Preventing Exploitation Of Digital Images Of Children

Child sexual abuse images online present new and daunting challenges for practitioners working in the field of child sexual abuse. 

Now, digital fingerprints of a million images of child sexual abuse have been created, the Internet Watch Foundation (IWF) has said. The IWF’s CTO Dan Sexton explains vital role new European proposal could have in preventing the widespread sexual abuse, rape, and sexual torture of child victims online.

In a quote provided by the IWF, an image analyst said: "I have three children 11 and under. The job has changed the way I think about them and the internet. "It has surprised me how much material there is of very young children. Some of them are five, six, or seven years old."

Susie Hargreaves, Chief Executive of the IWF, said in a statement that the nature of the material is such that its analysts were only allowed to work four-hour shifts, taking regular breaks, and with access to the best counselling and support. The charity says it has helped remove an unprecedented amount of material.

In 2021, it says it took action to remove 252,000 web pages which it confirmed contained images or videos of children suffering sexual abuse - more than ever before.

“For the IWF, we believe there is much to be positive about in the Bill. The introduction of a Duty of Care, Risk Assessment, and in-scope companies being subjected to ongoing to review and dialogue with a new online safety regulator, Ofcom, as well as the introduction of mandatory reporting for child sexual abuse material, are to be welcomed.

“A lot of thought has gone into the development of the legislation. It attempts to strike a balance between protecting children from harm and not infringing on civil liberties such as freedom of expression online,” says Susie Hargreaves.

IWF:        IWF:          BBC:         TechDigest:   

You Might Also Read: 

Britain Aims To Protect Children From Online Pornography:

 

« Social Media Platforms Must Protect Women Online
Artificial Intelligence Will Change The Future Of The World »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.