<div dir="ltr"><div><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div>
<table bgcolor="#ffffff" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td align="left" valign="top">
<table cellpadding="0" cellspacing="0">
<tbody>
<tr>
<td style="border-top:0px solid rgb(0,0,0);border-bottom:1px solid rgb(255,255,255);background-color:rgb(255,255,255);text-align:center" align="center"><span style="font-size:10px;color:rgb(96,96,96);line-height:200%;font-family:verdana;text-decoration:none">Email
not displaying correctly? <a href="http://www.oplin.org/4cast/" style="font-size:10px;color:rgb(0,0,255);line-height:200%;font-family:verdana;text-decoration:none" target="_blank">View
it in your browser.</a></span></td>
</tr>
<tr>
<td style="border-top:0px solid rgb(51,51,51);border-bottom:0px solid rgb(255,255,255);background-color:rgb(255,255,255)">
<center><a><img src="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickheader.jpg" title="OPLIN" alt="OPLIN 4Cast" align="middle" border="0"></a></center>
</td>
</tr>
</tbody>
</table>
<table style="width:763px;height:877px" bgcolor="#ffffff" cellpadding="20" cellspacing="0">
<tbody>
<tr>
<td style="font-size:12px;color:rgb(0,0,0);line-height:150%;font-family:trebuchet ms" background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg" bgcolor="#ffffff" valign="top">
<p>
<span style="font-size:20px;font-weight:bold;color:rgb(0,0,0);font-family:arial;line-height:110%">OPLIN 4cast #450: A new effort to stop child porn</span><br>
<span style="font-size:11px;font-weight:normal;color:rgb(102,102,102);font-style:italic;font-family:arial">August 12th, 2015</span></p>
<p style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><img align="left" src="http://www.oplin.org/4cast/wp-content/uploads/2015/08/stop.png" alt="hand stop signal" width="120" height="120">As we all know, the Internet contains a lot of bleak and nasty stuff, and some of the bleakest and nastiest is child pornography. For almost two decades, the Internet Watch Foundation, an English charity, has worked to combat criminal material on the Internet, and most recently has focused on minimizing the availability of images of child sexual abuse. Now Google, Facebook, and Twitter have agreed to use the IWF database of images identified as child pornography and block those images from their web services. The IMF has sometimes been criticized for being too aggressive in its policing efforts, and while no one is naive enough to believe that this new partnership will end child pornography, it seems like it might have the potential to help.
</p>
<div> </div>
<ul style="text-align:left">
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://motherboard.vice.com/en_ca/read/google-facebook-and-twitter-have-a-new-strategy-to-ban-images-of-child-abuse" target="_blank">Google, Facebook, and Twitter have a new strategy to ban images of child abuse</a> (Motherboard | Kari Paul) "The companies are <a href="http://www.bbc.com/news/uk-33844124" target="_blank">tapping into a database</a> created by the Internet Watch Foundation (IWF) that uses hashing technology to identify and block child sex abuse images. The system works by <a href="http://www.telegraph.co.uk/technology/internet-security/11794180/Facebook-Google-and-Twitter-to-block-hash-list-of-child-porn-images.html" target="_blank">running an illicit photo</a> through an algorithm that creates a unique digital fingerprint for it. The hash is then added to the database that can identify the image if it is uploaded by another user, allowing the companies to detect and remove it without viewing the image itself."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="https://www.iwf.org.uk/about-iwf/news/post/416-hash-list-could-be-game-changer-in-the-global-fight-against-child-sexual-abuse-images-online" target="_blank">Hash List "could be game-changer" in the global fight against child sexual abuse images online</a> (Internet Watch Foundation) "Not to be confused with a 'hash tag', a hash is a digital fingerprint of an image. There are billions of images on the internet and by creating a digital fingerprint of a single image, you can pluck it out, like finding a needle in a haystack. IWF will automatically begin creating three types of hashes to meet the needs of the online industry. It will create PhotoDNA (technology developed by Microsoft), MD5 and SHA-1 hashes."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.telegraph.co.uk/technology/internet-security/11794180/Facebook-Google-and-Twitter-to-block-hash-list-of-child-porn-images.html" target="_blank">Facebook, Google and Twitter block 'hash list' of child porn images</a> (The Telegraph | Sophie Curtis) "The IWF said many internet companies can make use of the hash list, including those that provide services such as the upload, storage or search of images, filtering services, hosting services, social media and chat services, data centres and connectivity services. The hash list is constantly growing, and has the potential to reach millions of hashes of images. The IWF claims to remove around 500 web addresses containing child sexual abuse material every day, with one web address containing up to thousands of images."</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.cambridge-news.co.uk/Cambridgeshire-8217-s-Internet-Watch-Foundation/story-27580353-detail/story.html" target="_blank">Cambridgeshire's Internet Watch Foundation launches 'hash list' in bid to rid web of abuse images</a> (Cambridge News | Florence Snead) "All five companies involved in the scheme's first stage, which started last week, were already IWF members but if all goes well it could be rolled out to other members within a matter of months. The next step would be to approach organisations worldwide, who do not currently work with the IWF. The charity is keen to work with more image hosting companies which are at particular risk of being targeted by people putting such media online."</li>
</ul>
<div style="text-align:left"> </div>
<p style="text-align:left;font-size:20px;font-family:arial;line-height:110%"><small><strong><em>Articles from <a href="http://ohioweblibrary.org" target="_blank">Ohio Web Library</a>:</em></strong></small><br>
</p>
<div style="text-align:justify;font-size:16px;font-family:arial;line-height:110%">
<ul>
<li><a href="http://search.ebscohost.com.proxy.oplin.org/login.aspx?direct=true&db=aph&AN=93468565&site=ehost-live" target="_blank">The politics of Internet filtering: The United Kingdom and Germany in a comparative perspective.</a> (<em>Politics</em>, Feb. 2014, p.58-71 | Ben Wagner)</li>
<li><a href="http://search.ebscohost.com.proxy.oplin.org/login.aspx?direct=true&db=buh&AN=101625945&site=ehost-live" target="_blank">Robust image hashing via colour vector angles and discrete wavelet transform.</a> (<em>IET Image Processing</em>, March 2014, p.142-149 | Zhenjun Tang, Yumin Dai, Xianquan Zhang, Liyan Huang, and Fan Yang)</li>
<li><a href="http://search.ebscohost.com.proxy.oplin.org/login.aspx?direct=true&db=aph&AN=85846527&site=ehost-live" target="_blank">Perceptual image hashing using local entropies and DWT.</a> (<em>Imaging Science Journal</em>, Feb. 2013, p.241-251 | Z.J. Tang, X.Q. Zhang, Y.M. Dai, and W.W. Lan)</li>
</ul>
</div>
<div style="text-align:left"> </div>
</td>
</tr>
<tr>
<td background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg" valign="top" width="760"><span style="font-size:10px;color:rgb(96,96,96);line-height:100%;font-family:verdana">
<hr>
<div style="text-align:justify">The <strong><em>OPLIN
4cast</em></strong>
is a weekly compilation of
recent headlines, topics, and trends that could impact public
libraries. You can subscribe to it in a variety of ways, such as: <br>
</div>
<div style="text-align:left"> </div>
<ul>
<li style="text-align:justify"><strong>RSS feed.</strong>
You
can receive the OPLIN 4cast
via RSS feed by subscribing to the following URL:
<a href="http://www.oplin.org/4cast/index.php/?feed=rss2" target="_blank">http://www.oplin.org/4cast/index.php/?feed=rss2</a>. </li>
<li style="text-align:justify"><strong>Live Bookmark.</strong>
If you're using the Firefox
web browser, you can go to the 4cast website
(<a href="http://www.oplin.org/4cast/" target="_blank">http://www.oplin.org/4cast/</a>) and click on the orange "radio wave" icon
on the right side of the address bar. In Internet Explorer 7, click on
the same icon to view or subscribe to the 4cast RSS feed. </li>
<li style="text-align:justify"><strong>E-mail.</strong>
You
can have the OPLIN 4cast
delivered via e-mail (a'la OPLINlist and OPLINtech) by subscribing to
the 4cast mailing list at
<a href="http://mail.oplin.org/mailman/listinfo/OPLIN4cast" target="_blank">http://mail.oplin.org/mailman/listinfo/OPLIN4cast</a>. </li>
</ul>
</span> </td>
</tr>
<tr>
<td style="border-top:0px solid rgb(255,255,255);background-color:rgb(255,255,204)" background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickfooter.jpg" valign="top" width="760"> <br>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</div></div></div></div></div></div></div></div>
</div>