Back to news

September 4, 2018 | International, C4ISR

'Five Eyes' allies urge digital industry to stop child pornographers, terrorists

Kathleen Harris · CBC News

Canada and security allies say illicit material is flourishing and easily accessible on the web

Canada and its "Five Eyes" intelligence allies are calling on the digital online industry to take urgent action to stop child pornographers, terrorists and violent extremists from finding a platform on the internet.

After meetings in Australia, ministers from that country, Canada, New Zealand, the U.S. and U.K., issued a statement claiming the group is as determined to counter the "grave threats" online as they are to dealing with them in the physical world.

"Our citizens expect online spaces to be safe, and are gravely concerned about illegal and illicit online content, particularly the online sexual exploitation of children. We stand united in affirming that the rule of law can and must prevail online," reads the joint communique issued Wednesday.

Public Safety Minister Ralph Goodale, Immigration Minister Ahmed Hussen and Justice Minister Jody Wilson-Raybould attended the meetings.

'New vectors for harm'

The joint statement says the anonymous, instantaneous and networked nature of the web has magnified threats and "opened up new vectors for harm." It also notes that the evolution of digital technology has created new opportunities for transmitting child exploitation material and perpetrating the most abhorrent acts, such as live streaming abuse.

The statement says illicit material is not relegated to the recesses of the dark web, but is accessible through most common top‑level domains. Mobile technology has enabled offenders to target children using apps to recruit and coerce children.

"The low financial cost, and the anonymized nature of this criminal enterprise, is contributing to a growth in the sexual exploitation of children. We must escalate government and industry efforts to stop this," it reads.

Lianna McDonald, executive director of the Canadian Centre for Child Protection welcomed the joint statement.

"Our organization has been engaging directly with survivors of child sexual abuse who endure lifelong impacts from the recording and sharing of their abuse on the internet," she said in an emailed statement "Collaboration across borders and with all sectors, including industry, is essential if we are to make meaningful progress in this space and address this heinous crime."

Tackling terrorist fundraising

The communique also pledges to do more to prevent terrorists and violent extremists from spreading materials designed to radicalize, recruit, fundraise and mobilize.

Actions urged by the Five Eyes group include:

  • Developing and implementing capabilities to prevent illegal and illicit content from being uploaded, and to execute urgent and immediate takedown measures when there is an upload.
  • Deploying human and automated capabilities to find and remove legacy content.
  • Investing more on automated capabilities and techniques, including photo DNA tools, to detect, remove and prevent reupload of illegal and illicit content.
  • Building user safety into the design of all online platforms and services.

Allen Mendelsohn, an internet law specialist and lecturer at McGill's law faculty, said because child porn is universally deemed reprehensible, he expects mounting governmental and public pressure could prompt tech companies to act.

But, he said in past, they have resisted any steps to remove content, citing the "slippery slope" argument.

"They are loathe to take any sort of action that would be seen as removing or not displaying any particular content that has been uploaded by users," he said. "They have taken the longstanding position that user content is the user's responsibility, not the platform's responsibility."

Mendelsohn said the issue is complicated because there are differing laws and views internationally on what constitutes crossing the line for the internet.

https://www.cbc.ca/news/politics/SOMNIA-1.4803122

On the same subject

  • Second French Offshore Patrol Vessel fitted with HENSOLDT's LYNCEA® Combat System

    October 24, 2023 | International, Naval

    Second French Offshore Patrol Vessel fitted with HENSOLDT's LYNCEA® Combat System

    To enhance the patrol vessel's mission system, the HENSOLDT group has supplied two sensors: the SHARPEYE MK11 surveillance radar from HENSOLDT UK and the IFF MSSR2000 encrypted interrogator from HENSOLDT...

  • Three European air forces approve performance benchmarks for next-gen fighter jet

    May 28, 2020 | International, Aerospace

    Three European air forces approve performance benchmarks for next-gen fighter jet

    By: Sebastian Sprenger COLOGNE, Germany — The air forces of Germany, France and Spain have agreed on a set of performance benchmarks to help their governments guide the development of a next-generation fighter jet set to fly in 2040, the German military announced Tuesday in a statement. The document, approved earlier this month, is meant to help officials identify what features from a collection of 10 possible system architectures are worth keeping when the time comes to settle on a path forward for the Next-Generation Weapon System, or NGWS. That system, with the manned next-gen fighter at its heart, is slated to become the central element of the Future Combat Air System, or FCAS, the most ambitious and expensive weapons program in mainland Europe. As envisioned, a small fleet of attack and surveillance drones, or “remote carriers,” would accompany each jet, and all elements would be interlinked by an artificial intelligence-powered “combat cloud,” according to a project description. The 10 different system architectures for NGWS currently in the mix lean in different directions — for example, when it comes to armaments, maneuverability and range of the main jet and its companion drones, the German Bundeswehr statement explained. The three air force top officials — Lt. Gen. Ingo Gerhartz of Germany, Gen. Philippe Lavigne of France and Javier Fernandez of Spain — also agreed on a “Common Understanding Connectivity,” a guide for connecting national systems into the future FCAS scenario. The document will enable the program's partner nations to “synchronize” their respective development programs, according to the German statement. The industry leads for the Future Combat Air System program, Airbus of Germany and Dassault of France, unveiled a mock-up of the future fighter jet at the Paris Air Show last year. The plan is to begin testing a prototype in 2026. Earlier this year, France and Germany formally kicked off the next phase of the overall program, with each government contributing $85 million toward the development of technology demonstrators. German lawmakers, who fear an overtly strong French industry influence in the FCAS program, have linked the project to progress on the Main Ground Combat System, another highly visible bilateral program aimed at building a common battle tank. France has the lead on the next-generation fighter, while Germany leads the tank project. The German parliament's strategy of keeping a close watch on the aerial program by approving only relatively small tranches of money has Dassault CEO Eric Trappier worried about the ability to hit deadlines, French newspaper La Tribune reported last week. Speaking before a French Senate committee in mid-May, Trappier proposed a Franco-German programming law to ensure a more rapid development pace, according to the newspaper. https://www.defensenews.com/global/europe/2020/05/26/three-european-air-forces-approve-performance-benchmarks-for-next-gen-fighter-jet/

  • Air Force begins to roll out special cyber defense teams

    December 31, 2018 | International, C4ISR

    Air Force begins to roll out special cyber defense teams

    By: Mark Pomerleau The Air Force is beginning to build specialized cyber teams across the service whose primary mission is to defend local installations and critical mission tasks from cyberattacks. These teams will ensure that a particular wing or smaller organization can complete their mission from a cyber perspective, Maj. Gen. Robert Skinner, commander of 24th Air Force/Air Forces Cyber, told Fifth Domain in a November interview. For example, Skinner said if a wing has an F-16 unit that's responsible for offensive counter air or defensive counter air support, mission defense teams will understand those weapon system and everything that goes into making those air sorties successful as a way to defend that mission from a cyber standpoint. As an example, an eight-man team at the 2nd Weather Group within the 557th Weather Wing monitors the network and recently discovered several “bogus” account requests. The commander, Col. Patrick Williams, said the team was able to figure out that many of the requests were either bots or foreign requests that “had no business being on that network.” By working with the Network Operations and Security Center to eliminate that activity, the number of requests dropped by 80 percent, a huge win, Williams said. He added this was done with just a nascent mission defense team given that the teams are just being filled out across the major commands now. Skinner said each major command is at a different point in activating the teams. In addition, Air Force leaders said the service hopes to achieve efficiencies within its entire IT and cyber defense enterprise. The officials pointed to the Air Force's “enterprise IT as a service” pilot, which examines what efficiencies can be gained by having commercial companies conduct the IT services as opposed to having airmen maintain the IT infrastructure. One benefit of such a move could be that it frees up personnel to spend more time on cyber defense. “Our core strategic theme is moving from IT focused delivery into mission defense teams,” Bill Marion, deputy CIO of the Air Force, said during a keynote presentation in early December. Skinner said the service will likely be able to “re-mission” workers from their IT positions and assign them to these more active defensive roles such as mission defense teams. These mission defense teams are different from cyber protection teams that the Air Force, and other services, provide to U.S. Cyber Command. “In my eyes the [mission defense team] is a [cyber protection team] lite,” Skinner said. "We're very proud of our cyber protection team training and I think that the more of that I can get with our mission defense teams, the more successful they'll be and then our cyber protection teams can be really focused on the high end, the big threats that we'll run into in a peer competition and peer adversaries.” https://www.fifthdomain.com/dod/air-force/2018/12/27/air-force-begins-to-roll-out-special-cyber-defense-teams

All news