WEBVTT 1 00:00:01.064 --> 00:00:02.191 2 00:00:02,191 --> 00:00:06,816 [Music] 2 00:00:06.816 --> 00:00:10.856 Denton: We focus on crimes across the spectrum on the Internet 3 00:00:10.856 --> 00:00:15.328 and on the Dark Web with child exploitation, network intrusions, 4 00:00:15.328 --> 00:00:17.911 intellectual property rights investigations, 5 00:00:17.911 --> 00:00:21.096 pretty much anything that is on the Internet 6 00:00:21.096 --> 00:00:23.296 or the Dark Web, we will investigate it. 7 00:00:23.296 --> 00:00:28.296 Child Exploitation was what this Cyber Crime was originally founded to counter; 8 00:00:28.800 --> 00:00:32.023 child pornographers moving from printed material 9 00:00:32.023 --> 00:00:34.560 onto material that was on the Internet. 10 00:00:34.560 --> 00:00:37.959 Cole: So the Victim Identification Program specifically uses technology, 11 00:00:37.959 --> 00:00:42.959 coupled with our investigative capabilities to review, analyze 12 00:00:43.063 --> 00:00:47.104 and process child exploitation images and videos, 13 00:00:47.104 --> 00:00:51.034 identify and rescue the victims, identify and apprehend the offenders, 14 00:00:51.034 --> 00:00:53.217 identify and locate the crime scene. 15 00:00:53.217 --> 00:00:56.386 Through DHS S&T, we have our 16 00:00:56.386 --> 00:00:59.947 Child Exploitation Imagery Analytics project or CHEXIA, 17 00:00:59.947 --> 00:01:03.027 which is about facial recognition, 18 00:01:03.027 --> 00:01:08.027 object recognition and text, visual textual recognition. 19 00:01:08.819 --> 00:01:13.819 In 2011, I started the program as just myself with an iMac and a copy of Photoshop 20 00:01:14.954 --> 00:01:19.954 and in the first six months was able to identify and rescue 32 child victims. 21 00:01:20.369 --> 00:01:23.370 Today, we're five of us working victim identification 22 00:01:23.370 --> 00:01:26.490 in a really well built-out laboratory 23 00:01:26.490 --> 00:01:30.643 and we have 26 victim identification teams spread throughout the country. 24 00:01:30.643 --> 00:01:35.643 As an agency, we've identified and rescued over 4400 children, since 2012. 25 00:01:35.650 --> 00:01:39.186 Bison: Many times because of the nature of the images, 26 00:01:39.186 --> 00:01:41.450 we don't know where that crime took place, 27 00:01:41.450 --> 00:01:43.634 we don't know where that child may be. 28 00:01:43.634 --> 00:01:47.762 But what we've learned over time is if we focus more on identifying the victim, 29 00:01:47.762 --> 00:01:51.003 we will, it almost always leads us to the offender, 30 00:01:51.003 --> 00:01:53.770 and that is one thing that we really strive to do, 31 00:01:53.770 --> 00:01:56.387 is rescue the victim, but also as law enforcement, 32 00:01:56.387 --> 00:01:58.578 obviously arrest the offenders in this. 33 00:01:58.578 --> 00:02:00.891 Cole: The National Center for Missing and Exploited Children 34 00:02:00.891 --> 00:02:04.650 receives around 750,000 images and videos a week, 35 00:02:04.650 --> 00:02:08.490 seized by law enforcement and just domestically here in the United States. 36 00:02:08.490 --> 00:02:13.330 In those images and videos, we have visual text, we have faces, 37 00:02:13.330 --> 00:02:18.330 we've got objects and we've got all types and manner of things. 38 00:02:19.058 --> 00:02:21.850 We have to use a lot of different technologies 39 00:02:21.850 --> 00:02:25.411 in order to find and identify those children. 40 00:02:25.411 --> 00:02:30.187 Through the funding that S&T provided, we were able to ground through 41 00:02:30.187 --> 00:02:34.618 130,000 real-world child exploitation images and videos. 42 00:02:34.618 --> 00:02:39.258 And what we have seen is a dramatic performance increase. 43 00:02:39.258 --> 00:02:41.291 Bison: It has just been amazing, 44 00:02:41.291 --> 00:02:44.218 the work that's getting done through their research and development 45 00:02:44.218 --> 00:02:48.354 that they do with us, through the funding that has been provided. 46 00:02:48.354 --> 00:02:50.691 Together we've been able to really launch 47 00:02:50.691 --> 00:02:53.722 and move forward a lot of very, very important projects. 48 00:02:53.722 --> 00:02:58.212 All of these projects not only benefit HSI and child exploitation investigations, 49 00:02:58.212 --> 00:03:01.627 but we see all of these projects also benefiting more and more 50 00:03:01.627 --> 00:03:04.635 of our programmatic areas within HSI, 51 00:03:04.635 --> 00:03:09.419 whether it be human trafficking, child exploitation, drug or financial crimes, 52 00:03:09.419 --> 00:03:13.131 I think all of the technology that we're working with S&T today 53 00:03:13.131 --> 00:03:15.778 on developing and fine-tuning, 54 00:03:15.778 --> 00:03:20.626 really plays a large part in the future of HSI and our investigations as a whole. 55 00:03:20.626 --> 00:03:23.626 Denton: We hope that our collaboration with Science & Technology 56 00:03:23.626 --> 00:03:28.411 is going to continue to give us newer and better technology down the road. 57 00:03:28.411 --> 00:03:33.330 As the criminals find ways to try and evade identification and capture, 58 00:03:33.330 --> 00:03:37.755 we need to use all of the tools at our disposal to stay ahead of them 59 00:03:37.755 --> 00:03:42.130 and to be able to stop them from preying on innocent children. 60 00:03:42.130 --> 00:03:46.523 Cole: And yeah, we have to look at some really horrific stuff, but at the end, 61 00:03:46.523 --> 00:03:51.523 we're doing it so that we can impact a child's life to the greater good. 62 00:03:53.819 --> 00:03:54.610 64 00:03:54,610 --> 00:03:54,923 63 00:03:54.923 --> 00:03:55.218 66 00:03:55,218 --> 00:03:55,523