GCHQ Deploys AI To Stop Human Trafficking & Child Sex Abuse

GCHQ is ready to deploy Artificial intelligence (AI) tools which can be used quickly analyse masses of complex data will be used in the fight against child sex abuse, human trafficking criminals and a range of other increasingly sophisticated criminal activities.
 
The British spy agency's new policy is described in a paper entitled Ethics of AI: Pioneering A New National Security, which explains that GCHQ believes it can use AI to help expose disinformation campaigns by adversary nations trying to undermine democracy.  GCHQ says hostile countries are already using AI to automate the production of 'deepfake' videos and audio recordings to influence public opinion.
 
More than 69 million child sexual exploitation videos and images in 2019 and a large number of such images were found being shared via online platforms, while the rest were exchanged via the dark web or encrypted communicationsAI tools could help the organisation automate the scanning of chat rooms for evidence of grooming, to prevent child sexual abuse. Humans would struggle to identify such information, given the massive quantity of data. 
 
By processing massive quantities of data, AI tools could help to map criminal networks that carry out illegal trafficking of drugs, weapons and humans, while concealing their activities using encryption techniques and crypto-currencies.  
 
In recent years, several big technology companies have introduced measures to fight online child abuse. Both YouTube and Facebook have put mechanisms in place to tag and trace videos and images violating their standards. Facebook's algorithms for flagging objectionable images and videos are also available on GitHub. Microsoft has also launched a tool to help people review chat-based conversations and detect online grooming.
 
The paper considers AI transparency and explains how GCHQ will ensure that AI tools are used in a fair and transparent way, by applying existing tests of necessity and proportionality, using an AI ethical code of practice, and employing more diverse talent to help govern AI use.
 
The spy agency sets out examples of how they will use the technology, including: 
 
  • Fact-checking and detecting deepfake media to tackle foreign state disinformation.
  • Mapping international networks that enable human, drugs and weapons trafficking.
  • Analysing chat rooms for evidence of grooming to prevent child sexual abuse.
  • How the National Cyber Security Centre could analyse activity at scale to identify malicious software to protect the UK from cyber attacks.
"AI is already invaluable in many of our missions as we protect the country, its people and way of life," Jeremy Fleming, the director of GCHQ, said in a statement. He added that AI and other technical developments bring great opportunities, but also "pose significant ethical challenges for all of society... I hope it will inspire further thinking at home and abroad about how we can ensure fairness, transparency and accountability to underpin the use of AI."
 
GCHQ warns that a growing number of states are turning to AI as a means of spreading disinformation to shape public perceptions and undermine trust. The report comes as the British Government gets ready to publish its Integrated Review into Security, Defence, Development and Foreign Policy.
 
GCHQ:         Computing:      Business Innovation:       Telegraph & Argus:    Hull Daily Mail:    Image: Unplash
 
You Might Also Read:
 
Tracking Modern Slavery On The Dark Web:
 
 
« Microsoft Email Software Breached
Webinar: Build a security posture strategy in the AWS Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

ON-DEMAND WEBINAR: Navigating cloud security: The importance of posture management tools

Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Site24x7

Site24x7

Site24x7 is an all-in-one performance monitoring solution for Networks, Websites, Servers and Applications.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Centro de Gestion de Incidentes Informaticos (CGII)

Centro de Gestion de Incidentes Informaticos (CGII)

CGII is the Computer Incident Management Center of the State of Bolivia.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Valid Network

Valid Network

Valid Network DSP is blending traditional cyber security methodologies with blockchain transactions to achieve trust, internal and federated between organizations and stake holders.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

SecureDNE

SecureDNE

SecureDNE are a leading provider of cutting-edge Fractional CISO, Managed Cybersecurity Services, and Cybersecurity Engineering Solutions.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.