Christensen, Larissa en Cyber strategies used to combat child sexual abuse material <span>Cyber strategies used to combat child sexual abuse material</span> <span><span lang="" about="/user/72" typeof="schema:Person" property="schema:name" datatype="">Yvette Maconachie</span></span> <span>Wed, 2021-09-01 11:25</span> <div class="field field--name-field-thumbnail field--type-entity-reference field--label-hidden field--item"> <img src="/sites/default/files/styles/max_250_width/public/2021-09/child_with_toy_rabbit-csam627148505.jpg?itok=_kTs-pvn" width="250" height="167" loading="lazy" typeof="foaf:Image" class="img-responsive" /> </div> <div class="field field--name-field-embed-youtube field--type-text field--label-hidden field--item"> </div> <div class="field field--name-field-author field--type-entity-reference field--label-hidden field--items"> <div class="field--item"><a href="/author/edwards-graeme" hreflang="en">Edwards, Graeme</a></div> <div class="field--item"><a href="/author/christensen-larissa" hreflang="en">Christensen, Larissa</a></div> <div class="field--item"><a href="/author/rayment-mchugh-susan" hreflang="en">Rayment-McHugh, Susan</a></div> <div class="field--item"><a href="/author/jones-christian" hreflang="en">Jones, Christian</a></div> </div> <div class="field field--name-field-issn field--type-string field--label-inline"> <div class="field--label">ISSN</div> <div class="field--items"> <div class="field--item">1836-2206</div> </div> </div> <div class="field field--name-field-isbn field--type-string field--label-inline"> <div class="field--label">ISBN</div> <div class="field--item">9781922478313</div> </div> <div class="field field--name-field-published-date field--type-datetime field--label-inline"> <div class="field--label">Published Date</div> <div class="field--item"><time datetime="2021-09-07T12:00:00Z">07-09-2021</time> </div> </div> <div class="field field--name-field-subject field--type-entity-reference field--label-inline"> <div class="field--label">Subject</div> <div class="field--items"> <div class="field--item"><a href="/subject/child-sexual-exploitation-material" hreflang="en">Child sexual exploitation material</a></div> <div class="field--item"><a href="/subject/crime-reduction" hreflang="und">Crime reduction</a></div> <div class="field--item"><a href="/subject/technology" hreflang="und">Technology</a></div> <div class="field--item"><a href="/subject/peer-reviewed" hreflang="und">Peer-reviewed</a></div> </div> </div> <div class="field field--name-field-series field--type-entity-reference field--label-inline"> <div class="field--label">Series</div> <div class="field--item">Trends &amp; issues in crime and criminal justice</div> </div> <div class="field field--name-field-series-num field--type-integer field--label-hidden field--item">636</div> <div class="field field--name-field-abstract field--type-text-long field--label-above"> <div class="field--label">Abstract</div> <div class="field--item"><p>Cyber strategies play a role in combating child sexual abuse material (CSAM). These strategies aim to detect offenders and prevent them from accessing and producing CSAM, or to identify victims. This paper explores five cyber strategies: peer-to-peer network monitoring, automated multi-modal CSAM detection tools, using web crawlers to identify CSAM sites, pop-up warning messages, and facial recognition. This research synthesis captures the background of each strategy, how it works and the evaluative research, along with the benefits, limitations and implementation considerations, offering a practical overview for a broad audience.</p> </div> </div> <div class="accordion-group"> <h2 class="accordion-button">References</h2> <div class="field field--name-field-reference-lists field--type-text-long field--label-hidden field--item accordion-container"><p><span><span><span><em><span>URLs correct as at May 2021</span></em></span></span></span></p> <p><span><span><span>*included in review</span></span></span></p> <p><span><span><span>Açar KV 2017. Web cam child prostitution: An exploration of current and futuristic methods of detection. <em><span>International Journal of Cyber Criminology</span></em> 11(1): 98–109. <a href=""></a></span></span></span></p> <p><span><span><span>Akerman T 2019. Hi-tech damage control. <em><span>The Australian</span></em>, 22 May. <a href="">…</a></span></span></span></p> <p><span><span><span>Australian Federal Police 2017. <em><span>Annual report 2016–17</span></em>. Canberra: Australian Federal Police. <a href=""></a></span></span></span></p> <p><span><span><span>Australian Transaction Reports and Analysis Centre 2019. <em><span>Combating the sexual exploitation of children for financial gain: Activity indicators</span></em>. <a href="">…</a></span></span></span></p> <p><span><span><span>*Baines V 2018. Online child sexual exploitation: Towards an optimal international response. <em><span>Journal of Cyber Policy</span></em> 4(2): 197–215. <a