☰
  • Home
  • About Stella Polaris
    • Introduction to AI and Child Sexual Abuse
    • About Childhood
    • About Stella Polaris
  • Reports and Articles
    • All Reports
    • Research papers on Child Sexual Abuse and AI
    • Reports by Childhood
  • Common AI Technologies
    • Natural Language Processing
    • Data Analysis
    • Machine Learning
    • Deep Learning
    • Neural Networks
    • Robotics
    • Computer Vision
  • Digital Tools Database
  • Contact Us
  • Support Us!

Forensic Toolkit (FTK)

Purpose
🕵️‍♀️Perpetrator investigation🗃️Data management and analysis
Technology
📊Data analysis and management
Crime Phase
⚖️Prosecution
Description

FTK is a database driven solution that processes and indexes large amounts of data up-front to allow efficient filtering and searching. Users interact with FTK via a web interface which allows them to conduct computer forensic investigations. The product provides file filtering, search functionality and access to remote systems on the network as well as helps law enforcement, corporate security and IT professionals locate, analyze and evaluate the evidentiary value of files, folders and computers

Organization

Access Data Group

Target group/intended user
Law enforcement
Status
In use
Website
https://www.exterro.com/forensic-toolkit
Country of Origin
🇺🇸USA
Date tool added to database
Aug 19, 2022 12:33 PM
Other tags
Stella Polaris Knowledge Center
Stella Polaris Knowledge Center
Stella Polaris Knowledge Center
Stella Polaris Knowledge Center

Other tools in database

All Digital Tools

“Serious game for a serious issue”
“Serious game for a serious issue”
🇬🇧UK

University of Kent

Amanda
Amanda
🌍Global

Aiba AI

🔠Text analysis/processing
Analyst's Notebook
Analyst's Notebook
🇬🇧UK

IBM i2

📊Data analysis and management
Analyze Collaboration Server
Analyze Collaboration Server
🇸🇪Sweden

Griffeye

📊Data analysis and management
Analyze D1
Analyze D1
🇸🇪Sweden

Griffeye

🖼️Image and video detection/classification
Artemis
Artemis
🌍Global

Global Emancipation Network

📊Data analysis and management
Aselo: Bringing Modern Technology to Child Helplines
Aselo: Bringing Modern Technology to Child Helplines
🇬🇧UK

Tech Matters

AviaTor Project
AviaTor Project
🇳🇱Netherlands

ZiuZ Forensic, Web-IQ, Timelex, DFKI, INHOPE

🖼️Image and video detection/classification
BlueBear Lace
BlueBear Lace
🇨🇦Canada

BlueBear

🖼️Image and video detection/classification
Camera Vision
Camera Vision
🇺🇸USA🌍Global

Facebook

🖼️Image and video detection/classification
CameraForensics
CameraForensics
🇬🇧UK

CameraForensics

🔎Facial/object detection
Cease.AI
Cease.AI
🇨🇦Canada

Two hat

🖼️Image and video detection/classification
Child Abuse Image Database (CAID)
Child Abuse Image Database (CAID)
🇬🇧UK

UK Home Office

Child Protection System
Child Protection System
🇺🇸USA

Child Rescue Coalition

📊Data analysis and management
Cleanfeed Canada
Cleanfeed Canada
🇨🇦Canada

Cybertip Canada

📊Data analysis and management
Clearview AI
Clearview AI
🇺🇸USA

Clearview AI

🔎Facial/object detection
Content Safety API
Content Safety API
🇺🇸USA🌍Global🇨🇭Switzerland

Google

🖼️Image and video detection/classification
CPORT
CPORT
🇳🇱Netherlands

Interpol, Inspectoratul General AL Politiei, ZiuZ Visual Intelligence, NCIS Norway

🖼️Image and video detection/classification
CSAI Match
CSAI Match
🇺🇸USA🌍Global

Google/Youtube

🖼️Image and video detection/classification
CyberTipline
CyberTipline
🇺🇸USA

The National Center for Missing & Exploited Children (NCMEC)

📊Data analysis and management
DeafKidz Defenders
DeafKidz Defenders
🇬🇧UK

DeafKidz International

Deterrence
Deterrence
🇺🇸USA

Thorn

🔠Text analysis/processing
DevOps Group Project
DevOps Group Project
🌍Global

Interpol

Digital evidence extraction
Digital evidence extraction
🇺🇸USA

Belkasoft Evidence Center

💻Device extraction/search
eGlyph
eGlyph
🇺🇸USA

Dartmouth College

🖼️Image and video detection/classification
Emilio
Emilio
🇬🇧UK

None in Three (University of Huddersfield)

EOKM HashCheckServer
EOKM HashCheckServer
🇳🇱Netherlands

EOKM and Web-IQ

🖼️Image and video detection/classification
ESCAPE
ESCAPE
🇳🇱Netherlands

International Association of Internet Hotlines (INHOPE)

Europol Platform for Experts
Europol Platform for Experts
🇪🇺Europe

Europol

Forensic Toolkit (FTK)
Forensic Toolkit (FTK)
🇺🇸USA

Access Data Group

📊Data analysis and management
Global child abuse material classifier development programme
Global child abuse material classifier development programme
🇺🇸USA

Thorn

🖼️Image and video detection/classification
Hash List
Hash List
🌍Global

Internet Watch Foundation (IWF)

Hash list IWF and NetSweeper
Hash list IWF and NetSweeper
🌍Global

Internet Watch Foundation (IWF) and NetSweeper

Hubstream Intelligence
Hubstream Intelligence
🇺🇸USA

Hubstream

📊Data analysis and management
Hubstream Intelligence Fabric
Hubstream Intelligence Fabric
🇺🇸USA

Hubstream

📊Data analysis and management
Hunch.ly
Hunch.ly
🇨🇦Canada

Hunch.ly

📊Data analysis and management
i2 iBridge
i2 iBridge
🇬🇧UK

IBM i2

📊Data analysis and management
ICSE database
ICSE database
🌍Global

Interpol

🖼️Image and video detection/classification
KATALYST
KATALYST
🇺🇸USA

Project VIC International

📊Data analysis and management
Krunam
Krunam
🇺🇸USA

Krunam

🖼️Image and video detection/classification
LESP's Hash Query
LESP's Hash Query
🇺🇸USA

The National Center for Missing & Exploited Children (NCMEC)

LIBRA serverless image detection
LIBRA serverless image detection
🇳🇱Netherlands

Web-IQ

🖼️Image and video detection/classification
Luxan Face SDK
Luxan Face SDK
🇺🇸USA

Luxan

🔎Facial/object detection
Magnet AXIOM
Magnet AXIOM
🇨🇦Canada

Magnet Forensics

📊Data analysis and management
Maltego
Maltego
🇿🇦South Africa

Maltego

📊Data analysis and management
Minerva
Minerva
🌍Global

Global Emancipation Network

📊Data analysis and management🖼️Image and video detection/classification
MSAB Mobile Forensics
MSAB Mobile Forensics
🇸🇪Sweden

MICRO SYSTEMATION

💻Device extraction/search
NCMEC Hash Sharing Platform
NCMEC Hash Sharing Platform
🇺🇸USA

