Innocent Lives Foundation
   HOME





Innocent Lives Foundation
The Innocent Lives Foundation, also known as ILF, is an international nonprofit organization dedicated to finding the true identities of anonymous child predators using open-source intelligence, compiling conclusive reports, and handing the reports over to various types of law enforcement to help bring predators to justice. ILF also works to combat child sexual abuse material by educating parents and guardians on ways to talk to their children about their online activity. The Innocent Lives Foundation was founded by Christopher J. Hadnagy in 2017. A. J. Cook is an ambassador for the foundation. History At DEF CON 25 in 2017, Christopher J. Hadnagy announced the creation of the Innocent Lives Foundation. Hadnagy's company ''Social-Engineer, LLC'' was involved in a social engineering engagement for a company when his team uncovered Tor traffic from one of the company's employees computers being used to trade child sexual abuse material on the dark web The dark web is the Wor ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Non-governmental Organization
A non-governmental organization (NGO) is an independent, typically nonprofit organization that operates outside government control, though it may get a significant percentage of its funding from government or corporate sources. NGOs often focus on humanitarian or social issues but can also include clubs and associations offering services to members. Some NGOs, like the World Economic Forum, may also act as lobby groups for corporations. Unlike international organizations (IOs), which directly interact with sovereign states and governments, NGOs are independent from them. The term as it is used today was first introduced in Article 71 of the UN Charter, Article 71 of the newly formed United Nations Charter in 1945. While there is no fixed or formal definition for what NGOs are, they are generally defined as nonprofit entities that are independent of governmental influence—although they may receive government funding. According to the United Nations Department of Global Communic ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

English Language
English is a West Germanic language that developed in early medieval England and has since become a English as a lingua franca, global lingua franca. The namesake of the language is the Angles (tribe), Angles, one of the Germanic peoples that Anglo-Saxon settlement of Britain, migrated to Britain after its End of Roman rule in Britain, Roman occupiers left. English is the list of languages by total number of speakers, most spoken language in the world, primarily due to the global influences of the former British Empire (succeeded by the Commonwealth of Nations) and the United States. English is the list of languages by number of native speakers, third-most spoken native language, after Mandarin Chinese and Spanish language, Spanish; it is also the most widely learned second language in the world, with more second-language speakers than native speakers. English is either the official language or one of the official languages in list of countries and territories where English ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Christopher J
Christopher is the English version of a Europe-wide name derived from the Greek name Χριστόφορος (''Christophoros'' or '' Christoforos''). The constituent parts are Χριστός (''Christós''), "Christ" or "Anointed", and φέρειν (''phérein''), "to bear"; hence the "Christ-bearer". As a given name, 'Christopher' has been in use since the 10th century. In English, Christopher may be abbreviated as " Chris", "Topher", and sometimes " Kit". It was frequently the most popular male first name in the United Kingdom, having been in the top twenty in England and Wales from the 1940s until 1995, although it has since dropped out of the top 100. Within the United Kingdom, the name is most common in England and not so common in Wales, Scotland, or Northern Ireland. Cognates in other languages *Afrikaans: Christoffel, Christoforus * Albanian: Kristofer, Kristofor, Kristoforid, Kristo *Arabic: كريستوفر (''Krīstafor, Kristūfar, Krístufer''), اصطفر (''ʔ ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Board Of Directors
A board of directors is a governing body that supervises the activities of a business, a nonprofit organization, or a government agency. The powers, duties, and responsibilities of a board of directors are determined by government regulations (including the jurisdiction's corporate law) and the organization's own constitution and by-laws. These authorities may specify the number of members of the board, how they are to be chosen, and how often they are to meet. In an organization with voting members, the board is accountable to, and may be subordinate to, the organization's full membership, which usually elect the members of the board. In a stock corporation, non-executive directors are elected by the shareholders, and the board has ultimate responsibility for the management of the corporation. In nations with codetermination (such as Germany and Sweden), the workers of a corporation elect a set fraction of the board's members. The board of directors appoints the ch ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Nonprofit Organization
A nonprofit organization (NPO), also known as a nonbusiness entity, nonprofit institution, not-for-profit organization, or simply a nonprofit, is a non-governmental (private) legal entity organized and operated for a collective, public, or social benefit, as opposed to an entity that operates as a business aiming to generate a Profit (accounting), profit for its owners. A nonprofit organization is subject to the non-distribution constraint: any revenues that exceed expenses must be committed to the organization's purpose, not taken by private parties. Depending on the local laws, charities are regularly organized as non-profits. A host of organizations may be non-profit, including some political organizations, schools, hospitals, business associations, churches, foundations, social clubs, and consumer cooperatives. Nonprofit entities may seek approval from governments to be Tax exemption, tax-exempt, and some may also qualify to receive tax-deductible contributions, but an enti ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Open-source Intelligence
Open source intelligence (OSINT) is the collection and analysis of data gathered from open sources (overt sources and publicly available information) to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and competitive intelligence, business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified information, classified, Classified information#Unclassified, unclassified, or trade secret, proprietary intelligence intelligence requirement, requirements across the previous intelligence disciplines. Categories OSINT sources can be divided up into six different categories of information flow: *Media: print newspapers, magazines, radio, and television from across and between countries. *Internet: online publications, blogs, discussion groups, citizen media (i.e. – cell phone digital video, videos, and user created content), YouTube, and other social media websites (i.e. – Facebook ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Child Sexual Abuse Material
Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is erotic material that depicts persons under the designated age of majority. The precise characteristics of what constitutes child pornography varies by criminal jurisdiction. Child pornography is often produced through online solicitation, coercion and covert photographing. In some cases, sexual abuse (such as forcible rape) is involved during production. Pornographic pictures of minors are also often produced by children and teenagers themselves without the involvement of an adult. Images and videos are collected and shared by online sex offenders. Laws regarding child pornography generally include sexual images involving prepubescents, pubescent, or post-pubescent minors and computer-generated images that appear to involve them. Most possessors of child p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

DEF CON
DEF CON (also written as DEFCON, Defcon, or DC) is a Computer security conference, hacker convention held annually in Las Vegas Valley, Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and Hacker (computer security), hackers with a general interest in source code, software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking Wargame (hacking), wargames). Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat. Other contests, past and present, include lockpicking, Defcon Robot ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Social Engineering (security)
In the context of information security, social engineering is the use of psychological influence of people into performing actions or divulging Confidentiality, confidential information. This differs from psychological manipulation in that it doesn't need to be controlling, negative or a one-way transaction. Manipulation involves a zero-sum game where one party wins and the other loses while social engineering can be win-win for both parties. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in the sense that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests." Research done in 2020 has indicated that social engineering will be one of the most prominent challenges of the upcoming decade. Having proficiency in social engineering will be increasingly important for orga ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Tor (network)
Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traffic via random paths through these relays. Using Tor makes it more difficult to trace a user's Internet activity by preventing any single point on the Internet (other than the user's device) from being able to view both where traffic originated from and where it is ultimately going to at the same time. This conceals a user's location and usage from anyone performing network surveillance or traffic analysis from any such point, protecting the user's freedom and ability to communicate confidentially. History The core principle of Tor, known as onion routing, was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, to p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Dark Web
The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term ''deep web'' is mistakenly used to refer specifically to the dark web. The darknets which constitute the dark web include small, friend-to-friend networks, as well as large, popular networks such as Tor, Hyphanet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as clearnet due to its unencrypted nature. The Tor dark web or onionland uses the traffic anonymization technique of onion routing under the network's top-level domain suffi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]