Child abuse, exploitation and trafficking are some of the most appalling crimes committed in our society. Unfortunately, the problem is far more significant than most people realise. According to the UK Government, a crime survey for England and Wales indicates … Read more
Child protection
SafeToNet’s Thomas Farrell on the Spectrum of Online Child Protection
Christa Miller: Child sexual abuse and exploitation is one of the great scourges of our time, often pitted against consumer privacy as investigators seek technological means to end it. This week on the Forensic Focus Podcast, we’re talking with … Read more
Illicit Image Investigations Part One: Making The World A Safer Place
Keith: Hey, this is Keith Lockhart from oxygen forensics training. I have Amanda Mahan with me from our team. Welcome to a series of webinars about making the world a safer place.
So our first in the series is using … Read more
How To Use Griffeye Brain – Artificial Intelligence
The Griffeye Brain in Analyze DI Pro version 19.2 brings the power of machine learning and artificial intelligence to help you quickly locate and identify child sex abuse material within your investigations.
In addition, the Griffeye Brain now has improved … Read more
Crimes Against Children Conference 2019 Recap Part II: Digital Evidence On Multidisciplinary Teams
By Christa Miller, Forensic Focus
Our first article in this two-part series focused on the technology associated with crimes against children: mobile peer-to-peer software; cryptocurrency used to buy and sell child sexual abuse material (CSAM); the virtual worlds where abuse … Read more
Industry Roundup: Image Recognition And Categorization
by Christa Miller, Forensic Focus
The need for image recognition and categorization has never been more in demand thanks to the spread of extremist propaganda, child sexual abuse material (CSAM), and other illicit activity across the internet.
Because of the … Read more
Reducing The Mental Stress Of Investigators
by Eric Oldenburg, Griffeye
We recently met up with Eric Oldenburg, Griffeye’s new Law Enforcement Liasion in North America, and heard about his new role. Here, he explains how reducing mental stress for investigators is a driving force for him, … Read more
Evaluating Automated Facial Age Estimation Techniques For Digital Forensics
by Felix Anda, David Lillis, Nhien-An Le-Khac & Mark Scanlon
Abstract
In today’s world, closed circuit television, cellphone photographs and videos, open-source intelligence (i.e., social media/web data mining), and other sources of photographic evidence are commonly used by police forces … Read more
Classifying Illegal Activities On Tor Network Based On Web Textual Contents
by Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre & Ivan de Paz; Department of Electrical, Systems and Automation, University of Leon, Spain & INCIBE Spanish National Cybersecurity Institute
Abstract
The freedom of the Deep Web offers a safe place … Read more
The Investigative Challenges Of Live Streamed Child Abuse
Among the challenges facing digital forensic investigators today, the instantaneous nature of online communication is arguably one of the most persistent. Trying to investigate whether a crime has occurred, and if so to bring its perpetrators to justice in a … Read more
Operation Endeavour: The Tip of the Iceberg?
In mid January 2014, reports began emerging of a cybersex ring that had recently been under investigation in the Philippines. Crime agencies across the UK, USA, Australia and the Philippines themselves have been working together since 2012 on a case … Read more
Forensic Software in Child Protection Cases
According to recently released statistics from ICAC, an agency whose aim is to make the internet safer for children, only 2% of reported child protection cases are investigated in the United States each year. Often the media seize every opportunity … Read more
Cyberbullying – a growing concern in a connected society
Megan Meier was just twelve years old when the events began that would ultimately lead to her death. Like many teenagers, Megan had accounts on common social networks, including MySpace, where she first met “Josh Evans”. Ostensibly a sixteen-year old … Read more