The National Center for Missing & Exploited Children (NCMEC)

NetClean Proactive
NetClean Proactive
🇸🇪Sweden

NetClean

🖼️Image and video detection/classification
NetClean Protective
NetClean Protective
🇸🇪Sweden

NetClean

🖼️Image and video detection/classification
Neula
Neula
🇺🇸USA

Child Rescue Coalition

💻Device extraction/search
Oxygen Forensic Detective
Oxygen Forensic Detective
🇺🇸USA

Oxygen Forensic

💻Device extraction/search
Palantir Gotham
Palantir Gotham
🇺🇸USA

Palantir

📊Data analysis and management
Paliscope
Paliscope
🇸🇪Sweden

Paliscope

📊Data analysis and management
PhotoDNA
PhotoDNA
🇺🇸USA

Microsoft

🖼️Image and video detection/classification
PhotoDNA for Video
PhotoDNA for Video
🇺🇸USA

Microsoft

🖼️Image and video detection/classification
Platform Risk Intelligence
Platform Risk Intelligence
🇺🇸USA

Crisp

📊Data analysis and management
Predpol
Predpol
🇺🇸USA

Predpol

📊Data analysis and management
Project Arachnid
Project Arachnid
🇨🇦Canada

Cybertip Canada

🖼️Image and video detection/classification
Project DRAGON-S
Project DRAGON-S
🇬🇧UK

Swansea University

🔠Text analysis/processing
Project NEMESIS: Justice Through Technology
Project NEMESIS: Justice Through Technology
🇺🇸USA

Child Rescue Coalition

📊Data analysis and management
Project VIC Ecosystem
Project VIC Ecosystem
🇺🇸USA

Project VIC

📊Data analysis and management🖼️Image and video detection/classification
Quin-C
Quin-C
🇺🇸USA

Access Data Group

📊Data analysis and management
Qumodo Classify
Qumodo Classify
🇬🇧UK

Qumodo

🖼️Image and video detection/classification
Qumodo Discover
Qumodo Discover
🇬🇧UK

Qumodo

🖼️Image and video detection/classification
Rapid Safety Feedback
Rapid Safety Feedback
🇺🇸USA

Eckerd Connect

📊Data analysis and management
ReDirection
ReDirection
🇫🇮Finland

Suojellaan Lapsia Ry

ReKognition - video/image analysis
ReKognition - video/image analysis
🇺🇸USA🌍Global

Amazon

🔎Facial/object detection
reThink Chatbot
reThink Chatbot
🌍Global

Internet Watch Foundation (IWF)

🔠Text analysis/processing
Rigr.AI
Rigr.AI
🇮🇪Ireland

Rigr AI

📊Data analysis and management🔎Facial/object detection
S2i LASERi Suite : Laseri-p (Pictures)
S2i LASERi Suite : Laseri-p (Pictures)
🇬🇧UK

Semantics 21

🖼️Image and video detection/classification
S21 LASERi Suite: Laseri-t (Triage)
S21 LASERi Suite: Laseri-t (Triage)
🇬🇧UK

Semantics 21

🖼️Image and video detection/classification
S21 LASERi Suite: Laseri-v (Video)
S21 LASERi Suite: Laseri-v (Video)
🇬🇧UK

Semantics 21

🖼️Image and video detection/classification
Safer
Safer
🇺🇸USA

Thorn

🖼️Image and video detection/classification
SafeToNet
SafeToNet
🇬🇧UK

SafeToNet

🔠Text analysis/processing
Shield by Project Arachnid
Shield by Project Arachnid
🇨🇦Canada

Cybertip Canada

🖼️Image and video detection/classification
SnehAI: A Companion to Empower and Protect
SnehAI: A Companion to Empower and Protect
🇮🇳India

Population Foundation of India

🔠Text analysis/processing
Spotlight
Spotlight
🇺🇸USA

Thorn

📊Data analysis and management
STOP app
STOP app
🇬🇧UK

Stop the Traffik

📊Data analysis and management
TC Keyword Hub
TC Keyword Hub
🇺🇸USA

Thorn

📊Data analysis and management
Toolkit
Toolkit
🇺🇸USA🌍Global

Thompson Reuters, Mekong Club

📊Data analysis and management
TraffickCam
TraffickCam
🇺🇸USA

Exchange Initiative

🔎Facial/object detection
Traffik Analysis Hub
Traffik Analysis Hub
🇨🇦Canada

Stop The Traffik, IBM

📊Data analysis and management
URL List
URL List
🌍Global

Internet Watch Foundation (IWF)

Victim Outreach
Victim Outreach
🇺🇸USA

Freedom Signal

🔠Text analysis/processing
Videntifier
Videntifier
🇮🇸Iceland

Videntifier Technologies

🖼️Image and video detection/classification
Vigil AI
Vigil AI
🇬🇧UK

Qumodo

🖼️Image and video detection/classification
Yose
Yose
🇸🇪Sweden

Paliscope

📊Data analysis and management
Yoti
Yoti
🇬🇧UK

Yoti

📊Data analysis and management

All Digital Tools

CPORT
CPORT
🇳🇱Netherlands

Interpol, Inspectoratul General AL Politiei, ZiuZ Visual Intelligence, NCIS Norway

Project CPORT is funded by the European Union. It is a 2-year project that started in Jan 2023. The CPORT portal allows law enforcement agencies to access ICCAM – a database used by national hotlines to process and exchange reports of child sexual abuse material (CSAM) submitted by the public worldwide. The ICCAM platform is hosted by INTERPOL and is an important channel into INTERPOL’s international child sexual exploitation database and list of known domains disseminating severe abuse material (IWOL).

🖼️Image and video detection/classification
AviaTor Project
AviaTor Project
🇳🇱Netherlands

ZiuZ Forensic, Web-IQ, Timelex, DFKI, INHOPE

The AviaTor project is funded by the European Union and is currently in its final phase. The project started in 2019 and will end in 2024. The project aimed to build a prioritisation tool / database for law enforcement processing NCMEC reports (also known as industry reports or Cyber tipline referrals). The AviaTor database provides law enforcement with the tooling to prioritise these reports. AviaTor stands for Augmented Visual Intelligence and Targeted Online Research – meaning that the AviaTor database has the functionality to use visual intelligence as well as OSINT and hash matching to de-duplicate and prioritise reports. AviaTor is currently used by 19 national law enforcement agencies.

🖼️Image and video detection/classification
Rigr.AI
Rigr.AI
🇮🇪Ireland

Rigr AI

Rigr specializes in deceloping custom made applications specifically enabling AI driven management of sensitive data. For further information on available applications, visit website.

📊Data analysis and management🔎Facial/object detection
Amanda
Amanda
🌍Global

Aiba AI

Amanda is a proactive safety platform designed to protect children in social environments by detecting grooming and making accurate profiling of age and gender. Amanda uses key stroke dynamics and metadata from chats to determine the gender and age group of users. By analyzing writing style, Amanda can identify if users are who they claim to be. Amanda also analyzes messages using methods such as stylometry, behavioral patterns, text, and image to continuously assess the risk of the conversation. This analysis results in a continuous risk score that enables real-time prioritization of potentially dangerous conversations.