href=""></a></span></span></span></p> <p><span><span><span>Balfe M, Gallagher B, Masson H, Balfe S, Brugha R &amp; Hackett S 2015. Internet child sex offenders’ concerns about online security and their use of identity protection technologies: A review. <em><span>Child Abuse Review</span></em> 24(6): 427–439. <a href=""></a></span></span></span></p> <p><span><span><span>Broadhurst R 2019. Child sex abuse images and exploitation materials. In R Leukfeldt &amp; T Holt (eds),<em><span> The human factor of cybercrime</span></em>. Routledge: 310–36</span></span></span></p> <p><span><span><span>Bursztein E, Clarke E, DeLaune M, Eliff DM, Hsu N, Olson L, Shehan J, Thakur M, Thomas K &amp; Bright T 2019. Rethinking the detection of child sexual abuse imagery on the internet. Paper presented at the World Wide Web Conference, San Francisco, CA: 2601–2607</span></span></span></p> <p><span><span><span>*Canadian Centre for Child Protection 2017. Groundbreaking tool to remove online child sexual abuse material. <a href="">…</a></span></span></span></p> <p><span><span><span>Christensen LS, Rayment-McHugh S, Prenzler T, Chiu YN &amp; Webster J 2021. The theory and evidence behind law enforcement strategies that combat child sexual abuse material.<em> International Journal of Police Science and Management</em>. Advance online publication. <a href=""></a></span></span></span></p> <p><span><span><span>Clarke RV 1980. Situational crime prevention: Theory and practice. <em><span>British Journal of Criminology</span></em> 20(2): 136–47</span></span></span></p> <p><span><span><span>Clarke RV 1997. <em><span>Situational crime prevention: Successful case studies</span></em>. Albany, NY: Harrow and Heston</span></span></span></p> <p><span><span><span>Cornish DB &amp; Clarke RV 2003. Opportunities, precipitators and criminal decisions: A reply to Wortley’s critique of situational crime prevention. In MJ Smith &amp; DB Cornish (eds), <em><span>Theory and practice in situational crime prevention</span></em>. Monsey, NY: Criminal Justice Press: 41–96</span></span></span></p> <p><span><span><span>Europol 2019. <em><span>Internet organised crime threat assessment 2019</span></em>. <a href="">…</a></span></span></span></p> <p><span><span><span> *Gangwar A, Fidalgo E, Alegre E &amp; González-Castro V 2017. Pornography and child sexual abuse detection in image and video: A comparative evaluation. Paper presented at the 8th International Conference on Imaging for Crime Detection and Prevention, Madrid, Spain: 37–42</span></span></span></p> <p><span><span><span>*Hill K 2020. Unmasking a company that wants to unmask us all. <em><span>New York Times</span></em>, 20 January. <a href="">…</a></span></span></span></p> <p><span><span><span> *Hill K &amp; Dance G 2020. Clearview’s facial recognition app is identifying child victims of abuse. <em><span>New York Times</span></em>, 7 February. <a href="">…</a></span></span></span></p> <p><span><span><span>Huisman W &amp; van Erp J 2013. Opportunities for environmental crime: A test of situational crime prevention theory. <em><span>British Journal of Criminology</span></em> 53(6): 1178–1200. <a href=""></a></span></span></span></p> <p><span><span><span>*Hurley R, Prusty S, Soroush H, Walls R, Albrecht J, Cecchet E, Levine BN, Liberatore M, Lynn B &amp; Wolak J 2015. <em><span>Measurement and analysis of child pornography trafficking on P2P networks</span></em>. <a href="">…</a></span></span></span></p> <p><span><span><span>Hutchinson A 2018. Facebook outlines enhanced efforts to remove child exploitation content from its platform. <em><span>Social Media Today</span></em>, 25 October. <a href="">…</a></span></span></span></p> <p><span><span><span>International Centre for Missing and Exploited Children 2018. GMCNgine: Revolutionizing the search for missing children. <a href="">…</a></span></span></span></p> <p><span><span><span>*Joffres K, Bouchard M, Frank R &amp; Westlake B 2011. Strategies to disrupt online child pornography networks. European Intelligence and Security Informatics Conference, Atlanta, Greece: 163–170</span></span></span></p> <p><span><span><span>Johnson B &amp; Patel P 2019. Multi-million pound funding to protect child abuse victims and track down offenders. <a href="">…</a></span></span></span></p> <p><span><span><span>*Kashmir H 2020. Meet Clearview AI, the secretive company that might end privacy as we know it. <em><span>Chicago Tribune</span></em>, 18 January. <a href="">…</a></span></span></span></p> <p><span><span><span>Microsoft 2020a. PhotoDNA. <a href=""></a></span></span></span></p> <p><span><span><span>Microsoft 2020b. PhotoDNA: FAQ. <a href=""></a></span></span></span></p> <p><span><span><span>Mirage News 2020. 