Marie-laure Lemineur Combating Sexual Exploitation of Children Online Programme ECPAT InternationaI Network CSEC in Turkey September 1, 2014, Istanbul, Turkey THE (positive) USE OF TECHNOLOGY IN THE FIGHT AGAINST SEXUAL EXPLOITATION OF CHILDREN ONLINE
AGENDA I.Basic concept about the Internet and associated technologies II.The role of the private sector III.The role of specialized law enforcement units IV.Our role as a network
YOUR CONCERNS AND INTERESTS
THERE IS A HUGE DIFFERENCE BETWEEN WHAT TECHNOLOGY CAN DO AND WHAT HUMAN BEING CHOOSE TO DO WITH TECHNOLOGY Prof. Seymour Papert
STRATEGIC OBJECTIVE To advocate for a wider deployment of technical tools which can eliminate, disrupt or reduce the availability of online child pornography and other forms of sexual exploitation online
VOLUME CRIME
I BASIC CONCEPTS INTERNET AND ASSOCIATED TECHNOLOGIES
1.It is a network of networks - decentralized architecture; 2.No single ownership and no national boundaries; 3.Internet evolves at Internet speed; 4.Internet governance; 5.Internet of things: FEATURES
WHAT IS … 1.AN IP ADDRESS 2.ALGORITHMS 3.CLOUD COMPUTING 4.A PEER TO PEER NETWORK 5.The Onion Router (TOR) and Lantern
NETWORK CLIENT-SERVER AND Peer-to-Peer (P2P)
II THE ROLE OF THE PRIVATE SECTOR
WHO ARE THE ACTORS ? Search engines (Google, Yahoo, etc.); Movil operators (GSMA); Internet service providers (ISPs); Social platform providers (Facebook, Twitter, etc.); Content providers, game developpers and apps developers.
DUAL ROLE Generators of innovative solutions Proactive users as companies for disruptive technologies
some TECHNOLOGICAL SOLUTIONS Microsoft PhotoDNA technology; Video digital footprint F1; Google video digital footprint; Use of algorithm in search engines; Splash pages used by content providers.
TECHNOLOGICAL ALLIANCES ICMEC Technological THORN US –UK task force (dec. 2013)
SUCESSFUL BUSINESS MODEL THREE LEGGED STOOL: 1/ INDUSTRY 2/ LAW ENFORCEMENT 3/ CIVIL SOCIETY
III THE ROLE OF SPECIALIZED LAW ENFORCEMENT UNITS
FIRST STEP: INVESTIGATE/TRACE BACK THE DATA/EVIDENCE OF CRIME
USE OF SOFTWARE IN THE MANAGEMENT OF SECO CASES AND ANALISIS OF IMAGES: Child Exploitation Tracking System (CETS) Microsoft Microsoft PhotoDNA technology
IP TRACKING SOFTWARES: Roundup P2P Marshal TLO
SOURCE:
MAP OF IP CONNECTIONS P2P NETWORKS Interpol, oct. 2013
STEP TWO: FORENSIC ANALISIS
EXAMPLES OF SOFTWARE NetClean software CETS Need for software to track down data stored in mobile apps
IV HOW CAN WE CONTRIBUTE AS CIVIL SOCIETY?
EXAMPLES OF APPLICATIONS INHOPE app to report what users consider illegal content; US ICE, FBI launched mobile phone app (and online) in sept. 2013; Brazil….other regional SE example?
FILTERS AND BLOCKING THOUGHTS ?
ADVOCACY WITH PRIVATE SECTOR in the Turkish context Promote self-regulation; Others ?
Teşekkür ederim