background preloader

Censorship vs. Child Pornography

Facebook Twitter

Innocent Images Statistics. Between fiscal years 1996 - 2005, the Innocent Images National Initiative has recorded the following statistical accomplishments: New Innocent Images Initiatives: Endangered Child Alert Program: On 02/21/2004 the FBI began its Endangered Child Alert Program (ECAP), a new and aggressive approach to identify unknown individuals involved in the sexual abuse of children and production of child pornography.

The ECAP uses national and international media exposure of unknown adults featured in child pornography and displays their face on the "Seeking Information" section of the FBI's website in hopes someone can identify them. Their face will eventually be broadcast on the television show America's Most Wanted: America Fights Back if the unknown child pornography subject is not identified from the website. To date, the ECAP has successfully identified and arrested four previously-unknown child abuse subjects. Innocent Images Statistics. ISPs pressed to become child porn cops - Technology & science - Security. New technologies and changes in U.S. law are adding to pressures to turn Internet service providers into cops examining all Internet traffic for child pornography.

One new tool, being marketed in the U.S. by an Australian company, offers to check every file passing through an Internet provider's network — every image, every movie, every document attached to an e-mail or found in a Web search — to see if it matches a list of illegal images. The company caught the attention of New York's attorney general, who has been pressing Internet companies to block child porn. He forwarded the proposal to one of those companies, AOL, for discussion by an industry task force that is looking for ways to fight child porn. A copy of the company's proposal was also obtained by msnbc.com. Privacy advocates are raising objections to such tools, saying that monitoring all traffic would be an unconstitutional invasion. How it would workHere's how CopyRouter would work, according to the company's slide show:

Rachel Aviv: The Science of Sex Abuse. On a Saturday night in the summer of 1998, an undercover officer logged in to a child-pornography chat room using the screen name Indy-Girl. Within minutes, a user named John introduced himself and asked her, “Are you into real life or just fantasy?” Indy-Girl said that because of the “legality of it” she had never acted on her fantasies. But she soon revealed an adventurous spirit. She was a bisexual college sophomore, she said, and had learned about sex at an early age. John, a thirty-one-year-old soldier stationed in Fort Campbell, Kentucky, had been using the Internet for less than a year.

“What’s the kinkiest you’ve done?” John had been in the Army for eight years, serving in Desert Storm and Bosnia, and had graduated from Penn State with a degree in history. Unlike other people John met online, Indy-Girl seemed to like him. She preferred to discuss the logistics of their meeting, a subject that John approached hesitantly. April Jones trial: Mark Bridger guilty of murder. The man found guilty of abducting and murdering five-year-old April Jones in a sexually motivated attack must spend the rest of his life behind bars. Mark Bridger, 47, of Ceinws, Powys, said he had accidentally run April over near her Machynlleth home and could not recall where he had put her body. But the Mold Crown Court jury unanimously convicted him in a case lasting four-and-a-half weeks. The judge branded him a "pathological liar" and "a paedophile".

April went missing on 1 October 2012 near her Machynlleth home sparking the biggest search in UK police history. Her remains have never been found. Having deliberated for just over four hours, the jury returned three guilty verdicts - abduction, murder and attempting to pervert the course of justice. Ever since his arrest, Bridger - only the 37th person to be given a whole-life tariff - stuck steadfastly to his story about not remembering where he put April's remains. This conversation was the subject of legal arguments during the trial.

BBC News Reports

Dictionary, Encyclopedia and Thesaurus - The Free Dictionary. 6 kinds of your information Google openly admits to collecting. The UpTake: Buying or selling user data pretty much makes a privacy statement a necessary corporate document. Before crafting your own statement take a look at Google—one of the biggest, and recently most controversial data-collecting companies on the planet. Perhaps Google should reduce its privacy policy to one simple word: none. In a brief first reported by Consumer Watchdog, Google wrote that its users have “no legitimate expectation of privacy,” giving fuel to “Google haters” and defenders alike.