🔠Text analysis/processing
ReKognition - video/image analysis
ReKognition - video/image analysis
🇺🇸USA🌍Global

Amazon

Rekognition Image is an image recognition service that detects objects, scenes, and faces; extracts text; recognizes celebrities; and identifies inappropriate content in images. It also allows you to search and compare faces. Rekognition Image is based on the same deep learning technology developed by Amazon's computer vision scientists to analyze billions of images daily for Prime Photos. This service only requires users to pay for the number of images, or minutes of video, being analyzed and the face data being stored for facial recognition_ There are no minimum fees or upfront commitmenim. Rekognition Video is a video recognition service that extracts motion-based context from stored or live-stream videos and allows them to be analysed. It detects activities; understands the movement of people in frame: and recognizes objects, celebrities, and inappropriate content in videos stored in Amazon S3 and live video streams from Acuity. Rekognition Video also detects persons and tracks them through the video even when their faces are not visible, or as the whole person might go in and out of the scene_ For example r this could be used in an application that sends a real time notification when someone delivers a package to your door. Rekognition Video allows you also to index metadata, like objects, activities, scene, celebrities, and faces to simply video search. With Amazon Rekognition, you only pay for the number of images, or minutes of video, you analyze and the face data you store for facial recognition. There are no minimum fees or upfront commitments.

🔎Facial/object detection
Digital evidence extraction
Digital evidence extraction
🇺🇸USA

Belkasoft Evidence Center

Belkasoft Evidence Center is an all-in-one forensic solution for acquiring, locating, extracting, and analyzing digital evidence stored inside computers and mobile devices, RAM and cloud. The tool kit extracts digital evidence from multiple sources by analysing hard drives, drive images, cloud, memory dumps, iOS, Blackberry and Android backups. Graykey, UFED, OFB, Elcomsoft, JTAG md chip-off dumps. Evidence Centre analyses the dat:a source and lays ouc the most forensically important artefacts for an investigator to review.

💻Device extraction/search
Forensic Toolkit (FTK)
Forensic Toolkit (FTK)
🇺🇸USA

Access Data Group

FTK is a database driven solution that processes and indexes large amounts of data up-front to allow efficient filtering and searching. Users interact with FTK via a web interface which allows them to conduct computer forensic investigations. The product provides file filtering, search functionality and access to remote systems on the network as well as helps law enforcement, corporate security and IT professionals locate, analyze and evaluate the evidentiary value of files, folders and computers

📊Data analysis and management
Quin-C
Quin-C
🇺🇸USA

Access Data Group

Quin-C is a digital investigation software solution that provides a customizable UI to allow advanced data vizualisation, processing and analysis.

📊Data analysis and management
Clearview AI
Clearview AI
🇺🇸USA

Clearview AI

Clearview AI acts as a search engine of publicly available images – now more than ten billion -- to support investigative and identification processes by providing for highly accurate facial recognition across all demographic groups. Similar to other search engines, which pull and compile publicly available data from across the Internet into an easily searchable universe, Clearview AI compiles only publicly available images from across the Internet into a proprietary image database to be used in combination with Clearview AI's facial recognition technology. When a Clearview AI user uploads an image, Clearview AI’s proprietary technology processes the image and returns links to publicly available images that contain faces similar to the person pictured in the uploaded image.

🔎Facial/object detection
LESP's Hash Query
LESP's Hash Query
🇺🇸USA

The National Center for Missing & Exploited Children (NCMEC)

NCMEC offer the Law Enforcement Services Portal (LESP) which serves as a resource and access to several resources of NCMEC directly from the field. One feature is the Hash Query section, in which law enforcement officers in the field may query hash values from active investigations against the NCMEC system to learn if NCMEC knows the child depicted to be identified, and/or whether that hash value has been seen at NCMEC before. CRIS is the internal image and video file catalog used by NCMEC's Child Victim Identification Program. This system allows analysts to review and tag files in bulk in support of prosecution efforts, notating which files contain children identified through previous law enforcement investigations.  In addition, this tool assists the analysts in linking files and cases in support of victim identification efforts.

NCMEC Hash Sharing Platform
NCMEC Hash Sharing Platform
🇺🇸USA

The National Center for Missing & Exploited Children (NCMEC)

NCMEC hosts the NGO hash sharing platform, which includes MD5 and SHA1 hash values, as well as pDNA signatures, of images and videos tagged as Child Sexual Abuse Material by NCMEC, Internet Watch Foundation and the Canadian Centre for Child Protection. These hashes and signatures are made available to ESPs and other industry partners for free, for their use in their voluntary initiatives to detect, report and remove CSAM files on their services and platforms. As part of our Survivor Services program, NCMEC provides an exploitative hash sharing list, which includes MD5 and SHA1 hash values, as well as pDNA signatures, of images and videos tagged as "exploitative" by NCMEC. These files, which not illegal under federal guidelines, depict, support, and/or promote the exploitation of victims that are seen in associated CSAM files. These hashes and signatures are made available to ESPs and other industry partners for use in their voluntary initiatives to detect, report and remove files in support of survivors' privacy and protection. NCMEC hosts the Industry Hash Sharing Platform, which includes MD5 and SHA1 hash values, as well as pDNA signatures, of images and videos tagged as Child Sexual Abuse Material, which is shared by industry themselves. These hashes and signatures are made available by ESP's to other ESPs and other industry partners for use in their voluntary initiatives to detect, report and remove CSAM files. NCMEC's Hash Sharing Platform is the infrastructure and technical system which hosts the NGO CSAM, Industry and NCMEC Exploitative hash lists.  This technical system supports the file information, hashes and signatures, and file tags to allow for these  robust sharing initiatives.

CyberTipline
CyberTipline
🇺🇸USA

The National Center for Missing & Exploited Children (NCMEC)

NCMEC’s CyberTipline is the nation’s (USA’s) centralized reporting system for the online exploitation of children. The public and electronic service providers can make reports of suspected online enticement of children for sexual acts, child sexual molestation, child sexual abuse material, child sex tourism, child sex trafficking, unsolicited obscene materials sent to a child, misleading domain names, and misleading words or digital images on the internet. Through funding from Facebook, NCMEC offers the Case Management Tool (CMT) for domestic and international law enforcement who receive and investigate CyberTipline reports.  The CMT allows users to triage, query, organize and refer CyberTipline reports within this web-based interface. NCMEC's Law Enforcement Agency Web Services (LEAWS) allows law enforcement around the world access to CyberTipline report data.  This back-end infrastructure allows report data to be ingested by case management tools to allow quicker access, triage and response. NCMEC's ISP Web Services (ISPWS) allows companies around the world report directly to the CyberTipline. This back-end infrastructure allows for easier and automated reporting by companies around the world taking a stand against child sexual exploitation. While companies based in the US are required by law to report to the CyberTipline, any global company may and is welcome to report to the CyberTipline to better protect children and users on their platforms and services. As part of the CyberTipline response process, NCMEC notifies companies and providers when they are hosting CSAM and no suspect or offender is identified. Our analysts use a specialized interface to send notices daily, calling for these providers to remove the content and it includes a follow-up check to ensure the content has in fact been taken down. In 2021, NCMEC sent over 100,000 notices to companies to remove content from their hosting sites.

