Sie sind auf Seite 1von 35

TECHNOLOGY Briefing 1

BRIEFING SERIES Online Child Sexual Abuse Imagery

Centre for the Analysis of Social Media


TECHNOLOGY
BRIEFING SERIES
Demos is producing a series of briefings about technology, bringing together
experts from policy, practice and tech.

We recognise that technology can present a challenge to policy makers. The


aim of this series is to help with that challenge: to explain the technology
clearly and succinctly, to report expert opinion with clarity, and to share the
views of big players in the world of technology.

This report is the first in the series. It examines child sexual abuse images
(CSAI) and their distribution and consumption online.

We are especially grateful for interviews, input and expert advice from the
Internet Watch Foundation, CEOP, law enforcement, academics, internet
companies and third-sector organisations. A list of interviewees is contained
in the appendix.

The report is based on a careful review of existing literature and interviews


with various experts, including the Internet Watch Foundation, CEOP, law
enforcement, academics, internet companies and third-sector organisations
that work with offenders and victims.
EXECUTIVE
SUMMARY
New technology has made the task of Police successes in identifying and
tackling CSAI significantly more difficult. prosecuting criminals who operate in this
Specifically, the internet has allowed for area have tended to rely on both
new channels of access and distribution international co-operation and forensic
that are often based overseas and change detective work. Investment in this type of
frequently with technological advance. policing is necessary. When resources are
While the problem is borderless, law stretched, it is necessary for policing to
enforcement remains geographically focus resources on the most serious
constrained. offenses: those which can be most
effective in reducing harm to children.
There are no easy solutions to this
problem. It is not possible to develop a Prevention work, while difficult, remains
singular, technological solution to this one area where more can be done. There
problem: success to date has turned on is a general consensus that investing
effective industry self-regulation and more in schemes to work with potential
commitment of industry resources. This offenders and prevent re-offending would
can be illustrated by the small proportion be a positive move.
of illegal content identified on social
media platforms and other major It will not be possible to ensure informed
technology companies, and the reputation public debate about CSAI without
of regulators like the IWF. responsible reporting of the problem. It is
everybody’s responsibility to report on the
However, there is a significant amount of subject carefully, in an informed way, and
investment in using technology to identify without conflating CSAI with other harmful
material, which is proving valuable in online content. Lessons could be learned
tackling the problem. This needs further from well-established reporting guidelines,
support. such as news related to suicide.
01.
Introduction to
CSAI Online
INTRODUCTION
The Internet has fundamentally policy makers to keep up with the
changed the way in which child pace of technological change. There
sexual abuse images (CSAI) are is, however, no technological silver
produced, distributed, consumed bullet: child sexual exploitation is an
and combated. New sources and old problem, and decision-makers
new channels for the online and the media must do more to
exploitation of children have been acknowledge this.
In 1990 the Home opened up. Millions of images in
Office estimated the circulation are easily accessible This briefing brings together
figure of video- or online by thousands of adults, and expertise from the fields of law
paper-based CSAI in are located in places frequently enforcement, technology, third-
circulation to beyond the reach of national law sector support and academia to
around 7,000 enforcement. clearly articulate the current state of
images; today, police play, and offers evidence-based
seizures often Combating child sexual abuse recommendations for policy.
involve millions of online will require enforcement and
digitally stored
images.

LEGAL DEFINITIONS
Possessing, making or sharing indecent images of children is a criminal
offence in the UK under the Protection of Children Act 1978 and the
Criminal Justice Act 1988. Indecent images of children can include child
sexual abuse images (CSAI) and self-generated indecent images. Since
2014, the UK Sentencing Council categorises CSAI into three levels:

Images involving penetrative sexual activity; images


Category A
involving sexual activity with an animal or sadism.

Category B Images involving non-penetrative sexual activity.

Category C Other indecent images not falling within categories A or B.

Legally, a child is defined as a person under 18 years of age. In practice, the


fight against CSAI tends to focus on images that are clearly illegal and illegal
in many countries, typically including children 15 years and younger.

Demos Technology Briefings Online Child Sexual Abuse Imagery 3


02.
Common Misconceptions about
Child Sexual Abuse Images Online
01. “Technology is a Silver Bullet.”
There have been important technological responses to CSAI, but technology can’t do
everything. There is also a gap between who is able to implement technological
solutions and who is responsible for the websites which are abused by CSAI offenders.

02.
See more on page 19.

“Social media is primarily to blame.”


Reports suggest only a small proportion of CSAI is hosted on social media platforms,
in part because many platforms already take steps to tackle it. However, social media
can unwittingly offer new material to consumers posted by young people themselves,
and provides new avenues for online grooming.

03.
See more on page 21.

“Finding CSAI online is difficult.”


CSAI is not all hidden. It can be accessed easily, and even stumbled upon.

04.
See more on page 7.

“We can arrest our way out of the problem.”


Law enforcement, third-sector charities and academics agree that the numbers of
adults engaging with CSAI online means arresting and prosecuting all offenders would
not be possible. This underscores the need for a more wide-ranging response.

05.
See more on page 24.

“A ban on encryption would be effective.”


The difficulties caused to law enforcement by the blanket uptake of encryption should
not be underestimated, but frequently are. However, a ban is not a feasible solution,
as it would not deal with the problem targeted, and likely create new ones.

06.
See more on page 13.

“Industry doesn’t self-regulate.”


Experts spoke to the advantages of self-regulation. In the UK, the IWF and its industry
partners have tended to be quick to remove content and quicker to react and adapt to
technological change.
See more on page 18.
03.
Scale of Online Child
Sexual Abuse Imagery
SCALE OF ONLINE CSAI
Estimating the scale of online Child UK who have at some point viewed
Sexual Abuse Imagery (CSAI) is CSAI, far higher than previous
difficult. Investigations only identify estimates.
a fraction of offenders, victims can
take a long time to come forward, Offenders who access CSAI fall into
and strong societal attitudes deter two broad categories. ‘Consumers’
self-reporting. view and distribute material, while
‘producers’ create material as well
Accurate statistics for engagement as viewing and distributing it.
with CSAI online are a vital Offenders can also be classed by
requirement. Without knowing the technological sophistication.
scale of the problem, policy and law Sophisticated offenders take steps
enforcement responses will remain to protect their activity online, for
poorly informed and “the ability to example, using encryption (see
(CEOP 2013) differentiate high risk cases and below). Unsophisticated offenders
suspects is reduced.” do not, and are therefore
significantly more vulnerable to law
However, changes to the way enforcement investigation.
images are produced and
distributed has made this extremely Estimates of the scale of CSAI in the
difficult. There were 7000 indecent UK come primarily from the Internet
(Home Office 2010)
images of children in circulation in Watch Foundation (IWF), which
1990 in the UK. According to publishes annual statistics on the
sources in the police, that figure has CSAI identified on UK servers. It is
now risen to tens of millions. The difficult to assess how well these
precise number of individuals estimates reflect the true scale and
convicted of CSAI offences is not nature of CSAI offences in the UK –
published in the UK, but is included images are widely duplicated and,
in the number of people arrested as with any crime, the criminals we
for ‘obscene publications’ violations. catch aren’t necessarily reflective of
This increased by 134 per cent to the criminals at large.
(ONS 2016) 7,324 in 2014/15. In total, 54,000
child sexual abuse offences (contact Although it is well established that
abuse and CSAI) were recorded in CSAI is distributed across the
the UK 2015/16. internet, exactly how is less well
understood. According to the IWF,
The actual number of offenders is less than 0.01 per cent of identified
likely to be even higher. The Child content is hosted in the United
Exploitation and Online Protection Kingdom, down from 18 per cent in
Centre (CEOP) estimated in 2013 1996. Most of the material the
(CEOP 2013) that 50,000 individuals viewed CSAI Foundation identifies is hosted in
each year in the UK. A more recent Europe (60 per cent) and North
survey in Germany found that 2.4 America (37 per cent). According to
(Dombert et al. 2016) per cent of men reported viewing IWF reports, the Netherlands, the
CSAI. Applying these figures to the USA and Canada are the most
UK, the NSPCC estimates there may frequent national hosts of CSAI.
(Jütte 2016) be as many as 590,000 men in the .

Demos Technology Briefings Online Child Sexual Abuse Imagery 7


An image hosting site
stores images
uploaded by its users.
A cyberlocker is a
website allowing users
to store and download
files. Both are often
The IWF’s figures suggest that the not legally able to access this
low-budget, hosted
majority of CSAI is found on image content. outside the UK and
hosting sites (72 per cent) and run by a handful of
cyberlockers (11 per cent). Only 0.01 Earlier this year, some 20 per cent of people.
per cent of the CSAI identified by the the dark net (under Freedom
IWF is hosted on social networking Hosting II) was taken over by
sites. However, according to the hackers, which claimed that half of
Chief Online Safety Officer at the sites – or 10 per cent of the dark
Microsoft, Jacqueline Beauchere, net – were dedicated to CSAI. (McCoogan 2017;
many CSAI are detected and Research by the Global Commission Lewis 2016)
removed by social networking sites on Internet Governance found that
themselves, before images can be CSAI was the most popular type of
(Owen & Savage
reported to the IWF. This suggests content on the dark net.
2015)
that tech companies could be more
transparent about how much Adding to the growing volume of
material they are encountering and CSAI is a newer phenomenon. A
the efforts they are taking to identify, growing proportion of indecent
report, and remove CSAI. images of children are ‘self-
generated’ images, produced by
Similarly, the IWF reports that only 1 minors: one fifth of reported images (NSPCC 2016)
per cent of the CSAI it identifies is in 2015 were self-generated. This is
hosted on ‘Tor Hidden Services’, supported by the fact that around
often referred to as the ‘dark net’. 16 per cent of young people aged
Because of the difficulty involved in 11-16 have reported sending sexual (Martellozzo et al.
identifying illegal material on the images in the UK and 1 in 6 people 2017)
dark net, this figure is unlikely to reported to the police for indecent
reflect the true scale of CSAI on images are minors. (NSPCC 2016)
hidden services. This is further
compounded by content rarely The chart below shows indicative
being ‘publicly available’, but limited volumes of CSAI producers and
to site or forum members: the IWF is consumers online.

