Internet Governance and Crimes against Children
This thematic ax is born under the leadership of our team member Carolina Christofoletti and represents a specific itinerary of this working group aimed at researching, in the complex scenario of Internet regulation, what the industry compliance policies currently into force for fighting against the creation and distribution of Child Sexual Abuse Materials (CSAM) online are.
The main goal of this Internet Governance and Online Crimes against Children Section is, already from its creation, to reach the Recommendation Level. As such, “analysis” is the key word that shall describe, from its beginning, the methodology followed by this thematic working group.
Although that could have also been a valid methodological approach, it was decided not to fragment the thematic approach into subsections, even if publishings are expected to appear (for organizational reason) as such in this Website. The reason of that is because this division ends up being artificial, as the fight against Child Sexual Abuse Material is not, considering the amount of stakeholders involved, a sectorial one. For readers, that means that research results will, constantly, communicate with each other.
Initially, this thematic section aims at working, directly, with already existent results published by (but not only):
• CSAM national and international hotlines
• National and international Law Enforcement Authorities (LEA)
• Industry Transparency Reports (including social media and adult pornography websites)
• Industry Compliance Policies (including Report Channels, Terms of Service, Policies and others)
• Academy
Which are expected to be the key documents from which this work will start.
Disclaimer:
This website is an academical one, and does not serve for reporting any illegal material you may have found. If you are afraid a child may be at risk, contact immediately the police through its proper channels (ex. Disque 100) and, if you wish to report a webpage or any file you have found online and that may constitute Child Sexual Abuse Material, report it first to the webpage you have found it, and, if a report channel directly with the platform is inexistent, if you disagree with their decision not to remove it or if you prefer, report it to the Brazilian CSAM hotline (Safernet Brasil) .
Do not ignore it, report it!
https://www.gov.br/pt-br/servicos/denunciar-violacao-de-direitos-humanos (Disque 100)
https://new.safernet.org.br/denuncie (Safernet Brasil)
Always remember that possessing and sharing it is a crime, so report it, accordingly to the above-mentioned procedures, EXCLUSIVELY to the adequate channels. Never share it or save it.
Contact information:
Carolina Christofoletti, Founder and Coordinator
carolina.christofoletti@alumni.usp.br
Contributors:
Austin Berrier (June 2021)
Braian Arroyo. (May 2021)
Carolina Christofoletti (May 2021)
Ernander Marcus Lataliza Rosendo (June 2021)
Guncha Sharma (May 2021)
Hericson dos Santos (May 2021)
Jorge André Domingues Barreto (May 2021)
+Internet Governance and Crimes against Children
- “YOU” una serie que nos muestra la vulnerabilidad de nuestra información en las Redes Sociales
- A legal point of view: How EU proposed AI regulation and the CSAM technology debate come together
- A light in the end of the tunnel: Pornhub’s Trusted Flagger Program
- A Rhetoric guide for CSAM Transparency Reports readers
- An Essay about Blindness: Instagram’s CSAM Reporting Policies
- Aprovechando los “tags ocultos” de Facebook para OSINT
- Arrested TOR nodes and the lack of a Data Retention Laws for VPNs: How they come together?
- Autoprodução de Materiais de Abuso Sexual Infantil: Uma Introdução ao Grooming
- BBSs: The Dark Web’s backbone?
- Beyond the privacy battle: A look at Telegram vs. WhatsApp from the CSAM Trust & Safety perspective
- Born of Ashes: The network visualization potential of a CSAM-related database of cryptocurrencies addresses
- Brazil, we need to talk about Child Sexual Abuse Materials clubs
- Building Big-Tech CSAM Trust & Safety from unexamined P2P Big-data mines
- Calibrating the underworld’s periscope: On the criminalization of Manuals on CSA and CSAM
- Carolina Christofoletti Interview with Bruno Requião: Topological characteristics of CSAM forums on the DarkNet
- Classifying images in the real world, objective feature of pictorial things and why consent doesn’t and shall not matter when we are talking about pornography
- Conferencia: El imparable incremento de la pornografía infantil en internet
- Cooperation is the key – From downloads to CSAM groups
- CSAM hash checkers not of individual files, but of disk images: A word on forensics.
- CSAM hashes from failed policies: What does it mean for programmers
- CSAM, CSEA y la mal llamada “Pornografía Infantil”
- Dancing in the Abyss: Do self-generated CSAM material follow a Guttman-like progression?
