IT giants join forces to combat child sexual abuse imagery

Facebook, Google, Twitter, Microsoft and Yahoo and the Internet Watch Foundation (IWF) are joining their efforts in the fight against child sexual abuse.

Facebook, Google, Twitter, Microsoft and Yahoo are joining their effort in the fight against child sexual abuse.

The IT giants child after joining forces with a the UK charity, the Internet Watch Foundation (IWF), will remove sexual abuse images from the web.

The news was reported by the Internet Watch Foundation (IWF) that announced it will share hashes of child sexual abuse imagery with the IT giants. The initiative aim to improve and speed up the identification of the despicable images and consequent removal.

The knowledge of the hash of the child sexual abuse imagines will allow companies to rapidly identify the content once published and shared on the Internet.

“The IWF will provide hashes of child sexual abuse images to the online industry to speed up the identification and removal of this content worldwide.

This enables the internet industry to actively protect their customers and help victims of child sexual abuse.”

  • Victims’ images can be identified and removed more quickly, preventing them from being shared time and time again.
  • Child sexual abuse images will be prevented from being uploaded to the internet in the first place.
    This gives internet companies the power to stop people from repeatedly sharing the images on their services.
  • Men, women and children of all ages are protected from accidentally stumbling across the images online.

The Internet Watch Foundation states that its experts will assist the IT companies to create three different types of hashes, PhotoDNA (A technology developed by Microsoft to identify a child abuse image), MD5 and SHA-1.

child sexual abuse images Hash-list-explanation-flow-diagram

The hashed will be calculated starting from the images discovered during its investigations as well as those provided by the IT giants and by the public. Another source for the IWF analysts will be the archive of the UK Home Office’s new Child Abuse Image Database (CAID).

Thanks to the initiative it will be possible to identify and remove as many as 500 child sex abuse web pages every day, an impressive result against the most villain kind of online crimes. The IWF highlighted that each of those pages will host multiple images, so the initiative will potential allow to remove millions of child sex abuse images.

The Internet Watch Foundation notes that this is a first step against child sex abuse, unfortunately, there are billions of such images online.

“The IWF Hash List could be a game-changer and really steps up the fight against child sexual abuse images online. …It means victims’ images can be identified and removed more quickly, and we can prevent known child sexual abuse images from being uploaded to the internet in the first place.” The Internet Watch Foundation’s CEO, Susie Hargreaves

Unfortunately, paedophiles prefer to exploit anonymizing networks like Tor to share child sexual abuse images, a territory difficult to explore despite the effort of the British Government recently announced by Prime Minister Cameron.

The sharing of hash lists of child sexual abuse images has been welcomed by other child protection groups, including the National Society for the Prevention of Cruelty to Children (NSPCC).

Pierluigi Paganini

(Security Affairs – child sexual abuse, cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Security Affairs newsletter Round 528 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

10 minutes ago

Palo Alto Networks fixed multiple privilege escalation flaws

Palo Alto Networks addressed multiple vulnerabilities and included the latest Chrome patches in its solutions.…

24 hours ago

Unusual toolset used in recent Fog Ransomware attack

Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec…

1 day ago

Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web

Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on…

2 days ago

Apple confirmed that Messages app flaw was actively exploited in the wild<gwmw style="display: none; background-color: transparent;"></gwmw>

Apple confirmed that a security flaw in its Messages app was actively exploited in the…

2 days ago