The Posting of Kids Photos and Videos Online — Sharenting
Context
Uploading photos or videos of kids online has become a common trend. Whilst many of those who do this do it out of affection for the young ones or simply to capture moments, they are unaware of the grave risks that come along. This article seeks to unearth the risks associated with this prevalent act and how to better protect kids even while posting them.
Introduction
Sharenting, from the words "sharing" and "parenting", is the growing habit of parents or guardians to share photos, videos and any other identifying material about their children on social media. Sharenting on social media platforms such as Instagram, Facebook, Tiktok and X has been on the upward trajectory in the modern digital age. For instance, according to Quintly (a German based software company that has specialized in social media analytics), approximately 1,074 photos are uploaded to Instagram per second — 64,440 per minute, 3,866,400 per hour and 95 Million per day. A good chunk of these are kids' photos.
In most cases, the motivation behind posting kids' photos and videos online are, but not limited to:
- Keeping loved ones updated on the child's inner life.
- Creating a digital scrapbook or timeline for a child's growth, achievements and milestones.
- Capturing fleeting moments with their kids on a day-to-day basis.
- To foster a sense of community with other parents online.
- To seek validation and affirmation through likes and comments, making them feel good about their kid.
- To create an influencer culture — mainly referred to as "momfluencers" — by leveraging their child's images and stories to build an online presence.
The Implications
To better understand the effects of posting underage children online, we will look at it from two dimensions: the "white area" and the "grey area".
"The White Area"
These are the consequences that can arise through legal or social structures in the society and that we have control over.
For instance, the Data Protection Act of 2019 requires that any publication and transmission of children's material requires parental consent. Violation of this can result in fines and criminal charges depending on the nature of the breach and potential harm to the child. An example is Roma School in Uthiru, which had published pictures of its pupils on its social profiles without parental consent, resulting in a fine of Ksh. 4.5 Million, on the grounds that the pictures were published without parental knowledge.
"The Grey Area"
This refers to the consequences that may arise with which one has no control over — and that are "nearly" out of reach by local government's laws and policies.
To better understand this, you have to acknowledge that once you make a post on any social media platform, you lose control over it there and then. Whether or not it goes viral, how it is propagated and perceived online, how it is used, who uses it and when they use it, is not in your control anymore. This precaution should guide the kind of content you upload online. Below are the associated risks that you are not much in control of:
-
Collection of data to train AI models — With the rapid boom of Artificial Intelligence, there is need to create better and more advanced AI models that are capable of mimicking human behavior on a massive scale. A subfield of AI known as Generative AI (Gen AI) — which focuses on generating new data or content that resembles existing data — is fed with vast amounts of data in the form of images, videos, audio and text, from which they learn and acquire the capability to regurgitate similar content. For context, the raw data used to train GPT-3.5 is 45TB of text data (1TB = 1,024GB). The conventional smartphone has a storage capacity of 64GB — you would therefore need 16 smartphones to store the data used to train GPT-3.5. Whilst OpenAI has been quite secretive about the exact size of data used to train GPT-4, researchers estimate approximately 13 Trillion tokens (roughly 10 Trillion words), equivalent to ~60TB of raw data.
Guess where most, if not all, of the data to train these models comes from? The social media platforms where you and I post daily. The terms and conditions we hastily agree to while creating accounts on these platforms grant these corporations the right to sell your data to companies creating AI models. So the pictures and videos you upload of your kid are used to train these AI models. Picture a scenario where you would prompt an AI to generate an image and it creates one that is quite similar to your kid. Sounds chilling?
Whilst I am not against the training of AI models, data about children being used to train AI models — which they have no knowledge about and would probably be against if they had the necessary understanding — is quite concerning. It is needful to be mindful of your kids' online footprint.
-
Identity theft — The audio from videos you post can be extracted by malicious personnel who, using software such as Audacity and Phonexia Voice Inspector, can separate your kid's voice from the audio and then clone the kid's voice (replicate it to say words the speaker never uttered) — for example, to seem to be in duress and ask for money. This kind of extortion has been on the rise recently. An incident of this kind happened at 4:55pm on 20th January 2023 in Arizona, USA, where a mother received a distress call from her "daughter" (who had gone training for a ski-race), where abductors demanded a ransom of Ksh. 129 Million ($1 Million). It was later established by the police that the voice was AI generated. In an interview with CNN, she recounted how real and genuine it sounded.
Deepfakes — videos of a person doing what they actually didn't do or appearing to be in a place they aren't — have also been used to extort money from loved ones. Cases of videos being sent to parents showing kids being involved in accidents and a demand for money to rush the kid to hospital are one of the tactics being used by scammers.
-
Digitally orchestrated kidnapping — Uploading content showing your kids' daily routine moments makes the kid a prime target for abductors. Consider this: you post your son/daughter while dressed in their school uniform, record how and when you drop them at school and later pick them up in the evening. With this information, an abductor can know the perfect time to lure and kidnap your child. In addition, posting visits to places and activities you undertook with the kid can be used by the abductor to initiate a conversation with the child, eventually winning their trust and easing the process of abduction.
-
Proliferation of kids' images in child pornography sites — Avoid sharing pictures of children in any state of undress because some individuals use web crawlers and spiders to collect pictures and videos of kids in this state and avail them to child pornography sites. In addition, uploading content of kids in this state can wreck their reputation in future.
Recommendations
Sharing can never be 100% safe. It is a matter of balancing the risks and what parents/guardians perceive as benefits. If the need arises to post your son/daughter, consider doing the following:
- Pixelate the faces of the kids. Pixelated images aren't fit for training AI models and also make it difficult for malicious people to perform any exploits.
- Include background music that overshadows the voices of people in the video before uploading. Note: This doesn't mean the voices can't be extracted — sophisticated software can still achieve this.
- While taking selfies together with the kid, orient the camera such that it doesn't expose their face.
- Hide the child's face using emojis when posting.
- Trim them out of the picture if necessary.
The government as well, through the relevant state departments, needs to actively review and enforce laws and policies that protect children in the digital space.
Conclusion
With the knowledge dissipated by this article, take the initiative to protect your kid's digital footprint.
"Forewarned, forearmed — to be prepared is half the victory"
— Latin Proverb
Sources: quintly.com · The Data Protection Act 2019 · the-star.co.ke/news · Fake abduction through voice cloning (CNN)
Authored by Daniel Chacha Mwita