A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Fighting Child Exploitation with Oculum - Andrew Hay, Mikhail Sudakov NolaCon 2018 (Hacking Illustrated Series InfoSec Tutorial Videos)

Fighting Child Exploitation with Oculum
Andrew Hay, Mikhail Sudakov
@andrewsmhay / @LEOCyberSec / @msudakov0

It is not a harmless act to look at child exploitation material. It is not something that you do, unless you have a sexual interest in children. The exception being the forensic analysts that are tasked with finding, extracting, and documenting illicit material for use in criminal cases. Though extraction can be automated, the analyst must still visually inspect the majority of the content to determine if it should be included as evidence. This process is not only time consuming but also mentally draining and potentially traumatizing for the analyst. In fact, there are several documented cases of law enforcement officers developing PTSD from being exposed to a constant barrage of illicit content. This session will present the open source Oculum tool which was designed to aid forensic analysts in determining the probability that visual content (images and video) contains illicit content and provide a detailed report on its findings. The tool allows forensic analysts to narrow the analysis using automatically assigned tags, review specific illicit child exploitation content as it pertains to a particular case, victims, or suspects, and maintain a database of known cryptographic hashes, filenames, and other metadata for use in future cases.

Recorded at NolaCon 2018

Back to NolaCon 2018 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast