{"id":820521,"date":"2023-05-19T10:23:49","date_gmt":"2023-05-19T09:23:49","guid":{"rendered":"https:\/\/www.electronicsweekly.com\/?p=820521"},"modified":"2023-05-19T10:23:49","modified_gmt":"2023-05-19T09:23:49","slug":"software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse","status":"publish","type":"post","link":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/","title":{"rendered":"Software to scan phones for abuse images is itself open to abuse"},"content":{"rendered":"<p>Software designed to detect child abuse images on smartphones, which could be mandated by governments in some counties, can be covertly repurposed to intrude on personal privacy, according to research at Imperial college.<\/p><div class=\"elect-content\" style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"elect-1713226101\"><div id=\"x02\">\r\n<script type=\"text\/javascript\"> if ($(window).width() <= 768) { googletag.display('x02'); } <\/script>\r\n<\/div>\r\n<\/div>\n<p>&#8216;Client-side scanning&#8217; (CSS) is an image analysis technique based on &#8216;perceptual hashing&#8217;, and is mooted as a way to get around the legitimate problem of criminals hiding illegal content behind end-to-end encrypted phone apps.<\/p><div class=\"elect-test\" style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"elect-1067981952\"><div id=\"DFP-EW-InRead1\">\r\n<script type=\"text\/javascript\"> if ($(window).width() > 768) { googletag.display('DFP-EW-InRead1'); } <\/script>\r\n<\/div>\r\n<BR>\r\n<\/div>\n<p>Installed on a phone, CSS works by comparing digital signatures derived from images on the phone with an official database of known illegal images.<\/p><div class=\"elect-post-content-2\" style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"elect-1270331284\"><div id=\"DFP-EW-InRead1-Mobile\">\r\n<script type=\"text\/javascript\"> if ($(window).width() <= 768) { googletag.display('DFP-EW-InRead1-Mobile'); } <\/script>\r\n<\/div>\r\n<\/div>\n<p>In the study, whose findings will be revealed in a paper presented at IEEE Security and Privacy next week, the Imperial team recreated algorithms that underpin CSS.<\/p>\n<p>They then, without adding\u00a0standard face detection or facial\u00a0recognition algorithms,\u00a0taught the existing perceptual hashing software to scan for specific faces in photos on the phone &#8211; effectively spying on private content &#8211; which it succeeded in identifying most of the time.<\/p>\n<p>This added function was cloaked from detection because the modified CSS software could not be distinguished from the original CSS software.<\/p>\n<p>&#8220;What our paper shows, is that the software could be built or tweaked to include other hidden features such as scanning private content from the phones using facial recognition,&#8221; said Imperial computer scientist Yves-Alexandre de Montjoye.<\/p>\n<p>The UK is one of the countries considering mandating CSS, through the Online Safety Bill, according Imperial.<\/p>\n<p>&#8220;It is our opinion that client-side scanning is not the innocuous single-purpose technology it has been described to Parliament as,&#8221; said de Montjoye. &#8220;We call on policymakers to thoroughly evaluate the pros and cons of client-side scanning, including the risk of it being abused, before passing laws mandating its installation.&#8221;<\/p>\n<p>&#8216;Hidden dual purpose deep hashing algorithms: when client-side scanning does facial recognition&#8217; will be presented at IEEE Security and Privacy next week.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Software designed to detect child abuse images on smartphones, which could be mandated by governments in some counties, can be covertly repurposed to intrude on personal privacy, according to research &#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12649,12681,12655,12658],"tags":[15705,17131,13097,14485,14753,13916],"class_list":["post-820521","post","type-post","status-publish","format-standard","hentry","category-communications","category-information-technology","category-legislation","category-research-news","tag-cellphone","tag-cybersecurity","tag-mobile-phone","tag-phone","tag-smart","tag-uk-government"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Software to scan phones for abuse images is itself open to abuse | Electronics Weekly<\/title>\n<meta name=\"description\" content=\"Software designed to detect child abuse images on smartphones, which could be mandated by governments in some counties, can be covertly repurposed to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Software to scan phones for abuse images is itself open to abuse | Electronics Weekly\" \/>\n<meta name=\"twitter:description\" content=\"Software designed to detect child abuse images on smartphones, which could be mandated by governments in some counties, can be covertly repurposed to\" \/>\n<meta name=\"twitter:creator\" content=\"@ElectronicsNews\" \/>\n<meta name=\"twitter:site\" content=\"@ElectronicsNews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Bush\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/\"},\"author\":{\"name\":\"Steve Bush\",\"@id\":\"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/6b872697fe5e17abda1e967b9d09c1bd\"},\"headline\":\"Software to scan phones for abuse images is itself open to abuse\",\"datePublished\":\"2023-05-19T09:23:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/\"},\"wordCount\":319,\"commentCount\":0,\"keywords\":[\"Cellphone\",\"Cybersecurity\",\"Mobile Phone\",\"Phone\",\"smart\",\"UK government\"],\"articleSection\":[\"Communications\",\"Information Technology\",\"Legislation &amp; Skills\",\"Research\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/\",\"url\":\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/\",\"name\":\"Software to scan phones for abuse images is itself open to abuse | Electronics Weekly\",\"isPartOf\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/#website\"},\"datePublished\":\"2023-05-19T09:23:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/6b872697fe5e17abda1e967b9d09c1bd\"},\"description\":\"Software designed to detect child abuse images on smartphones, which could be mandated by governments in some counties, can be covertly repurposed to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.electronicsweekly.