1 / 23

ICT Solution to Prevent and Combat Online Sexual Abuse Crimes on Children Tony Seno Hartono National Technology Officer

ICT Solution to Prevent and Combat Online Sexual Abuse Crimes on Children Tony Seno Hartono National Technology Officer. Mission To enable people and business throughout Indonesia to realize their full potential Vision Accelerating Indonesia to be a Knowledge Based Society.

avidan
Download Presentation

ICT Solution to Prevent and Combat Online Sexual Abuse Crimes on Children Tony Seno Hartono National Technology Officer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ICT Solution to Prevent and Combat Online Sexual Abuse Crimes on ChildrenTony Seno HartonoNational Technology Officer

  2. Mission To enable people and business throughout Indonesia to realize their full potential Vision Accelerating Indonesia to be a Knowledge Based Society

  3. Microsoft Indonesia Objectives • Good Corporate Citizen • IT as an enabler to protect & create database (education material) on Indonesia’s property, natural resources, heritage, & creative industry • MS technology is built to protect users from viruses to cybercrime • MS as a well-recognized philanthropy player • Knowledge Based Society • Through MS Citizenship programs we offer Students’ Programs, Teachers Programs, Education Institution Programs through PIL (Partners in Learning) • Community Technology Centers • Software donations

  4. Promoting Transparency and Security • Transparent • Efficient • Effective • Secure • High Quality Service • Open Government • Good governance Government 2.0

  5. Relevant ICT Tools & Program for Law Enforcement & Parents • Program • CETS (Child Exploitation Tracking System) • SCP (Security Cooperation Program) • Law Enforcement • PhotoDNA • Search, Analytic, Monitoring, Alert • Scope Search, Information Rights Management • Parents • Parental Control • Internet Explorer Safety/Privacy

  6. PhotoDNA = Original Photo PhotoDNA Process PhotoDNA Signature All of these pictures have the same PhotoDNA Signature

  7. PhotoDNA can also find Near Duplicate pictures PhotoDNA can ignore the differences between Near Duplicates -> Accuracy of 98% can be achieved with a false-positive rate of 1 / 100,000,000 We have picked a threshold which almost completely eliminates False Positives Microsoft has run PhotoDNA on billions of photos and had no FPs This is a “near duplicate” which PhotDNA would match

  8. NCMEC PhotoDNA Model Images From Electronic Service Providers Report     Report Report Law Enforcement The National Center for Missing and Exploited Children (NCMEC) is a private, non-profit organization established in 1984 by the United States Congress.

  9. Results • PhotoDNA live on Bing, SkyDrive and Hotmail (Microsoft online services) and also now on Facebook* • Microsoft results: • Bing: ~3000 matches found and reported to date • SkyDrive/Hotmail: • Implementation scaled up over time, now using 4,000 and soon >12,000 • NCMEC signatures compared against 3.3 billion images on our services, with ~5,000 matches identified/reported • Zero false positives and at least 99% detection accuracy • Scan takes <5 msec per image (~20,000,000 images/day) * Facebook data not yet available, but they are reporting strong success as well

  10. Search, Analytic, and Monitoring Real-Time Monitoring & Alert Non Realtime Analytic With Excel, PowerPivot, PowerView, BI, Data Mining, etc. SSAS Combine Unstructured Data Processing Structured Data Processing Complex Event Processing Connect Images Video File Scan CCTV SMS CDR ATM Chat/BBS Email Crawler Usenet

  11. Mining and Information Extraction from Unstructured Data Date Location Person’s Face Crime Department Person’s Name

  12. Suspect Search – geographically based

  13. Search Result is depend on the User Authority Searchable by SBU User Searchable by Secret User Searchable by TS User

  14. Partnering for a safer future Child Exploitation and Tracking Systems (CETS) A database to fight the online sexual exploitation of children Security Cooperation Program (SCP) 24x7 support plus formation sharing about vulnerabilities, security patches and incidents Windows Parental Control A database to fight the online sexual exploitation of children Internet Explorer 10 Safety & Privacy 24x7 support plus formation sharing about vulnerabilities, security patches and incidents

  15. Child Exploitation and Tracking SystemShare, Search, Collaborate 1 Police receive report via email Search any relevant case with the keyword Police assign Lead Investigator 2 • Add all related information : IP Address, Online Identity, Online Resource, Person 3 • Find more information via Search Engine, Chat Room, Social Network • Add some more related info, i.e. IP address, captured date/time with correct time zone • Find GUID (Global Unique Identifier) • Find relationship between people, location (address) 4 5 • Connect to other lead investigator in other location (city/country) • Collaborate with the lead & team member

  16. Security Cooperation Program 106 SCP Participants 94 disclosed 12 undisclosed

  17. To Governments: Alerts and advisories (SCP) Security metrics (SCP) Attack indicators (SCP) Mitigations (SCP) To Microsoft: Security metrics Incident details Product feedback Training Opportunities Public Outreach • Web guidance • Guidance portal • Flyers, brochures, posters • Videos • Educational curriculum • Public service announcements Government Microsoft SCP - Information Exchange & Collaboration To Citizen

  18. Parental Control 2 1 Activate Family Safety Add userid for each child

  19. Parental Control 4 3 View Activity Report Configure it

  20. Internet Explorer and Bing Search Engine will block adult content automatically for children

  21. Example of the same search without parental control…

  22. What you can do at Home Learn children internet acronym (i.e. POS : parent over shoulder, CTN : can’t talk now etc.) Teach your children not to share personal information online Teach your children about cyber crime and online sexual predators. Do not allow your children to meet cyber acquaintances Do not allow your children to have social network account (i.e. Facebook) Setup parental control Put computer in family room. Always supervise children when using internet

  23. Thank you. Tony Seno Hartono tonyseno@microsoft.com

More Related