Over the past forty years of doing some hard-core IT stuff and some not so hot stuff, the one part that was not so hot was investigating child pornography.
One needs to understand the psychology, or mindset, of those that commit sexually motivated crimes. I have learnt about the typologies and patterns of behaviour of sex offenders. Exploring the relationship between paraphilia such as exhibitionism, voyeurism, fetishism and criminal acts. I have reviewed and dissected real case examples to gain insight into offender modus operandi.
Technology plays a tremendous role in our children's lives. Understanding the ways children are interacting online allows for more open communication. Also, increasing awareness of the opportunities to mitigate threats posed by the individuals seeking to exploit them.
This post might sound like a product punt… It is, yes, but for an extremely good reason.
It involves the exploration of investigative strategies to address the relationship between child sexual abuse and child sexual abuse materials (child pornography), as well as gathering new tools and resources for the most comprehensive case outcomes.
There was a recent arrest of a man found with child pornography videos and photos on various electronics devices. Several electronic devices suspected to contain child sexual abuse material were confiscated. A forensic analysis of these devices was conducted on scene by cybercrime experts, and an estimated 10 million child pornography images and videos were detected.
When handling high volumes of images captured in this type of crime two important factors come to mind.
Firstly, speed matters. Digital evidence investigators know they are always working against the clock. They also know case-solving often hinges on timely data gathered from technology devices. Efficiency is especially crucial for child sexual assault material (CSAM) cases. Without timely investigation, children could remain in harmful situations and perpetrators could abuse new victims. With fast recovery, analysis and sharing, law enforcement officers are poised to rescue and repeat.
Secondly, abusive material takes its toll in an ever-evolving technology landscape, a constant challenge is the sheer volume of data: a large child exploitation investigation may pit capable examiners against hundreds of thousands, or even millions, of media files. Even more problematic, however, is the content of those images and videos. To protect the innocent as well as the protectors, law enforcement units should ensure its team has access to tools that emphasize both safeguarding the public and promoting officer wellness.
Over the last two-decade Risk Diversion has been involved in various cases involving child pornography and have assisted law enforcement in combating other related crimes dealing with vast amounts of images. One of the solutions used by Risk Diversion is the Magnet Griffeye platform, which is designed to interconnect investigators, streamline information sharing, and enable investigators to build on each other’s case work. It allows access to a powerful set of analytical features, capabilities, and flexible workflows for a seamless and efficient experience. Some of the powerful takeaways of Griffeye is its ability to quickly find and match all images and videos featuring different individuals, and search between the data to identify matching faces of suspects or victims. It can rapidly and accurately review hours of video footage in a fraction of the time using advanced filtering capabilities such as motion and facial, and object-based searches.
Some key takeaways about Magnet Griffeye:
With the help of companies like Risk Diversion and Magnet Griffeye we support all efforts to route out this criminal act.
Until next time, working together works.