Blog Post

Protecting the Naked Child with Griffeye

Vernon Fryer • February 28, 2025

Technology plays a tremendous role in children's lives. Knowing how to protect them is essential

Over the past forty years of doing some hard-core IT stuff and some not so hot stuff, the one part that was not so hot was investigating child pornography.


One needs to understand the psychology, or mindset, of those that commit sexually motivated crimes. I have learnt about the typologies and patterns of behaviour of sex offenders. Exploring the relationship between paraphilia such as exhibitionism, voyeurism, fetishism and criminal acts. I have reviewed and dissected real case examples to gain insight into offender modus operandi.


Technology plays a tremendous role in our children's lives. Understanding the ways children are interacting online allows for more open communication. Also, increasing awareness of the opportunities to mitigate threats posed by the individuals seeking to exploit them.

 

This post might sound like a product punt… It is, yes, but for an extremely good reason.


It involves the exploration of investigative strategies to address the relationship between child sexual abuse and child sexual abuse materials (child pornography), as well as gathering new tools and resources for the most comprehensive case outcomes.

 

There was a recent arrest of a man found with child pornography videos and photos on various electronics devices. Several electronic devices suspected to contain child sexual abuse material were confiscated. A forensic analysis of these devices was conducted on scene by cybercrime experts, and an estimated 10 million child pornography images and videos were detected.


When handling high volumes of images captured in this type of crime two important factors come to mind.


Firstly, speed matters. Digital evidence investigators know they are always working against the clock. They also know case-solving often hinges on timely data gathered from technology devices. Efficiency is especially crucial for child sexual assault material (CSAM) cases. Without timely investigation, children could remain in harmful situations and perpetrators could abuse new victims. With fast recovery, analysis and sharing, law enforcement officers are poised to rescue and repeat.


Secondly, abusive material takes its toll in an ever-evolving technology landscape, a constant challenge is the sheer volume of data: a large child exploitation investigation may pit capable examiners against hundreds of thousands, or even millions, of media files. Even more problematic, however, is the content of those images and videos. To protect the innocent as well as the protectors, law enforcement units should ensure its team has access to tools that emphasize both safeguarding the public and promoting officer wellness.


Over the last two-decade Risk Diversion has been involved in various cases involving child pornography and have assisted law enforcement in combating other related crimes dealing with vast amounts of images. One of the solutions used by Risk Diversion is the Magnet Griffeye platform, which is designed to interconnect investigators, streamline information sharing, and enable investigators to build on each other’s case work. It allows access to a powerful set of analytical features, capabilities, and flexible workflows for a seamless and efficient experience. Some of the powerful takeaways of Griffeye is its ability to quickly find and match all images and videos featuring different individuals, and search between the data to identify matching faces of suspects or victims. It can rapidly and accurately review hours of video footage in a fraction of the time using advanced filtering capabilities such as motion and facial, and object-based searches.


Some key takeaways about Magnet Griffeye:


  • Gain a clear indication of where to begin your investigation and identify the most relevant data for the case.
  • Save valuable time and effort through pre-categorization of known data, duplicate stacking, and correlating metadata and visual attributes in your media files.
  • Utilize AI tools like Brain and Thorn.AI to automatically detect CSAM in large media sets, as well as other classes and objects.
  • With T3K.AI CORE* you can effortlessly detect and categorize media related to various content types such as extremism, terrorism, narcotics and more.
  • Quickly find and match all images and videos featuring different individuals, and search between the data to identify matching faces of suspects or victims.
  • Rapidly and accurately review hours of video footage in a fraction of the time using advanced filtering capabilities such as motion, facial, and object-based searches.
  • It allows minimize exposure to harmful material with a build-in wellbeing feature.



With the help of companies like Risk Diversion and Magnet Griffeye we support all efforts to route out this criminal act.


Until next time, working together works.


Risk Diversion Blog

By Vernon Fryer November 28, 2024
Looking at the growth of IoT (Internet of Things) in Digital Forensics
By Vernon Fryer November 15, 2024
Incorporation of digital evidence in crime investigations
By Vernon Fryer November 14, 2024
An Introduction by Risk Diversion
By Vernon Fryer August 1, 2024
Cyberbullying - causing harm through the use of digital technology
By Francois van Staden June 28, 2024
Magnet AUTOMATE with brilliant features
By Vernon Fryer June 10, 2024
Conducting digital forensics investigations using cloud-based services
By Vernon Fryer May 24, 2024
Delving further into Mobile Forensics
By Vernon Fryer May 13, 2024
Exploring the complex and fascinating world of Speech Analysis
By Vernon Fryer May 6, 2024
Digital Forensics in Aircrafts
By Vernon Fryer April 29, 2024
The superhighways and byways of cyber space has enabled millions of IoT devices to be connected to the internet.
More Posts
Share by: