Google builds system to identify child abuse images
By Barry Collins
Posted on 17 Jun 2013 at 09:15
Google is developing a new system that it claims will make it easier to detect and remove online images of child abuse.
The search company has come under intense pressure from politicians - including the prime minister - to make it more difficult to access child pornography, even though experts concede that it's already virtually impossible to find child abuse images using a Google search.
Now, the company says it has created a new system that gives each image a unique identifier, making it easier for international bodies to remove them without the need for human verification.
"Since 2008, we’ve used 'hashing' technology to tag known child sexual abuse images, allowing us to identify duplicate images which may exist elsewhere," said Jacquelline Fuller, director of Google Giving, the branch of the company devoted to charity work.
"Each offending image in effect gets a unique ID that our computers can recognise without humans having to view them again. Recently, we’ve started working to incorporate encrypted 'fingerprints' of child sexual abuse images into a cross-industry database. This will enable companies, law enforcement and charities to better collaborate on detecting and removing these images, and to take action against the criminals."
Separately, the company announced it was creating a $2 million Child Protection Technology Fund to "encourage the development of ever more effective tools".
Last week, Google announced it was donating £1 million to the Internet Watch Foundation, which helps to identify and remove child abuse images. It's not clear whether the IWF donation is coming from the Child Protection Technology Fund.
Google's initiatives follow heavy criticism from David Cameron, who has called upon internet companies including Google to "use their extraordinary technical abilities to do more to root out these disgusting images". A spokesman for the prime minister later singled out Google for criticism for failing to deal with child abuse, claiming that software such as Google Earth showed "firms can do amazing things on the internet when they want to".
Yet Google and other internet companies and providers have long worked with organisations such as the Internet Watch Foundation to successfully remove child abuse images. The Internet Watch Foundation's own "About Us" page boasts that as a result of its "notice and takedown" scheme, "the content we deal with has been virtually eradicated from UK networks".
Speaking last week at a Westminster eForum on internet safety, the CEO of the Child Exploitation and Online Protection Agency (CEOP) admitted it was highly unlikely that people would discover child abuse images through casual surfing. ""It's not easy to find it online," he said. "You make a choice to go find it. You don't stumble across it, and I think that's often overlooked."
Is your business a social business? For helpful info and tips visit our hub.
Glad I'm not one of the developers building this system. The only way to do it would be to feed the software with a selection of child abuse images, and some that might be mistaken for the above, and then help it learn to distinguish between the two. It means that some poor sod is going to have to (legitimately) sit through a load of kiddie porn (and worse). I'm sure the process can be part automated using existing image lists, but it's definitely going to need a degree of manual intervention.
By PaulOckenden on 17 Jun 2013
what politicians fail to recognise is that Google isn't the internet. If somebody wants to find such images they don't simply search for it online
while searching for posted images to remove is all well and good i imagine most offending files are in rar form or on encrypted TOR only websites
By Emodan666 on 17 Jun 2013
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look
- Nokia X review: first look
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly
- Nexus 5 vs Samsung Galaxy S4 Active: the best phone for avoiding screen burn
- How much is a social user worth?
- The key to choosing a secure password
- Thunderbolt Bridge: a fast Mac migration tool
- Should you advertise on Twitter?
- How to track a lost smartphone
- Self-publishing success: the best way to sell your book
- 1.6TB SSD: why would you need one?