Sophisticated Producers

Sophisticated Consumers

Unsophisticated Consumers
(i.e. no technological protection)

Unsophisticated Producers
(i.e. young people)

Demos Technology Briefings Online Child Sexual Abuse Imagery 8


Where is Child Sexual
Abuse Imagery Hosted?
Reported websites (IWF, 2016)

60%

30%

9.9%

0.1%

Europe North America UK Other

72%

16.99%
11%

0.01%

Image Hosting Sites Cyber Lockers Social Networking Other


Sites

The data shown above is based on the websites reported to the IWF in 2016.
Unreported, hidden sites are not included, nor are examples of CSAI that have been
removed before a report was filed.

Demos Technology Briefings Online Child Sexual Abuse Imagery 9


04.
Technology Challenges
in CSAI
“The Internet has significantly changed
offender behaviour. The key challenges
now are the huge volume of material and
the borderless nature of the Internet,
compared to the bordered nature of law
enforcement.”
Fred Langford
Deputy CEO at the Internet Watch
Foundation

‘Law enforcement offline relies on CCTV


and DNA. We still need to find this audit
trail in the online space, but it is much
harder.’
David Gray
National Online Coordinator for CSE
TECHNOLOGY CHALLENGES
This section explains the key changes in offender culture, and the
technological developments which technological solutions
have affected the ways in which implemented or proposed by
CSAI is stored and communicated, parties dealing with CSAI online.

Replicability & Interconnectedness


The Internet’s capacity to facilitate around the world, close-
the storage and transfer of billions cooperation by technologically-
of files, to host communities of like- savvy law enforcement is a
minded Internet users, and to allow necessity. One recent investigation
both on an international scale, has resulted in arrests across fifteen
had predictable consequences for countries in Central and South
CSAI. Files are replicated in multiple America, and Europe. Known as
locations, both online and offline. Operation Tantalio, it was
(Interpol 2017) coordinated by Interpol and
Tackling the sources and hosts of Europol to target offenders sharing
A web server is a the files is difficult: with servers that CSAI over the messaging app
computer system host Internet content located Whatsapp.
which stores,
processes, and
delivers webpages
Encryption
to clients. Encryption – essentially a means of However, the recent uptake of
keeping messages or Internet powerful encryption has been
activity hidden except to those who picked up and used by various
are intended to see them – has individuals involved in the
become an important part of how distribution and storage of CSAI (as
the Internet works. According to well as extremism and the drugs
former director of GCHQ Robert trade). This is especially true of
(BBC 2017) Hannigan, ‘encryption is offenders with a relatively high level
overwhelmingly a good thing’, of technical sophistication. Three
keeping us all ‘safe and secure’. forms of encryption are worth
exploring in the context of CSAI.

Encrypted Web Browsing and the ‘Dark Net’


Some perpetrators rely on ‘Tor Tor Hidden Services have a
A proxy network is a
Hidden Services’ (websites where reputation for hosting illegal
computer or
server location is obscured using material. As discussed, the volume
program which acts
proxies, also known as the ‘dark of CSAI content in these systems is
as an intermediary
for local requests to net’). These websites are accessible difficult to measure accurately.
other servers. through special browsers, such as However, they play an important
‘Tor’, which encrypt the connection role in the general availability of
and make tracing a user who is material. Being difficult to censor
browsing these ‘hidden services’ entirely, they can provide a
(Bartlett 2014)
difficult. Similarly, those sharing ‘warehouse’ function, meaning there
CSAI across peer-to-peer platforms is always a source of available
which allow the transfer of files material.
from one computer to another are
frequently protected by encryption.
Demos Technology Briefings Online Child Sexual Abuse Imagery 12
‘End-to-end’ Encrypted Messaging
End-to-end encryption is where the Experts confirm that end-to-end
contents of a message sent encryption has made the tasks of
between two people cannot be read law enforcement more difficult:
by a third party. It is increasingly prosecution requires an audit trail
included as standard in most of evidence which is frequently
messaging apps and platforms by inaccessible to either law
companies increasingly conscious enforcement or even a cooperative
of their customers’ privacy. technology company.

Hardware Encryption
Encryption is also used by offenders of Investigatory Powers Act (RIPA)
to store material. For example 2000 requires suspects to give up
VeraCrypt can create a virtual passwords to encrypted systems or
encrypted disk for ‘on-the-fly face up to 5 years prison (for
encryption’. TAILS, an encrypted suspected cases of ‘child
operating system, can be run from a indecency’).
USB. However, the UK’s Regulation

Encryption has become a difficult policy area in recent months. While used
by those accessing CSAI, it is also very widely used by journalists, whistle-
blowers, and ordinary members of the public. Encryption is the
cornerstone of a digital economy and a digital culture. Internet banking,
protection from hacking, and secure processing of data all depend on
secure encryption systems.

Despite the challenges, limiting the use of encryption is not widely


supported by experts in this area. Making the Internet less safe for
everyone will not necessarily make it less safe for those sharing CSAI, and
will expose British citizens to cybercrime at a time when they are
increasingly at risk. The mathematics underpinning encryption are well
known, and it is highly likely that security-conscious offenders would
continue to use it under any kind of blanket ban.

Social Media Platforms


The last decade has seen a huge a victim, usually referred to as
(Lilley et al. 2014) growth in social media platforms grooming. A 2014 survey found that
online, with 96 per cent of 16-24 12 per cent of children with a social
year olds now using at least one. media profile had received
(compared to the UK
Although not often used to unwanted sexual messages online.
average of 69 per
distribute CSAI, they provide a In 2012, CEOP identified social
cent; ONS 2017)
platform through which young networking sites as the most
people publish images that are common offending environment for
either publically available or child exploitation: over 80 per cent
vulnerable to being shared without of online child exploitation cases in
permission. Social media also the UK involved social networking or
(CEOP 2013)
provides a route between a instant messaging sites.
potential contact offender and
Demos Technology Briefings Online Child Sexual Abuse Imagery 13
Digital Culture Change
‘Revenge porn’ is The Internet has had major impacts also at risk of being
sexually explicit on sexual culture, resulting in misappropriated by paedophiles,
material shared changes in the nature and sources and both have inspired new
without a person’s of illegal pornography. Several criminal activity, such as revenge
consent. Sextortion studies suggest that the high porn, sextortion and peer-on-peer
is blackmail using volumes of Internet pornography in abuse.
explicit material. circulation have normalized it,
changing attitudes to this type of Technological change has brought
content among young people. A with it cultural change among
recent study found that 53 per cent offenders. Online anonymity can
of 16 year olds had seen create a feeling of safety, and lead
(Suler 2004) pornography, and 94 per cent of to a sense of disinhibition. As noted,
(Martellozzo et al. them had seen it by the age of 14 ease of access to all pornography
2016) has been greatly increased by the
Alongside the circulation of existing web. Voices within the child
CSAI, the use of smartphones by protection community have
young people to take indecent suggested that this availability has
images of themselves, or sharing also desensitized viewers of
(Jütte 2016; indecent images of other young pornography who may turn to
Cline 2001) people they know, has created a extreme or illegal pornography as
new challenge. Images posted to interest in legal content dwindles.
social media by young people are

Emerging Trends
Technological change continues apace, creating new opportunities for both
offenders and those tasked with stopping them. A comprehensive list is
impossible, but the following areas are likely to grow in importance in the
coming 3-5 years

 Live streaming of abuse or  Unsecured ‘Internet of Things’


webcams, which is especially devices (such as a ‘smart’ TV)
difficult to detect in real-time and acting as ‘safe’ repositories of
leaving little or no digital trace. images, without the knowledge of
the device owner.
A distributed  Online ‘cloud’ storage, which
network is not reduces the need for offenders  Improvements in mobile
reliant on a central to store images offline. technology, such as the move
server: it could be Increasing broadband speeds from 3G to 4G (and the
operated across also support the use of online- forthcoming 5G), will further
connected only services. encourage streaming and ‘peer-
computers. This  Default encryption, which is now to-peer’ sharing, and reduce
could be enabled by bundled by default with all reliance on offline storage.
a new technology
phones, messaging applications
called ‘blockchain’,
and online services.
which acts as a
distributed ledger
for files or  Use of distributed networks,
information. which are difficult to censor.

Demos Technology Briefings Online Child Sexual Abuse Imagery 14


A CHANGING LANDSCAPE

Proliferation of Increasing availability


pornography online has of CSAI as internet
changed attitudes to connectivity becomes
sexual imagery. universal.

Access to smart
Websites are hosted
phones has allowed
around the world,
young people to produce
requiring international
sexual images themselves,
cooperation to combat
and images shared by
them.
parents are being misused.

Live streaming of abuse


‘Sextortion’ threat of
or webcams: especially
publicising existing images
difficult to detect in real-
unless additional images
time and leaving little or no
are produced.
digital trace.

Online ‘cloud’ storage


reduces the need for Encryption is now
offenders to hoard offline. bundled with all phones,
Increased broadband messaging applications
speeds support the use of and online services.
online-only services.
05.
Responses
to CSAI
“There is a misconception that tech can do
anything - when actually, there are things
that might be technically impossible.”

Expert Interviewee
RESPONSES TO CSAI
Law & Policy
The two central pieces of legislation Downloading images hosted
on CSAI in the UK are Section 1 of outside the UK remains an act of
the Protection of Children Act 1978 ‘making’ within the UK’s jurisdiction.
and Section 160 of the Criminal
Justice Act 1988. Both of these acts The Sexual Offences Act 2003
stipulate offences for indecent changed the definition of a ‘child’ to
photographs (or pseudo- include young people aged 18 years
photographs) of a child. and lower, and also prohibits other
child exploitation offences, including
The 1978 Act establishes offences grooming.
for taking, making, distributing, and
possessing CSAI. This has been Before the last election, additional
more commonly used in measures were taken by the
prosecutions than the 1988 Act, government to tackle CSAI. The
which concerns the possession of Independent Inquiry into Child
images only. Case law has Sexual Abuse (IICSA) was
established that ‘making’ images announced in 2014 by then Home
under the 1978 Act can include Secretary Theresa May. Alongside
opening email attachments, the inquiry, the government has
The CAID is downloading images to a computer, supported the creation of the
discussed in detail storing images on a computer, and WePROTECT Global Alliance, the
below. It is a accessing a website with ‘pop-ups’ - Child Abuse Image Database (CAID),
database containing whenever this is done deliberately and international cooperation by
known CSAI images, with the knowledge that there are intelligence agencies. However,
each of which has (likely to be) indecent images of complications with the IICSA and
been given a unique children (CPS). The Protection of the impact of Brexit and counter-
‘hash’ or ID. Children Act 1978 has therefore terrorism on political priorities have
afforded courts the ability to adapt moved the spotlight away from
understandings of this offence to CSAI.
reflect new technologies.

Self Regulation
The IWF has an advantaged role in approach might allow. The IWF
policing of CSAI in the UK. It is an currently publishes biennial audits,
independent, self-regulatory and points to the speed at which
organisation. Experts within the IWF content is now removed and the
and external to it have argued that large reduction in UK hosted
this approach has allowed the IWF content as evidence of their
to keep up with the pace of effectiveness.
technological development over the
past two decades, operating with
greater agility than a legislative

Demos Technology Briefings Online Child Sexual Abuse Imagery 18


A Memorandum of Understanding net’, which are reported to host
between the NPCC and the CPS country hotlines or law
formally recognises the work of the enforcement.
IWF and protects its employees Since 2015, the IWF has also
from prosecution in the course of contributed to the CAID by
their legitimate search for illegal assessing and categorising images
content. The IWF provides a hotline for law enforcement, and will in the
for reporting CSAI and since April future contribute to the CAID
2014 itself has proactively searched directly.
for publicly-available images,
including those hosted on the ‘dark

Policing
The policing response to CSAI has required to guarantee competence
been divided between local police across police forces.
forces, which tend to focus on
pursuing less technologically There is a clear correlation between
sophisticated offenders, and CEOP, CSAI offences and contact offences
NCA and GCHQ, which investigate against children, but a causal
more complex cases, such as relationship has not been
international rings, live streaming, established – we do not know
organised crime, and CSAI on the whether CSAI satisfies or
dark net. According to experts, law exacerbates the demand for
enforcement has benefited from contact abuse. CEOP has therefore
significant investment in technical recommended that CSAI offenders
skills in recent years, but in order to be viewed as potential contact
(CEOP 2013) ensure a national response, offenders ‘to some extent.
continued investment will be

Demos Technology Briefings Online Child Sexual Abuse Imagery 19


TECHNOLOGICAL RESPONSES
Currently, tackling online CSAI in the part due to the technical complexity
UK is a collaborative effort involving involved in dealing with aspects of
policy-makers, law enforcement, online material, which exceeds the
technology companies, and civil capacity of law enforcement alone.
society organisations. This is in large

Child Abuse Image Databases (CAID)


In 2014, the Home Office developed adopt a lowest common
a unified Child Abuse Image denominator approach. This is the
Database (CAID) to bring together intention of the ‘Worst of’-list, which
all CSAI collected by all UK police is a list of hashes that identify
and the National Crime Agency material that would be illegal in any
(NCA). Newly found images can be country.
uploaded to CAID, which
Image hashes are
automatically compares them to the Efforts have been made to make
unique ‘digital
fingerprints’ images hashed in the database and this technology available to smaller
assigned to known sorts them by level of severity. hosts, for whom funding is limited.
CSAI. There are Thanks to this, law enforcement can However, rollout has not taken
different ways of more quickly identify any ‘first place in the parts of the web where
assigning image generation images’ (newly produced CSAI is most prevalent because
hashes, such as CSAI) and begin the victim hosts lack the capacity or interest in
PhotoDNA and SHA- identification process. building preventative measures.
2, meaning each One independent expert told us
image can have Internationally, Interpol that there is a major problem with
multiple different supplements traditional the ‘long-tail’ of providers: small
hashes, but two investigative methods and image companies that can’t deal with the
different images analysis with the International Child responsibilities of hosting, and may
cannot share the Sexual Exploitation (ICSE) image and be inadvertently hosting illegal
same hash. New video database. However, material but do not have the
images can be differences in countries’ CSAI capacity or know how to monitor
checked against the legislation means that Interpol must and remove it.
hashes of known
images by a
computer, saving Website Blocking
time and human
resources. The IWF provides a list of URLs them. The IWF also offers domain
known to contain CSAI. Updated and payment brand alerts to
twice a day, it can be used by companies wishing to quickly
network operators, social media identify and remove illegal websites
companies and filtering providers to that are registered or receiving
block access to these websites and money through them.
search engines to stop indexing

