aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
  • Tools
  • About
  • Software
  • Solutions

Intel Solutions Help To Combat Modern Slavery

  • relay
  • November 28, 2022
  • 3 minute read

​What’s New: Intel, enterprise technology and services firm R3 and nonprofit Hope for Justice are working together to build a pilot application that enables organizations combatting modern slavery to confidently share sensitive data related to individual cases with the enhanced privacy protections offered by confidential computing. The Private Data Exchange, built for Hope for Justice, a nonprofit, nongovernmental organization working to end modern slavery and human trafficking, aggregates and analyzes data, then notifies the appropriate agencies when relevant data matches are identified.

“As security technology creators, we have both the responsibility and the opportunity to help protect every person’s data and privacy. We’re seeing this occur through confidential computing advancements – the innovations we are bringing forward today will help us facilitate change and soon become the standards for how we operate tomorrow.”

–Paul O’Neill, director of strategic business in Intel’s Confidential Computing Group

 

How It Works: Confidential computing enables encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system. It reduces the likelihood that the sensitive data of those affected by human trafficking will be compromised or misused.

Hope for Justice’s Private Data Exchange application takes advantage of the industry-leading security capabilities delivered by Intel® Software Guard Extensions (Intel® SGX), the security features built into 3rd and 4th generation Intel® Xeon® Scalable processors. These features are designed to help provide protection for data-in-use, independent of the cloud provider, operating system or hardware configuration. They also enable multiple organizations to collaborate on shared analyses and validate algorithms while shielding confidential or regulated data from other parties.

Read More  Intel Acquires Moovit To Accelerate Mobileye’s Mobility-as-a-Service Offering

“Human traffickers are exploiting new technology and globalization at a staggering scale and pace. Most trafficking is now facilitated via the internet and other digital technologies that pay little attention to borders or jurisdictions,” said Tim Nelson, CEO of Hope for Justice. “We cannot lose the technology race against human trafficking. That is why we are so pleased that the Private Data Exchange platform has the potential to revolutionize how the sector collaborates across borders and tackles issues surrounding data privacy and confidentiality. For the first time, civil society, governments, U.N. agencies and businesses can truly collaborate to make technology a force that will help to end human trafficking.”

By leveraging the built-in security and attestation features of Intel SGX and R3’s Conclave platform, the application can provide organizations with confidence that information on slavery victims or those seeking to help them are better protected from their data being exposed. Conclave provides the tools necessary for organizations to run code without the burden of managing a complex infrastructure, putting the power of Intel SGX into the hands of developers and enabling them to write privacy-first applications with ease. This combination opens new possibilities for organizations seeking to benefit from the enhanced security of confidential cloud computing.

Why It Matters: Globally, organizations working on human trafficking cases have collected large pools of valuable data on both victims of slavery and perpetrators, as well as contextual information relating to emerging patterns and trends. Given the data’s sensitivity, there is a reluctance to collaborate on sharing, meaning maintaining high security and compliance is mission critical. To reap the benefits of collaboration, each organization must utilize trustworthy security solutions that help keep data confidential and private, and aid in ensuring the data’s integrity.

Read More  Intel Launches Project Circuit Breaker

Confidentially matched information will enable participating organizations such as nonprofits, national actors and intergovernmental agencies to realize tangible outcomes in the fight against slavery and enable victims of human trafficking and modern slavery to be better identified, rescued and provided the services they need. For instance:

  • Perpetrator name matching: If the same person appears in multiple matches, they may be involved in numerous cases of trafficking and be a serial offender or part of organized crime. The appropriate group can begin an investigation or notify law enforcement.
  • Victim family name matching: Discovering the same surname in multiple cases may indicate that two or more family members have been trafficked separately. Linking the two cases may accelerate rescue and help reunite the family.
  • Address matching: If the same property keeps showing up in results, it may be owned or operated by perpetrators or criminal organizations. This can be enough to trigger an investigation.
  • Lower-level contextual matching: If information, like location and industry, doesn’t present an active investigation opportunity, it can still reveal critical trends and trigger future outreach efforts.

Overcoming many of the obstacles to data sharing enables Hope for Justice to prepare to use the Private Data Exchange in consortium with national and intergovernmental stakeholders in direct response to the ongoing humanitarian crisis in Europe. The increased prevalence of human trafficking is a critical moment for both innovation and intervention, and this is an example of how technology plays a part.

relay

Related Topics
  • Conclave
  • Hope for Justice
  • Intel
  • R3
  • Slavery
  • Software Guard Extensions
You May Also Like
View Post
  • Computing
  • Software
  • Tools

Docker’s Bad Week

  • March 27, 2023
View Post
  • Software
  • Software Engineering
  • Tools

How To Use Bash

  • March 17, 2023
View Post
  • Software
  • Technology

Own Your Cloud With NextcloudPi On The Raspberry Pi

  • March 16, 2023
View Post
  • Platforms
  • Solutions
  • Technology

Cloudflare Takes On Online Fraud Detection Market

  • March 15, 2023
View Post
  • Software
  • Software Engineering

Python 3.12.0 Alpha 6 Released

  • March 15, 2023
mobile-laptop-developer-christina-wocintechchat-com-UTw3j_aoIKM-unsplash
View Post
  • Data
  • Software
  • Solutions

Build Customer Trust Through Secure Front End App Development & Cyber Security

  • March 14, 2023
View Post
  • Software
  • Tech
  • Technology

A New Smartphone Operating System That Puts Privacy First

  • March 10, 2023
View Post
  • Design
  • Engineering
  • Solutions
  • Technology

Network Detection And Response: The Future Of Cybersecurity

  • March 8, 2023

Stay Connected!
LATEST
  • 1
    How AI Can Improve Digital Security
    • March 27, 2023
  • 2
    Docker’s Bad Week
    • March 27, 2023
  • 3
    My First Pull Request At Age 14
    • March 24, 2023
  • 4
    AWS Chatbot Now Integrated Into Microsoft Teams
    • March 24, 2023
  • 5
    Verify POST Endpoint Availability With Uptime Checks
    • March 24, 2023
  • 6
    Sovereign Clouds Are Becoming A Big Deal Again
    • March 23, 2023
  • 7
    Ditching Google: The 3 Search Engines That Use AI To Give Results That Are Meaningful
    • March 23, 2023
  • 8
    Pythonic Techniques For Handling Sequences
    • March 21, 2023
  • 9
    Oracle Cloud Infrastructure to Increase the Reliability, Efficiency, and Simplicity of Large-Scale Kubernetes Environments at Reduced Costs
    • March 20, 2023
  • 10
    Monitor Kubernetes Cloud Costs With Open Source Tools
    • March 20, 2023
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Cloudflare Takes On Online Fraud Detection Market
    • March 15, 2023
  • 2
    Linux Foundation Training & Certification & Cloud Native Computing Foundation Partner With Corise To Prepare 50,000 Professionals For The Certified Kubernetes Administrator Exam
    • March 16, 2023
  • 3
    Cloudflare Democratizes Post-Quantum Cryptography By Delivering It For Free, By Default
    • March 16, 2023
  • 4
    Daily QR “Scan Scams” Phishing Users On Their Mobile Devices
    • March 16, 2023
  • 5
    Lockheed Martin Launches Commercial Ground Control Software For Satellite Constellations
    • March 14, 2023
  • /
  • Platforms
  • Architecture
  • Engineering
  • Programming
  • Tools
  • About

Input your search keywords and press Enter.