Child sexual abuse material and end-to-end encryption on social media platforms: An overview

被引:6
|
作者
Teunissen, Coen [1 ]
Napier, Sarah [2 ]
机构
[1] Australian Inst Criminol, Canberra, ACT, Australia
[2] Australian Inst Criminol, Sexual Exploitat Children Res Program, Canberra, ACT, Australia
关键词
PORNOGRAPHY;
D O I
10.52922/ti78634
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This paper reviewed open-source materials including electronic service provider (ESP) transparency reports to provide an overview of the contemporary problem of child sexual abuse material (CSAM) offending on ESP platforms, examine measures currently used by ESPs to detect and prevent CSAM offending, and explore the potential impact of end-to-end encryption on CSAM distribution and detection. The study found that the platforms with the highest user bases are actively detecting and removing CSAM. However, some are less transparent than others about the methods they use to prevent, detect and remove CSAM, omitting key information that is crucial for future best practice in reducing CSAM offending. Further, the adoption of end-to-end encryption by ESPs that detect and remove large amounts of CSAM from their platforms will likely provide a haven for CSAM offenders. Implications for ESPs and international law reform are discussed.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [21] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [22] Homomorphic Encryption as End-to-End Solution for Smart Devices
    Shanthala, P. T.
    Annapurna, D.
    Nittala, Sravanthi
    Bhat, Arpitha S.
    Aishwarya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 57 - 62
  • [23] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [24] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [25] An Encryption Protocol for End-to-end Secure Transmission of SMS
    Thomas, Minta
    Panchami, V
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [26] Detecting Sexually Explicit Content in the Context of the Child Sexual Abuse Materials (CSAM): End-to-End Classifiers and Region-Based Networks
    Gutfeter, Weronika
    Gajewska, Joanna
    Pacut, Andrzej
    MACHINE LEARNING AND PRINCIPLES AND PRACTICE OF KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2023, PT II, 2025, 2134 : 154 - 168
  • [27] MetaTinyML: End-to-End Metareasoning Framework for TinyML Platforms
    Navardi, Mozhgan
    Humes, Edward
    Mohsenin, Tinoosh
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (04) : 393 - 396
  • [28] Predicting Internet end-to-end delay: An overview
    Yang, M
    Li, XR
    Chen, HM
    PROCEEDINGS OF THE THIRTY-SIXTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2004, : 210 - 214
  • [29] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
  • [30] An Overview of End-to-End Automatic Speech Recognition
    Wang, Dong
    Wang, Xiaodong
    Lv, Shaohe
    SYMMETRY-BASEL, 2019, 11 (08):