Child Predator Abuse of Generative AI
- Circumvent platform safeguards
- Create text and image-based CSAM
- Find new predator resources

Download the Full Report
Overview
This exclusive Alice report provides exclusive insights from threat actor chatter and shows trend within child predator communities, as well as how platforms can secure their services from
- Image-based GenAI CSAM production
- Text-based GenAI CSAM production
- AI models that are in circulation which enable CSAM production
What’s New from Alice
Making Sense of AI: Trust, Scale, and the Human Role
Curiosity might be our most important security tool. In the first episode of Curiouser & Curiouser, Mo Sadek sits down with longtime security leader Julie Tsai to explore AI, security, and the human judgment that still matters most. Together, they cut through hype and fear to talk about what’s actually changing, what isn’t, and how we build systems we can truly trust.
Distilling LLMs into Efficient Transformers for Real-World AI
This technical webinar explores how we distilled the world knowledge of a large language model into a compact, high-performing transformer—balancing safety, latency, and scale. Learn how we combine LLM-based annotations and weight distillation to power real-world AI safety.
