Feeds

Google offers tools to find victims of child abuse

Organising the unspeakable

Internet Security Threat Report 2014

The US-based National Center for Missing & Exploited Children (NCMEC) is adopting custom-made Google technology to combat the sexual abuse of children.

Analysts from NCMEC's Child Victim Identification Program (CVIP) have reviewed more than 13m child abuse images and videos as part of their mission to identify and rescue children. To help automate and streamline this process, a team of Google engineers led by Dr. Shumeet Baluja created software tools to help NCMEC track down child predators and victims of child exploitation through video and image search.

The Google technology will enable NCMEC analysts to more quickly and easily search NCMEC's systems, in order to sort and identify files that contain images of child pornography victims. New video tools from Google will streamline analysts' review of video snippets from files seized in child pornography cases.

In addition to developing the custom-made software, Google has also donated a Google Search Appliance, Google Earth Enterprise, and in-kind advertising through Google Grants to further support NCMEC's work. NCMEC is a non-profit organisation which runs a reporting mechanism for child sexual exploitation, called CyberTipline. Since it was established in 1984, NCMEC has assisted law enforcement with more than 140,900 missing child cases, resulting in the removal from harm of more than 124,500 children.

Google's Baluja explained: "The keys here were organization, scalability, and search. In particular, the tools we provided will aid in organizing and indexing NCMEC's information so that analysts can both deal with new images and videos more efficiently and also reference historical material more effectively. We hope the tools we've built for NCMEC will help its analysts make the important and often time-sensitive work of investigating child predators faster and more efficient."

Ernie Allen, president and chief exec of NCMEC, added: "Criminals are using cutting-edge technology to commit their crimes of child sexual exploitation, and in fighting to solve those crimes and keep children safe, we must do the same."

Last week Google announced a plan to allow Brazilian police to access 3,261 private photo albums on Google-owned social networking website Orkut, suspected of containing images of child abuse. ®

Remote control for virtualized desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.