Tech, Law & Security Program

Understanding and Demystifying the Fight Against Child Sexual Exploitation

As social media and other tech increasingly employ default end-to-end encryption and other technical tools designed to protect the security and privacy of users, the Department of Justice and several members of Congress have raised the alarm bells, warning about the risks of 鈥済oing dark.鈥 Of particular concern: the ability to effectively identify, stop, and prosecute those聽engaged in child sexual exploitation.

This is, for many, a persuasive objection. After all, the use of default end-to-end encryption,聽particularly when coupled with other technological tools designed to protect the privacy and聽security of user data, makes it harder to collect certain types of evidence, including photos聽unlawfully disseminated online. Conversely, however, these same tools also provide key聽privacy and security benefits, including to potential victims of child sexual exploitation. As a result, the national debate on encryption often devolves into an almost-impossible-to-win聽argument about whether the benefits of default encryption outweigh the costs.

The goal of this project is to break the logjam and refocus the debate in a way that聽accommodates the multiple, competing interests. It acknowledges, yet sidesteps, the ongoing聽debate about whether and to what extent the move to default encryption is a net positive or聽net negative. Rather, it takes the shift as a given reality鈥攁nd seeks to identify cooperative聽approaches to combating on-line child sexual exploitation that account for that reality.聽Specifically, it identifies and assesses the challenges in combatting child sexual exploitation, as well as the technological tools, partnerships, and other innovative approaches that tech聽companies and law enforcement can collectively employ to respond, even as default end-to-end encryption becomes the industry standard.

Sign up to receive event information and program news.

Sign me up!