Preventing Exploitation Of Digital Images Of Children

Child sexual abuse images online present new and daunting challenges for practitioners working in the field of child sexual abuse. 

Now, digital fingerprints of a million images of child sexual abuse have been created, the Internet Watch Foundation (IWF) has said. The IWF’s CTO Dan Sexton explains vital role new European proposal could have in preventing the widespread sexual abuse, rape, and sexual torture of child victims online.

In a quote provided by the IWF, an image analyst said: "I have three children 11 and under. The job has changed the way I think about them and the internet. "It has surprised me how much material there is of very young children. Some of them are five, six, or seven years old."

Susie Hargreaves, Chief Executive of the IWF, said in a statement that the nature of the material is such that its analysts were only allowed to work four-hour shifts, taking regular breaks, and with access to the best counselling and support. The charity says it has helped remove an unprecedented amount of material.

In 2021, it says it took action to remove 252,000 web pages which it confirmed contained images or videos of children suffering sexual abuse - more than ever before.

“For the IWF, we believe there is much to be positive about in the Bill. The introduction of a Duty of Care, Risk Assessment, and in-scope companies being subjected to ongoing to review and dialogue with a new online safety regulator, Ofcom, as well as the introduction of mandatory reporting for child sexual abuse material, are to be welcomed.

“A lot of thought has gone into the development of the legislation. It attempts to strike a balance between protecting children from harm and not infringing on civil liberties such as freedom of expression online,” says Susie Hargreaves.

IWF:        IWF:          BBC:         TechDigest:   

You Might Also Read: 

Britain Aims To Protect Children From Online Pornography:

 

« Social Media Platforms Must Protect Women Online
Artificial Intelligence Will Change The Future Of The World »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

OneCollab

OneCollab

OneCollab, your unwavering ally in the dynamic landscape of IT services and cybersecurity.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.