Need Help? Contact us via phone or e-mail. Your Feedback
login / join us
×
login
e-mail:
password:

News

AIC: New study identifies cyber strategies with the potential to identify and protect victims of child abuse material

Share

Share

Tweet

Tweet

Forward

Forward

 

New study identifies cyber strategies with the potential to identify and protect victims of child abuse material

The Australian Institute of Criminology (AIC) has today released a paper that identifies cyber strategies that have the potential to identify victims of child sexual abuse material (CSAM) and detect offenders.

Cyber strategies used to combat child sexual abuse material reviews existing research on cyber strategies to disrupt and prevent CSAM offending.

The study identified five key cyber strategies: peer-to-peer network monitoring; automated CSAM detection tools; web crawlers; pop-up warning messages; and facial recognition.

AIC Deputy Director Dr Rick Brown said these strategies also have the potential to automate the removal of large amounts of CSAM, identify CSAM sites for detection and prevent individuals from viewing and sharing the material.

“During National Child Protection Week, this is incredibly hopeful news, and puts us one step closer to improving our understanding of an extremely serious and harmful form of crime against our most vulnerable children.

“The automated nature of these identified strategies is particularly important given the demands placed on law enforcement by the dramatic growth in CSAM,” Dr Brown said.

The report is available at https://doi.org/10.52922/ti78313

This research was undertaken by the University of the Sunshine Coast as part of the AIC’s Child Sexual Abuse Material Reduction Research Program. The program was funded through a grant made under Section 298 of the Proceeds of Crime Act 2002 (Cth).

Twitter

Facebook

Website

YouTube

Flickr

 

 

 

Copyright © 2021 Australian Institute of Criminology, All rights reserved.

 https://www.aic.gov.au/privacy



 


‹‹‹ previous news next news ›››