Child sexual abuse material and end-to-end encryption on social media platforms: An overview

被引:6
|
作者
Teunissen, Coen [1 ]
Napier, Sarah [2 ]
机构
[1] Australian Inst Criminol, Canberra, ACT, Australia
[2] Australian Inst Criminol, Sexual Exploitat Children Res Program, Canberra, ACT, Australia
关键词
PORNOGRAPHY;
D O I
10.52922/ti78634
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This paper reviewed open-source materials including electronic service provider (ESP) transparency reports to provide an overview of the contemporary problem of child sexual abuse material (CSAM) offending on ESP platforms, examine measures currently used by ESPs to detect and prevent CSAM offending, and explore the potential impact of end-to-end encryption on CSAM distribution and detection. The study found that the platforms with the highest user bases are actively detecting and removing CSAM. However, some are less transparent than others about the methods they use to prevent, detect and remove CSAM, omitting key information that is crucial for future best practice in reducing CSAM offending. Further, the adoption of end-to-end encryption by ESPs that detect and remove large amounts of CSAM from their platforms will likely provide a haven for CSAM offenders. Implications for ESPs and international law reform are discussed.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [31] End-to-End Visual Grounding Framework for Multimodal NER in Social Media Posts
    Lyu, Yifan
    Hu, Jiapei
    Xue, Yun
    Cai, Qianhua
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, : 1 - 11
  • [32] Child sexual abuse: An overview
    Mullen, PE
    King, NJ
    Tonge, BJ
    BEHAVIOUR CHANGE, 2000, 17 (01) : 2 - 14
  • [33] Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 249 - 268
  • [34] MemFHE: End-to-end Computing with Fully Homomorphic Encryption in Memory
    Gupta, Saransh
    Cammarota, Rosario
    Simunic, Tajana
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)
  • [35] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [36] Securing SCADA Applications Using OpenPLC With End-To-End Encryption
    Alves, Thiago
    Morris, Thomas
    Yoo, Seong-Moo
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 1 - 6
  • [37] End-to-end Encryption for SMS Messages in the Health Care Domain
    Hassinen, Marko
    Laitinen, Pertti
    CONNECTING MEDICAL INFORMATICS AND BIO-INFORMATICS, 2005, 116 : 316 - 321
  • [38] Novel end-to-end voice encryption method in GSM system
    Qi, H. F.
    Yang, X. H.
    Jiang, R.
    Liang, B.
    Zhou, S. J.
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 217 - 220
  • [39] Towards Efficient End-to-End Encryption for Container Checkpointing Systems
    Stoyanov, Radostin
    Reber, Adrian
    Ueno, Daiki
    Clapinski, Michal
    Vagin, Andrei
    Bruno, Rodrigo
    PROCEEDINGS OF THE 15TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2024, 2024, : 60 - 66
  • [40] Integrating end-to-end encryption and authentication technology into broadband networks
    Pierson, LG
    INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269