analyze and evaluate the evidentiary value of files, folders and computers
Clearview AI acts as a search engine of publicly available images – now more than ten billion -- to support investigative and identification processes by providing for highly accurate facial recognition across all demographic groups. Similar to other search engines, which pull and compile publicly available data from across the Internet into an easily searchable universe, Clearview AI compiles only publicly available images from across the Internet into a proprietary image database to be used in combination with Clearview AI's facial recognition technology. When a Clearview AI user uploads an image, Clearview AI’s proprietary technology processes the image and returns links to publicly available images that contain faces similar to the person pictured in the uploaded image.
The National Center for Missing & Exploited Children (NCMEC)
NCMEC offer the Law Enforcement Services Portal (LESP) which serves as a resource and access to several resources of NCMEC directly from the field. One feature is the Hash Query section, in which law enforcement officers in the field may query hash values from active investigations against the NCMEC system to learn if NCMEC knows the child depicted to be identified, and/or whether that hash value has been seen at NCMEC before.
CRIS is the internal image and video file catalog used by NCMEC's Child Victim Identification Program. This system allows analysts to review and tag files in bulk in support of prosecution efforts, notating which files contain children identified through previous law enforcement investigations. In addition, this tool assists the analysts in linking files and cases in support of victim identification efforts.
The National Center for Missing & Exploited Children (NCMEC)
NCMEC hosts the NGO hash sharing platform, which includes MD5 and SHA1 hash values, as well as pDNA signatures, of images and videos tagged as Child Sexual Abuse Material by NCMEC, Internet Watch Foundation and the Canadian Centre for Child Protection. These hashes and signatures are made available to ESPs and other industry partners for free, for their use in their voluntary initiatives to detect, report and remove CSAM files on their services and platforms.
As part of our Survivor Services program, NCMEC provides an exploitative hash sharing list, which includes MD5 and SHA1 hash values, as well as pDNA signatures, of images and videos tagged as "exploitative" by NCMEC. These files, which not illegal under federal guidelines, depict, support, and/or promote the exploitation of victims that are seen in associated CSAM files. These hashes and signatures are made available to ESPs and other industry partners for use in their voluntary initiatives to detect, report and remove files in support of survivors' privacy and protection.
NCMEC hosts the Industry Hash Sharing Platform, which includes MD5 and SHA1 hash values, as well as pDNA signatures, of images and videos tagged as Child Sexual Abuse Material, which is shared by industry themselves. These hashes and signatures are made available by ESP's to other ESPs and other industry partners for use in their voluntary initiatives to detect, report and remove CSAM files.
NCMEC's Hash Sharing Platform is the infrastructure and technical system which hosts the NGO CSAM, Industry and NCMEC Exploitative hash lists. This technical system supports the file information, hashes and signatures, and file tags to allow for these robust sharing initiatives.
The National Center for Missing & Exploited Children (NCMEC)
NCMEC’s CyberTipline is the nation’s (USA’s) centralized reporting system for the online exploitation of children. The public and electronic service providers can make reports of suspected online enticement of children for sexual acts, child sexual molestation, child sexual abuse material, child sex tourism, child sex trafficking, unsolicited obscene materials sent to a child, misleading domain names, and misleading words or digital images on the internet.
Through funding from Facebook, NCMEC offers the Case Management Tool (CMT) for domestic and international law enforcement who receive and investigate CyberTipline reports. The CMT allows users to triage, query, organize and refer CyberTipline reports within this web-based interface.
NCMEC's Law Enforcement Agency Web Services (LEAWS) allows law enforcement around the world access to CyberTipline report data. This back-end infrastructure allows report data to be ingested by case management tools to allow quicker access, triage and response.
NCMEC's ISP Web Services (ISPWS) allows companies around the world report directly to the CyberTipline. This back-end infrastructure allows for easier and automated reporting by companies around the world taking a stand against child sexual exploitation. While companies based in the US are required by law to report to the CyberTipline, any global company may and is welcome to report to the CyberTipline to better protect children and users on their platforms and services.
As part of the CyberTipline response process, NCMEC notifies companies and providers when they are hosting CSAM and no suspect or offender is identified. Our analysts use a specialized interface to send notices daily, calling for these providers to remove the content and it includes a follow-up check to ensure the content has in fact been taken down. In 2021, NCMEC sent over 100,000 notices to companies to remove content from their hosting sites.
