Tech Giants Back Plan To Eradicate Online Child Sexual Abuse

The tech giants – which includes Facebook, Google, Microsoft and Twitter – have committed to work with each other to keep the content off social networks and other distribution platforms, they claim.

The firms, speaking as part of the existing Technology Coalition of digital firms, have announced Project Protect – which it says will improve the cross-industry approach to stopping child sexual exploitation and abuse (CSEA) content appearing online.

Experts Comments

June 12, 2020
Ian Stevenson
CEO
Cyan Forensics
It's a positive sign to see these organisations taking responsibility, uniting, and helping to clamp down on heinous content. Sexual abuse of children is a horrific crime, made worse when victims know that images and video of their abuse is circulating. Additionally, access to CSAM is thought by some to encourage and glamorise abuse and leads to more direct abuse through increased demand. Of course, there is no silver bullet to solve the issues around CSAM content, but a transparent,.....Read More
It's a positive sign to see these organisations taking responsibility, uniting, and helping to clamp down on heinous content. Sexual abuse of children is a horrific crime, made worse when victims know that images and video of their abuse is circulating. Additionally, access to CSAM is thought by some to encourage and glamorise abuse and leads to more direct abuse through increased demand. Of course, there is no silver bullet to solve the issues around CSAM content, but a transparent, cross-industry approach is absolutely what is needed, coupled with intelligent technology to try and lift the burden on moderators, who are often faced with terrible material on a regular basis. The more tech companies work together and alongside with government, policy makers, charities and other forces for good to find solutions, the closer we’ll be to protecting online users and creating a safer space.  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.