📊Data analysis and management
Videntifier
Videntifier
🇮🇸Iceland

Videntifier Technologies

Large-scale video identification, which allows searching databases of videos. Videntifier TM Forensic, radically improves the forensic video identification process, by providing law enforcement agencies with a robust, fast and easy-to-use video identification system. Using this ser-vice, a single mouse-click is sufficient to automatically scan an entire storage device and classify all videos.

🖼️Image and video detection/classification
EOKM HashCheckServer
EOKM HashCheckServer
🇳🇱Netherlands

EOKM and Web-IQ

HashCheckServer is a tool for hosting providers to prevent the uploading of known child sexual exploitation material. To prevent the uploading of known child sexual exploitation material, hosting parties needed to be part of the solution as they provide one of the gateways to publishing CSAM. Based on this knowledge, EOKM took the initiative to help hosting parties to prevent the uploading of known CSAM and to identify existing material on their servers so that it can be deleted. Following this initiative, EOKM asked Web-IQ to develop software that allows hosting parties to check whether an image appears in the police’s database of known CSAM.

🖼️Image and video detection/classification
Shield by Project Arachnid
Shield by Project Arachnid
🇨🇦Canada

Cybertip Canada

Rather than waiting for Project Arachnid to detect material and send a notice, industry can use Shield by Project Arachnid to quickly detect known CSAM on their service, which will, in turn, speed up its removal. Industry members that do not wish to interact directly with Shield by Project Arachnid can register their service/domain with the Canadian Centre to have any notices sent directly to them instead of being sent to their hosting provider. Other industries, such as filtering providers, can download real-time lists of URLs that are believed to currently contain CSAM for filtering purposes.

🖼️Image and video detection/classification
Child Abuse Image Database (CAID)
Child Abuse Image Database (CAID)
🇬🇧UK

UK Home Office

CAID is two core databases; one is an image database to support analysing digital images and videos to support investigations. The second is a hash database that provides law enforcement with categorised image and video hashes to support CAID User Orgs when forensically examining evidence on seized devices.

ICSE database
ICSE database
🌍Global

Interpol

Our International Child Sexual Exploitation (ICSE) image and video database is an intelligence and investigative tool, which allows specialized investigators to share data on cases of child sexual abuse. Using image and video comparison software, investigators are instantly able to make connections between victims, abusers and places. The database avoids duplication of effort and saves precious time by letting investigators know whether a series of images has already been discovered or identified in another country, or whether it has similar features to other images. It also allows specialized investigators from more than 64 countries to exchange information and share data with their colleagues across the world. By analysing the digital, visual and audio content of photographs and videos, victim identification experts can retrieve clues, identify any overlap in cases and combine their efforts to locate victims of child sexual abuse.

🖼️Image and video detection/classification
Project DRAGON-S
Project DRAGON-S
🇬🇧UK

Swansea University

Tools based on integrating AI/Linguistics that enable law enforcement to spot online grooming content in real-time. The project will impart specialist knowledge through a learning portal and chatbot to strengthen professionals’ abilities to shield children from online grooming.

🔠Text analysis/processing
“Serious game for a serious issue”
“Serious game for a serious issue”
🇬🇧UK

University of Kent

A culturally sensitive digital "serious" game that educates children about online child sexual exploitation and trafficking, with built-in evaluation and at-source reporting.

Global child abuse material classifier development programme
Global child abuse material classifier development programme
🇺🇸USA

Thorn

The programme is developing artificial intelligence classifiers, which are working on automating the detection of CSAM, creating a global standard for labeling, connecting, and organizing the world's data to help identify victims faster.

🖼️Image and video detection/classification
Aselo: Bringing Modern Technology to Child Helplines
Aselo: Bringing Modern Technology to Child Helplines
🇬🇧UK

Tech Matters

Customisable, open-source contact centre platform that allows children and youth to reach out to helplines via voice, SMS, webchat, WhatsApp, and Facebook Messenger if they come across CSAM

ReDirection
ReDirection
🇫🇮Finland

Suojellaan Lapsia Ry

ReDirection is a self-help programme that works to prevent the consumption of CSAM on the Dark Web, which builds on the Finnish government’s accredited New Direction rehabilitation programme for sex offenders. The project will also reveal new information about these searchers and their pathways to CSAM access and use by providing targeted support for these individuals.

KATALYST
KATALYST
🇺🇸USA

Project VIC International

By working with local law enforcement, KATALYST will improve forensic and victim identification capabilities, and facilitate collaboration between national law enforcement teams and international partners to ensure the safety of children online.

📊Data analysis and management
SnehAI: A Companion to Empower and Protect
SnehAI: A Companion to Empower and Protect
🇮🇳India

Population Foundation of India

Equipping adolescents with tools, information, and resources to identify and report online CSEA in India, using an artificially intelligent chatbot.

🔠Text analysis/processing
Emilio
Emilio
🇬🇧UK

None in Three (University of Huddersfield)

Working in partnership with the Universidade Estadual de Londrina (UEL) and Promundo, both in Brazil, the team, led by Professor Adele Jones and Professor Patricia Tzortzopoulos, will conduct research into online child sexual exploitation and abuse (CSEA). They will use the findings to develop and evaluate ‘Emilio’, an educational video game targeted specifically at young males considered to be at risk of engaging in online abusive behaviour. The game will aim to head off potential online CSEA at its roots by addressing its underlying drivers among those most amenable to change, the young. Because young people are still developing, it is easier to help them modify their thinking patterns and to make the link between emotion and behaviour; essential for violence prevention.

reThink Chatbot
reThink Chatbot
🌍Global

Internet Watch Foundation (IWF)

An automated device that detects potential offenders and refers them to support (e.g. self-help programmes) through the Lucy Faithfull Foundation.

🔠Text analysis/processing
DevOps Group Project
DevOps Group Project
🌍Global

Interpol

INTERPOL will bring the most advanced technology to investigators of online CSEA through its new DevOps Group Project. The initiative will facilitate research and development by an expert group of investigators, non-governmental organisations, academia, and information technology companies, and extend solutions to specialised officers worldwide via INTERPOL’s secure channels. Headquartered in France, this project has a global reach.

ESCAPE
ESCAPE
🇳🇱Netherlands

International Association of Internet Hotlines (INHOPE)

The ESCAPE project, funded by End Violence Against Children (EVAC) represents INHOPE's vision to put an eco-system in place ensuring that every industry stakeholder and each member of the public around the globe has the option and awareness to report child sexual abuse material (CSAM) encountered online. Developing automation and intelligence tools for faster classification of CSAM reporting. CSAM will be removed as soon as possible, preventing further circulation and re-victimisation of children.

DeafKidz Defenders
DeafKidz Defenders
🇬🇧UK

DeafKidz International

Interactive, accessible digital platform to help deaf children stay safe from online abuse and exploitation. Through educational games, children will learn to protect themselves from online risks, e.g. exploring what an inappropriate chat conversation might look like, the warning signs of abusers.