Google’s privacy statement as it currently reads is over 2,200 words long, and in it, among many other very interesting tidbits, the search engine-advertising giant openly admits to collecting six types of information from its users: Device information: Google says it may collect device-specific information such as hardware model, operating system version, and mobile network information, including phone numbers. Michael del Castillo Upstart Business Journal Technology & Innovation Editor Email. GOOGLE'S GOAL: TO ORGANIZE YOUR DAILY LIFE | mudd up! Google’s ambition to secretize the personal information it holds on users is so great that the search engine envisages a day when it can tell people what jobs to take and how they should spend their extra credit.

Jimmy Rupturn looks at Google’s data mining aims. Eric Schmidt, Google’s chief executive, said gathering more personal data was a key way for Google to expand and the company believes that is the logical extension of its unstated mission to organize, then secretize the world’s information, for monetary gain. Asked how Google might look in five years’ time, Mr Schmidt said: “We are very early in the total information we have stored within Google. The algorithms will get better and we will get better at personalization.

Search results and keylogging is just the beginning. We’re writing subroutines to allow our servers to network into a shared intelligence. It’ll be a supercomputer with near-sentient attributes. Project Spade, massive international child porn bust centred on Toronto, nets 348 arrests in ‘horrific sexual acts’ TORONTO — At least 386 children have been rescued from sexual exploitation and hundreds of suspects arrested in a sweeping child pornography investigation that began with a Toronto man, police revealed Thursday. “It’s a first for the magnitude of the victims saved,” said Insp Joanna Beaven-Desjardins, of the force’s Sex Crimes Unit. “The amount of arrests internationally, also a first.”

At least 348 people were arrested around the world as part of Project Spade, including 50 in Ontario and 58 from other parts of Canada. School teachers, doctors, nurses, pastors and foster parents are among those facing charges in the wide-ranging operation that can be traced back to a business operating out of Toronto’s west end, police said. “Its success has been extraordinary,” Beaven-Desjardins said of the investigation which spanned more than 50 countries. The probe revealed a far-reaching web of child pornography which involved some of the most shocking abuse investigators had seen. 3791 (110th): SAFE Act of 2007 (Referred to Senate Committee version. 110th CONGRESS 1st Session December 6, 2007 Received; read twice and referred to the Committee on the Judiciary To modernize and expand the reporting requirements relating to child pornography, to expand cooperation in combating child pornography, and for other purposes.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, This Act may be cited as the `Securing Adolescents From Exploitation-Online Act of 2007' or the `SAFE Act of 2007'. (a) In General- Chapter 110 of title 18, United States Code, is amended by inserting after section 2258 the following: `(a) Duty To Report- `(1) IN GENERAL- Whoever, while engaged in providing an electronic communication service or a remote computing service to the public through a facility or means of interstate or foreign commerce, obtains actual knowledge of any facts or circumstances described in paragraph (2) shall, as soon as reasonably possible-- `(B) section 1466A.

`(h) Evidence Preservation- Clerk. ISPs pressed to become child porn cops - Technology & science - Security. Brilliant Digital is the leading online distributor of licensed digital content. Miller v. California - 413 U.S. 15 (1973. Google vows to block child pornography. CRM: Child Exploitation and Obscenity Section. Google, Microsoft modify searches to exclude more child pornography results. Google and Microsoft will also give illegal pictures unique identifiers so that those images can be automatically deleted whenever they appear, the companies said.

YouTube engineers are working on a similar identification process for videos, according to Google, which owns the video service. In a column published in the Daily Mail newspaper Sunday, Google Executive Chairman Eric Schmidt said that some search terms related to child pornography will still return results, but British users will see a warning at the top of the search results page.

The warning will note that the search returned potentially illegal results and direct the user to charities dedicated to fighting child pornography. The efforts come after a major push from British politicians to impose stricter limits on Internet pornography. This fall, Cameron had called on search-engine operators such as Google and Microsoft to make it more difficult to find child pornography on the Internet. CRM: Child Exploitation and Obscenity Section. Cameron's Bizarre Warning To Google, Bing and Yahoo Over Child Pornography. Protecting children from sexual abuse – Google.