Demos Technology Briefings Online Child Sexual Abuse Imagery 20


Website blocking is seen as a which were found to have child
preventative measure - the details sexual abuse material. This is the
of people who have been redirected fastest scanning tool yet developed
away from known illegal domains and promises to hasten detection.
are not typically retained or shared
with law enforcement and accessing Similarly, the IWF internal software
domains once (or even a few times) development team are currently
are unlikely to form the basis of a building to further automate the
prosecution. search for child sexual abuse
material on the ‘dark net’. The ‘Dark
Earlier this year, the Canadian Web’ crawler was created by
A ‘crawler’ follows Centre for Child Protection Richard Franks of Simon University
links on websites to launched a new tool called Project and has been working with the IWF
discover new Arachnid, which is an automated Technical team to adjust the crawler
websites and stores ‘webcrawler’ that follows links from to compliment the work the IWF
this information. known CSAI websites across the already do online. Once the crawler
clear and dark net. In an initial six- is up and running, it will crawl
week trial of the crawler, it hidden services for known child
successfully scanned 230 million sexual abuse and alert analysts to
individual webpages, 5.1 million of new content.

Artificial Intelligence and Deep Learning


Deep learning is a Tools are being developed by act.
kind of artificial technologists and in partnership
intelligence (or AI) with law enforcement to bring the This technology would greatly
that allows power of AI and ‘deep learning’ to accelerate identification of CSAI and
computer programs image recognition. Experts believe of victims, while easing the
to automatically this technology has great potential, psychological burden on operatives
learn and improve for instance, in identifying likely new tasked with classifying this data.
from experience. CSAI before it is shared, or in However, the pace of technological
automatically determining the age development requires continued
of a victim or severity of an abusive investment here.

Internet Company Responses


Most major Internet companies launched a new service – VideoDNA.
have taken steps to fight CSAI on VideoDNA utilises custom software
their platforms. Facebook, Twitter, and PhotoDNA algorithms to hash
and Google use Microsoft’s stills of child sexual abuse images
PhotoDNA image hashing system to within videos. With this technology,
tackle CSAI on their platforms. This reviewing and categorising videos
may explain why the proportion of takes a few minutes rather than
detected CSAI on social media hours to complete and with less risk
platforms is reportedly low. that a reviewer might identify some
small parts of the video incorrectly.
In August 2017, the IWF, in
partnership with Microsoft

Demos Technology Briefings Online Child Sexual Abuse Imagery 21


Google has introduced changes to not known where this material is
its search algorithms to limit results most commonly found.
for CSAI queries, as well as
restricting access to known Despite having adopted Terms of
websites through its Chrome Service and technical tools that
browser. Both the IWF and Thorn (a tightly restrict illegal and even ‘grey
US-based NGO) have also worked area’ content, social media
with the search engines to redirect companies remain under pressure.
potential offenders towards help The volumes of content on these
based on their search queries. websites, numbered in the billions
Facebook also restricts searches for of photos, comments and
certain keywords across its services. messages, make policing the
platform difficult. Provision of
In 2006, service providers formed messaging platforms also provides
the Technology Coalition to jointly a channel between offenders and
fight online CSAI and develop new victims, a tool exploited by online
tools. In partnership with the US groomers. Finally, they provide an
National Center for Missing and environment in which young
Exploited Children (NCMEC), they people, and parents or friends of
made over 8.1 million reports of young people, are encouraged to
suspected CSAI in 2016 alone. share images. Despite privacy
However, NCMEC does not publish warnings, these are often public,
a breakdown of these figures so it is and used as material by offenders.

International Investigations
In 2014, a joint The UK is frequently seen as the some of the largest operations in
Australian-Europol global benchmark for combating the last decade.
investigation gained CSAI. The IWF, CEOP, GCHQ, the
access to Playpen, a NSPCC and other charities, and law Formed in 2015, the WePROTECT
website distributing enforcement, have formed a strong Global Alliance emanated from a
CSAI. The FBI was national network of cooperation. merger of the Global Alliance
able to unmask Nonetheless, experts did note that Against Child Sexual Abuse Online
users accessing the even greater levels of cooperation (led by the US Department of Justice
site. When it was could be achieved. and EU Commission) and the UK’s
shut down in WePROTECT initiative, and
February 2015,
Major successes in investigating represents the most
there were over
CSAI distribution rings have tended comprehensive global initiative to
215,000 users and
to rely on two pillars: international establish coordinated and
23,000 images and
videos. There have
cooperation and forensic detective comprehensive national responses
been some 900 work. to CSAI. Other initiatives include
arrests and INHOPE, an international network of
investigations Europol, Interpol, the FBI, and hotlines to report illegal content
continue. national enforcement around the online.
world have worked together on

Demos Technology Briefings Online Child Sexual Abuse Imagery 22


“The problem is the “long tail” of providers -
small companies hosting material that can’t
deal with the responsibilities that come from
hosting. The big players can’t do everything.”