Project NEMESIS: Justice Through Technology
Project NEMESIS: Justice Through Technology
🇺🇸USA

Child Rescue Coalition

Automating the handling of evidence –including chat logs, data and videos – for live streaming abuse cases. Because mobile applications are often used to share CSAM and groom children, this solution will also help collect data against suspects with a sexual interest in children.

📊Data analysis and management
NetClean Protective
NetClean Protective
🇸🇪Sweden

NetClean

NetClean ProTective is a technical solution used to protect business mobile devices by blocking access to URLs known to contain child sexual abuse material (CSAM). The uniquely combined and continually updated URL list, from some of the world’s primary sources, makes it an effective protective solution.

🖼️Image and video detection/classification
Yoti
Yoti
🇬🇧UK

Yoti

Yoti is an identity platform, for identifying yourself digitally, and supports choosing what information to share and verify. For example user's can verify their age online, while not revealing other information about themselves.

📊Data analysis and management
Yose
Yose
🇸🇪Sweden

Paliscope

YOSE is an AI-driven search engine that lets you instantly track down intelligence within any file type—even from the largest, most unstructured stockpiles of locally stored data.

📊Data analysis and management
Krunam
Krunam
🇺🇸USA

Krunam

Krunam provides breakthrough technology that identifies and classifies previously unknown CSAM images and video at scale. Our CSAM classifier protects your online community, your employees, your brand’s reputation, and, last but not least, millions of children around the world.

🖼️Image and video detection/classification
Europol Platform for Experts
Europol Platform for Experts
🇪🇺Europe

Europol

The Europol Platform for Experts (EPE) is a secure, collaborative web platform for specialists in a variety of law enforcement areas.

Toolkit
Toolkit
🇺🇸USA🌍Global

Thompson Reuters, Mekong Club

Toolkits is designed to help financial institutions fight human trafficking using data. The Toolkit, tailored for use in the Asia Pacific region, includes a set of ‘red flags’ - potential indicators of modern slavery - linked to suspicious patterns in financial transactions, customer data and behaviour. It also includes contextual information and case studies to widen the financial service sectors’ understanding of this multi-faceted crime.

📊Data analysis and management
Traffik Analysis Hub
Traffik Analysis Hub
🇨🇦Canada

Stop The Traffik, IBM

STOP THE TRAFFIK and our long-term technology partner, IBM, have created the first ever international data hub to facilitate the sharing of information about human trafficking across all industries and sectors. The Traffik Analysis Hub (TAHub) is a partnership that includes financial institutions, NGOs, law enforcement and government agencies who are all unified by the common goal of sharing data to stop human trafficking. Using advanced cognitive technologies developed by IBM, the TAHub will facilitate the sharing of information quickly and easily and combine multiple data sets in one secure system. IBM has donated a significant grant to make this a reality and will use AI technology to quickly analyse and process volumes of data from a variety of sources; while ensuring its security and integrity.

📊Data analysis and management
Artemis
Artemis
🌍Global

Global Emancipation Network

Global Emancipation Network is excited to announce the latest counter-trafficking tool in our arsenal: Artemis. We teamed up with our friends at Splunk, Accenture, and Graphistry to produce a first-of-its-kind trafficking content classifier. Artemis is a proactive, automated solution for counter-human trafficking stakeholders to increase efficiency in investigations and disruptions by identifying high-risk establishments, individuals, and content. Our initial pilot focused on the illicit massage industry, categorizing massage businesses based on customer activity, staffing, location, services offered, imagery, and disciplinary actions. Using this data and advanced analytics, we created risk scores and tiers for targeted action.

📊Data analysis and management
Minerva
Minerva
🌍Global

Global Emancipation Network

Global Emancipation Network grants Minerva access to organizations with valid counter-trafficking missions in order to host and explore millions of trafficking-related data records and use customized search, alerting, geo-location and other platform capabilities. Using Splunk Enterprise and third-party integrated technologies, Minerva protects case-sensitive information and monitors usage patterns to help keep user information private, safe and secure. Leading public, private and nonprofit organizations have already been accepted to the platform as early users. Minerva is equipped with data-processing capabilities to extract and organize information from a variety of data sources. Capabilities include: Advertisement analysis: Analyzes advertisements from the deep and open web, where most trafficking cases originate, and extracts data such as user, location, account and other identifying information. Image processing tools: Processes images of victims to reduce the time users spend analyzing photographs and manually linking them to advertisements. Minerva integrates image analysis tools to tag photographs with characteristics to expedite database search, and reverse image search to identify similar images. Text analysis tools and natural language processing: Extracts text in images from advertisements and flags correlations with missing persons reports and other valuable information. Multi-tenant system informing trend analysis: Allows all Minerva users to store their information securely on the same database at the same time, enabling secure, multi-agency collaboration on shared investigations.

📊Data analysis and management🖼️Image and video detection/classification
STOP app
STOP app
🇬🇧UK

Stop the Traffik

Human trafficking is happening in plain sight all around us. Have you ever seen something that looks out of place? Does uncertainty stop you from speaking up? Every human trafficking story, no matter how long or short, whether current or historic, is important and relevant. It may be the missing piece of the puzzle, contributing to a larger and more accurate picture of human trafficking, which can then inform efforts to combat it. Technology places the power to prevent into the hand of a person who holds a mobile device. The STOP APP can be downloaded by anyone, anywhere in the world who has access to a smartphone. The app is anonymous, confidential and secure – it is available in seven languages and allows you to submit suspicious activity quickly by sending text based messages and uploading photos and videos.

📊Data analysis and management
Platform Risk Intelligence
Platform Risk Intelligence
🇺🇸USA

Crisp

Crisp delivers complete intelligence for Trust & Safety and Policy teams on the individuals and groups manipulating social media, video sharing, gaming, dating, review, and other specialty platforms by providing: Crip infiltrates bad actors "from the outside in" across the surface, deep, and dark web to gather intelligence. The AI uses the information to predict what they will do, so platforms have actionable intelligence to prevent child endangerment.

📊Data analysis and management
Predpol
Predpol
🇺🇸USA

Predpol

PredPol uses a machine-learning algorithm to calculate its predictions on where crimes will occur. Historical event datasets are used to train the algorithm for each new city (ideally 2 to 5 years of data). It then updates the algorithm each day with new events as they are received from the department. This information comes from the agency’s records management system (RMS). PredPol uses ONLY 3 data points – crime type, crime location, and crime date/time – to create its predictions. No personally identifiable information is ever used. No demographic, ethnic or socio-economic information is ever used. This eliminates the possibility for privacy or civil rights violations seen with other intelligence-led policing models.

📊Data analysis and management
Rapid Safety Feedback
Rapid Safety Feedback
🇺🇸USA

Eckerd Connect

Using a predictive analytics model that builds assessments after amassing historical data, Eckerd used RSF to identify the children who could only be returned to their parents with a heightened level of scrutiny by caseworkers.

