ActiveFence is now Alice
x
Back
Whitepaper

Child Predator Abuse of Generative AI

Child predators are innovative, constantly scoping out new technologies to perpetrate their harmful activities. As this dangerous community begins exploring GenAI tools, one forum has revealed that almost 80% of predators are using, or plan to use the new technology to:
  • Circumvent platform safeguards
  • Create text and image-based CSAM
  • Find new predator resources
May 23, 2023

Overview

This exclusive Alice report provides exclusive insights from threat actor chatter and shows trend within child predator communities, as well as how platforms can secure their services from

  • Image-based GenAI CSAM production
  • Text-based GenAI CSAM production
  • AI models that are in circulation which enable CSAM production

Download the Full Report

What’s New from Alice

Secure AWS Strands Agents with Alice WonderFence

blog
Mar 29, 2026
,
 
Mar 29, 2026
 -
9
 min read
March 29, 2026

Learn how to use Strands Agent hooks to enforce safety and security policies with Alice WonderFence in production-oriented agent workflows.

Learn More

Alice Financial Benchmark

whitepaper
Apr 16, 2026
,
 
Apr 16, 2026
 -
This is some text inside of a div block.
 min read
April 16, 2026

See which models tested gave unauthorized financial advice with no jailbreak needed. Get the benchmark and protect your deployment.

Learn More

Secure the keys to GenAI wonderland?

Get a demo
Red-Team Lab