Child Predator Abuse of Generative AI
- Circumvent platform safeguards
- Create text and image-based CSAM
- Find new predator resources

Download the Full Report
Overview
This exclusive Alice report provides exclusive insights from threat actor chatter and shows trend within child predator communities, as well as how platforms can secure their services from
- Image-based GenAI CSAM production
- Text-based GenAI CSAM production
- AI models that are in circulation which enable CSAM production
What’s New from Alice
Securing Agentic AI: The OWASP Approach
In this episode, Mo Sadek is joined by Steve Wilson (Chief AI and Product Officer at Exabeam, founder and co-chair of the OWASP GenAI Security Project) to explore how OWASP is shaping practical guidance for agentic AI security. They dig into prompt injection, guardrails, red teaming, and what responsible adoption can look like inside real organizations.
Distilling LLMs into Efficient Transformers for Real-World AI
This technical webinar explores how we distilled the world knowledge of a large language model into a compact, high-performing transformer—balancing safety, latency, and scale. Learn how we combine LLM-based annotations and weight distillation to power real-world AI safety.