Large-scale video identification, which allows searching databases of videos.
Videntifier TM Forensic, radically improves the forensic video identification process, by providing law enforcement agencies with a robust, fast and easy-to-use video identification system. Using this ser-vice, a single mouse-click is sufficient to automatically scan an entire storage device and classify all videos.
What you should know about this new anti-grooming technique
Technology is a powerful tool—one we can decide to use to keep children safe online.
At Thorn, we believe in building a world where children can interact with technology and remain safe, curious, and happy. Building that world will take a variety of solutions, and working together with partners like Microsoft, Roblox, and The Meet Group we’ve recently taken another step forward.
You may have heard it called Project Artemis. While this is a term often associated with the tool, it was actually originally intended to only be used as a codename for internal purposes. To avoid confusion we won’t refer to this new anti-grooming tool as Project Artemis moving forward.
But that certainly doesn’t make it any less significant: This is a first-of-its-kind technique that can detect the online grooming of children, helping organizations to disrupt and report it when and where it happens.
HashCheckServer is a tool for hosting providers to prevent the uploading of known child sexual exploitation material.
To prevent the uploading of known child sexual exploitation material, hosting parties needed to be part of the solution as they provide one of the gateways to publishing CSAM.
Based on this knowledge, EOKM took the initiative to help hosting parties to prevent the uploading of known CSAM and to identify existing material on their servers so that it can be deleted. Following this initiative, EOKM asked Web-IQ to develop software that allows hosting parties to check whether an image appears in the police’s database of known CSAM.
Rather than waiting for Project Arachnid to detect material and send a notice, industry can use Shield by Project Arachnid to quickly detect known CSAM on their service, which will, in turn, speed up its removal.
Industry members that do not wish to interact directly with Shield by Project Arachnid can register their service/domain with the Canadian Centre to have any notices sent directly to them instead of being sent to their hosting provider.
Other industries, such as filtering providers, can download real-time lists of URLs that are believed to currently contain CSAM for filtering purposes.
CAID is two core databases; one is an image database to support analysing digital images and videos to support investigations. The second is a hash database that provides law enforcement with categorised image and video hashes to support CAID User Orgs when forensically examining evidence on seized devices.
Our International Child Sexual Exploitation (ICSE) image and video database is an intelligence and investigative tool, which allows specialized investigators to share data on cases of child sexual abuse.
Using image and video comparison software, investigators are instantly able to make connections between victims, abusers and places. The database avoids duplication of effort and saves precious time by letting investigators know whether a series of images has already been discovered or identified in another country, or whether it has similar features to other images.
It also allows specialized investigators from more than 64 countries to exchange information and share data with their colleagues across the world.
By analysing the digital, visual and audio content of photographs and videos, victim identification experts can retrieve clues, identify any overlap in cases and combine their efforts to locate victims of child sexual abuse.
Tools based on integrating AI/Linguistics that enable law enforcement to spot
online grooming content in real-time. The project will impart specialist knowledge
through a learning portal and chatbot to strengthen professionals’ abilities to shield
children from online grooming.
The programme is developing artificial intelligence classifiers, which are working on automating the detection of CSAM, creating a global standard for labeling, connecting, and organizing the world's data to help identify victims faster.
ReDirection is a self-help programme that works to prevent the
consumption of CSAM on the Dark Web, which builds on the Finnish government’s
accredited New Direction rehabilitation programme for sex offenders. The project will
also reveal new information about these searchers and their pathways to CSAM
access and use by providing targeted support for these individuals.
By working with local law enforcement, KATALYST will improve forensic
and victim identification capabilities, and facilitate collaboration between national law
enforcement teams and international partners to ensure the safety of children online.
Working in partnership with the Universidade Estadual de Londrina (UEL) and Promundo, both in Brazil, the team, led by Professor Adele Jones and Professor Patricia Tzortzopoulos, will conduct research into online child sexual exploitation and abuse (CSEA). They will use the findings to develop and evaluate ‘Emilio’, an educational video game targeted specifically at young males considered to be at risk of engaging in online abusive behaviour.