19-year-old charged with multiple child abuse offences. <em><span>Mirage News</span></em>, 30 June. <a href="">…</a></span></span></span></p> <p><span><span><span>National Center for Missing and Exploited Children 2020. NCMEC Data. <a href=""></a></span></span></span></p> <p><span><span><span>Oxford T 2019. I can see you. <em><span>Linux Format</span></em>, June. <a href=""></a></span></span></span></p> <p><span><span><span>*Peersman C, Schulze C, Rashid A, Brennan M &amp; Fischer C 2016. iCOP: Live forensics to reveal previously unknown criminal media on P2P networks. <em><span>Digital Investigation</span></em> 18: 50–64. <a href=""></a></span></span></span></p> <p><span><span><span>*Peersman C, Schulze C, Rashid A, Brennan M &amp; Fischer C 2014. <em><span>iCOP: Automatically identifying new child abuse media in P2P networks</span></em>. IEEE Security and Privacy Workshops. San Jose, CA: 124–131. <a href=""></a></span></span></span></p> <p><span><span><span>*Penna K, Clark A &amp; Mohay G 2005. <em><span>Challenges of automating the detection of paedophile activity on the internet</span></em>. First International Workshop on Systematic Approaches to Digital Forensic Engineering. Washington, DC: 206–220</span></span></span></p> <p><span><span><span>*Prichard J, Krone T, Spiranovic C &amp; Watters P 2019. Transdisciplinary research in virtual space: Can online warning messages reduce engagement with child exploitation material? In R Wortley, A Sidebottom, N Tilley &amp; G Laycock (eds), <em><span>Routledge handbook of crime science</span></em>. UK: Routledge: 309–19</span></span></span></p> <p><span><span><span>*Prichard J, Watters P &amp; Spiranovic C 2011. Internet subcultures and pathways to the use of child pornography. <em><span>Computer Law &amp; Security Review</span></em> 27(6): 585–600</span></span></span></p> <p><span><span><span>Prichard J, Wortley R, Watters P, Spiranovic C, Hunn C &amp; Krone T 2021. Effects of automated messages on internet users attempting to access “barely legal” pornography. <em>Sexual Abuse</em>. Advance online publication. <a href=""></a></span></span></span></p> <p><span><span><span>Rayment-McHugh S, McKillop N &amp; Christensen LS forthcoming. Educational and therapeutic programs that combat child sexual abuse material: A research synthesis</span></span></span></p> <p><span><span><span>*Russell A 2020. RCMP used Clearview AI facial recognition tool in 15 child exploitation cases, helped rescue 2 kids. <em><span>Global News</span></em>, 27 February. <a href="">…</a></span></span></span></p> <p><span><span><span>*Schell BH, Martin MV, Hung PCK &amp; Rueda L 2007. Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed technological solution. <em><span>Aggression and Violent Behavior</span></em> 12(1): 45–63. <a href=""></a></span></span></span></p> <p><span><span><span>*Schulze C, Henter D, Borth D &amp; Dengel A 2014. Automatic detection of CSA media by multi-modal feature fusion for law enforcement support. In Proceedings of International Conference on Multimedia Retrieval. Glasgow, United Kingdom: 353–360</span></span></span></p> <p><span><span><span>Seto MC 2013. <em><span>Internet sex offenders</span></em>. Washington, DC: American Psychological Association</span></span></span></p> <p><span><span><span>Smallbone S, Marshall W &amp; Wortley R 2008. <em><span>Preventing child sexual abuse: Evidence, policy and practice</span></em>. Devon UK: Willan Publishing</span></span></span></p> <p><span><span><span>*Smallbone S &amp; Wortley R 2017. Preventing child sexual abuse online. In J Brown (ed), <em><span>Online risk to children: Impact, protection and prevention</span></em>. London: Wiley: 143–162</span></span></span></p> <p><span><span><span>United Nations Office on Drugs and Crime (UNODC) 2015. <em><span>Study on the effects of new information technologies on the abuse and exploitation of children</span></em>. Vienna: UNODC. <a href="">…</a></span></span></span></p> <p><span><span><span>*Westlake B, Bouchard M &amp; Frank R 2012. Comparing methods for detecting child exploitation content online. European Intelligence and Security Informatics Conference. Odense, Denmark: 156–63</span></span></span></p> <p><span><span><span>*Williams KS 2005. Facilitating safer choices: Use of warnings to dissuade viewing of pornography on the internet. <em><span>Child Abuse Review</span></em> 14(6): 415–429. <a href=""></a></span></span></span></p> <p><span><span><span>*Wolak J, Liberatore M &amp; Levine BN 2014. Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network. <em><span>Child Abuse &amp; Neglect</span></em> 38(2): 347–56. <a href=""></a></span></span></span></p> <p><span><span><span>Wortley R &amp; Smallbone S 2012. <em><span>Internet child pornography: Causes, investigation, and prevention</span></em>. Global crime and justice series. Santa Barbara, CA: Praeger</span></span></span></p> <p><span><span><span>Wortley R &amp; Smallbone S 2006. Applying situational principles to sexual offenses against children. In R Wortley &amp; S Smallbone (eds), <em><span>Situational prevention of child sexual abuse</span></em>. Monsey, NY: Criminal Justice Press: 7−36</span></span></span></p> </div> </div> Wed, 01 Sep 2021 01:25:03 +0000 Yvette Maconachie 2471 at