Page 39 - T-I JOURNAL19-3
P. 39
REINING IN ONLINE ABUSES 599
deployed can be misused. The underlying technology REFERENCES
is agnostic as to what it searches for and removes. 1. New York v. Ferber. (U.S. Supreme Ct. 458 U.S.
When deploying photoDNA and eGlyph, we have 747, 1982).
been exceedingly cautious to control its distribution 2. Rivest R. The MD5 message-digest algorithm.
through strict licensing arrangements. It is my hope Internet RFC 1321; 1992. http://people.csail.mit.
and expectation that this technology will not be used edu/rivest/Rivest-MD5.txt
to impinge on an open and free internet but to elim- 3. Eastlake DE, Jones PE. US Secure Hash Algo-
inate some of the worst and most heinous content rithm 1 (SHA1). Internet RFC 3174; 2001.
online. 4. Venkatesan R, Koon SM, Jakubowski MH,
Moulin P. Robust image hashing. In: Proceed-
ACKNOWLEDGMENTS ings 2000 International Conference on Image
Processing. International Conference on Image
Hany Farid is the Albert Bradley 1915 Third Processing 2000; 2000 Sep 10-13; Vancouver.
Century Professor and chair of computer science at IEEE; 2000. 3:664–666.
Dartmouth College. His research focuses on digital 5. Swaminathan A, Mao Y, Wu, M. Robust and
forensics, image analysis, and human perception. secure image hashing. IEEE Trans Inf Forensic
He is the chief technology officer and co-founder Secur. 2006;1(2):215–230.
of Fourandsix Technologies and a senior adviser to 6. Gusfield D. Algorithms on strings, trees and
the Counter Extremism Project. This work was sup- sequences: computer science and computational
ported by funding from Microsoft Corporation and biology. New York (NY): Cambridge University
the Counter Extremism Project. Press; 1997.
7. Sexual Exploitation and Other Abuse Of Chil-
dren Definitions for Chapter, Section 2256 of
Title 18, United States Code.