The game will aim to head off potential online CSEA at its roots by addressing its underlying drivers among those most amenable to change, the young. Because young people are still developing, it is easier to help them modify their thinking patterns and to make the link between emotion and behaviour; essential for violence prevention.
INTERPOL will bring the most advanced technology to investigators of online CSEA through its new DevOps Group Project. The initiative will facilitate research and development by an expert group of investigators, non-governmental organisations, academia, and information technology companies, and extend solutions to specialised officers worldwide via INTERPOL’s secure channels. Headquartered in France, this project has a global reach.
International Association of Internet Hotlines (INHOPE)
The ESCAPE project, funded by End Violence Against Children (EVAC) represents INHOPE's vision to put an eco-system in place ensuring that every industry stakeholder and each member of the public around the globe has the option and awareness to report child sexual abuse material (CSAM) encountered online.
Developing automation and intelligence tools for faster classification of CSAM
reporting. CSAM will be removed as soon as possible, preventing further circulation
and re-victimisation of children.
Interactive, accessible digital platform to help deaf children stay
safe from online abuse and exploitation. Through educational games, children will
learn to protect themselves from online risks, e.g. exploring what an inappropriate
chat conversation might look like, the warning signs of abusers.
Automating the handling of evidence –including chat logs, data and videos – for live streaming abuse cases. Because mobile applications are often used to share CSAM and groom children, this solution will also help collect data against suspects with a sexual interest in children.
NetClean ProTective is a technical solution used to protect business mobile devices by blocking access to URLs known to contain child sexual abuse material (CSAM). The uniquely combined and continually updated URL list, from some of the world’s primary sources, makes it an effective protective solution.
Yoti is an identity platform, for identifying yourself digitally, and supports choosing what information to share and verify. For example user's can verify their age online, while not revealing other information about themselves.
Krunam provides breakthrough technology that identifies and classifies previously unknown CSAM images and video at scale. Our CSAM classifier protects your online community, your employees, your brand’s reputation, and, last but not least, millions of children around the world.
Toolkits is designed to help financial institutions fight human trafficking using data.
The Toolkit, tailored for use in the Asia Pacific region, includes a set of ‘red flags’ - potential indicators of modern slavery - linked to suspicious patterns in financial transactions, customer data and behaviour. It also includes contextual information and case studies to widen the financial service sectors’ understanding of this multi-faceted crime.
STOP THE TRAFFIK and our long-term technology partner, IBM, have created the first ever international data hub to facilitate the sharing of information about human trafficking across all industries and sectors. The Traffik Analysis Hub (TAHub) is a partnership that includes financial institutions, NGOs, law enforcement and government agencies who are all unified by the common goal of sharing data to stop human trafficking. Using advanced cognitive technologies developed by IBM, the TAHub will facilitate the sharing of information quickly and easily and combine multiple data sets in one secure system.
IBM has donated a significant grant to make this a reality and will use AI technology to quickly analyse and process volumes of data from a variety of sources; while ensuring its security and integrity.
Global Emancipation Network is excited to announce the latest counter-trafficking tool in our arsenal: Artemis. We teamed up with our friends at Splunk, Accenture, and Graphistry to produce a first-of-its-kind trafficking content classifier. Artemis is a proactive, automated solution for counter-human trafficking stakeholders to increase efficiency in investigations and disruptions by identifying high-risk establishments, individuals, and content. Our initial pilot focused on the illicit massage industry, categorizing massage businesses based on customer activity, staffing, location, services offered, imagery, and disciplinary actions. Using this data and advanced analytics, we created risk scores and tiers for targeted action.
Global Emancipation Network grants Minerva access to organizations with valid counter-trafficking missions in order to host and explore millions of trafficking-related data records and use customized search, alerting, geo-location and other platform capabilities. Using Splunk Enterprise and third-party integrated technologies, Minerva protects case-sensitive information and monitors usage patterns to help keep user information private, safe and secure. Leading public, private and nonprofit organizations have already been accepted to the platform as early users.
Minerva is equipped with data-processing capabilities to extract and organize information from a variety of data sources.
Capabilities include:Advertisement analysis: Analyzes advertisements from the deep and open web, where most trafficking cases originate, and extracts data such as user, location, account and other identifying information.
Image processing tools: Processes images of victims to reduce the time users spend analyzing photographs and manually linking them to advertisements. Minerva integrates image analysis tools to tag photographs with characteristics to expedite database search, and reverse image search to identify similar images.
