GCHQ Deploys AI To Stop Human Trafficking & Child Sex Abuse

GCHQ is ready to deploy Artificial intelligence (AI) tools which can be used quickly analyse masses of complex data will be used in the fight against child sex abuse, human trafficking criminals and a range of other increasingly sophisticated criminal activities.
 
The British spy agency's new policy is described in a paper entitled Ethics of AI: Pioneering A New National Security, which explains that GCHQ believes it can use AI to help expose disinformation campaigns by adversary nations trying to undermine democracy.  GCHQ says hostile countries are already using AI to automate the production of 'deepfake' videos and audio recordings to influence public opinion.
 
More than 69 million child sexual exploitation videos and images in 2019 and a large number of such images were found being shared via online platforms, while the rest were exchanged via the dark web or encrypted communicationsAI tools could help the organisation automate the scanning of chat rooms for evidence of grooming, to prevent child sexual abuse. Humans would struggle to identify such information, given the massive quantity of data. 
 
By processing massive quantities of data, AI tools could help to map criminal networks that carry out illegal trafficking of drugs, weapons and humans, while concealing their activities using encryption techniques and crypto-currencies.  
 
In recent years, several big technology companies have introduced measures to fight online child abuse. Both YouTube and Facebook have put mechanisms in place to tag and trace videos and images violating their standards. Facebook's algorithms for flagging objectionable images and videos are also available on GitHub. Microsoft has also launched a tool to help people review chat-based conversations and detect online grooming.
 
The paper considers AI transparency and explains how GCHQ will ensure that AI tools are used in a fair and transparent way, by applying existing tests of necessity and proportionality, using an AI ethical code of practice, and employing more diverse talent to help govern AI use.
 
The spy agency sets out examples of how they will use the technology, including: 
 
  • Fact-checking and detecting deepfake media to tackle foreign state disinformation.
  • Mapping international networks that enable human, drugs and weapons trafficking.
  • Analysing chat rooms for evidence of grooming to prevent child sexual abuse.
  • How the National Cyber Security Centre could analyse activity at scale to identify malicious software to protect the UK from cyber attacks.
"AI is already invaluable in many of our missions as we protect the country, its people and way of life," Jeremy Fleming, the director of GCHQ, said in a statement. He added that AI and other technical developments bring great opportunities, but also "pose significant ethical challenges for all of society... I hope it will inspire further thinking at home and abroad about how we can ensure fairness, transparency and accountability to underpin the use of AI."
 
GCHQ warns that a growing number of states are turning to AI as a means of spreading disinformation to shape public perceptions and undermine trust. The report comes as the British Government gets ready to publish its Integrated Review into Security, Defence, Development and Foreign Policy.
 
GCHQ:         Computing:      Business Innovation:       Telegraph & Argus:    Hull Daily Mail:    Image: Unplash
 
You Might Also Read:
 
Tracking Modern Slavery On The Dark Web:
 
 
« Microsoft Email Software Breached
Webinar: Build a security posture strategy in the AWS Cloud »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

ArcusTeam

ArcusTeam

ArcusTeam is at the forefront of the firmware and applications security industry, with a mission to increase the level of security on all IoT devices and applications.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.

HazeGrayCyber

HazeGrayCyber

HazeGrayCyber offers comprehensive technical services to bring your company to the next level.