GCHQ Deploys AI To Stop Human Trafficking & Child Sex Abuse

GCHQ is ready to deploy Artificial intelligence (AI) tools which can be used quickly analyse masses of complex data will be used in the fight against child sex abuse, human trafficking criminals and a range of other increasingly sophisticated criminal activities.
 
The British spy agency's new policy is described in a paper entitled Ethics of AI: Pioneering A New National Security, which explains that GCHQ believes it can use AI to help expose disinformation campaigns by adversary nations trying to undermine democracy.  GCHQ says hostile countries are already using AI to automate the production of 'deepfake' videos and audio recordings to influence public opinion.
 
More than 69 million child sexual exploitation videos and images in 2019 and a large number of such images were found being shared via online platforms, while the rest were exchanged via the dark web or encrypted communicationsAI tools could help the organisation automate the scanning of chat rooms for evidence of grooming, to prevent child sexual abuse. Humans would struggle to identify such information, given the massive quantity of data. 
 
By processing massive quantities of data, AI tools could help to map criminal networks that carry out illegal trafficking of drugs, weapons and humans, while concealing their activities using encryption techniques and crypto-currencies.  
 
In recent years, several big technology companies have introduced measures to fight online child abuse. Both YouTube and Facebook have put mechanisms in place to tag and trace videos and images violating their standards. Facebook's algorithms for flagging objectionable images and videos are also available on GitHub. Microsoft has also launched a tool to help people review chat-based conversations and detect online grooming.
 
The paper considers AI transparency and explains how GCHQ will ensure that AI tools are used in a fair and transparent way, by applying existing tests of necessity and proportionality, using an AI ethical code of practice, and employing more diverse talent to help govern AI use.
 
The spy agency sets out examples of how they will use the technology, including: 
 
  • Fact-checking and detecting deepfake media to tackle foreign state disinformation.
  • Mapping international networks that enable human, drugs and weapons trafficking.
  • Analysing chat rooms for evidence of grooming to prevent child sexual abuse.
  • How the National Cyber Security Centre could analyse activity at scale to identify malicious software to protect the UK from cyber attacks.
"AI is already invaluable in many of our missions as we protect the country, its people and way of life," Jeremy Fleming, the director of GCHQ, said in a statement. He added that AI and other technical developments bring great opportunities, but also "pose significant ethical challenges for all of society... I hope it will inspire further thinking at home and abroad about how we can ensure fairness, transparency and accountability to underpin the use of AI."
 
GCHQ warns that a growing number of states are turning to AI as a means of spreading disinformation to shape public perceptions and undermine trust. The report comes as the British Government gets ready to publish its Integrated Review into Security, Defence, Development and Foreign Policy.
 
GCHQ:         Computing:      Business Innovation:       Telegraph & Argus:    Hull Daily Mail:    Image: Unplash
 
You Might Also Read:
 
Tracking Modern Slavery On The Dark Web:
 
 
« Microsoft Email Software Breached
Webinar: Build a security posture strategy in the AWS Cloud »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

Rosberg System

Rosberg System

Rosberg System solve the security challenges with connected devices on mobile networks by providing encrypted communications solutions.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

NextVision

NextVision

NextVision is a Cybersecurity and Technology company offering a range of solutions and services for Security, Compliance and IT Infrastructure Management.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.