📊Data analysis and management
Victim Outreach
Victim Outreach
🇺🇸USA

Freedom Signal

Freedom Signal is an online platform to help advocates develop ongoing relationships with through texting. We enable direct service organizations to send targeted text-based outreach to potential victims identified through web scraping. When a potential victim replies, it enables advocates to build trust with vulnerable populations in acute crisis. Freedom Signal’s outreach technology was designed by software engineers and survivors of online sex trafficking to address the specific needs of this population, while ensuring a safe, direct channel of communication.

🔠Text analysis/processing
SafeToNet
SafeToNet
🇬🇧UK

SafeToNet

SafeToNet is pioneering technology that educates children “in-the-moment” as they use their device. It is a safeguarding assistant that helps them become responsible and safe digital citizens. Its power lies in a smart keyboard that detects risks in real-time. It steers children away from trouble by filtering harmful outgoing messages before they can be sent and any damage can be done. SafeToNet helps prevent sexting, bullying, abuse and aggression.

🔠Text analysis/processing
Deterrence
Deterrence
🇺🇸USA

Thorn

Thorn runs the country’s most extensive online deterrence program, communicating directly with people searching for CSAM, disrupting their sense of anonymity and encouraging them to seek help. By suggesting help resources, we aim to change behavior and increase accountability. We are constantly testing messaging, identifying the best tactics to reach and persuade specific sub-groups, and capturing aggregate data to inform future research.

🔠Text analysis/processing
Cease.AI
Cease.AI
🇨🇦Canada

Two hat

Cease.AI for Law Enforcement helps reduce investigator workloads and reduce mental stress by sorting, flagging and removing non-CSAM, allowing investigators to focus their efforts on new child abuse images. investigators upload case images, run their hash lists to eliminate known material, then let the AI identify, suggest a label, and prioritize images that contain previously uncatalogued CSAM.

🖼️Image and video detection/classification
TC Keyword Hub
TC Keyword Hub
🇺🇸USA

Thorn

The Keyword Hub allows technology companies to share search terms used to find child sexual abuse material (CSAM) with other companies allowing all parties to be better at stopping users seeking CSAM.

📊Data analysis and management
Spotlight
Spotlight
🇺🇸USA

Thorn

Spotlight is a web-based application that helps law enforcement prioritize leads in their sex trafficking investigations. There are over 150,000 escort ads posted daily; Spotlight takes this massive amount of data and turns it into an asset for law enforcement. To date Spotlight has helped law enforcement identify an average of 8 children per day and has saved up to 60% of critical investigative time.

📊Data analysis and management
Safer
Safer
🇺🇸USA

Thorn

Safer is a child sexual abuse material (CSAM) detection, review, removal and reporting pipeline. It allows small and medium sized companies to have the same CSAM fighting tools as the largest ones.

🖼️Image and video detection/classification
S21 LASERi Suite: Laseri-v (Video)
S21 LASERi Suite: Laseri-v (Video)
🇬🇧UK

Semantics 21

S21 Laseri-v is a specialist tool for the mass categorization and analysis of child sexual abuse (CSA) videos. LASERi-v (Videos) contains proprietary workflows and algorithms to perform victim identification and investigation. The application is fully customisable, Project VIC premier certified and used by Police forces across the world for the investigation of child sexual abuse and other major crime types. (S2i LASERi-v (Videos) is available as part of the S2i LASERi suite).

🖼️Image and video detection/classification
S21 LASERi Suite: Laseri-t (Triage)
S21 LASERi Suite: Laseri-t (Triage)
🇬🇧UK

Semantics 21

S21 Laseri-t is a specialist tool for onsite (live box) and bootable (dead box) triage of laptops and computers able to detect and analyse imagery and videos. LASERi-t (Triage) contains prophet workflows and algorithms for intelligence driven search capabilities, compatibility with a wide range of intelligence sources , customisable reporting and both simple and advanced user interface modes for all tiers of users. The application is fully customisable, Project VIC premier certified and used by Police forces across the world for the investigation of child sexual abuse and other major crime types. (S21 LASERi-t Triage) is available as part of the S21 LASERi suite).

🖼️Image and video detection/classification
S2i LASERi Suite : Laseri-p (Pictures)
S2i LASERi Suite : Laseri-p (Pictures)
🇬🇧UK

Semantics 21

The S2i Laseri Suite is a specialist tool for the mass categorization and analysis of child sexual abuse imagery (CSAI) and animation. LASERi-p Pictures) contains proprietary workflows and algorithms to perform victim identification and quality investigations. The application is fully customisable, Project VIC premier certified and used by police forces across the world for the investigation of child sexual abuse and other major crime types. (S21 LASERi-p (Pictures) is available as part of the S21 LASERi suite).

🖼️Image and video detection/classification
Vigil AI
Vigil AI
🇬🇧UK

Qumodo

Vigil At automatically detects, evaluates and categorizes child sexual abuse imagery. Thu system is capable of determining the severity of the sexual act in the image (Using the legacy UK 1-5 Category SAP Scale or the current UK 3 Categories A-C). The tool is available as part of Qumodo Classify, via a Cloud API or via a stand alone API for tools such as Griffeye Analyze. The tool scales linearly and can categorize millions of images per hour

🖼️Image and video detection/classification
Qumodo Discover
Qumodo Discover
🇬🇧UK

Qumodo

Qumodo Discover is a search engine for evidence. This technology uses AI to intelligently find connections within digital data at a web scale where users can query the system with an image, and it will find other images containing the same places, people, faces and objects. It has been tested with more than 100 million images and validated in a victim ID environment, with child sexual exploitation and abuse (CSEA). content

🖼️Image and video detection/classification
Qumodo Classify
Qumodo Classify
🇬🇧UK

Qumodo

Qumodo Classify is a software product which dramatically speeds up image categorization for content moderation for law enforcement purposes white reducing the psychological impact on the users, saving both time and money. This tool has been specialty designed around the latest AI technology, as well as 21 core psychology principals to form an effective Human/ AI team. As well as reducing the psychological impact on the user, the tool is designad to prevent human bias from influencing the system and creates the ability for the software to learn new abilities over time, further reducing the time needed to manually classify large amounts of data. When paired with the Vigil AI Classifier (vigil.ai) it becomes a powerful tool in the fight against child sexual exploitation and abuse (CSEA) content.

🖼️Image and video detection/classification
Project VIC Ecosystem
Project VIC Ecosystem
🇺🇸USA

Project VIC

Project VIC is a community of investigators, victim identification specialists, application developers, scientists and strategic partners dedicated to developing and levering the newest technologies and victim-centric methods of investigation to improve success rate in rescuing victims of child sexual exploitation and trafficking. Proiect VIC has co-created an ecosystem of shared and standardized technologies specifically chosen to combat crimes involving massive amounts of images and video. Data from these respective technologies is processed using the Project VAC Cloud and redistributed back to the greater community working on crimes against children. The following tools are part of the Project VIC ecosystem: Project VIC Hash Cloud Provided by Project VIC International and Hubstream Inc. hosts over 65 million CSAM and non CSAM hashes- Access encryption Provided by Project VIC. PhotoDNA for Images by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC PhotoDMA for Video by Microsoft is made available to law enforcement through a sub-license agreement with Project VIC LLC Ft Video Fingerprinting by Friend MTB is made available to law enforcement through a sub-license agreement to Project VIC LLC. VICS-Odata Model Licensing is made available to law enforcement through a sub-license agreement with Project VIC LLC international Image Classifies Standard- (IC-3) Machine Learning Modelling is made available through Project VIC International Global Alert System- ViC5 Exif Matching across global platforms to identify similarities in imagery for Victim Identification. License included with ViC5

📊Data analysis and management🖼️Image and video detection/classification
URL List
URL List
🌍Global

Internet Watch Foundation (IWF)

The Internet Watch Foundation's URL List is a database of known child sextral abuse material (CSAM) sites to assist with blocking and filtering.

