Marie-laure Lemineur Combating Sexual Exploitation of Children Online Programme ECPAT InternationaI Network CSEC in Turkey September 1, 2014, Istanbul,

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

A Global Movement to Protect Children The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working to.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Welcome to AccessEngineering. The NEXT generation engineering reference tool. AccessEngineering from McGraw-Hill is a dynamic online resource offering.
Loredana Ceccacci: Expert of the Observatory for the fight against pedophilia and child pornography.
Can public libraries & their users benefit & profit from Europeana ?
The Key To Utilizing LinkedIn For Your Job Search.
Lawford C of E Primary School Welcome to our E-Safety Evening ‘High quality learning and caring together in an encouraging Christian environment.’
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Privacy Online TC 310 June 17, Weekly Review Questions Courts v. FCC in mergers Jurisdiction of FCC in mergers Why FCC can block, even with DoJ.
72% of all parents are concerned that other people could locate their child through their mobile phone using location based services.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
INTEGRATION OF MOBILE COMMUNICATION IN ENGINEERING APPLICATIONS Kamlesh Koladiya Supervisor: Dr. Eike Schallehn 1.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Serving Sociologists | Advancing Sociology | Promoting Sociology to Society Geolocation.
 Search Engine Optimization (SEO)  Blog marketing  marketing  Affiliate marketing  Viral marketing  Digital Assets Optimization  Search.
The Internet’s Hardware Much of the hardware components that make up the Internet are owned or shared by thousands of private and public organizations.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Rethinking child protection in a digital age, Fighting online.
Luxembourg 12 September Public consultation 12 September 2003 Horst Forster Director, INFSO/E European Commission Safer Internet plus
INHOPE Partnership Model
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Keeping on Top of Technological Trends and Uses of Existing Technology Daniel L. Appelman Heller Ehrman LLP.
By Taylor Ivy, Mark Sarosky, Elliott Bays, Ovidiu Ravasan, and Dave Martin SOCIAL IMPLICATIONS AND ETHICS OF THE INTERNET.
Digital Planet: Tomorrow’s Technology and You
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
+ SAM IT TECH Portfolio +.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Bottlenecks on the Internet and Platform Competition Susan Athey, Stanford University and Microsoft Research Disclosure: The author consults for Microsoft.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Commonwealth Internet Governance Forum CTO Forum, Colombo, Sri-Lanka 13 September 2010 Malcolm Johnson Director of ITU-TSB.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Digital Social Innovation Crowdmapping oragnisations and activities across Europe February 2014, DSI Policy workshop Francesca Bria, Nesta
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Large scale video & image identification : what’s next ? Safer Internet Conference, Moscow 21th April 2014.
Combatting Child Sexual Exploitation – the European Approach Europol Rob Wainwright Director Europol Unclassified - Basic Protection Level Europol Public.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
San José, Costa Rica, 9-10 June 2014 Marie-laure Lemineur Head, Sexual Exploitation of Children Online Programme The sexual exploitation of children through.
Centre for Cybercrime Investigation University College Dublin (UCD)
The IT Industry The Online World Building and Installing Know the components of computer systems Understand and practically apply appropriate connectivity.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
DIGITAL SAFETY City of Edinburgh Council Digital Learning Team.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
The Safer Internet programme 5 October 2010 Workshop on Information Security Margareta Traung Project officer eContent and Safer Internet unit.
Charbel Fakhoury General Manager, Microsoft Eastern Mediterranean The Economic Consequences of Software Piracy Beirut, Lebanon May 5, 2003.
ECPAT International Strategic Framework 2015 – 2018.
Accelerating Indonesia To Be Knowledge Based Society Tony Seno Hartono National Technology Officer ICT Solution to Prevent and Combat Online Sexual Abuse.
1 Belfast, Horst Forster European Commission Belfast,
Geolocation.
Digital Safety City of Edinburgh Council Digital Learning Team.
Industry Perspective on Combatting Child Sexual Abuse Content
The Internet Industry Week Two.
More and more pre-schoolers are using their parents’ computers, smartphones or tablets to play games, use apps, and watch their favourite TV shows.  Habits.
Track and measure Social Media and Darknet through
A Better Internet for Kids through Industry collaboration Pat Manson –Inclusion, Skills & Youth Directorate General Communications Networks, Content.
Egypt’s Internet Safety Project
COMBATING THE SEXUAL EXPLOITATION
END HUMAN TRAFFICKING NOW
seeing content that is inappropriate
In 2017, 4327 reports were received from the Finnish public
E-commerce Infrastructure
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Democracy and Information
Democracy and Information
E-safety Presentation
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Marie-laure Lemineur Combating Sexual Exploitation of Children Online Programme ECPAT InternationaI Network CSEC in Turkey September 1, 2014, Istanbul, Turkey THE (positive) USE OF TECHNOLOGY IN THE FIGHT AGAINST SEXUAL EXPLOITATION OF CHILDREN ONLINE