Text analysis tools and natural language processing: Extracts text in images from advertisements and flags correlations with missing persons reports and other valuable information.
Multi-tenant system informing trend analysis: Allows all Minerva users to store their information securely on the same database at the same time, enabling secure, multi-agency collaboration on shared investigations.
Human trafficking is happening in plain sight all around us. Have you ever seen something that looks out of place? Does uncertainty stop you from speaking up?
Every human trafficking story, no matter how long or short, whether current or historic, is important and relevant. It may be the missing piece of the puzzle, contributing to a larger and more accurate picture of human trafficking, which can then inform efforts to combat it. Technology places the power to prevent into the hand of a person who holds a mobile device.
The STOP APP can be downloaded by anyone, anywhere in the world who has access to a smartphone. The app is anonymous, confidential and secure – it is available in seven languages and allows you to submit suspicious activity quickly by sending text based messages and uploading photos and videos.
Crisp delivers complete intelligence for Trust & Safety and Policy teams on the individuals and groups manipulating social media, video sharing, gaming, dating, review, and other specialty platforms by providing:
Crip infiltrates bad actors "from the outside in" across the surface, deep, and dark web to gather intelligence. The AI uses the information to predict what they will do, so platforms have actionable intelligence to prevent child endangerment.
PredPol uses a machine-learning algorithm to calculate its predictions on where crimes will occur. Historical event datasets are used to train the algorithm for each new city (ideally 2 to 5 years of data). It then updates the algorithm each day with new events as they are received from the department. This information comes from the agency’s records management system (RMS).
PredPol uses ONLY 3 data points – crime type, crime location, and crime date/time – to create its predictions. No personally identifiable information is ever used. No demographic, ethnic or socio-economic information is ever used. This eliminates the possibility for privacy or civil rights violations seen with other intelligence-led policing models.
Using a predictive analytics model that builds assessments after amassing historical data, Eckerd used RSF to identify the children who could only be returned to their parents with a heightened level of scrutiny by caseworkers.
Freedom Signal is an online platform to help advocates develop ongoing relationships with through texting.
We enable direct service organizations to send targeted text-based outreach to potential victims identified through web scraping. When a potential victim replies, it enables advocates to build trust with vulnerable populations in acute crisis.
Freedom Signal’s outreach technology was designed by software engineers and survivors of online sex trafficking to address the specific needs of this population, while ensuring a safe, direct channel of communication.
SafeToNet is pioneering technology that educates children “in-the-moment” as they use their device. It is a safeguarding assistant that helps them become responsible and safe digital citizens.
Its power lies in a smart keyboard that detects risks in real-time. It steers children away from trouble by filtering harmful outgoing messages before they can be sent and any damage can be done.
SafeToNet helps prevent sexting, bullying, abuse and aggression.
Thorn runs the country’s most extensive online deterrence program, communicating directly with people searching for CSAM, disrupting their sense of anonymity and encouraging them to seek help. By suggesting help resources, we aim to change behavior and increase accountability. We are constantly testing messaging, identifying the best tactics to reach and persuade specific sub-groups, and capturing aggregate data to inform future research.
Cease.AI for Law Enforcement helps reduce investigator workloads and reduce mental stress by sorting, flagging and removing non-CSAM, allowing investigators to focus their efforts on new child abuse images. investigators upload case images, run their hash lists to eliminate known material, then let the AI identify, suggest a label, and prioritize images that contain previously uncatalogued CSAM.
Spotlight is a web-based application that helps law enforcement prioritize leads in their sex trafficking investigations. There are over 150,000 escort ads posted daily; Spotlight takes this massive amount of data and turns it into an asset for law enforcement. To date Spotlight has helped law enforcement identify an average of 8 children per day and has saved up to 60% of critical investigative time.
S21 Laseri-v is a specialist tool for the mass categorization and analysis of child sexual abuse (CSA) videos. LASERi-v (Videos) contains proprietary workflows
and algorithms to perform victim identification and investigation. The application is fully customisable, Project VIC premier certified and used by Police forces across the world for the investigation of child sexual abuse and other major crime types. (S2i LASERi-v (Videos) is available as part of the S2i LASERi suite).