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software to scan phones for abuse images is itself open to abuse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.electronicsweekly.com\/#website\",\"url\":\"https:\/\/www.electronicsweekly.com\/\",\"name\":\"Electronics Weekly\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.electronicsweekly.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/6b872697fe5e17abda1e967b9d09c1bd\",\"name\":\"Steve Bush\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c9265551aa9558e0529386854909c9e29fa812e6589d3c18b0e0ca30dff9397a?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c9265551aa9558e0529386854909c9e29fa812e6589d3c18b0e0ca30dff9397a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c9265551aa9558e0529386854909c9e29fa812e6589d3c18b0e0ca30dff9397a?s=96&d=mm&r=g\",\"caption\":\"Steve Bush\"},\"description\":\"Steve Bush is the long-standing technology editor for Electronics Weekly, covering electronics developments for more than 25 years. He has a particular interest in the Power and Embedded areas of the industry. He also writes for the Engineer In Wonderland blog, covering 3D printing, CNC machines and miscellaneous other engineering matters.\",\"url\":\"https:\/\/www.electronicsweekly.com\/author\/steve-bush\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Software to scan phones for abuse images is itself open to abuse | Electronics Weekly","description":"Software designed to detect child abuse images on smartphones, which could be mandated by governments in some counties, can be covertly repurposed to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/","twitter_card":"summary_large_image","twitter_title":"Software to scan phones for abuse images is itself open to abuse | Electronics Weekly","twitter_description":"Software designed to detect child abuse images on smartphones, which could be mandated by governments in some counties, can be covertly repurposed to","twitter_creator":"@ElectronicsNews","twitter_site":"@ElectronicsNews","twitter_misc":{"Written by":"Steve Bush","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/#article","isPartOf":{"@id":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/"},"author":{"name":"Steve Bush","@id":"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/6b872697fe5e17abda1e967b9d09c1bd"},"headline":"Software to scan phones for abuse images is itself open to abuse","datePublished":"2023-05-19T09:23:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/"},"wordCount":319,"commentCount":0,"keywords":["Cellphone","Cybersecurity","Mobile Phone","Phone","smart","UK government"],"articleSection":["Communications","Information Technology","Legislation &amp; Skills","Research"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/","url":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/","name":"Software to scan phones for abuse images is itself open to abuse | Electronics Weekly","isPartOf":{"@id":"https:\/\/www.electronicsweekly.com\/#website"},"datePublished":"2023-05-19T09:23:49+00:00","author":{"@id":"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/6b872697fe5e17abda1e967b9d09c1bd"},"description":"Software designed to detect child abuse images on smartphones, which could be mandated by governments in some counties, can be covertly repurposed to","breadcrumb":{"@id":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.electronicsweekly.com\/news\/research-news\/software-to-scan-phones-for-abuse-images-is-itself-open-to-abuse-2023-05\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.electronicsweekly.com\/"},{"@type":"ListItem","position":2,"name":"Software to scan phones for abuse images is itself open to abuse"}]},{"@type":"WebSite","@id":"https:\/\/www.electronicsweekly.com\/#website","url":"https:\/\/www.electronicsweekly.com\/","name":"Electronics Weekly","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.electronicsweekly.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.electronicsweekly.com\/#\/schema\/person\/6b872697fe5e17abda1e967b9d09c1bd","name":"Steve Bush","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/c9265551aa9558e0529386854909c9e29fa812e6589d3c18b0e0ca30dff9397a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c9265551aa9558e0529386854909c9e29fa812e6589d3c18b0e0ca30dff9397a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c9265551aa9558e0529386854909c9e29fa812e6589d3c18b0e0ca30dff9397a?s=96&d=mm&r=g","caption":"Steve Bush"},"description":"Steve Bush is the long-standing technology editor for Electronics Weekly, covering electronics developments for more than 25 years. He has a particular interest in the Power and Embedded areas of the industry. He also writes for the Engineer In Wonderland blog, covering 3D printing, CNC machines and miscellaneous other engineering matters.","url":"https:\/\/www.electronicsweekly.com\/author\/steve-bush\/"}]}},"_links":{"self":[{"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/posts\/820521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/comments?post=820521"}],"version-history":[{"count":1,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/posts\/820521\/revisions"}],"predecessor-version":[{"id":820524,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/posts\/820521\/revisions\/820524"}],"wp:attachment":[{"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/media?parent=820521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/categories?post=820521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.electronicsweekly.com\/wp-json\/wp\/v2\/tags?post=820521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}