Risk
7/21/2008
11:48 AM
50%
50%

Comcast, Other Cable Companies Sign Pact To Block Child Porn Online

With the help of the National Center for Missing and Exploited Children, 17 cable companies will update policies to keep up with emerging sources of child pornography, like newsgroups.

Cable operators delivering Internet services to 87% of percent of U.S. homes said they will now limit distribution of child pornography online.

The National Cable & Telecommunications Association, the National Center for Missing and Exploited Children (NCMEC), and the National Association of Attorneys General signed an industry-wide agreement last week to curtail the exploitation of minors.

As of December 2007, the NCMEC's Child Victim Identification Program had information on more than 1,233 child victims from around the world seen in sexually abusive images. The bureau also has helped seize child pornography collections from more than 11,650 investigations across the country.

"We are deeply grateful for this industry-wide attack on child pornography," Ernie Allen, president & CEO of NCMEC, said in an announcement. "It is not possible to arrest and prosecute every offender. We must be creative and build new public-private partnerships to address this insidious problem more effectively. Today's announcement represents a bold step forward."

The cable companies will use an NCMEC list of Web sites containing child pornography to prevent their servers from hosting the sites. They also agreed to report instances of child pornography, as required by federal law, to NCMEC's CyberTipline. NCMEC will pass the tips on to crime investigators. Finally, the cable companies will update policies to keep up with emerging sources of child pornography, like newsgroups.

The agreement takes effect within 30 days. Companies involved include: BendBroadband; Bresnan Communications; Bright House Networks; Broadstripe; Cablevision Systems; Charter Communications; Comcast; Cox Communications; Eagle Communications; GCI; Harron Communications; Insight Communications; Mediacom Communications; Midcontinent Communications; Sjoberg's; Suddenlink Communications; and US Cable. Time Warner Cable signed the memorandum of understanding already.

"Although NCMEC has recently signed similar agreements with individual companies, this agreement is notable as the first such agreement NCMEC has reached with an entire sector of the nation's communications industry," Patrick C. Lynch, National Association of Attorneys General president, said in a statement. "The NCTA agreement with NCMEC will limit the ability of predators to store and exchange images of exploitation of those who are, by definition, among the more vulnerable in society. We congratulate the cable industry for taking a strong stand in support of child safety.”

Combined, the companies that signed the agreement provide Internet services to more than 112 million U.S. homes.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.