Project VIC Presenter: John Hancock Technical Advisor, Project VIC

Slides:



Advertisements
Similar presentations
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Advertisements

© 2010 IBM Corporation 1 Content Analytics Solutions September, 2010.
Marie-laure Lemineur Combating Sexual Exploitation of Children Online Programme ECPAT InternationaI Network CSEC in Turkey September 1, 2014, Istanbul,
SOCA and Beyond- The Role of Science and Technology
PLANNING FOR A SAFER TOMORROW THROUGH COLLABORATION, RESEARCH, AND STRATEGIC FUNDING Indiana Criminal Justice Institute Prepared for the Indiana Prosecuting.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Video Camcorder Start Animation.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Network Switch (Rackmount) Start Animation.
Safeguarding Adults in Ealing
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Budapest 25 September 2012 Denton Howard INHOPE Training & Services.
For Visa Internal Use Only Visa Europe This information is not intended, and should not be construed, as an offer to sell, or as a solicitation of an offer.
CHILE 1 Adaptation process of an evidence based model of investigative interviewing: the Chilean case* Carolina Navarro, Decio Mettifogo, Andrés.
Wednesday, January 30, 2008 Operations and Information Technology “OIT Training” Joseph M Bognanno Enforcement Advisor Office of Technical Assistance.
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Tape Drive Start Animation.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative USB Watch Start Animation.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Actions in Norway - achievements and obstacles Birgitte Ellefsen Senior Adviser Organised Crime Section National Police Directorate in Norway.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
Resource Materials developed by UNODC in partnership with Govt. of India and civil society partners in addressing Human Trafficking For details see:
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Desktop Computer Start Animation.
Public Safety Committee September 28, 2015 David O. Brown Chief Of Police Operation Brick and Mortar 1.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Mouse and Keyboard Start Animation.
Large scale video & image identification : what’s next ? Safer Internet Conference, Moscow 21th April 2014.
Combatting Child Sexual Exploitation – the European Approach Europol Rob Wainwright Director Europol Unclassified - Basic Protection Level Europol Public.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
SME based in Dublin, Ireland. Data Analytics solutions deriving actionable insights for government SMI2G brokerage event, January FCT
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Wireless Access Point Start Animation.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Network Attached Storage Start Animation.
Harnessing P2P Power in the Classroom Julita Vassileva Department of Computer Science University of Saskatchewan, Canada.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Detective Sergeant John Powell Detective Division Los Angeles County Sheriff’s Department Cell# Powered.
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
IDENTIFYING SLAVES BY USING SMART PHONES Empowering the counter trafficking community to better identify victims of human slavery.
Integrating Lawful Hacking with NiceTrack Target360° Daniele Milan, Hacking Team Omri Kletter, NICE Systems.
15 October, 2012 Belgrade Human Trafficking and Migrant Smuggling Section (HTMSS) Trafficking in Persons.
Digital Evidence Collection Training for Law Enforcement Developed by the Electronic Crime Partnership Initiative Memory Stick Start Animation.
E-Safety Parents Evening
Deployment Planning Services
Data Platform and Analytics Foundational Training
BRIDGING THE GAP BETWEEN TECHNOLOGY AND CHILD WELFARE GOAL: Generate ideas and develop tools that will help social workers, foster youth, and caregivers.
Deployment Planning Services
GOSSIP and CYBERBULLYING
Andrew Lewman The Tor Project
Security Automation Standards Landscape
Microsoft 365 – Make it real with GTM Accelerators
United Nations Development Account 10th Tranche Statistics and Data
COMBATING THE SEXUAL EXPLOITATION
In 2017, 4327 reports were received from the Finnish public
Introduction Center for family health and community development
Cross Training in the Criminal Investigation Division…
Big Data.
GOSSIP and CYBERBULLYING
TITLE OF TOPIC FCT : Law enforcement capabilities Develop novel monitoring systems and miniaturised sensors that improve Law Enforcement Agencies'
The focus of this day is on eradicating contemporary forms of slavery, such as trafficking in persons, sexual exploitation, the worst forms of child labour,
Online crimes against children
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Conducting surveys on violence against children in the UK
About Project SMARTEL Project Results Partnership
Item 2.2 of the agenda IT Working Group meeting 2016
Law Enforcement Responses to Online Child Sexual Exploitation Crimes: The National Juvenile Online Victimization Study, 2000 & 2006 Crimes against Children.
Peter E, Ayemholan1, Garba, Suleiman2 and Osaigbovo Timothy3
Presentation transcript:

Project VIC Presenter: John Hancock Technical Advisor, Project VIC CEO, Hubstream Inc

Project VIC is… a partnership between government agencies, technology companies and not-for-profits to respond to the online sexual exploitation of children

Project VIC’s vision Stop leaving victims in evidence rooms

The data deluge

Technology ecosystem

Technology ecosystem VICS (Video and Image Classification Standard) Based on the Open Data Protocol (OASIS standard) Project VIC GitHub repository Currently at version 1.3

Crowdsourced data set Contributions from trained law enforcement agencies Data set allows law enforcement to keep up with the massive volume of new child abuse images and videos Hubstream provides an encrypted cloud-based data sharing and analytics service

Metrics 1000+ 35 16 1,700+ 2,600,000+ 2,000+ Countries Participating Participating Agencies Supported Products 2,600,000+ 1,700+ 2,000+ Officially Trained Users Categorized Files

International Deployments

95% of respondents found that Project VIC saved them time “Due to the large numbers of files, culling the home security content away from the pool of otherwise possibly relevant data would have taken weeks if not months using older methods. With Analyze DI, this was finished in a few days time.” - Survey Respondent Based on 192 respondents

Project VIC summary A framework to effect change A victim-centric methodology A technology ecosystem Crowdsourced data sets

New projects

Hubstream Intelligence helps you use data to solve crimes faster. Prioritization Data Visualization Timelines Network Analysis Hubstream Intelligence helps you use data to solve crimes faster. solve crimes faster John Hancock, CEO john.hancock@hubstream.net Cloud and on-premise intelligence solutions. Applied crime analytics to improve every phase of your investigations.