
Download the Full Report
Overview
Online child predator communities construct networks across platforms. They use instant messaging platforms to secretly communicate, sharing child sexual abuse material and coordinating child abuse. This activity occurs in all languages, placing children at risk worldwide. In this report, we show how Trust & Safety teams can guard against systematic abuse while maintaining the right to privacy that innocent users expect. The solution is an intelligence-led approach that includes:
- Threat actor patterns of behaviors (gathered from child predator experts);
- Threat actor off-platform network activity;
- Threat actor on-platform activity (implementation of known CSAM keywords, their obfuscations, and other metadata, suspicious entry rules in biographies, etc.)
What’s New from Alice
Distilling LLMs into Efficient Transformers for Real-World AI
webinar
Sep 25, 2025
 -
This is some text inside of a div block.
 min read
This technical webinar explores how we distilled the world knowledge of a large language model into a compact, high-performing transformer—balancing safety, latency, and scale. Learn how we combine LLM-based annotations and weight distillation to power real-world AI safety.
Intelligence Desk