S21 Laseri-t is a specialist tool for onsite (live box) and bootable (dead box) triage of laptops and computers able to detect and analyse imagery and videos. LASERi-t (Triage) contains prophet workflows and algorithms for intelligence driven search capabilities, compatibility with a wide range of intelligence sources , customisable reporting and both simple and advanced user interface modes for all tiers of users. The application is fully customisable, Project VIC premier certified and used by
Police forces across the world for the investigation of child sexual abuse and other major crime types. (S21 LASERi-t Triage) is available as part of the S21 LASERi suite).
The S2i Laseri Suite is a specialist tool for the mass categorization and analysis of child sexual abuse imagery (CSAI) and animation. LASERi-p Pictures) contains proprietary workflows and algorithms to perform victim identification and quality investigations. The application is fully customisable, Project VIC premier certified and used by police forces across the world for the investigation of child sexual abuse and other major crime types. (S21 LASERi-p (Pictures) is available as part
of the S21 LASERi suite).
Vigil At automatically detects, evaluates and categorizes child sexual abuse imagery. Thu system is capable of determining the severity of the sexual act in the image (Using the legacy UK 1-5 Category SAP Scale or the current UK 3 Categories A-C).
The tool is available as part of Qumodo Classify, via a Cloud API or via a stand alone API for tools such as Griffeye Analyze. The tool scales linearly and can categorize millions of images per hour
Qumodo Discover is a search engine for evidence. This technology uses AI to intelligently find connections within digital data at a web scale where users can query the system with an image, and it will find other images containing the same places, people, faces and objects. It has been tested with more than 100 million images and validated in a victim ID environment, with child sexual exploitation and abuse (CSEA). content
Qumodo Classify is a software product which dramatically speeds up image categorization for content moderation for law enforcement purposes white reducing the psychological impact on the users, saving both time and money. This tool has been specialty designed around the latest AI technology, as well as 21 core psychology principals to form an effective Human/ AI team. As well as reducing the psychological impact on the user, the tool is designad to prevent human bias from influencing the system and creates the ability for the software to learn new abilities over time, further reducing the time needed to manually classify large amounts of data. When paired with the Vigil AI Classifier (vigil.ai) it becomes a powerful tool in the fight against child sexual exploitation and abuse (CSEA) content.
Project VIC is a community of investigators, victim identification specialists, application developers, scientists and strategic partners dedicated to developing and levering the newest technologies and victim-centric
methods of investigation to improve success rate in rescuing victims of child sexual exploitation and trafficking.
Proiect VIC has co-created an ecosystem of shared
and standardized technologies specifically chosen to combat crimes involving massive amounts of images and video.
Data from these respective technologies is processed using the Project VAC Cloud and redistributed back to the greater community working on crimes against children.
The following tools are part of the Project VIC ecosystem:
Project VIC Hash Cloud Provided by Project VIC International and Hubstream Inc. hosts over 65 million CSAM and non CSAM hashes- Access encryption
Provided by Project VIC.
PhotoDNA for Images by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC
PhotoDMA for Video by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC
Ft Video Fingerprinting by Friend MTB is made available to law enforcement through a sub-license agreement to Project VIC LLC.
VICS-Odata Model Licensing is made available to law enforcement through a sub-license agreement with Project VIC LLC
international Image Classifies Standard- (IC-3) Machine Learning Modelling is made available through Project VIC International
Global Alert System- ViC5 Exif Matching across global platforms to identify similarities in imagery for Victim Identification. License included with ViC5
XRY is a purpose built software based solution set complete with all the necessary tools for recovering data from mobile devices in a forensically secure manner. The software is delivered through four primary platforms: MSAB Office, MSAB Field, MSAB Kiosk and MSAB Tablet.
MSAB Office is the all-purpose forensic system from MSAB, offering the entire XRY product solution in a single package. With MSAB Office you can go deeper
into a mobile device to recover vital data with a choice
of Logical, Physical, Cloud, PinPoint and Drone recovery tools for all supported devices. The Office kit works on a PC to produce a secure forensic report containing dat extractions from mobile handsets. MSAB Office allows investigators to access alI possible methods to recover data from a mobile device through XAMN Spotlight, or perform deeper analysis which can be done with XAMI\ Horizon.
