Technology
The use of technology, including artificial intelligence, machine learning and specific tools such as Photo DNA, is central to protecting children from sexual exploitation and abuse online.
Safety technology can prevent, detect, block, report and remove illegal and exploitative material, live streaming and grooming. Technology tools can also be used to deter and detect offenders and identify and protect victims.
Technology can also be used to identify some of the hard problems that are preventing progress. Online tools can work many times faster than humans to identify and detect abusive material, as well as tracking down platforms and websites used to share this material. Safety technology can also be used to assess risks and help limit the vulnerability of children online.
Join the conversation in the Protectors’ Portal
Sorry, there were no discussions found.
Key library items about technology
Outcomes briefing – technology, privacy and rights roundtable
Publisher: ECPAT International, WePROTECT Global Alliance (Briefing)
This outcomes briefing records the outcomes from the roundtable meeting: issue context, key challenges, potential solutions and mapping the way forward.
End-To-End Encryption: Understanding the impacts for child safety online
Publisher: NSPCC (Report)
There are diverse and often conflicting opinions on the extent to which platforms should adopt online privacy and safety features, but the overwhelming majority of participants agree that child safety…
Statement on behalf of the Phoenix 11
Publisher: Phoenix 11 (Media)
Survivors of child sexual abuse material demand action from tech one year after key players support online anti-exploitation principles.
Guide for tech companies considering supporting the “Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse”
Publisher: WePROTECT Global Alliance (Tool)
Six industry members of the Alliance (Facebook, Google, Microsoft, Roblox, Snap and Twitter) have produced this ‘by tech, for tech’ guide to operationalising the Voluntary Principles’.
Safety by Design can build investor and customer trust
Publisher: eSafety Commissioner (Tool)
The investment and venture capital community can play a pivotal role in helping to ensure that early-stage technology companies put safety and ethical considerations at the heart of their design processes.
Reviewing Child Sexual Abuse Material Reporting Functions on Popular Platforms
Publisher: Canadian Centre for Child Protection (Report)
Millions of images of child sexual abuse circulate freely on the internet each day, not only in obscure corners of the dark web, but also on some of the most…
Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse
Publisher: Five-Country Ministerial (Tool)
On 5 March 2020 a set of Voluntary Principles to Counter Online Child Sexual Exploitation and Abuse was launched in Washington DC. These principles were developed by the Five Country…
PhotoDNA
Publisher: Microsoft (Tool)
In 2009, Microsoft partnered with Dartmouth College to develop PhotoDNA, a technology that aids in finding and removing known images of child exploitation.
See what the Alliance is doing on: Technology
Innovative solutions
The use of technology, such as artificial intelligence (AI) and machine learning, to prevent, detect, block, report and remove illegal and exploitative material, live streaming and grooming.
Collaborative online expertise
Collaborative technology development to identify and investigate online child sexual abuse offenders.
Modernised reporting systems
A reporting system for CSEA online (also known as cybertip) promotes and enables the reporting of and response to images and videos of CSEA online to ensure an efficient criminal…
Risk / threat assessment matrix
Assessing risks for victim identification, offender targeting and to mitigate against technology infrastructure and broader online risks.
Outcomes briefing – technology, privacy and rights roundtable
Publisher: ECPAT International, WeProtect Global Alliance (Briefing)
This outcomes briefing records the outcomes from the roundtable meeting: issue context, key challenges, potential solutions and mapping the way forward.
Guidance for implementing the Global Strategic Response
Publisher: WeProtect Global Alliance (Tool)
Guidance for practitioners and decision-makers across the globe to reach the outcomes outlined in the Alliance’s Global Strategic Response.
Internet Watch Foundation Annual Report 2020
Publisher: Internet Watch Foundation (Report)
“Face the facts”: In 2020, our team assessed over 150,000 reports of child sexual abuse imagery online and were able to seek the removal of millions of criminal images and…
I worked at Facebook — end-to-end encryption will sacrifice children’s safety at the altar of privacy
Publisher: iNews (Media)
Joanna Shields blog: I was working at the tech giant when five-year-old April Jones was murdered. I felt sick that we hadn’t done more.
End-To-End Encryption: Understanding the impacts for child safety online
Publisher: NSPCC (Report)
There are diverse and often conflicting opinions on the extent to which platforms should adopt online privacy and safety features, but the overwhelming majority of participants agree that child safety…
Introduction to Hashing
Publisher: Thorn (Media)
Explainer on this powerful tool to detect child sex abuse imagery online. The tool applies a unique fingerprint to identify an individual photo to detect suspected material online and then…