CESIUM
Tackling child exploitation with ethical AI
Revolutionising child safeguarding with predictive risk modelling, improving the identification and referral of vulnerable children.
16,000 children face sexual exploitation in England 27,000 children at risk of exploitation by organised crime gangs 34,000 children involved in gang activity and experiencing violence 48 child sexual exploitation offences per day 15% increase in child sexual abuse / exploitation offenses 41% of serious incidents flagged for poor risk assessment and information sharing 42% increase in CCE reported as factor during social care assessment £10 billion lifetime cost of child sexual abuse £84.9 million estimated policing cost for CSA/E offenses in 2024/25 34% of cases referred earlier to MACE 80% reduction in pre-screening time 400% capacity uplift
Enhanced risk management
Advanced AI-powered risk engine
Single source of truth for exploitation risks
Increased safeguarding efficiencies
Less time to identify at-risk children
Earlier interventions and referrals
Improved internal processes
Increased objectivity in assessments
Increase in safeguarding capacity
CESIUM’s
core features
Less time on ‘at-desk’ research and administration means more time for safeguarding professionals to spend on safeguarding children.
Providing you with dynamic risk insights, showing changes in key risk indicators in near-real-time.
- Daily proactive monitoring of increased risk scores.
- Insights on new high-risk entrants and missing individuals.
- An enhanced approach to case prioritisation.

Utilising the latest Machine Learning (ML) technology to provide near real-time risk scores across your data.
- Access any individual’s risk level instantaneously.
- Understand risk levels and patterns across the data.
- Gain insight into the scores’ contributing factors.

A granular, interactive timeline of every individual’s risk-related events.
- A live, detailed history of arrests, missing events and others.
- Build a full picture of the individual’s background and risk factors.
- Understand the escalating sequence of events behind the current risk.

A highly interactive visualisation tool, allowing you to explore the individual’s social network.
- Gain a full picture of all high risk associations.
- Understand the relationships between these associations.
- Quickly switch between each associate’s profile to enhance your investigation.

Gain access to a geospatial picture of exploitation-related locations.
- Gain insight into key locations for your subject and their network.
- Understand how timeline and geospatial analysis can interact.
- Use insights to drive targeted, evidence-based interventions.

Harness CESIUM’s Natural Language Processing (NLP) models to classify and code statements
- Use the latest NLP to identify insights on exploitation-related cases.
- Enhance your understanding of an individual’s potential vulnerabilities.
- Gain detailed insight into the specifics of a classification.

Implementation of CESIUM
CESIUM is designed to be implemented as efficiently as possible in your organisation,
minimising disruption and ensuring safeguarding improvements are prioritised.
Development and delivery
Operations and optimisation
Month 1
Month 2
Month 3 onwards
insights
live
We’ll work with your internal specialists to identify foundational data, ensuring security and privacy are prioritised. We’ll then work with you to configure and connect this data to CESIUM.
Once the data is connected, it will be used to train and validate our Machine Learning (ML) model, ensuring that outputs and insights are as robust and trustworthy as possible.
We’ll extract additional data to power CESIUM’s wider suite of functionalities. We’ll also work with you to provide ongoing training, system support and longer-term exploitation analyses.
If you’d like to find out more about how CESIUM can support your safeguarding activity, get in touch with our team today.
Implementation of CESIUM
CESIUM is designed to be implemented as efficiently as possible in your organisation, minimising disruption and ensuring safeguarding improvements are prioritised.
Your current dashboard
Month 1
We’ll work with your internal specialists to identify foundational data, ensuring security and privacy are prioritised. We’ll then work with you to configure and connect this data to CESIUM.
Month 2
Once the data is connected, it will be used to train and validate our Machine Learning (ML) model, ensuring that outputs and insights are as robust and trustworthy as possible.
Core risk insights are operational
Go live and
Bussiness as Usual
Month 3 onwards
We’ll extract additional data to power CESIUM’s wider suite of functionalities. We’ll also We’ll work with you to provide ongoing training, system support and longer-term exploitation analyses.
If you’d like to find out more about how CESIUM can support your safeguarding activity, get in touch with our team today.
How does CESIUM compare to your current dashboard?
Your current dashboard
- Who’s in the database
- What’s their subject profile
- Who’s at risk of exploitation
- What’s their level of risk
- What are the contributing risk factors
- How does this compare to other subjects
- Who else is this person linked to
- What locations and events are they linked to
- Implementing faster interventions
CESIUM
- Who’s in the database
- What’s their subject profile
- Who’s at risk of exploitation
- What’s their level of risk
- What are the contributing risk factors
- How does this compare to other subjects
- Who else is this person linked to
- What locations and events are they linked to
- Implementing faster interventions
CASE STUDY: LINCOLNSHIRE POLICE
How CESIUM identified 16 vulnerable children up to 6 months before safeguarding referral.

