HOW WE WORK

thorn-how-we-work-version-final-3-01

1. EXPLORE & LEARN

We maintain a vast global network of professionals on the front lines of this issue. We invest in research to better understand emerging trends.

Research

Research

VictimID

Accelerate Victim Identification

DisruptPlatforms

Disrupt Platforms

Computer-bg

Deter Predators

PROJECTS WE’VE BUILT

Learn about some of our tools and programs that attack the problem of child sexual exploitation from all sides.

RESEARCH

A large part of our work comes from informed research collected in the field, which helps our team, along with our many partners, remain on the cutting edge of technology.

EXPLORE THE RESEARCH

SPOTLIGHT: HUMAN TRAFFICKING INTELLIGENCE AND LEADS

The Challenge

There are more than 100,000 escort ads posted every day in this country. Somewhere in that pile of data, are children who are bought and sold online for sex. How can law enforcement sift through massive amounts of data to focus their time on the most vulnerable victims?

EXPLORE THE PROJECT

BEFREE TEXT SHORTCODE

The Challenge

Trafficking victims are often unable to call for help when under the control of a trafficker, but they might have access to text messaging. How can we provide a more discreet and accessible way for victims to reach out for help?

EXPLORE THE PROJECT

PROJECT VIC

The Challenge

Around the world, law enforcement who seize child sexual abuse material for cases are reviewing the content independently. They have no easy way to determine if the images they find on hard drives are of children who have already been identified or if they are new victims and require further action.

EXPLORE THE PROJECT

SOUND PRACTICES GUIDE

The Challenge

Many small and mid-size companies do not have the resources or knowledge to implement child safety procedures and tools, making their platforms vulnerable to abusive content and behavior.

EXPLORE THE PROJECT

DETERRENCE

The Challenge

Because of the sheer volume of illicit child abuse material online, law enforcement isn’t properly equipped to sift through the many thousands of people searching for this content online to focus on the potential hands-on offenders and content producers. The result is that people using the Internet to share child abuse material are doing so with seemingly low risk of getting caught.

EXPLORE THE PROJECT

INDUSTRY HASH SHARING PLATFORM

The Challenge

Prior to 2012, most image sharing platforms were screening for child sexual abuse images independently, but not sharing intelligence. This meant redundancy, inefficiency and slow removal of content across the largest platforms in the country.

EXPLORE THE PROJECT

THINK YOU HAVE WHAT IT TAKES TO TACKLE OUR NEXT CHALLENGE?

 

BECOME A DIGITAL DEFENDER