1,891 research outputs found

    A study of detecting child pornography on smart phone

    Get PDF
    © Springer International Publishing AG 2018. Child Pornography is an increasingly visible rising cybercrime in the world today. Over the past decade, with rapid growth in smart phone usage, readily available free Cloud Computing storage, and various mobile communication apps, child pornographers have found a convenient and reliable mobile platform for instantly sharing pictures or videos of children being sexually abused. Within this new paradigm, law enforcement officers are finding that detecting, gathering, and processing evidence for the prosecution of child pornographers is becoming increasingly challenging. Deep learning is a machine learning method that models high-level abstractions in data and extracts hierarchical representations of data by using a deep graph with multiple processing layers. This paper presents a conceptual model of deep learning approach for detecting child pornography within the new paradigm by using log analysis, file name analysis and cell site analysis which investigate text logs of events that have happened in the smart phone at the scene of the crime using physical and logical acquisition to assists law enforcement officers in gathering and processing child pornography evidence for prosecution. In addition, this paper shows an illustrative example of logical and physical acquisition on smart phones using forensics tools

    Sexting and Mental Health: A School-based Longitudinal Study Among Youth in Texas

    Get PDF
    Background: Sexting has emerged as a common socio-cultural problem in our society today. Few studies have estimated the prevalence of sexting among younger middle school youth and even fewer have assessed the relationship between sexting and mental health outcomes like anxiety and depression symptoms among middle school youth. Objectives: To estimate the prevalence of sexting among sixth and seventh-grade middle school students in a large urban school district in Southeast Texas and to assess its relationship with mental health outcomes (both anxiety and depression) among these youth. Methods: A retrospective analysis of an existing three-year randomized, two-arm, nested longitudinal study was conducted. Associations between sexting and depression symptoms; and sexting and anxiety symptoms were assessed via univariate and multivariate logistic analysis. Results: The prevalence of sexting among sixth graders was found to be 12%. Compared to youth who were not engaged in sexting, engagement in sexting was associated with significantly increased odds of depression and anxiety symptoms. Conclusion: Sexting is common among youth and is associated with poorer mental health outcomes such as anxiety and depression among these youth, but further validation of these findings is needed

    The Fourth Amendment and Technological Exceptionalism After Carpenter: A Case Study on Hash-Value Matching

    Get PDF
    The Fourth Amendment has long served as a barrier between the police and the people; ensuring the government acts reasonably in combating crime. Fourth Amendment jurisprudence is more dynamic than other constitutional guarantees, and has undergone periodic shifts to account for technological and cultural changes. The Supreme Court’s 2018 decision in United States v. Carpenter marks the most recent jurisprudential shift, as the Court departed from the well-settled reasonable expectation of privacy test to account for a new technology (CSLI records). This Note examines Carpenter’s impact on future Fourth Amendment cases, using another novel surveillance technique, hash-value matching, as a case study. Hash-value matching is a binary authentication method that can scan billions of digital communications in seconds for evidence of contraband

    Designing Light Filters to Detect Skin Using a Low-powered Sensor

    Get PDF
    Detection of nudity in photos and videos, especially prior to uploading to the internet, is vital to solving many problems related to adolescent sexting, the distribution of child pornography, and cyber-bullying. The problem with using nudity detection algorithms as a means to combat these problems is that: 1) it implies that a digitized nude photo of a minor already exists (i.e., child pornography), and 2) there are real ethical and legal concerns around the distribution and processing of child pornography. Once a camera captures an image, that image is no longer secure. Therefore, we need to develop new privacy-preserving solutions that prevent the digital capture of nude imagery of minors. My research takes a first step in trying to accomplish this long-term goal: In this thesis, I examine the feasibility of using a low-powered sensor to detect skin dominance (defined as an image comprised of 50% or more of human skin tone) in a visual scene. By designing four custom light filters to enhance the digital information extracted from 300 scenes captured with the sensor (without digitizing high-fidelity visual features), I was able to accurately detect a skin dominant scene with 83.7% accuracy, 83% precision, and 85% recall. The long-term goal to be achieved in the future is to design a low-powered vision sensor that can be mounted on a digital camera lens on a teen\u27s mobile device to detect and/or prevent the capture of nude imagery. Thus, I discuss the limitations of this work toward this larger goal, as well as future research directions

    The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

    Get PDF
    In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward

    Estimating the Size and Structure of the Underground Commercial Sex Economy in Eight Major U.S. Cities

    Get PDF
    The underground commercial sex economy (UCSE) generates millions of dollars annually, yet investigation and data collection remain under resourced. Our study aimed to unveil the scale of the UCSE in eight major US cities. Across cities, the UCSE's worth was estimated between 39.9and39.9 and 290 million in 2007, but decreased since 2003 in all but two cities. Interviews with pimps, traffickers, sex workers, child pornographers, and law enforcement revealed the dynamics central to the underground commercial sex trade -- and shaped the policy suggestions to combat it

    Sextortion: The Hybrid Cyber-Sex Crime

    Get PDF
    Sextortion is an increasingly prevalent internet crime, but it is not well-defined or understood. As new technology makes the challenge of combatting sextortion even more difficult, regulators should consider using a broad definition of sextortion to capture the myriad of ways that criminals are extorting victim with their sexual images. This recent development discusses the pervasiveness and methods of the crime, particularly in the context of technology, and the need for federal government action and legislation to promote public awareness of this disturbingly prevalent cyber-sex crime. This article recommends a sextortion attack plan that would involve: (1) enactment of a federal sextortion crime that properly classifies sextortion as a sex crime, (2) federally regulating and negotiating with internet companies to take greater responsibility for sextortion occurring on internet platforms, (3) establishing a non-profit clearinghouse under the federal statute to collect data and provide resources to both victims and law enforcement, and (4) using information gathered from the clearinghouse to create an effective sextortion awareness campaign
    • …
    corecore