Child sexual exploitation and trafficking is a serious and widespread epidemic proliferated by the internet’s vast international network of traffickers, pedophiles, and pornographers searching for victims.
Earlier this year, the classified ad website Backpage.com became embroiled in numerous lawsuits claiming that minors were being trafficked in their adult section. Indeed, 71% of all child trafficking cases reported to the National Center for Missing and Exploited Children (NCMEC) can be linked back to Backpage.com.
However, in spite of legal setbacks, the website shows no sign of stopping.
It’s not just the trafficking. The rape of a child is horrifying enough, but when it is photographed and filmed, the pictures and video perpetuate the misery, making the child a victim over and over again.
The NCMEC has reviewed more than 199 million images and videos and law enforcement has identified more than 12,900 child victims. The work is far too painstaking and labor-intensive to do manually.
That’s why computer scientists have joined forces with law enforcement to tackle the problem.
Mitali Thakor of Northwestern University has researched the history of forensic science as it relates to child exploitation.
“The detection and removal of child pornography online is a vexing process, weighted with moral urgency,” she writes in her article “How to Look: Apprehension, Forensic Craft, and the Classification of Child Exploitation Images,” which appears in the April-June 2017 issue of IEEE Annals.
Thakor further explains how computing experts are developing even better algorithms to scour the internet quickly for images and video of children being raped or photographed for the purposes of being trafficked or exploited.
The goal is threefold: to find children who are missing, to gather evidence against criminals, and to get the files removed from the internet.
These algorithms are being used by service providers like Facebook and Microsoft to report suspected child abuse images to the NCMEC, as required by the PROTECT Our Children Act of 2008, which Congress passed to provide greater resources for fighting child exploitation and trafficking.
Related research from the Computer Society Digital Library
Login may be required for full text.
- Crime data mining: a general framework and some examples
- NuDetective: A Forensic Tool to Help Combat Child Pornography through Automatic Nudity Detection
- A Novel Skin Tone Detection Algorithm for Contraband Image Analysis
- A Statistical Approach for Identifying Videos of Child Pornography at Crime Scenes
- Efficient Tagging of Remote Peers During Child Pornography Investigations
- Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks
- Challenges of automating the detection of paedophile activity on the Internet
- Unintended Consequences: Digital Evidence in Our Legal System
About Lori Cameron
Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at firstname.lastname@example.org. Follow her on LinkedIn.