scholarly journals Digital Apprehensions: Policing, Child Pornography, and the Algorithmic Management of Innocence

2018 ◽  
Vol 4 (1) ◽  
pp. 1-16
Author(s):  
Mitali Thakor

In this paper, I discuss the embodied labor of policing child pornography through the ways in which algorithms and human reviewers like Linda see abuse images. I employ the concept of “apprehension” to suggest that the ways that reviewers “see” child pornography is always already oriented toward the capture and arrest of suspected offenders. As I have argued elsewhere (Author 2017; Forthcoming), the use of new digital techniques to find child pornography has fundamentally transformed and expanded policing into a distributed network of labor increasingly done by computer scientists and technology companies. Rather than suggest new software is the cause of these transformations, I draw attention to the constitutive and mutually defining relation between computing and corporeality, or how image detection algorithms need the work of human perception to put their detective skills to work.            I argue further still that the case study of child pornography detection offers an entry point into examining the algorithmic management of race. I suggest that childhood innocence is coded as whiteness, and whiteness as innocence, in the algorithmic detection of victims and abusers. By taking ‘detection’ as a dynamic practice between human and machine, I make an intervention into critical algorithm studies that have tended to focus solely on the programming of racial bias into software. The algorithmic detection of child pornography hinges, crucially, upon practice and the tacit observation of human reviewers, whose instinctual feelings about child protection and offender apprehension become embedded within the reviewing and reporting process as cases escalate for law enforcement.

2018 ◽  
Vol 4 (1) ◽  
pp. 1-16 ◽  
Author(s):  
Mitali Thakor

In this paper, I discuss the embodied labor of policing child pornography through the ways in which algorithms and human reviewers like Linda see abuse images. I employ the concept of “apprehension” to suggest that the ways that reviewers “see” child pornography is always already oriented toward the capture and arrest of suspected offenders. As I have argued elsewhere (Author 2017; Forthcoming), the use of new digital techniques to find child pornography has fundamentally transformed and expanded policing into a distributed network of labor increasingly done by computer scientists and technology companies. Rather than suggest new software is the cause of these transformations, I draw attention to the constitutive and mutually defining relation between computing and corporeality, or how image detection algorithms need the work of human perception to put their detective skills to work.            I argue further still that the case study of child pornography detection offers an entry point into examining the algorithmic management of race. I suggest that childhood innocence is coded as whiteness, and whiteness as innocence, in the algorithmic detection of victims and abusers. By taking ‘detection’ as a dynamic practice between human and machine, I make an intervention into critical algorithm studies that have tended to focus solely on the programming of racial bias into software. The algorithmic detection of child pornography hinges, crucially, upon practice and the tacit observation of human reviewers, whose instinctual feelings about child protection and offender apprehension become embedded within the reviewing and reporting process as cases escalate for law enforcement.


2009 ◽  
Vol 5 (4) ◽  
pp. 1-17 ◽  
Author(s):  
Marie Eneman

On the one side, it could be argued that ICT provide a perceived anonymity for people downloading and distributing child abusive material, also labelled child pornography. While, on the other side the technology offers powerful surveillance mechanisms to monitor these activities and thus constitutes a powerful tool for law enforcement. This article aims to explore how offenders manage the risk of surveillance when downloading, distributing and exchanging child abusive material. Critical research with a focus on panopticon is used as a theoretical framework. The data is drawn from interviews with offenders, convicted of child pornography. The findings show that the offenders have developed technological and social strategies to reduce the risk of surveillance and addresses the need of a new theoretical concept better adjusted to surveillance practices that allow the many to watch the many. The ultimate motivation for researching this topic is to contribute to the development of effective child protection strategies.


SOEPRA ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 4
Author(s):  
Liya Suwarni

Background. Cases of sexual violence increase every year, victims ranging from adolescents, children to toddlers. Based on data from the Indonesian Child Protection Commission, abuse and violence against children in Indonesia in 2013 were 23 cases, in 2014 there were 53 cases, in 2015 there were 133 cases, 2017 reached 1,337 cases, and as of July 2018 there were 424 cases. Purpose. Knowing the factors that influence the law enforcement process of sexy violence cases in Semarang City. Method This study uses descriptive analytical methods for cases of violence against children, based on medical record data in hospitals, documents in Mapolrestabes, the District Attorney's Office and the Semarang City Court for the period of January 2015 to December 2018. Results. Based on research results obtained 213 experimental cases section from medical record data in hospitals in the city of Semarang. Most cases of child abuse occurred in 2018 with 72 cases. Most victims are 12-14 years old age group, female. Most types of cases are cases of intercourse. The majority of violations are persons known as victims, perpetrators not working, and most of the places of occurrence are in the defendant's house. At the time of prosecution and trial, the number of cases was significantly reduced to only 8 cases. Factors related to this include lack of evidence, difficulty in obtaining information from victims, convoluted statements of coverage, lack of election, and obtaining diversion rates. Conclusion Cases of sexual violence have increased from year to year. The process of law enforcement on this problem still has many difficulties in each manufacturing process which is still difficult to overcome.


Drones ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 49
Author(s):  
Miloš Stanković ◽  
Mohammad Meraj Mirza ◽  
Umit Karabiyik

Rapid technology advancements, especially in the past decade, have allowed off-the-shelf unmanned aerial vehicles (UAVs) that weigh less than 250 g to become available for recreational use by the general population. Many well-known manufacturers (e.g., DJI) are now focusing on this segment of UAVs, and the new DJI Mini 2 drone is one of many that falls under this category, which enables easy access to be purchased and used without any Part 107 certification and Remote ID registration. The versatility of drones and drone models is appealing for customers, but they pose many challenges to forensic tools and digital forensics investigators due to numerous hardware and software variations. In addition, different devices can be associated and used for controlling these drones (e.g., Android and iOS smartphones). Moreover, according to the Federal Aviation Administration (FAA), the adoption of Remote ID is not going to be required for people without the 107 certifications for this segment at least until 2023, which creates finding personally identifiable information a necessity in these types of investigations. In this research, we conducted a comprehensive investigation of DJI Mini 2 and its data stored across multiple devices (e.g., SD cards and mobile devices) that are associated with the drone. The aim of this paper is to (1) create several criminal-like scenarios, (2) acquire and analyze the created scenarios using leading forensics software (e.g., Cellebrite and Magnet Axiom) that are commonly used by law enforcement agencies, (3) and present findings associated with potential criminal activities.


2020 ◽  
Vol 13 (1) ◽  
pp. 279
Author(s):  
Fang Zhao ◽  
Ning Zhu ◽  
Juha Hämäläinen

This study investigated the resilience of the Chinese child protection system in responding to the special needs of children in difficulty under the specific circumstances caused by the COVID-19 pandemic. This study applied qualitative document analysis of child protection administrative documents, in-depth interviews with 13 child protection professionals, and an in-depth case study of 14 children living in difficulty, complemented by relevant information available in the media. The results indicate that there are good policies in China’s child protection services but the organizational and functional fragmentation complicates implementation, suggesting a need for the development of bottom-up practices. The essential conclusion supported by these results is that the child protection system should be regarded and developed as a systematic project combining the legal, policymaking, and professional systems of child welfare services as well as governmental and non-governmental forces. As the COVID-19 pandemic has raised awareness of the need to develop the field of child protection holistically as an integrated system in terms of social sustainability in China, an international literature-based comparison indicates that the pandemic has also raised similar political awareness in other countries.


2019 ◽  
Vol 8 (6) ◽  
pp. 272 ◽  
Author(s):  
Iq Reviessay Pulshashi ◽  
Hyerim Bae ◽  
Hyunsuk Choi ◽  
Seunghwan Mun ◽  
Riska Asriana Sutrisnowati

Analysis of trajectory such as detection of an outlying trajectory can produce inaccurate results due to the existence of noise, an outlying point-locations that can change statistical properties of the trajectory. Some trajectories with noise are repairable by noise filtering or by trajectory-simplification. We herein propose the application of a trajectory-simplification approach in both batch and streaming environments, followed by benchmarking of various outlier-detection algorithms for detection of outlying trajectories from among simplified trajectories. Experimental evaluation in a case study using real-world trajectories from a shipyard in South Korea shows the benefit of the new approach.


2017 ◽  
Vol 28 (8) ◽  
pp. 1125-1136 ◽  
Author(s):  
E. Paige Lloyd ◽  
Kurt Hugenberg ◽  
Allen R. McConnell ◽  
Jonathan W. Kunstman ◽  
Jason C. Deska

In six studies ( N = 605), participants made deception judgments about videos of Black and White targets who told truths and lies about interpersonal relationships. In Studies 1a, 1b, 1c, and 2, White participants judged that Black targets were telling the truth more often than they judged that White targets were telling the truth. This truth bias was predicted by Whites’ motivation to respond without prejudice. For Black participants, however, motives to respond without prejudice did not moderate responses (Study 2). In Study 3, we found similar effects with a manipulation of the targets’ apparent race. Finally, in Study 4, we used eye-tracking techniques to demonstrate that Whites’ truth bias for Black targets is likely the result of late-stage correction processes: Despite ultimately judging that Black targets were telling the truth more often than White targets, Whites were faster to fixate on the on-screen “lie” response box when targets were Black than when targets were White. These systematic race-based biases have important theoretical implications (e.g., for lie detection and improving intergroup communication and relations) and practical implications (e.g., for reducing racial bias in law enforcement).


Sign in / Sign up

Export Citation Format

Share Document