Online child sex abuse content ‘can be stopped without harming encryption’

21 July 2022, 07:04

Online abuse AI algorithm
Online abuse AI algorithm. Picture: PA

A new paper published by UK cybersecurity experts has proposed new ways of tackling abuse material without protecting encryption.

UK cybersecurity experts have laid out a range of possible ways that child sexual abuse material could be detected within encrypted services that would still protect user privacy.

Technical experts from GCHQ and the National Cyber Security Centre (NCSC) have published a paper on the issue, which they say they hope will help the debate around the issue of end-to-end encrypted platforms and child online safety.

The Government and child safety campaigners have previously warned that the increased use of encrypted messaging services, such as WhatsApp, makes it more difficult for law enforcement to detect online abuse – while privacy groups have argued that forcing platforms to create workarounds to encryption threatens everyone’s personal privacy and safety.

Last year, Apple announced and then subsequently delayed a tool that would scan photos a user attempted to upload to their iCloud library – as part of tackling child sexual abuse material – after backlash from some over potential privacy implications.

In their paper, NCSC technical director Dr Ian Levy and Crispin Robinson, GCHQ’s technical director for cryptanalysis, lay out several ways in which technology could be used to aid the detection of child sexual abuse material without breaking encryption.

The proposals include storing digital fingerprints of known abuse material on a user’s device and having the device detect if any known material is sent or received or using on-device artificial intelligence to scan for language in the text which could indicate a link to child sexual abuse, or scanning images and video for known material.

In some of these cases, the authors suggest this data would never leave the person in question’s device but would instead be used to flag concerns to the user and prompt them to report it themselves, while others suggest varying forms of secure external analysis.

However, they acknowledge that many of their proposals currently have flaws and would require work from all engaged parties on the issue to make them feasible and technically sound.

The authors say the paper is not part of any Government policy or a set of rules or requirements they believe must be introduced, but instead a way of creating a more informed debate around the subject.

Dr Levy and Mr Robinson also acknowledge that further research and technical work were needed on the issue, saying there was “undoubtedly work to be done” to examine and understand the impact of any of their proposals.

“We hope this paper will help the debate around combating child sexual abuse on end-to-end encrypted services, for the first time setting out clearly the details and complexities of the problem,” the authors write in the paper.

“We hope to show that the dual dystopian futures of safe spaces for child abusers and insecurity by default for all are neither necessary or inevitable.

“We have written this paper having spent many years combating child abuse, but also in the technical domains of cryptography and computer security.”

Child safety campaigners have praised the new paper.

Andy Burrows, head of child safety online policy at the NSPCC, said: “This important and highly credible intervention breaks through the false binary that children’s fundamental right to safety online can only be achieved at the expense of adult privacy.

“The report demonstrates it will be technically feasible to identify child abuse material and grooming in end-to-end encrypted products.

“It’s clear that barriers to child protection are not technical, but driven by tech companies that don’t want to develop a balanced settlement for their users.

“The Online Safety Bill is an opportunity to tackle child abuse taking place at an industrial scale.

“Despite the breathless suggestions that the Bill could ‘break’ encryption, it’s clear that legislation can incentivise companies to develop technical solutions and deliver safer and more private online services.”

By Press Association

More Technology News

See more More Technology News

Getting accurate information online is "under greater threat than ever before".

Accurate information online ‘under greater threat than ever’ as misinformation 'crisis' looms

The waist of an obese woman

Smart scales and special clinics to help thousands of obese children lose weight

A hand on a keyboard

Council cannot say when computer system will be fully restored after cyberattack

US President Donald Trump

US-China tariff deal helps tech firms but they ‘remain in Trump’s crosshairs’

European moose, (Alces alces), Markaryd, Sweden. A majestic elk in the forests of the land of a thousand lakes. Autumn forest in the wilderness. Beaut

Elk could return to UK after 3,000 years in new rewilding effort

A total of 28 toadlets have been counted at Blackmoor, Hampshire, following the reintroduction programme which started in 2021.

Britain’s loudest amphibian makes ‘remarkable comeback’, after project that could be ‘blueprint’ for conservation efforts

A hand on a keyboard

Thousands of pupils attend school on Saturday after online phishing attack

x

Part of Soviet-era spacecraft to crash to Earth this weekend

Schoolgirls in class

Phishing attack sees Edinburgh pupils locked out of online learning materials

Prime Minister Sir Keir Starmer with Commanding Officer Matthew Teare

Starmer declines to rule out tech tax changes as part of future trade deal

Lunar samples at the Shanghai Expo Trade Center in Shanghai, China

First moon rocks on Earth since 1976 arrive safely in UK

Scientists have revealed that mother wasps can remember the locations of up to nine separate nests at once, rarely making mistakes despite the fact nests are dug in bare sand containing hundreds belonging to other females.

Incredible new research reveals the power of a mother wasp's brain

Government cyber defences have not kept up with the dangerous and evolving threats from hackers, a report from MPs has warned.

Government cyber defences not prepared for evolving threat from ‘hostile states’ and hackers, MPs warn

Close up photo of young woman sitting at wooden table using mobile phone

Schoolgirls in Wales report problematic social media use double that of boys

A woman’s hand pressing keys of a laptop keyboard

‘Crumbling’ Government cyber defences outpaced by cyber criminals – report

The Wikimedia Foundation said it was launching a legal challenge against the thresholds of the Act

Wikipedia launches legal challenge against Online Safety Act