Use Cases
Cross border intelligence
Child A has been reported missing by their care home multiple times, either being found during police warrants, or refusing to confirm where they had been on return.
How does CESIUM help?
Child A’s subject profile is quickly retrieved and examined, revealing reports of domestic violence at the child’s home in the weeks and months prior to moving into care. In addition, CESIUM also confirms contact with nominals involved in county lines, that contact occurs shortly before Child A goes missing, and that the nominals are linked to an organised crime group. Finally, CESIUM identifies injuries to Child A which clearly result from assault.
CESIUM’s cross-border, holistic intelligence picture confirms that Child A is highly vulnerable and likely a victim of child exploitation.
Previous
Next
Exploitation risk insights
Child B is arrested for being drunk and disorderly, and in possession of cannabis. As a result, their exploitation risk score increases.
How does CESIUM help?
CESIUM issues a notification, prompting a proactive investigation of Child B in advance of potential exploitation. CESIUM’s advanced predictive risk engine has placed Child B within the top 2% of children at potential risk of exploitation, with the following data: referral to social care by school due to self harming, links to men in their 30s and stopped in cars with older men. In addition, Child B has been present at a party attended by police due to noise complaints – again in the company of older men, with Child B appearing to be intoxicated but confirming attendance of their own free will.
CESIUM’s investigative insights provide a holistic risk picture of Child B, and as a result is referred for further assessment.
Previous
Next
White Paper
The socio-economic impact of child exploitation in the UK
This detailed report gives insight into the criminal and sexual exploitation of children in the UK, and provides recommendations on the use of ethical AI as an enabler for change.
Awards and accreditations












Our approach to Ethical AI
Our Ethical AI solutions tackle complex social problems using cutting-edge technologies such as machine learning, natural language processing, data visualisation and integration, and cloud computing, with a strong focus on ethics and data protection as the key catalyst for a sustainable use of AI in the future.
Improve Safeguarding with AI
Find out more about how CESIUM can improve your internal processes, enhance your organisation’s risk management and increase safeguarding efficiencies.
Our team
Engineers and
Designers
Our team of engineers and designers is dedicated to developing solutions that embody shared responsibility, transparency, accountability, and security in algorithms and user experiences.

Our team

Engineers and
Designers
Our team of engineers and designers is dedicated to developing solutions that embody shared responsibility, transparency, accountability, and security in algorithms and user experiences.
Our team
Data Scientists
Data science is at the core of the solutions we develop, with our team ensuring solutions provide robust analysis, pattern recognition and insight extraction to inform innovative decision making.

Our team

Data Scientists
Data science is at the core of the solutions we develop, with our team ensuring solutions provide robust analysis, pattern recognition and insight extraction to inform innovative decision making.
Our team
Subject Matter Experts
Our social scientists and legal experts provide crucial insight into human behaviour and societal and legal dynamics; helping to understand how society works to inform our products and services.

Our team

Subject Matter
Experts
Our social scientists and legal experts provide crucial insight into human behaviour and societal and legal dynamics; helping to understand how society works to inform our products and services.
Our team
Ethics
Our expert ethicists provide a unique insight into all facets of our solutions, identifying biases, and ensuring transparency, explainability, accountability and human-led decision making.

Our team

Ethics
Our expert ethicists provide a unique insight into all facets of our solutions, identifying biases, and ensuring transparency, explainability, accountability and human-led decision making.
Our team
Research
Trilateral is founded on robust research methods and insights, with our researchers informing best practice and continuous improvement in the development and delivery of our solutions.

Our team

Research
Trilateral is founded on robust research methods and insights, with our researchers informing best practice and continuous improvement in the development and delivery of our solutions.
Our team
Data Protection
Our data protection specialists ensure that privacy, security, and fair treatment of personal data is at the heart of our solutions, implementing robust data governance practices throughout.

Our team

Data Protection
Our data protection specialists ensure that privacy, security, and fair treatment of personal data is at the heart of our solutions, implementing robust data governance practices throughout.