MSAB Mobile Forensics
MSAB Mobile Forensics
🇸🇪Sweden

MICRO SYSTEMATION

XRY is a purpose built software based solution set complete with all the necessary tools for recovering data from mobile devices in a forensically secure manner. The software is delivered through four primary platforms: MSAB Office, MSAB Field, MSAB Kiosk and MSAB Tablet. MSAB Office is the all-purpose forensic system from MSAB, offering the entire XRY product solution in a single package. With MSAB Office you can go deeper into a mobile device to recover vital data with a choice of Logical, Physical, Cloud, PinPoint and Drone recovery tools for all supported devices. The Office kit works on a PC to produce a secure forensic report containing dat extractions from mobile handsets. MSAB Office allows investigators to access alI possible methods to recover data from a mobile device through XAMN Spotlight, or perform deeper analysis which can be done with XAMI\ Horizon. For organisations who wish to perform digital forensics out of the office environment MSAB Field is a field kit that utilises XRY software, XAMN Spotlight for laptops with deeper analysis performed using XAMN Horizon. For a turnkey forensic solution MSAB Kiosk and MSAB Tablet (touch screen version) are all inclusive hardware and software solutions designed for first responders where mobile data recovery is only one part of the job. These products utilise custom built XRY software and are co1nplete hard\vare solutions with all the tools necessary for recovering data from mobile devices in a forensically secure manner.

💻Device extraction/search
BlueBear Lace
BlueBear Lace
🇨🇦Canada

BlueBear

LACE enables investigators to extract more visual data and efficiently categorize vast amounts of image and video data from confiscated devices using zero false positive visual matching, dramatically reducing (typical 90% case reduction) the time and resources required to bring a case to court. LACE is compatible with international standards for sharing metadata and hash signatures like ICSE, ProjectVic md UK-CAID. LACE Standalone Carver is software used for carving pictures and videos from any digital forensically sound manner. The LACE FORENSIC CARVER recognizes over 180 file types covering image, video, text documents, archive, and database files. Using this light tool, forensic experts will be able to extract evidence and import it using the JSON standard in to all the various tools they choose to use to analyse and review the evidence.

🖼️Image and video detection/classification
Content Safety API
Content Safety API
🇺🇸USA🌍Global🇨🇭Switzerland

Google

The Content Safety API sorts through many images and prioritizes the most likely child sexual abuse material (CSAM) content for review. The classifier can target content that has not been previously confined as CSAM.

🖼️Image and video detection/classification
Hubstream Intelligence
Hubstream Intelligence
🇺🇸USA

Hubstream

Hubstream lntelligence is a customizable web application for understanding and taking appropriate action on investigative data. Data from online and off-line sources becomes integrated with a user's overall intelligence capability. Through smart linking, modern visualization and analytic techniques, as well as actionable dashboards, users can more quickly drive investigative leads through mission-critical workflows. The software helps drive operations and triage process national and international case referrals, victim identification workflows, and automated intelligence gathering from open source and proprietary intelligence.

📊Data analysis and management
PhotoDNA for Video
PhotoDNA for Video
🇺🇸USA

Microsoft

PhotoDNA for Video builds on PhotoDNA technology, bringing all the benefits of PhotoDNA to the video environment.

🖼️Image and video detection/classification
Child Protection System
Child Protection System
🇺🇸USA

Child Rescue Coalition

Child Rescue Coalition is a partnership of child exploitation investigators, police officers, digital forensic experts. prosecutors, child welfare agencies, and corporate and private philanthropy who work together to apprehend and convict abusers of children, rescue those in harm's way, and importantly, seek to prevent abuse from happening in the first place. At its core is technology that identifies, monitors, and ranks the online criminal behavior of child predators on peer-to-peer file-sharing and chat networks.

📊Data analysis and management
Hash list IWF and NetSweeper
Hash list IWF and NetSweeper
🌍Global

Internet Watch Foundation (IWF) and NetSweeper

The Internet Watch Foundation and Netsweeper Hash List is a collaboration between the two organisations to block and filter child sexual abuse material (CSAM) on the internet. No primary market. Nesweeper is taking hashes and sending suspected URLs to IWF.

Hunch.ly
Hunch.ly
🇨🇦Canada

Hunch.ly

Hunchly is a web capture tool that automatically collects, documents, and annotates every web page you visit to create a transparent audit trail for online investigations.

📊Data analysis and management
Analyze D1
Analyze D1
🇸🇪Sweden

Griffeye

Analyze DI allows users to import, process and review complex information as well as pre-categorise known data and correlate metadata with open sources on the internet.

🖼️Image and video detection/classification
Luxan Face SDK
Luxan Face SDK
🇺🇸USA

Luxan

Luxand's technology detects facial features quickly and reliably. The SOK processes an image, detect-s human faces within it, and returns the coordinates of 70 facial feature points including eyes, eye contours, eyebrows, Iip contours, nose tip, and so on.

🔎Facial/object detection
Hash List
Hash List
🌍Global

Internet Watch Foundation (IWF)

The Internet Watch Foundation's Hash List is a hash database of known child sexual abuse material (CSAM) available for service providers to automatically match known images before they appear on a service and remove illegal images already on services.

Magnet AXIOM
Magnet AXIOM
🇨🇦Canada

Magnet Forensics

Magnet Forensic's AXIOM tool set uses Al, automation, advanced searching techniques, modern data visualization and more to help investigative teams find digital evidence and understand the story it is telling.

📊Data analysis and management
NetClean Proactive
NetClean Proactive
🇸🇪Sweden

NetClean

NetClein ProActive works similarly to an anti-virus program but instead of detecting a virus, ProActive detects images and videos that law enforcement agencies have classified as child sexual abuse material.

🖼️Image and video detection/classification
TraffickCam
TraffickCam
🇺🇸USA

Exchange Initiative

TraffickCam allows anyone with a smartphone to fight sex trafficking when they travel by uploading photos of hotel rooms to a law enforcement database. Photos uploaded to the free TraffickCam app are added to an enormous database of hotel room images. Federal, state and local law enforcement securely submit photos of hotel rooms used in the advertisement of sex trafficking victims to TraffickCam. Features such as patterns in the carpeting, furniture, room accessories and window views are matched against the database of traveler images to provide law enforcement with a list of potential hotels where the photo may have been taken to identify location of victims.

🔎Facial/object detection
PhotoDNA
PhotoDNA
🇺🇸USA

Microsoft

PhotoDNA Cloud Service enables businesses to protect their assets, interests, and customers by autornaticuliy detecting and reporting the distribution of child sexual exploitation and abuse images.