For organisations who wish to perform digital forensics out of the office environment MSAB Field is a field kit that utilises XRY software, XAMN Spotlight for laptops with deeper analysis performed using XAMN Horizon.
For a turnkey forensic solution MSAB Kiosk and MSAB Tablet (touch screen version) are all inclusive hardware and software solutions designed for first responders
where mobile data recovery is only one part of the job. These products utilise custom built XRY software and are co1nplete hard\vare solutions with all the tools necessary for recovering data from mobile devices in a forensically secure manner.
LACE enables investigators to extract more visual data and efficiently categorize vast amounts of image and video data from confiscated devices using
zero false positive visual matching, dramatically reducing (typical 90% case reduction) the time and resources required to bring a case to court. LACE is compatible
with international standards for sharing metadata and hash signatures like ICSE, ProjectVic md UK-CAID.
LACE Standalone Carver is software used for carving pictures and videos from any digital forensically sound manner. The LACE FORENSIC CARVER recognizes over 180 file types covering image, video, text documents, archive, and database files. Using this light tool, forensic experts will be able to extract
evidence and import it using the JSON standard in to all the various tools they choose to use to analyse and review the evidence.
The Content Safety API sorts through many images and prioritizes the most likely child sexual abuse material (CSAM) content for review. The classifier can target
content that has not been previously confined as CSAM.
Hubstream lntelligence is a customizable web application for understanding and taking appropriate action on investigative data. Data from online and off-line sources becomes integrated with a user's
overall intelligence capability. Through smart linking, modern visualization and analytic techniques, as well as actionable dashboards, users can more quickly drive investigative leads through mission-critical workflows.
The software helps drive operations and triage process national and international case referrals, victim identification workflows, and automated intelligence gathering from open source and proprietary intelligence.
Child Rescue Coalition is a partnership of child exploitation investigators, police officers, digital forensic experts. prosecutors, child welfare agencies, and corporate and private philanthropy who work together to apprehend and convict abusers of children, rescue those in harm's way, and importantly, seek to prevent abuse from happening in the first place. At its core is technology that identifies, monitors, and ranks the online criminal behavior of child predators on peer-to-peer file-sharing and chat networks.
The Internet Watch Foundation and Netsweeper Hash List is a collaboration between the two organisations to block and filter child sexual abuse material (CSAM) on the internet.
No primary market. Nesweeper is taking hashes and sending suspected URLs to IWF.
Luxand's technology detects facial features quickly and reliably. The SOK processes an image, detect-s human faces within it, and returns the coordinates of 70 facial feature points including eyes, eye contours, eyebrows, Iip contours, nose tip, and so on.
The Internet Watch Foundation's Hash List is a hash database of known child sexual abuse material (CSAM) available for service providers to automatically match known images before they appear on a service and remove illegal images already on services.
Magnet Forensic's AXIOM tool set uses Al, automation, advanced searching techniques, modern data visualization and more to help investigative teams find
digital evidence and understand the story it is telling.
NetClein ProActive works similarly to an anti-virus program but instead of detecting a virus, ProActive detects images and videos that law enforcement agencies have classified as child sexual abuse material.
TraffickCam allows anyone with a smartphone to fight sex trafficking when they travel by uploading photos of hotel rooms to a law enforcement database. Photos
uploaded to the free TraffickCam app are added to an enormous database of hotel room images. Federal, state and local law enforcement securely submit photos of hotel rooms used in the advertisement of sex trafficking victims to TraffickCam. Features such as patterns in the carpeting, furniture, room accessories and window views are matched against the database of traveler images to provide law enforcement with a list of potential hotels where the photo may have been taken to identify location of victims.
IBM i2 Analyst's Notebook is a visual analysis tool that helps turn data into intelligence. The solution provides features such as connected network visualizations, social network analysis, and geospatial or temporal views to help users uncover hidden connections and patterns in data. These insights aid in identifying and disrupting criminal, cyber and fraudulent threats.
Instead of logging in to separate data systems, agents, detectives and investigators can conduct a single search for a suspect, target, or location and return data from all relevant systems.
Palantir Gotham featres intuitive, user-friendly interface backed by powerful data integration software providing access to art available information related to an investigation in one place.
Data is secured at a granular level (down to individual attributes describing each piece of data), ensuring that users can only see information for which they are authorized. Users can also collaborate on investigations and share information.