Expert Interviewee
05.
Preventing
Online CSAI
PREVENTION
Efforts to address online CSAI have For instance, the campaign slogan
largely focused on the detection was:
and prosecution of offenders and
protection of victims, but far less “You are not at fault for your sexual
has been done in the realm of feelings, but you are responsible for
prevention. Experts across the your sexual behaviour! There is help
board have highlighted the need for available! Don’t offend!”
a different approach to prevention,
including the NSPCC, which stated Over 8000 people have sought help
last year that ‘it is a focus on through the project since its
(Jütte 2016) prevention that will make the long- inception and some 260 people are
term difference.’ currently in therapy. Treatment
consists of cognitive behavioural
Currently, the main source of help therapy and optionally medication
for potential offenders in the UK is to either reduce sex hormones or
the Lucy Faithfull Foundation, which their effect. The Dunkelfeld project
provides the Stop It Now! Helpline has been a source of much-needed
(Beier & Loewit
(0808 1000 900) and Get Help information on non-offending
2013)
website (get-help.stopitnow.org.uk) paedophiles and early academic
(Beier et al. 2014) for abusers and those at risk of assessments of its effectiveness are
abusing. The Specialist Treatment positive.
Organisation for the Prevention of
Sexual Offending (StopSO) also The second approach adopted in
supports potential offenders by the UK has been to help convicted
helping them find trained therapists offenders refrain from re-offending.
and providing training for Reoffending rates for sexual crimes
professionals. Despite the work of are actually relatively low – in the
these organisations, support pre- UK, it is around 15 per cent
(MoJ 2017) offence is limited in its reach and (compared to 40 per cent for theft,
scope. For example, the Stop It for example) – further reinforcing
Now! helpline estimates that it the view that interventions must
misses around 1500 calls each take place prior to the first offence.
month due to lack of resources. In prison, CSAI offenders can take
part in Sex Offenders Treatment
Better public understanding might Programmes (SOTP), including one
encourage potential offenders to programme specifically focused on
seek help sooner and avoid Internet crimes. Evaluations of
offending. Germany’s Dunkelfeld these programmes have been
Prevention Project (www.dont- largely positive, finding significant
offend.org) has led the way in decreases in pro-offending
prevention internationally. The attitudes. However, there is
project began in 2005 as a large- anecdotal evidence that many CSAI
scale media campaign advertising offenders in the UK do not receive
free confidential medical treatment long enough prison sentences to
to paedophiles who wanted clinical take part in these programmes
help. while serving their sentences.

Demos Technology Briefings Online Child Sexual Abuse Imagery 25


Outside of prison, Circles UK offers leading example of this in the UK is
support for ex-offenders to the CEOP’s Thinkuknow curriculum
reintegrate into the community. and related teaching resources,
Circles brings together several which was estimated in 2009 to
volunteers from the community have reached 14 per cent of UK
who meet regularly with the ex- children. The programme has been
offender to help reduce their social shown to children’s likelihood of
isolation, develop pro-social reporting threatening online
behaviours, and follow any experiences, but did not affect their
treatment programmes. In 2015/16, propensity to share personal
there were 137 ex-offenders in the information or interact with
(Davidson et al. 2009)
programme. However, there have strangers. It is likely that
been no systematic studies of the Thinkuknow has improved in
effectiveness of the Circles. effectiveness since this review, as
resources have been developed
As well as programmes for that are more targeted to different
offenders and potential offenders, age groups and using more varied
there are also programmes to teaching styles, but no evaluations
educate potential victims. The have been conducted since.

Demos Technology Briefings Online Child Sexual Abuse Imagery 26


06.
Recommendations
We conclude there are seven areas in which government, tech
companies and the media might improve in combating CSAI.

Improve Measurements of Focus on the Top


Online CSAI of the ‘Pyramid’
Better estimates for the amount of If indeed the number of adults engaging
content circulating on the Internet, and with CSAI is as high as predicted, and the
the numbers of UK users viewing it, are goal is to minimise harm to children, it is
vital. Law enforcement reports should right that law enforcement must focus on
distinguish between ‘contact abuse’, dismantling the top of the ‘pyramid’:
online crimes, and CSAI specifically. contact abuse and those producing CSAI.
Technology companies should, where This is not being ‘soft on paedophiles’, but
accurate data is available, be more rather a sensible way of targeting limited
transparent about the volumes of material resources.
found on their platforms.

Invest in Facilitate Sharing


Technology and Cooperation
Although technology is not a silver bullet, Designing new technology, improving
it is vital that law enforcement can keep existing technology and adopting new
pace with technological change. Advances tools in the fight against CSAI requires the
in technological solutions have been legal sharing of highly sensitive data. This
widely hailed by experts in enforcement must be carefully facilitated: without
and prevention, and the development of access to data, it is more difficult for
future tools in areas such as image researchers to develop tools, and without
categorisation and biometric victim access to tools, websites are not able to
identification must be supported. implement them to curtail CSAI.

