Child Abuse ImageryTechnology For Good

Join the Fight to End Cyber Exploitation

By October 15, 2015 No Comments

Posting intimate images online without consent is a serious issue, and in some cases, it may be a crime. We know from our sextortion survey how out of control this problem is. In the three months that our survey was deployed, we had over 1,500 victims of sextortion. We are grateful to each and every participant—you have helped us better understand how technology is being used to facilitate this crime, so that we can begin to develop interventions to disrupt, discourage and prevent this from happening.

In addition to our research, Thorn is part of working group, convened by California Attorney General Kamala D. Harris, that has brought together 50 major technology companies, victim advocates, and legislative and law enforcement leaders to end cyber exploitation. Since February 2015, we have been working together to develop strategies to combat cyber exploitation and support victims.

Working Together to End Cyber Exploitation

The working group has collaborated to develop an online hub with new resources, tools, and information to end cyber exploitation. It includes a summary of best practices for the technology industry to combat cyber exploitation written by technology leaders for other technology companies. There are resources for victims including frequently asked questions, information about removing images, and a list of websites that provide additional resources for victims including information on legal services, public policy, and advocacy campaigns. The website also features tools for law enforcement, including a cyber exploitation guide, frequently asked questions, and a list of computer crimes in California.

Check out these important resources from the California Department of Justice and find out how you can help #endcyberexploitation.

cyber-exploitation-steps

Stay up to date—get the latest on our work and important news in the fight against child sexual exploitation.