• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Trends
  • Home
  • / ...
  • /Tech News
  • /Trends

Tech Fights Crime: The Ways Algorithms and Websites Police for Child Exploiters and Criminals

By Michael Martinez and Lori Cameron

By Michael Martinez and Lori Cameron on
October 13, 2017

Fist in foreground, sad person in backgroundFist in foreground, sad person in background

The internet is our 21st Century frontier, and with that wilderness comes its share of exploiters and criminals.

Among the more abominable offenders are child sexual abusers and traffickers.

But police and websites increasingly leverage technology's endless innovations to fight back.

Here's how Big Tech is advancing that detective work on many fronts, according to recent and ongoing research culled from the Computer Society Digital Library. (An abstract is free, in front of the paywall. For the full-length report, most of the research listed below is behind the paywall and requires a subscription.)

Dropbox, Microsoft launch digital investigations in the cloud

As more of our personal information becomes exposed to cloud computing and the Internet of Things, cybercriminals exploit opportunities to steal that data and wreak havoc on you or a business: The hackers engage in hacking/phishing or malicious attacks, stalk people, or even engage in the abuse and sexual exploitation of children.

But companies are fighting back.Forensic applications and services move to the cloud.Forensic applications and services move to the cloud.

Dropbox has implemented child abuse material detection software similar to Microsoft’s PhotoDNA, which identifies exploitative pictures on their servers and cloud storage products.

Other cybercrimes, like denial-of-service attacks—which Amazon experienced with its Elastic Compute Cloud (EC2) service—are managed by DDoS protection systems, say researchers Kim-Kwang Raymond Choo of the University of Texas at San Antonio; Christian Esposito of the University of Naples “Federico II”, Italy; Aniello Castiglione of the University of Salerno (Italy).

Read "Evidence and Forensics in the Cloud: Challenges and Future Research Directions" research (login may be required for full text)

Algorithm engineers join fight and assist Facebook, Microsoft

Mitali Thakor of Northwestern University knows the history of forensic science about child exploitation.

“The detection and removal of child pornography online is a vexing process, weighted with moral urgency,” she writes.

Computing experts are developing even better algorithms to scour the internet quickly for images and video of children being raped or photographed for the purposes of being trafficked or exploited.

The goal is threefold: to find children who are missing, to gather evidence against criminals, and to get the files removed from the internet.

These algorithms are being used by service providers like Facebook and Microsoft to report suspected child abuse images to the NCMEC, as required by the PROTECT Our Children Act of 2008, which Congress passed to provide greater resources for fighting child exploitation and trafficking.

Read "How to Look: Apprehension, Forensic Craft, and the Classification of Child Exploitation Images" research here (login may be required for full text)

GUI of NuDetective Forensic ToolGUI of NuDetective Forensic Tool
Main GUI of NuDetective Forensic Tool, upper image, and its results, lower image.

A new tool called NuDetective is deployed

Brazilian authorities developed an algorithmic technology called the NuDetective Forensic Tool to identify child pornography files, wrote Mateus de Castro Polastro and Pedro Monteiro da Silva Eleuterio of the Brazilian Federal Police.

It's not perfect, but it's highly effective in doing an image analysis as human nudity or not and in doing a file name analysis for suspicious wording of child pornography.

"Although tests have shown the existence of false

positives, that is not really a problem since the NuDetective

was able to reduce dramatically the files to be analyzed on a

hard disk drive (from 330,595 to only 183 suspicious files on

second experiment)," the authors write.

"With low rates of false negatives and short

processing time, the Tool proved very effective to help

combat the sexual exploitation of children and adolescents.

Future developments include implementation of face and

texture detection algorithms to reduce the number of false

positives," they continue.

Read "NuDetective: A Forensic Tool to Help Combat Child Pornography through Automatic Nudity Detection" research (login may be required for full text)

Related crime-fighting tech research from the Computer Society Digital Library

Login may be required for full text.

  • Crime data mining: a general framework and some examples
  • A Novel Skin Tone Detection Algorithm for Contraband Image Analysis
  • A Statistical Approach for Identifying Videos of Child Pornography at Crime Scenes
  • Efficient Tagging of Remote Peers During Child Pornography Investigations
  • Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks
  • Challenges of automating the detection of paedophile activity on the Internet
  • Unintended Consequences: Digital Evidence in Our Legal System


Michael MartinezMichael Martinez

About Michael Martinez

Michael Martinez, the editor of the Computer Society's website and its social media, has covered technology as well as global events while on the staff at CNN, Tribune Co. (based at the Los Angeles Times), and the Washington Post. He welcomes email feedback, and you can also follow him on LinkedIn.

About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Copilot Ergonomics: UI Patterns that Reduce Cognitive Load
Copilot Ergonomics: UI Patterns that Reduce Cognitive Load
Read Next

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

How AI Is Transforming Fraud Detection in Financial Transactions

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter