The Strengths and Weaknesses of the Online Child Safety Ecosystem
The CyberTipline is the main line of defense for children who are exploited on the internet. It leads to the rescue of children and the arrest of abusers. Yet after 26 years many believe the entire...
Big thanks to @shelbygrossman.bsky.social, @riana.bsky.social @det.bsky.social, @sarashah19.bsky.social & @stamos.org for almost a year of work interviewing stakeholders and researching these issues; also @noupside.bsky.social, @jcperrino.bsky.social and Elena Cryst for helping bring it to fruition.
22.04.2024 17:26 β π 5 π 0 π¬ 0 π 0
We argue these issues would be best addressed by a concerted effort to massively uplift NCMEC's technical and analytical capabilities, which will require the cooperation of platforms, NCMEC, law enforcement and, importantly, the U.S. Congress.
22.04.2024 17:18 β π 4 π 0 π¬ 1 π 0
Through interviews with 66 respondents, we explain why.
1. Many online platforms submit low-quality reports.
2. NCMEC has faced challenges rapidly implementing technological improvements that would aid LE triage.
3. Legal constraints on NCMEC and U.S. LE have implications for efficiency.
22.04.2024 17:18 β π 2 π 0 π¬ 1 π 0
It is well known that law enforcement are overwhelmed with the volume of CyberTipline reports. Our contribution is to show that law enforcement feel unable to accurately prioritize reports that are most likely to lead to the rescue of a child being abused.
22.04.2024 17:17 β π 2 π 0 π¬ 1 π 0
If U.S. platforms discover child sexual abuse material, federal law requires they report it to the CyberTipline, which is run by the National Center for Missing and Exploited Children, a nonprofit. NCMEC then forwards the reports to law enforcement.
22.04.2024 17:16 β π 2 π 0 π¬ 1 π 0
The CyberTipline is the main line of defense for children who are exploited on the internet. It leads to the rescue of children and the arrest of abusers. Yet many believe the entire system does not always live up to its potential. Our new report explores why.
22.04.2024 17:16 β π 2 π 0 π¬ 1 π 0
As a result of the investigation:
- The image URLs for abuse material were reported to authorities with action being taken to remove this content across the internet.
- The datasets have been temporarily taken down by the nonprofit developer to address safety concerns.
20.12.2023 15:53 β π 1 π 0 π¬ 0 π 0
Investigation Finds AI Image Generation Models Trained on Child
A new report identifies hundreds of instances of exploitative images of children in a public dataset used for AI text-to-image generation models.
A new investigation by SIO Chief Technologist David Thiel (@det.bsky.social) found more than 1,000 instances of externally validated child sexual abuse material in a dataset used to train popular AI image generation models.
20.12.2023 15:50 β π 1 π 1 π¬ 1 π 0
Call for Proposals: Expanding Online Trust & Safety Research
A new research initiative offers funding to researchers studying trust and safety in the majority world. Applications due January 30, 2024
We are excited to launch a grant funding program for researchers studying trust and safety issues outside of the North American or Western European context.
Have an idea? Applications are due January 30, 2024.
06.11.2023 19:48 β π 3 π 1 π¬ 0 π 0
Trust & Safety Research Conference showcases leading research in
The sold-out conference united and inspired researchers examining how we can build confidence and reduce harm in our online ecosystems.
Thanks to all who made the second annual Trust and Safety Research Conference a huge success!
ποΈ SOLD OUT with nearly 500 attendees
π¬ 27 sessions spanning research on AI, content moderation, and mental health
π 10 new Journal of Online Trust and Safety articles
π» Great food, drink, and community
27.10.2023 18:11 β π 1 π 1 π¬ 0 π 0
Curbing Government Internet Surveillance | by Riana Pfefferkorn & Callum Voge - Project Syndicate
Riana Pfefferkorn & Callum Voge show how sustained public pressure can stop authorities from gaining access to or using encrypted data.
Billions of people use encryption to protect their online data, payments, and communications.
Riana Pfefferkorn and ISOC's Callum Voge argue that online safety regulations can protect people without targeting encryption.
@riana.bsky.social
@internetsociety.bsky.social
19.10.2023 16:53 β π 2 π 2 π¬ 0 π 0
Happening now! π₯οΈ
19.10.2023 15:22 β π 0 π 0 π¬ 0 π 0
Common Abuses on Mastodon: A Primer
Decentralized social networks may be the new model for social media, but their lack of a central moderation function make it more difficult to combat online abuse.
You're on Bluesky, so you know social media is increasingly decentralized.
With opportunity and growth, unfortunately, comes abuse. Our new primer offers tips for addressing unique safety challenges in decentralized spaces.
By @stamos.org & @sarashah19.bsky.social π¬π
18.10.2023 19:40 β π 4 π 3 π¬ 0 π 0
Identifying Search Directives on Social Media
| Journal of Online Trust and Safety
Journal of Online Trust and Safety
A new issue of the Journal of Online Trust and Safety is hot off the cloud servers with research on privacy, deepfakes, crowdsourced fact checking, and what influences online searches. π π¬ π
25.09.2023 17:10 β π 4 π 0 π¬ 0 π 1
Assessing the Problem of Disinformation
Rebecca Rand & Shelby Grossman on AI propaganda; Justin Hendrix, Kirsty Park & Stephan MΓΌndges on the EU Code of Practice on Disinformation.
Shelby Grossman joined the Tech Policy Press podcast to discuss research finding that current AI tools can generate persuasive propaganda articles.
@shelbygrossman.bsky.social / @techpolicypress.bsky.social
11.09.2023 18:38 β π 1 π 1 π¬ 0 π 1
In Monitoring Child Sex Abuse, Apple Is Caught Between Safety and Privacy
An advocacy group is starting a $2 million campaign calling for the company to better police materials on its products and services.
Alex Stamos (@stamos.bsky.social) tells the New York Times it is possible for Apple to do more in the fight against child sexual exploitation while balancing privacy and safety.
07.09.2023 18:03 β π 2 π 1 π¬ 0 π 0
YouTube rabbit holes are rare, but SIO scholar Ronald Robertson finds the platform can still help alternative and extremist channels build audiences.
cyber.fsi.stanford.edu/io/news/stud...
31.08.2023 13:55 β π 7 π 0 π¬ 0 π 0
Addressing Child Exploitation on Federated Social Media
New report finds an increasingly decentralized social media landscape offers users more choice, but poses technical challenges for addressing child exploitation and other online abuse.
A new report about child safety and decentralized social media. It's mostly about the Fediverse (see https://hachyderm.io/@det/110769470058276368 for discussion), but some of it applies to the Bluesky / ATproto ecosystem as well.
24.07.2023 14:38 β π 13 π 10 π¬ 1 π 0
Stanford University's research center for the interdisciplinary study of issues at the nexus of technology, governance and public policy.
Assistant Professor, American University | Studying disinfo, cybersecurity, and emerging technology π©βπ»
Researcher of online rumors & disinformation. Former basketball player. Prof at University of Washington, HCDE. Co-founder of the UW Center for an Informed Public. Personal account: Views may not reflect those of my employer. #RageAgainstTheBullshitMachine
Director of Program on Platform Regulation, Stanford CPC. Former Google (2004-2015) Legal Director for Web Search, Speech and Intermediary Liability Issues.
I've done this stuff for a long time and am getting kind of cranky about it.
long suffering NJ acolyte. currently Stanford FSI/Cyber Policy Center, formerly #Team46 @ DHS. process is my valentine.
www.sarashah.io
Tech policy researcher at Stanford. Former litigator. Anger is an energy. Dum spiro spero. she/her
Get E2EE DMs on Germ! π
https://ger.mx/A8RNdqpVCF0_VW6QP0yqb4JK8W2SNlPNayEQfDxIN9OI#did:plc:juj4a7jagip23ja36opmi4d4
Professor of Practice at the Howard Center for Investigative Reporting at the Walter Cronkite School of Journalism and Mass Communication at Arizona State University
CISO of SentinelOne, teaching at Stanford.
πStudies influence,propaganda,platform design,identity @Georgetown
βπΌLawfare,The Atlantic
πInvisible Rulers: The People Who Turn Lies Into Reality βhow influencers & online crowds create bespoke realities (invisiblerulers.com)
π¦Ήπ»ββοΈTwitter Files supervillain
π€ Internet policy nerd
π @InternetSociety.bsky.social "Senior Expert"
π Always learning
βΎ ποΈ NY sports & DC life
Infosec person focused on harm reduction in technology; fmr tech, data science and T&S research at https://io.stanford.edu & https://tsjournal.org
https://orcid.org/0000-0002-0947-5921
Also music things + open data.