- Decentralized Cryptocurrencies in CSAM clubs as a matter of Decentralized Forensics
- Despite Forensic Backups and Data Retention Policies, WhatsApp’s print-screens are illegal evidence: How come?
- Do not remove it, prevent it from being posted: How old hashes could help on the fight against new CSAM materials
- Eggbert it: What Facebook Transparency Center says about how should we read its CSAM Transparency Data
- Explotación sexual de Niños, Niñas y Adolescentes en línea
- Facebook’s Tolerance Code: A Commentary
- Forget MasterCard: We need a Sectorial Compliance Standard for Pornography Industry as a whole
- GEOINT y SOCMINT en la Investigación
- Grooming en línea en el contexto de AESNNA: Conceptos importantes (parte 1)
- Hotlines, Fragmented Databases and the -very special- Brazilian case
- How many CSAM metadata we lost by, simply, not asking for it?
- How weak compliance polices of pornography websites are putting anyone under European Law paying for it at risk
- Imploding CSAM networks on P2P without damaging the protocol
- Inside the Battle for Internet Global Morals: Instagram Kids – A Commentary (Part 1)
- Insight series – CSAM Research with a single forensic dataset: Day and time of file creation
- Intención de los usuarios en relación con el CSAM en Redes Sociales
- Internal link-tree analysis: Why should Social Media Platforms care about that
- Interpreting silence: How LEA news affect CSAM forums
- Keep the networks in sight: Reducing the legal complexity of “Knowingly access to CSAM”(Art. 5, 3,2011/92/EU Directive) adjudication on Instagram
- Long live the UK Online Safety Bill, which decided to face the CSAM problem on P2P networks
- Los nuevos paradigmas de la Investigación: CRIMINT y Social media analitycs ante la digitalización
- Los nuevos paradigmas de la seguridad, la investigación y la inteligencia con el uso de la ciencia de datos y las nuevas tecnologias
- Lost somewhere in the deep, unindexed and uncrawlable world: How hard it is to find the “Report it” command
- Mask ball: Our platform is free of CSAM, we use known hash lists. Really?
- Methodological considerations about the universal CSAM hash database as a training set
- Neutral Intentions in the Era of Internet Crimes: Knowingly Access to CSAM, hacktivists and whistleblowers. -A proposed legal solution
- Old-fashion printed CSAM clubs: Why are they back?
- On whether media platforms should delegate its users the metaphysical task of classifying the world in details- CSAM reporting
- Platform-specific CSAM intelligence: What happened to WhatsApp?
- Query this database: The keyword-based Search Warranties
- Realizando OSINT con Google LENS
- Reducing complexity: How Open Web CSAM hash policies could help CSAM investigators on the Dark Web
- Relying on Children to Protect Themselves: A Commentary
- Social Media Platforms and the to-the-hotlines reported & confirmed URLs
- Sunsetting a CSAM investigation: The lost intelligence of non-CSAM data removed by default
- Technical instructions in forums: Where the legal concept of “neutral action” stops
- The Brazilian Legal Debate on “Rape imagery” and “Child Pornography” or Why legal wording matters
- The Checkmate within CSAM forums “Law Colloquiums”
- The contradiction behind the CSAM.country-code rule
- The disintegration of the persistence of (CSAM) hashes: Review it!
- The LinkedIn Cybercrime Carousel: An Intelligence piece of advice for candidates (and recruiters)
- The Mephistophelian pact of end-to-end encrypted platforms on the fight against CSAM
- The Mephistophelian pact of end-to-end encrypted platforms on the fight against CSAM
- The noise-bombing power of CSAM hash removals: How criminals respond to that
- The Non-CSAM data: Where does it stay in the legal, ‘global supply chain’ of CSAM crimes
- The secret tips CSAM whistleblowers give to hotline personnel: The victim’s nationality
- The Sovereignty cry: Denying the criminal mathematics of transnational CSAM crimes
- The terminology you use informs your whistleblower: Why Adult Pornography Websites should not refer to CSAM as CSAM
- Users intentions related to Child Sexual Abuse Material (CSAM) in social networks
- What about the CSAM Megalinks?
- Where non-accuracy data could turn into something (very) odd: Electronic Service Providers CSAM Reports and Pornography Websites
- Where things have gone wrong, put your Trust & Safety Team to analyse the data collected by your Privacy Policy
- Who is winning the CSAM reporting race, tech scanners or the public? – The weird known files data
- XXXII Brazilian Bar Examination gapes the bleeding wound of omission crimes