New study identifies cyber strategies with potential to identify and protect victims of child abuse material

The Australian Institute of Criminology (AIC) has today released a paper that identifies cyber strategies that have the potential to identify victims of child sexual abuse material (CSAM) and detect offenders.

Cyber strategies used to combat child sexual abuse material reviews existing research on cyber strategies to disrupt and prevent CSAM offending.

The study identified five key cyber strategies: peer-to-peer network monitoring; automated CSAM detection tools; web crawlers; pop-up warning messages; and facial recognition.

AIC Deputy Director Dr Rick Brown said these strategies also have the potential to automate the removal of large amounts of CSAM, identify CSAM sites for detection and prevent individuals from viewing and sharing the material.

"During National Child Protection Week, this is incredibly hopeful news, and puts us one step closer to improving our understanding of an extremely serious and harmful form of crime against our most vulnerable children.

"The automated nature of these identified strategies is particularly important given the demands placed on law enforcement by the dramatic growth in CSAM," Dr Brown said.

The report is available at https://doi.org/10.52922/ti78313

This research was undertaken by the University of the Sunshine Coast as part of the AIC's Child Sexual Abuse Material Reduction Research Program. The program was funded through a grant made under Section 298 of the Proceeds of Crime Act 2002 (Cth).

/Public Release. This material from the originating organization/author(s) might be of the point-in-time nature, and edited for clarity, style and length. Mirage.News does not take institutional positions or sides, and all views, positions, and conclusions expressed herein are solely those of the author(s).View in full here.