AGENDA I.Basic concept about the Internet and associated technologies II.The role of the private sector III.The role of specialized law enforcement units IV.Our role as a network

YOUR CONCERNS AND INTERESTS

THERE IS A HUGE DIFFERENCE BETWEEN WHAT TECHNOLOGY CAN DO AND WHAT HUMAN BEING CHOOSE TO DO WITH TECHNOLOGY Prof. Seymour Papert

STRATEGIC OBJECTIVE To advocate for a wider deployment of technical tools which can eliminate, disrupt or reduce the availability of online child pornography and other forms of sexual exploitation online

VOLUME CRIME

I BASIC CONCEPTS INTERNET AND ASSOCIATED TECHNOLOGIES

1.It is a network of networks - decentralized architecture; 2.No single ownership and no national boundaries; 3.Internet evolves at Internet speed; 4.Internet governance; 5.Internet of things: FEATURES

WHAT IS … 1.AN IP ADDRESS 2.ALGORITHMS 3.CLOUD COMPUTING 4.A PEER TO PEER NETWORK 5.The Onion Router (TOR) and Lantern

NETWORK CLIENT-SERVER AND Peer-to-Peer (P2P)

II THE ROLE OF THE PRIVATE SECTOR

WHO ARE THE ACTORS ? Search engines (Google, Yahoo, etc.); Movil operators (GSMA); Internet service providers (ISPs); Social platform providers (Facebook, Twitter, etc.); Content providers, game developpers and apps developers.

DUAL ROLE Generators of innovative solutions Proactive users as companies for disruptive technologies

some TECHNOLOGICAL SOLUTIONS Microsoft PhotoDNA technology; Video digital footprint F1; Google video digital footprint; Use of algorithm in search engines; Splash pages used by content providers.

TECHNOLOGICAL ALLIANCES ICMEC Technological THORN US –UK task force (dec. 2013)

SUCESSFUL BUSINESS MODEL THREE LEGGED STOOL: 1/ INDUSTRY 2/ LAW ENFORCEMENT 3/ CIVIL SOCIETY

III THE ROLE OF SPECIALIZED LAW ENFORCEMENT UNITS

FIRST STEP: INVESTIGATE/TRACE BACK THE DATA/EVIDENCE OF CRIME

USE OF SOFTWARE IN THE MANAGEMENT OF SECO CASES AND ANALISIS OF IMAGES:  Child Exploitation Tracking System (CETS) Microsoft  Microsoft PhotoDNA technology

IP TRACKING SOFTWARES: Roundup P2P Marshal TLO

SOURCE:

MAP OF IP CONNECTIONS P2P NETWORKS Interpol, oct. 2013

STEP TWO: FORENSIC ANALISIS

EXAMPLES OF SOFTWARE  NetClean software  CETS  Need for software to track down data stored in mobile apps

IV HOW CAN WE CONTRIBUTE AS CIVIL SOCIETY?

EXAMPLES OF APPLICATIONS INHOPE app to report what users consider illegal content; US ICE, FBI launched mobile phone app (and online) in sept. 2013; Brazil….other regional SE example?

FILTERS AND BLOCKING THOUGHTS ?

ADVOCACY WITH PRIVATE SECTOR in the Turkish context Promote self-regulation; Others ?

Teşekkür ederim