As the vast majority of CSAI is stored


outside of our borders, international
cooperation will be the key to combating
Educate it. In the wake of Brexit, ensuring close
collaboration between international police
forces must be prioritised.
We strongly believe that digital life skills
should be part of the PSHE curriculum,
and that the pitfalls of sharing content
online, including sexual content, should
form part of the syllabus. As the amount
of self-produced illegal content continues
to increase, stopping this at its source is
the only sensible response. Education is
needed to support potential victims and
perpetrators of sextortion and peer-on-
peer abuse, a growing problem.

Demos Technology Briefings Online Child Sexual Abuse Imagery 28


A Greater Focus
Report Responsibly
on Prevention
The NSPCC advised in their 2016 report It will not be possible to ensure informed
that it would not be possible to “arrest our public debate around online CSA without
way out” of the problem, a sentiment responsible reporting practices on this
echoed by every expert we interviewed. issue. Four preliminary guidelines are
Estimates of the number of individuals suggested as good practice reporting tips:
who may have viewed CSAI range from
50,000 to over 500,000; even taking the First, images should be referred to as
lowest estimates, locking up all either ‘indecent images of children’ (IIOC)
perpetrators is not a viable option. or ‘child sexual abuse images’ (CSAI). The
term ‘child pornography’ is misleading:
More funding could be made available to pornography is material that is produced
charities dealing with preventing contact and consumed by consenting adults,
paedophilia like the Lucy Faithfull which cannot include children. Referring
foundation. Awareness of their work, and to child abuse material as ‘pornography’
helplines for people concerned about minimises the necessarily abusive way in
their own feelings, should form a part of which material is produced.
media coverage.
Second, reports should give details of
sources of support for both victims and
potential offenders. This can encourage
victims to come forward and potential
offenders to seek help. The purpose of
potential abusers charities is not to
defend paedophiles, but protect children,
in a similar way to other crime prevention
interventions.

Third, broader context should be given.


According to the NSPCC, in 90 per cent of
cases, offenders have a close connection
(such as family, neighbour, or teacher)
with their victims. In addition, a significant
proportion of material is generated by
children and young people themselves.
Reports on incidents of abuse should help
provide this context to better equip
children and their guardians.

Fourth, caution should be exercised when


referring to the methods of abuse,
including grooming, and sharing and
storage of images. Details of the methods
used may inform other offenders. Lessons
should be learned from the success of the
Samaritan’s guidelines for reporting
suicide.

Demos Technology Briefings Online Child Sexual Abuse Imagery 29


FOR MORE
INFORMATION
To report child abuse to the police in the UK, call 999 or 101. More
information is available at www.gov.uk/report-child-abuse.

If you are worried about a child’s safety, you can also call the National Society
for the Prevention of Cruelty to Children (NSPCC) on 0808 800 5000 or go to
www.nspcc.org.uk.

To learn about and contribute to the Independent Inquiry into Child Sexual
Abuse (IICSA), go to www.iicsa.org.uk.

To report online child abuse images and learn about the Internet Watch
Foundation (IWF), go to www.iwf.org.uk.

To find help for offenders or potential offenders in the UK, go to the Lucy
Faithfull Foundation (www.lucyfaithfull.org.uk) or the Specialist Treatment
Organisation for the Prevention of Sexual Offending (StopSO)
(www.stopso.org.uk). For resources overseas, go to helplinks.eu.

For educational materials on CSAI, go to CEOP’s Thinkuknow programme


www.thinkuknow.co.uk.

30
EXPERT
INTERVIEWEES
Eric King, Former Deputy Director at Privacy International
Katie O’Donovan, Public Policy Manager at Google UK
Elena Martellozzo, Senior Lecturer at Middlesex University
Jonathan Baggaley, Chief Executive of the PSHE Association
Fred Langford, Deputy CEO of the Internet Watch Foundation
David Gray, National Online CSE Coordinator for England & Wales Police
Jacqueline Beauchere, Chief Online Safety Officer at Microsoft
Brooke Istook, Strategy and Operations Director at Thorn
Yiota Souras, Senior Vice President, General Counsel at NCMEC
John Shehan, Vice President, Exploited Children Division at NCMEC
Novi Quadrianto, Associate Professor at University of Sussex
Julie de Bailliencourt, EMEA Safety Policy Manager at Facebook

We would also like to thank the experts who contributed to the research but
who did not wish to be named in the briefing paper. Demos is committed to
gathering input from a wide range of organisations and experts on this issue.
Due to time constraints, some organisations may not have been contacted
during the research period. However, we continue to invite suggestions and
contributions.

31
CONTRIBUTORS
Alex Krasodomski-Jones
Alex.Krasodomski@demos.co.uk

Camille White
Dominic Eccleston
Oliver Marsh

32
www.demos.co.uk

Das könnte Ihnen auch gefallen