Risk
7/21/2008
11:48 AM
Connect Directly
RSS
E-Mail
50%
50%

Comcast, Other Cable Companies Sign Pact To Block Child Porn Online

With the help of the National Center for Missing and Exploited Children, 17 cable companies will update policies to keep up with emerging sources of child pornography, like newsgroups.

Cable operators delivering Internet services to 87% of percent of U.S. homes said they will now limit distribution of child pornography online.

The National Cable & Telecommunications Association, the National Center for Missing and Exploited Children (NCMEC), and the National Association of Attorneys General signed an industry-wide agreement last week to curtail the exploitation of minors.

As of December 2007, the NCMEC's Child Victim Identification Program had information on more than 1,233 child victims from around the world seen in sexually abusive images. The bureau also has helped seize child pornography collections from more than 11,650 investigations across the country.

"We are deeply grateful for this industry-wide attack on child pornography," Ernie Allen, president & CEO of NCMEC, said in an announcement. "It is not possible to arrest and prosecute every offender. We must be creative and build new public-private partnerships to address this insidious problem more effectively. Today's announcement represents a bold step forward."

The cable companies will use an NCMEC list of Web sites containing child pornography to prevent their servers from hosting the sites. They also agreed to report instances of child pornography, as required by federal law, to NCMEC's CyberTipline. NCMEC will pass the tips on to crime investigators. Finally, the cable companies will update policies to keep up with emerging sources of child pornography, like newsgroups.

The agreement takes effect within 30 days. Companies involved include: BendBroadband; Bresnan Communications; Bright House Networks; Broadstripe; Cablevision Systems; Charter Communications; Comcast; Cox Communications; Eagle Communications; GCI; Harron Communications; Insight Communications; Mediacom Communications; Midcontinent Communications; Sjoberg's; Suddenlink Communications; and US Cable. Time Warner Cable signed the memorandum of understanding already.

"Although NCMEC has recently signed similar agreements with individual companies, this agreement is notable as the first such agreement NCMEC has reached with an entire sector of the nation's communications industry," Patrick C. Lynch, National Association of Attorneys General president, said in a statement. "The NCTA agreement with NCMEC will limit the ability of predators to store and exchange images of exploitation of those who are, by definition, among the more vulnerable in society. We congratulate the cable industry for taking a strong stand in support of child safety.”

Combined, the companies that signed the agreement provide Internet services to more than 112 million U.S. homes.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

CVE-2014-0600
Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

CVE-2014-0888
Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.