Powered by RND
PodcastsTrue CrimeIn Conversation With

In Conversation With

Internet Watch Foundation (IWF)
In Conversation With
Latest episode

Available Episodes

5 of 9
  • 9. How online predators use privacy apps
    The future we want for the internet? Child sexual abuse, offenders, and the apps they use to avoid detection. New research shows online offenders are choosing end-to-end encrypted messaging apps to contact children and to spread child sexual abuse material amid renewed calls for Meta to rethink its planned roll out of end-to-end encryption on Facebook Messsenger. This new episode from the Internet Watch Foundation (IWF) focuses on new research from Finnish child protection agency Suojellaan Lapsia which shows how offenders operate and the methods they use.In conversation with Tegan Insoll, Head of Research at Suojellaan Lapsia, and Dan Sexton, Chief Technology Officer at the IWF. Support the show
    --------  
    30:10
  • 8. Too Close for comfort: Understanding 'self-generated' child sexual abuse material
    The increase in self-generated child sexual abuse content is alarming. In 2022, more than three quarters (78%) of the webpages IWF identified as containing child sexual abuse material were tech-enabled, ie created via smartphones or webcams without the offender being physically present in the room with the child. As we release the Talk Trust Empower report, this episode delves into how children – many of them of primary school age – are groomed and extorted into producing self-generated imagery, how the IWF is working to raising awareness of the phenomenon and what can be done by parents and carers to help children navigate dangers online.  Support the show
    --------  
    29:09
  • 7. AI – the power to harm and to help
    In Conversation With Thorn’s Head of Data Science Rebecca Portnoff and IWF Chief Technology Officer Dan Sexton. This episode explores what needs to be done to try and control the explosion in harmful AI-generated child abuse imagery and how other AI or machine-learning tools could be used to counter the phenomenon. Support the show
    --------  
    28:29
  • 6. What next for online safety laws?
    As the Online Safety Bill becomes the Online Safety Act, the Internet Watch Foundation looks at what is next.In this podcast, children’s online safety expert Natalia Greene and IWF Head of Policy and Public Affairs Mike Tunks explain this landmark piece of legislation and the effect it may have on all our lives.Support the show
    --------  
    34:26
  • 5. Nowhere to Hide?
    Nowhere to Hide is part of the IWF’s In Conversation With series exploring the technological and political issues surrounding the global spread of child sexual abuse material.  This episode looks at how end-to-end encryption goes further than standard encryption, meaning even the service providers themselves can’t see what has been shared between two users. It means that service providers who deploy end-to-end encryption on their platforms and messaging services are actively disabling their ability to detect child sexual abuse imagery. That is, unless they deploy additional safeguards.Speaking on the podcast, Dan Sexton, Chief Technical Officer at the IWF, said: “It is very concerning for the IWF. Our mission, our vision, is a safer internet for all, and that the internet is free of child sexual abuse material.“A big part of how we achieve that mission is providing data on known images and videos to industry so they can detect and block that content, prevent it from being uploaded, saved, shared, distributed and, right now, no one is doing that in end-to-end encrypted messaging services. And that is deeply concerning for us.”He added: “When a child reports content of themselves to us, we want to be able to say to those children, to those victims, that their content will be found, and it will be blocked across the internet. Right now, we can’t do that with end-to-end encrypted services. That is very concerning for us, and very concerning for those children.”Mr Sexton, however, said it is possible for safety solutions to be “made compatible” with end-to-end encryption. He said the way in which the technology is being used is the problem, rather than the technology itself. He said preventing the sharing or upload of child sexual abuse material into end-to-end encrypted spaces can be as unobtrusive as scanning for viruses or malware, and doesn’t require any intrusion into individuals’ privacy.Read more here.Support the show
    --------  
    13:44

More True Crime podcasts

About In Conversation With

A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
Podcast website

Listen to In Conversation With, True Crime South Africa – die Afrikaanse weergawe and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v7.18.2 | © 2007-2025 radio.de GmbH
Generated: 5/21/2025 - 5:53:00 AM