Google builds system to identify child abuse images
By Barry Collins
Posted on 17 Jun 2013 at 09:15
Google is developing a new system that it claims will make it easier to detect and remove online images of child abuse.
The search company has come under intense pressure from politicians - including the prime minister - to make it more difficult to access child pornography, even though experts concede that it's already virtually impossible to find child abuse images using a Google search.
Now, the company says it has created a new system that gives each image a unique identifier, making it easier for international bodies to remove them without the need for human verification.
"Since 2008, we’ve used 'hashing' technology to tag known child sexual abuse images, allowing us to identify duplicate images which may exist elsewhere," said Jacquelline Fuller, director of Google Giving, the branch of the company devoted to charity work.
"Each offending image in effect gets a unique ID that our computers can recognise without humans having to view them again. Recently, we’ve started working to incorporate encrypted 'fingerprints' of child sexual abuse images into a cross-industry database. This will enable companies, law enforcement and charities to better collaborate on detecting and removing these images, and to take action against the criminals."
Separately, the company announced it was creating a $2 million Child Protection Technology Fund to "encourage the development of ever more effective tools".
Last week, Google announced it was donating £1 million to the Internet Watch Foundation, which helps to identify and remove child abuse images. It's not clear whether the IWF donation is coming from the Child Protection Technology Fund.
Google's initiatives follow heavy criticism from David Cameron, who has called upon internet companies including Google to "use their extraordinary technical abilities to do more to root out these disgusting images". A spokesman for the prime minister later singled out Google for criticism for failing to deal with child abuse, claiming that software such as Google Earth showed "firms can do amazing things on the internet when they want to".
Yet Google and other internet companies and providers have long worked with organisations such as the Internet Watch Foundation to successfully remove child abuse images. The Internet Watch Foundation's own "About Us" page boasts that as a result of its "notice and takedown" scheme, "the content we deal with has been virtually eradicated from UK networks".
Speaking last week at a Westminster eForum on internet safety, the CEO of the Child Exploitation and Online Protection Agency (CEOP) admitted it was highly unlikely that people would discover child abuse images through casual surfing. ""It's not easy to find it online," he said. "You make a choice to go find it. You don't stumble across it, and I think that's often overlooked."
Is your business a social business? For helpful info and tips visit our hub.
Glad I'm not one of the developers building this system. The only way to do it would be to feed the software with a selection of child abuse images, and some that might be mistaken for the above, and then help it learn to distinguish between the two. It means that some poor sod is going to have to (legitimately) sit through a load of kiddie porn (and worse). I'm sure the process can be part automated using existing image lists, but it's definitely going to need a degree of manual intervention.
By PaulOckenden on 17 Jun 2013
what politicians fail to recognise is that Google isn't the internet. If somebody wants to find such images they don't simply search for it online
while searching for posted images to remove is all well and good i imagine most offending files are in rar form or on encrypted TOR only websites
By Emodan666 on 17 Jun 2013
- Windows 8.1 Update: an abject surrender
- The insane economics of Sky Now TV
- No such thing as a free app... so pay up if you want quality
- Time to outlaw crapware-laden installers
- Windows Phone 8.1 video: hands-on
- Office for iPad: key information
- Why every PC buyer owes Richard Durkin a debt of gratitude
- HTC One M8 vs Samsung Galaxy S5: 2014's big-hitters compared
- Windows XP end of life: key information
- Cut out the broadband jargon? What jargon?
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office
- How to write your company's IT security policy
- Raspberry Pi and Wolfram: a must-have for every child
- Could you get by with Office Web Apps?
- The best Android antivirus apps for 2014
- Headings vs headers: how to use both in Word
- Windows Server 2012 R2: how the Datacenter edition could change SMBs