Child Predator Abuse of Generative AI
- Circumvent platform safeguards
- Create text and image-based CSAM
- Find new predator resources

Overview
This exclusive Alice report provides exclusive insights from threat actor chatter and shows trend within child predator communities, as well as how platforms can secure their services from
- Image-based GenAI CSAM production
- Text-based GenAI CSAM production
- AI models that are in circulation which enable CSAM production
Download the Full Report
What’s New from Alice
"Okay, Here is How to Build a Bomb": Millions Download Dangerous LLMs
Thousands of abliterated LLMs have flooded open-source platforms with millions of downloads. These models comply with virtually any request, from bomb-making to malware, and run fully offline on consumer devices.
Your LLM Has No Idea What It's Doing
Diana Kelley, CISO at Noma Security and former Cybersecurity CTO at Microsoft, joins Mo to work through the real mechanics of LLM risk: why the context window flattens the trust boundary between system instructions and user data, why that makes reliable internal guardrails essentially impossible, and why agentic AI is less a new threat category and more a stress test for the hygiene debt organizations never fully paid off.
Distilling LLMs into Efficient Transformers for Real-World AI
This technical webinar explores how we distilled the world knowledge of a large language model into a compact, high-performing transformer—balancing safety, latency, and scale. Learn how we combine LLM-based annotations and weight distillation to power real-world AI safety.
