New Laws To Prevent Using AI To Generate Sexual Images

Britain will he UK will be the first country to make it illegal to possess, create or distribute Artificial Intelligence (AI) tools designed to create child sexual abuse material (CSAM), and any criminal activity of this type will get a punishment of up to five years in prison.

The legislation is intended to tackle the use of AI for the creation of abusive child imagery and there will be four new  laws to reduce the increasing threat of child sexual abuse that AI presents.

Artificially generated CSAM involves images that are either partly or completely computer generated. Software can "nudify" real images and replace the face of one child with another, creating a realistic image. In some cases, the real-life voices of children are also used, meaning innocent survivors of abuse are being re-victimised. Fake images are also being used to blackmail children and force victims into further abuse.

The British National Crime Agency reports that there are 800 arrests each month relating to threats posed to children online. It said 840,000 adults are a threat to children nationwide, both online and offline, which makes up 1.6% of the adult population.

The legislation is intended  address the following criminal acts:  

  • “Nudifying” real-life images of children, or stitching their faces on to existing images of abuse, are among the ways AI is being used by abusers,with fake images being used to blackmail children and force them to livestream further abuse.
  • Possession of AI paedophile manuals, which teach people how to use AI for sexual abuse, will also be made illegal, and offenders will get prison sentences of up to three years. 
  • Other laws set to be introduced include making it an offence to run websites where paedophiles can share child sexual abuse content or provide advice on how to groom children. 

The UK Border Force will be given powers to instruct individuals who they suspect of posing a sexual risk to children to unlock their digital devices for inspection when they attempt to enter the UK, as CSAM is often filmed abroad. Depending on the severity of the images, this will be punishable by up to three years in prison.

The Internet Watch Foundation (IWF) has warned that more sexual abuse AI images of children are being produced, with them becoming more prevalent.

AI-generated images have been used to blackmail children and force them into more abusive situations, including the live streaming of abuse. AI tools are also helping perpetrators disguise their identity to help them groom and abuse their victims.

Senior police officers say that there is now well-established evidence that those who view such images are likely to go on to abuse children in person, and they are concerned that the use of AI imagery could -normalise the sexual abuse of children.

British Home Secretary, Yvette Cooper, said “We know that sick predators' activities online often lead to them carrying out the most horrific abuse in person. This government will not hesitate to act to ensure the safety of children online by ensuring our laws keep pace with the latest threats.

“These four new laws are bold measures designed to keep our children safe online as technologies evolve. It is vital that we tackle child sexual abuse online as well as offline so we can better protect the public from new and emerging crimes as part of our Plan for Change.”

The new laws will be brought in as part of the Crime & Policing bill, which has yet to come to parliament. 

BBC     |   Guardian     |   Times of India     |   Sky  |    IWF     |   Yahoo     |    Independent

Image: Leire Cavia

You Might Also Read: 

Teach Your Children About Safer Cyber Security:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« AI Security Standard To Promote British Digital Economy
Lessons Learned From The Salt Typhoon Hacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

Yaana Technologies

Yaana Technologies

Yaana is a leading provider of intelligent compliance solutions including lawful interception, data retention & disclosure, and advanced security analytics.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Ascent Cyber

Ascent Cyber

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Velotix

Velotix

Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape.