1. 程式人生 > >Using Technology to Combat Human Trafficking

Using Technology to Combat Human Trafficking

After nearly disappearing in the ‘90s, the spread of child sexual abuse material exploded with the rise of the internet, as child sex trafficking increased with exposure to a greater market online. Today, the problem is complex and still growing.

Thorn, a nonprofit, is working to build technology to defend children from sexual abuse.

Thorn is a uniquely equipped nonprofit who joins forces with the sharpest minds from tech, nonprofit, government, and law enforcement to help to stop the spread of child sexual abuse material and stand up to child traffickers. One way they fight human trafficking is by driving technology innovation.

By using AWS, Thorn provides law enforcement with intelligence and leads about suspected human trafficking networks and individuals, with the ultimate goal of identifying victims and connecting them with resources.

Spotlight, a product powered by Thorn and Digital Reasoning and run fully on AWS, processes and analyzes the data from 150,000 ads per day based on risk profiles provided by law enforcement. More than 5,300 law enforcement officers use Spotlight in all 50 states and Canada. Over the last two years, they have helped save more than 21,000 victims, 6,000 of which are children. They have also gone mobile. Daily Spotlight users report a 60 percent time savings in human-trafficking investigations. By using

Amazon Elastic Compute Cloud (Amazon EC2), Amazon Relational Database Service (Amazon RDS), Amazon DynamoDB, Amazon Simple Storage Service (Amazon S3), Amazon Elasticsearch Service, Amazon Redshift, AWS Lambda, Amazon ElastiCache, and Amazon CloudWatch, Thorn can focus on constant improvement and innovation that helps stop trafficking and abuse, instead of worrying about stability or storage space.

“AWS has been critical to our ability to deliver a world-class investigations tool that has helped officers across the country identify thousands of trafficking victims faster than ever before,” said Julie Cordua, CEO, Thorn.

Next up, Thorn is working to build an age progressed facial recognition service on AWS to identify missing children by matching images against child abuse material. By working with a group of technology companies, they can bring in the talent to tailor facial recognition for this specific use case with the hopes of finding children faster and stopping abuse.

Watch Thorn’s video and SlideShare presentation from re:Invent 2016 and don’t miss their presentation at the AWS Public Sector Breakfast at re:Invent 2017.

相關推薦

Using Technology to Combat Human Trafficking

After nearly disappearing in the ‘90s, the spread of child sexual abuse material exploded with the rise of the internet, as child sex trafficking

New machine learning technology to predict human blood pressure: Study

New York: Researchers, including one of an Indian-origin, have developed a wearable off-the-shelf and machine learning technology that can predict an indiv

Augmented human intelligence: Using AI to streamline business process

AI and related technologies are most effective when used as a way to unleash creativity and increase autonomy in workers. The study was done by researchers

Ask HN: How to build human-proof technology?

Just as we build child-proof systems that prevent children from injuring themselves or doing damage. How does one think about the principles behind buildin

IOS Using UIAlertView to show alerts

leg uilabel nat cancel element field void csdn ng- UIAlertView in other words, it‘s a dialog box. You want to show a message or ask u

#MFC Programming# Using Dialog To Set A Correlate Menu

dial font using 技術分享 images res width mfc fill This blog will show how to display a menu we designed in a dialog. 1.Insert a new dialog&a

視頻顯著性檢測-----Predicting Video Saliency using Object-to-Motion CNN and Two-layer Convolutional LSTM

layer lin -- 分享圖片 組合 object idt red 9.png 幀內顯著性檢測: 將卷積網絡的多層特征進行組合通過unsampling 得到粗顯著性預測; 幀間顯著性檢測: (粗檢測結果+新卷積網絡的特征圖,最後+之前卷積網絡的卷積特征輸入到LST

using ThreadLocal to cache data in request scope

thread stack;reques/** * aim to cache the data that‘s accessed frequently and costly. * @param <K> * @param <V> */ public interface Cache&l

【Python學習筆記】Coursera課程《Using Python to Access Web Data》 密歇根大學 Charles Severance——Week6 JSON and the REST Architecture課堂筆記

學習 except for num string net none input 網上 Coursera課程《Using Python to Access Web Data》 密歇根大學 Week6 JSON and the REST Architecture 13.5 Ja

Using kubeadm to deploy k8s (by quqi99)

版權宣告:可以任意轉載,轉載時請務必以超連結形式標明文章原始出處和作者資訊及本版權宣告 (作者:張華 發表於:2018-07-13) echo "deb http://apt.kubernetes.io/ kubernetes-xenial main" |sudo tee /etc/

Thoughts on the Application of Radar Technology to the Improvement of Street Light System

Abstract: Street lights are everywhere in people’s daily lives. But street lights can sometimes cause problems for people. First of all, long-term

New Computer Systems Seek to Replicate Human Intellig manufacturer ence

www.inhandnetworks.com As part of an investigation into the nature of humans’ physical intuitions, MIT researchers trained a neural network to p

Using kubectl to Create a Deployment

如果你有一個正在執行的kubernates叢集,那麼你可以在它上面部署你的容器應用。你要建立一個deployment配置,它是來告訴kubernates如何建立並且更新你的應用。一旦你建立了一個deployment,kubernates master就會排程應用例項到叢集中的一個獨立的節點

Using Cppcheck To Produce Better Code (轉)

Cppcheck is an open source static code analyzer tool for C/++.  With its default arguments, it produces quite a low rate of false positives and identifies

Using astyle to format code

As you know, we had our coding style which everyone should follow, and also we had the cpplint tool to check if we had followed the rule, but we do no

Using QEMU to produce Debian filesystems for multiple architectures

Building up our filesystem with debootstrap and QEMUDebian provides a couple of tools to create new root filesystems. The one we’ll be using here is deboot

An idea to combat hiring discrimination

So I just read this.. https://www.theguardian.com/science/2018/oct/01/physics-was-built-by-men-cern-scientist-alessandro-strumia-remark-sparks-fury .. and

How Google Is Using AI To Power Internal Talent Deployment

The traditional narrative when it comes to discussing the impact of artificial intelligence on HR revolves around the jobs that will be lost. It's a largel

Deep Learning to Analyse Human Activities Recorded on Videos Analytics Insight

Analyzing live videos by leveraging deep learning is the trendiest technology aided by computer vision and multimedia analysis. Analysing live videos is a

Uber Eats is Using AI to Surpass Its Competitors (And It's Working)

Ashley Sams is a consultant at PR 20/20. She joined the agency in 2017 with a background in marketing, specifically for higher education and social media.