Child sexual abuse material and end-to-end encryption on social media platforms: An overview

被引:6
|
作者
Teunissen, Coen [1 ]
Napier, Sarah [2 ]
机构
[1] Australian Inst Criminol, Canberra, ACT, Australia
[2] Australian Inst Criminol, Sexual Exploitat Children Res Program, Canberra, ACT, Australia
关键词
PORNOGRAPHY;
D O I
10.52922/ti78634
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This paper reviewed open-source materials including electronic service provider (ESP) transparency reports to provide an overview of the contemporary problem of child sexual abuse material (CSAM) offending on ESP platforms, examine measures currently used by ESPs to detect and prevent CSAM offending, and explore the potential impact of end-to-end encryption on CSAM distribution and detection. The study found that the platforms with the highest user bases are actively detecting and removing CSAM. However, some are less transparent than others about the methods they use to prevent, detect and remove CSAM, omitting key information that is crucial for future best practice in reducing CSAM offending. Further, the adoption of end-to-end encryption by ESPs that detect and remove large amounts of CSAM from their platforms will likely provide a haven for CSAM offenders. Implications for ESPs and international law reform are discussed.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [1] Review of End-to-End Encryption for Social Media
    Bhuse, Vijay
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 35 - 38
  • [2] Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms
    Basem, Omar
    Ullah, Abrar
    Hassen, Hani Ragab
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1258 - 1269
  • [3] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (70-73):
  • [4] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [5] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [6] A European right to end-to-end encryption?
    Shurson, Jessica
    COMPUTER LAW & SECURITY REVIEW, 2024, 55
  • [7] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [8] An Overview of End-to-End HDR
    Dai, Min
    Rusanovskyy, Dmytro
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XLI, 2018, 10752
  • [9] Subverting Telegram's End-to-End Encryption
    Cogliati, Benoit
    Ethan, Jordan
    Jha, Ashwin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 5 - 40
  • [10] System of end-to-end symmetric database encryption
    Galushka, V. V.
    Aydinyan, A. R.
    Tsvetkova, O. L.
    Fathi, V. A.
    Fathi, D. V.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015