Download presentation
Presentation is loading. Please wait.
Published byLeslie Mitchell Modified over 9 years ago
1
Marie-laure Lemineur Combating Sexual Exploitation of Children Online Programme ECPAT InternationaI Network CSEC in Turkey September 1, 2014, Istanbul, Turkey THE (positive) USE OF TECHNOLOGY IN THE FIGHT AGAINST SEXUAL EXPLOITATION OF CHILDREN ONLINE
2
AGENDA I.Basic concept about the Internet and associated technologies II.The role of the private sector III.The role of specialized law enforcement units IV.Our role as a network
3
YOUR CONCERNS AND INTERESTS
4
THERE IS A HUGE DIFFERENCE BETWEEN WHAT TECHNOLOGY CAN DO AND WHAT HUMAN BEING CHOOSE TO DO WITH TECHNOLOGY Prof. Seymour Papert
6
STRATEGIC OBJECTIVE To advocate for a wider deployment of technical tools which can eliminate, disrupt or reduce the availability of online child pornography and other forms of sexual exploitation online
7
VOLUME CRIME
8
I BASIC CONCEPTS INTERNET AND ASSOCIATED TECHNOLOGIES
9
1.It is a network of networks - decentralized architecture; 2.No single ownership and no national boundaries; 3.Internet evolves at Internet speed; 4.Internet governance; 5.Internet of things: http://youtu.be/kq8wcjQYW90?list=PLD4B1B7AB8011CFB7 FEATURES
10
WHAT IS … 1.AN IP ADDRESS 2.ALGORITHMS 3.CLOUD COMPUTING 4.A PEER TO PEER NETWORK 5.The Onion Router (TOR) and Lantern
11
NETWORK CLIENT-SERVER AND Peer-to-Peer (P2P)
13
II THE ROLE OF THE PRIVATE SECTOR
14
WHO ARE THE ACTORS ? Search engines (Google, Yahoo, etc.); Movil operators (GSMA); Internet service providers (ISPs); Social platform providers (Facebook, Twitter, etc.); Content providers, game developpers and apps developers.
15
DUAL ROLE Generators of innovative solutions Proactive users as companies for disruptive technologies
16
some TECHNOLOGICAL SOLUTIONS Microsoft PhotoDNA technology; Video digital footprint F1; Google video digital footprint; Use of algorithm in search engines; Splash pages used by content providers.
17
TECHNOLOGICAL ALLIANCES ICMEC Technological THORN US –UK task force (dec. 2013)
18
SUCESSFUL BUSINESS MODEL THREE LEGGED STOOL: 1/ INDUSTRY 2/ LAW ENFORCEMENT 3/ CIVIL SOCIETY
19
III THE ROLE OF SPECIALIZED LAW ENFORCEMENT UNITS
20
FIRST STEP: INVESTIGATE/TRACE BACK THE DATA/EVIDENCE OF CRIME
21
USE OF SOFTWARE IN THE MANAGEMENT OF SECO CASES AND ANALISIS OF IMAGES: Child Exploitation Tracking System (CETS) Microsoft Microsoft PhotoDNA technology
22
IP TRACKING SOFTWARES: Roundup P2P Marshal TLO
23
SOURCE: http://www.wearethorn.org/child-trafficking-statistics/
24
MAP OF IP CONNECTIONS P2P NETWORKS Interpol, oct. 2013
25
STEP TWO: FORENSIC ANALISIS
26
EXAMPLES OF SOFTWARE NetClean software CETS Need for software to track down data stored in mobile apps
27
IV HOW CAN WE CONTRIBUTE AS CIVIL SOCIETY?
28
EXAMPLES OF APPLICATIONS INHOPE app to report what users consider illegal content; US ICE, FBI launched mobile phone app (and online) in sept. 2013; Brazil….other regional SE example?
29
FILTERS AND BLOCKING THOUGHTS ?
30
ADVOCACY WITH PRIVATE SECTOR in the Turkish context Promote self-regulation; Others ?
31
Teşekkür ederim marielaurel@ecpat.net
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.