Home / Blogs

Internet Watch Foundation Uses Hashes to Block Child Abuse Material

Last week during the ICANN meeting in Barcelona I attended a short presentation from the Internet Watch Foundation (IWF).

Their mission is pretty simple:

...eliminate child sexual abuse imagery online (source)

Fortunately, the presentation I was at did not include any of the actual material (which would have been illegal anyway) but even without seeing any of it the topic is one that I think most people find deeply disturbing.

You can dig into some of the data on their interactive annual report, which includes some truly disturbing numbers including the one that I find most disturbing:

2% involve children aged 2 or under.

One of the tools they’ve made available to 3rd parties is a system which recognises images based on a hash. Here’s a video they’ve created to explain how it works:

Several content networks are using this and similar technologies to help keep their platforms free of this kind of content.

If you come across CSAM (Child sexual abuse material) then you should report it to your local hotline. The Irish one is here, while the international organisation that co-ordinates hotlines is here.

By Michele Neylon, MD of Blacknight Solutions

Filed Under

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

Related

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global