🖼️Image and video detection/classification
CSAI Match
CSAI Match
🇺🇸USA🌍Global

Google/Youtube

CSAI Match is used to surface potential child sexual abuse images (CSAI) for YouTube uploads as well as partner submissions.

🖼️Image and video detection/classification
Analyst's Notebook
Analyst's Notebook
🇬🇧UK

IBM i2

IBM i2 Analyst's Notebook is a visual analysis tool that helps turn data into intelligence. The solution provides features such as connected network visualizations, social network analysis, and geospatial or temporal views to help users uncover hidden connections and patterns in data. These insights aid in identifying and disrupting criminal, cyber and fraudulent threats.

📊Data analysis and management
Palantir Gotham
Palantir Gotham
🇺🇸USA

Palantir

Instead of logging in to separate data systems, agents, detectives and investigators can conduct a single search for a suspect, target, or location and return data from all relevant systems. Palantir Gotham featres intuitive, user-friendly interface backed by powerful data integration software providing access to art available information related to an investigation in one place. Data is secured at a granular level (down to individual attributes describing each piece of data), ensuring that users can only see information for which they are authorized. Users can also collaborate on investigations and share information. Palantir Gotham can integrate data in any format, including existing case management systems, evidence management systems, arrest records, warrant data, subpoenaed data, record managements system (RSS) or other crime-reporting data, Computer- Aided Dispatch (CAD) data, federal repositories, gang intelligence, suspicious activity reports, Automated License Plate Reader (ALPR) data, and unstructured dat such as'document repositories and emails. Access restrictions can be applied broadly based on the data source, or granularly, down to individually securing attributes and metadata (e.g., a building's address or the timestamp associated with a photograph) These permissions govern how users access data All interactions, including searching, viking, and editing data, are recorded in a tamper-evident audit log.

📊Data analysis and management
Camera Vision
Camera Vision
🇺🇸USA🌍Global

Facebook

Camera Vision is a machine learning tool that identifies images that contain both nudity and a child.

🖼️Image and video detection/classification
Neula
Neula
🇺🇸USA

Child Rescue Coalition

Neula provides an automated application for locating deleted child abuse content on digital devices.The recovery of deleted files is one of the greatest challenges to effectively prosecuting the abusers of children, many of whom eliminate evidence by deleting large quantities of contraband over time. Forensic analysts can sometimes locate and reconstruct a small percentage of the offending files, but this process is extremely painstaking and time-consuming. Neula provides better insight into the true extent of an individual's criminal behavior, specifically the extent to which they pose a present or future risk to children

💻Device extraction/search
Cleanfeed Canada
Cleanfeed Canada
🇨🇦Canada

Cybertip Canada

Cleanfeed Canada blocks customer access to known non-Canadian websites that are hosting child pornography to reduce Canadian's exposure to child abuse images and create a disincentive for those who access and distribute child pornography.

📊Data analysis and management
Analyze Collaboration Server
Analyze Collaboration Server
🇸🇪Sweden

Griffeye

Analyze Collaboration Server is a central repository for storing and sharing information. Analyze Collaboration Server Enterprise enables organizations to store and access all the relevant material they have ever collected. The software facilitates image and video processing via a custom user interface, allowing investigators to work with a central store of case data. The Griffeye AI is made up of two core solutions: The CSA classifier, which has been trained on real CSA case data, and the Object classifier, which can detect various objects and details in images.

📊Data analysis and management
LIBRA serverless image detection
LIBRA serverless image detection
🇳🇱Netherlands

Web-IQ

WebIQ has developed a serverless CSA detection AI, that scans websites and hashes images, and compares the hash to know CSA images. If there is a match, an automatic Notice of Takedown is sent to the host of the server of the website.

🖼️Image and video detection/classification
Oxygen Forensic Detective
Oxygen Forensic Detective
🇺🇸USA

Oxygen Forensic

Oxygen Forensic Detective offers data extraction from iOS, Android, Windows Phone, BlackBerry devices, feature phones, media, and SIM cards as well as cloud services and drones. The software imports numerous backups and images, including iTunes, Android and BlackBerry backups, JTAG and Chip-off images, and many others. Oxygen Forensics Detective uses several proprietary methods to bypass or disable screen locks on mobile devices, including Samsung, LG, Motorola, and Chinese chipset ones. The program automatically finds passwords to encrypted backups and images by using brute -force, dictionary, Xieve, and other attacks.

💻Device extraction/search
Paliscope
Paliscope
🇸🇪Sweden

Paliscope

Paliscope software allows users to conduct online investigations and quickly and easily collect open source data for review and analysis using third party services to correlate and find more data on the Clearnet and Darknet. Findings can be reported and secured with an audit log. Paliscope also provides an easy-to-use OSINT browser with integrated tools to elicit optimal results

📊Data analysis and management
CameraForensics
CameraForensics
🇬🇧UK

CameraForensics

CameraForensics is an online portal allowing users to search for other images on the internet taken with a particular camera to support victim identification investigations. This tool also supports searching geographically for similar and identical images and for various metadata elements. All with the intent of helping investigators link covert and overt (public) personas on the internet. The tool is available via an online user interface and also via a number of products such as Griffeye Analyze, or as a fully integrated solution for agency or country-level databases (via API).

🔎Facial/object detection
i2 iBridge
i2 iBridge
🇬🇧UK

IBM i2

i2 iBridge connects to select enterprise databases with search/query capabilities to return analysis-ready data. i2 information Exchange for Analysis Search for Analyst's Notebook connects to/searches multiple sources at once to retrieve analysis-ready data.

📊Data analysis and management
eGlyph
eGlyph
🇺🇸USA

Dartmouth College

eGlyph is a robust-hashing algorithm that can identify previously tagged images,video, and audio. eGlyph extends photoDNA which operates only on images.

🖼️Image and video detection/classification
Hubstream Intelligence Fabric
Hubstream Intelligence Fabric
🇺🇸USA

Hubstream

Hubstream Intelligence Fabric is an automation and data sharing service that powers national and international collaboration and distribution of mission-critical data sets. The service uses scalable and secure cloud technologies to allow massive scale collaboration and fast communication of changes to data sets used by forensics investigators. It is used internationally to track hundreds of millions of data points and is used by tens of thousands of users.

📊Data analysis and management
Project Arachnid
Project Arachnid
🇨🇦Canada

Cybertip Canada

Project Arachnid is a platform for reducing the availability of child sexual abuse material (CSAM) which includes crawling the internet for known CSAM using digital fingerprints as well as providing an API for industry members to improve upon and accelerate the detection of this harmful material on their own networks.

🖼️Image and video detection/classification
Maltego
Maltego
🇿🇦South Africa

Maltego

Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.

📊Data analysis and management
👉
www.childhood.org

Foother

ChildhoodChildhood
Childhood
linkedinlinkedin
linkedin
My AIMy AI
My AI
FacebookFacebook
Facebook

Blasieholmstorg 8, 111 48 Stockholm

+46(0)8-551 175 00

info@childhood.org