Palantir Gotham can integrate data in any format, including existing case management systems, evidence management systems, arrest records, warrant data, subpoenaed data, record managements system (RSS) or other crime-reporting data, Computer- Aided Dispatch (CAD) data, federal repositories, gang intelligence, suspicious activity reports, Automated License Plate Reader (ALPR) data, and unstructured dat such as'document repositories and emails.
Access restrictions can be applied broadly based on the data source, or granularly, down to individually securing attributes and metadata (e.g., a building's
address or the timestamp associated with a photograph) These permissions govern how users access data All interactions, including searching, viking, and editing data, are recorded in a tamper-evident audit log.
Neula provides an automated application for locating deleted child abuse content on digital devices.The recovery of deleted files is one of the greatest challenges to effectively prosecuting the abusers of children, many of whom eliminate evidence by deleting large quantities of contraband over time. Forensic analysts can sometimes locate and reconstruct a small percentage of the offending files, but this process is extremely painstaking and time-consuming. Neula provides better insight into the true extent of an individual's criminal behavior,
specifically the extent to which they pose a present or
future risk to children
Cleanfeed Canada blocks customer access to known non-Canadian websites that are hosting child pornography to reduce Canadian's exposure to child abuse images and create a disincentive for those who access and distribute child pornography.
Analyze Collaboration Server is a central repository for storing and sharing information. Analyze Collaboration Server Enterprise enables organizations to store and access all the relevant material they have ever collected. The software facilitates image and video processing via a custom user interface, allowing investigators to work with a central store of case data. The Griffeye AI is made up of two core solutions: The CSA classifier, which has been trained on real CSA case data, and the Object classifier, which can detect various objects and details in images.
WebIQ has developed a serverless CSA detection AI, that scans websites and hashes images, and compares the hash to know CSA images. If there is a match, an automatic Notice of Takedown is sent to the host of the server of the website.
Oxygen Forensic Detective offers data extraction from iOS, Android, Windows Phone, BlackBerry devices, feature phones, media, and SIM cards as well as cloud services and drones. The software imports numerous backups and images, including iTunes, Android and BlackBerry backups, JTAG and Chip-off images, and many others. Oxygen Forensics Detective uses several proprietary methods to bypass or disable screen locks on mobile devices, including Samsung, LG, Motorola, and Chinese chipset ones.
The program automatically finds passwords to encrypted backups and images by using brute -force, dictionary, Xieve, and other attacks.
IWF has a project to develop chatbot technology to engage with individuals searching for CSAM, encouraging them to seek help to change. IWF’s chatbot will be deployed in a targeted manner on platforms known by IWF to be used by individuals seeking or at risk of accessing CSAM and engage with them in order to signpost to LFF resources.
Paliscope software allows users to conduct online investigations and quickly and easily collect open source data for review and analysis using third party services to correlate and find more data on the Clearnet and Darknet.
Findings can be reported and secured with an audit log. Paliscope also provides an easy-to-use OSINT browser with integrated tools to elicit optimal results
CameraForensics is an online portal allowing users to search for other images on the internet taken with a particular camera to support victim identification investigations. This tool also supports searching geographically for similar and identical images and for various metadata elements. All with the intent of helping investigators link covert and overt (public) personas on the internet. The tool is available via an online user interface and also via a number of products such as Griffeye Analyze, or as a fully integrated solution for agency or country-level databases (via API).
i2 iBridge connects to select enterprise databases with search/query capabilities to return analysis-ready data. i2 information Exchange for Analysis Search for Analyst's Notebook connects to/searches multiple sources at once to retrieve analysis-ready data.
Hubstream Intelligence Fabric is an automation and data sharing service that powers national and international collaboration and distribution of mission-critical
data sets. The service uses scalable and secure cloud technologies to allow massive scale collaboration and fast communication of changes to data sets used by forensics investigators. It is used internationally to track hundreds of millions of data points and is used by tens of thousands of users.
Project Arachnid is a platform for reducing the availability of child sexual abuse material (CSAM) which includes crawling the internet for known CSAM using digital fingerprints as well as providing an API for industry members to improve upon and accelerate the detection of this harmful material on their own networks.
Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between
pieces of information from various sources located on the Internet.