ActiveFence is now Alice
x
Back
Whitepaper

Child Predator Abuse of Generative AI

Child predators are innovative, constantly scoping out new technologies to perpetrate their harmful activities. As this dangerous community begins exploring GenAI tools, one forum has revealed that almost 80% of predators are using, or plan to use the new technology to:
  • Circumvent platform safeguards
  • Create text and image-based CSAM
  • Find new predator resources
May 23, 2023

Overview

This exclusive Alice report provides exclusive insights from threat actor chatter and shows trend within child predator communities, as well as how platforms can secure their services from

  • Image-based GenAI CSAM production
  • Text-based GenAI CSAM production
  • AI models that are in circulation which enable CSAM production

Download the Full Report

What’s New from Alice

"Okay, Here is How to Build a Bomb": Millions Download Dangerous LLMs

blog
Apr 17, 2026
,
 
Apr 17, 2026
 -
2
 min read
April 17, 2026

Thousands of abliterated LLMs have flooded open-source platforms with millions of downloads. These models comply with virtually any request, from bomb-making to malware, and run fully offline on consumer devices.

Learn More

Alice Financial Benchmark

whitepaper
Apr 16, 2026
,
 
Apr 16, 2026
 -
This is some text inside of a div block.
 min read
April 16, 2026

See which models tested gave unauthorized financial advice with no jailbreak needed. Get the benchmark and protect your deployment.

Learn More

Secure the keys to GenAI wonderland?

Get a demo
Red-Team Lab