Thoughts on child safety on commodity platforms

07/19/2022
by   Ian Levy, et al.
0

The explosion of global social media and online communication platforms has changed how we interact with each other and as a society, bringing with it new security and privacy challenges. Like all technologies, these platforms can be abused and they are routinely used to attempt to cause harm at scale. One of the most significant offence types that is enabled by these platforms is child sexual abuse - both scaling existing abuse and enabling entirely new types of online-only abuse where the impacts on the victim are equally catastrophic. Many platforms invest significantly in combating this crime, referring confirmed evidence of illegality to law enforcement. The introduction of end-to-end encryption and similar technologies breaks many of the mitigations in place today and this has led to a debate around the apparent dichotomy of good child safety and good general user privacy and security. This debate has concentrated on the problem of detecting offenders sharing known abuse imagery using a technique known as client side scanning. We will show that the real problem of online child sexual abuse is much more complex than offender image sharing, providing a new set of 'harm archetypes' to better group harms into categories that have similar technical characteristics and, as far as we are able, bring more clarity to the processes currently used by platforms and law enforcement in relation to child sexual abuse content and the real world impacts. We explore, at a high level, a variety of techniques that could be used as part of any potential solution and examine the benefits and disbenefits that may accrue in various use cases, and use a hypothetical service as an example of how various techniques could be brought together to provide both user privacy and security, while protecting child safety and enabling law enforcement action.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/04/2022

Understanding Teenage Perceptions and Configurations of Privacy on Instagram

As teenage use of social media platform continues to proliferate, so do ...
research
10/11/2022

Chat Control or Child Protection?

Ian Levy and Crispin Robinson's position paper "Thoughts on child safety...
research
10/14/2021

Bugs in our Pockets: The Risks of Client-Side Scanning

Our increasing reliance on digital technology for personal, economic, an...
research
04/13/2021

Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases

Former US attorney general William Barr and law enforcement colleagues f...
research
10/24/2021

The privacy protection effectiveness of the video conference platforms' virtual background and the privacy concerns from the end-users

Due to the abrupt arise of pandemic worldwide, the video conferencing pl...
research
12/02/2021

Principles for new ASI Safety Paradigms

Artificial Superintelligence (ASI) that is invulnerable, immortal, irrep...
research
05/05/2023

"Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns

There are indications in literature that women do not engage with securi...

Please sign up or login with your details

Forgot password? Click here to reset