Search Results

1342 results
  1. AI-generated child sexual abuse

    Explore how IWF confronts the rise of AI-generated child sexual abuse material, highlighting emerging threats and efforts to protect children online.

  2. AI-generated child sexual abuse imagery reaching ‘tipping point’, says watchdog

    Internet Watch Foundation says illegal AI-made content is becoming more prevalent on open web with high level of sophistication.

  3. AI-generated child sexual abuse material

    Understand the rise of AI-generated CSAM in our 2025 Annual Data & Insights Report. We analyse the evolving threats and challenges posed by AI tools.

  4. AI-generated child sexual abuse: now cannot be the moment the EU downs tools

    The IWF’s latest AI report exposes rapidly escalating harms to children as the EU moves to scale back the tools that detect and remove child sexual abuse material online. The charity warns that the EU must act urgently to criminalise AI‑generated abuse and preserve essential detection systems before risks intensify further.

  5. AI-generated child sexual abuse: why safety by design must be the next step

    We’re calling for an AI Bill that includes key measures to ensure safety-by-design becomes a non-negotiable standard in AI development.

  6. AI-generated images

  7. AI-generated images of child sexual abuse uses real victims as reference material

    AI used to generate deepfake images of child sexual abuse uses photos of real victims as reference material, a report has found.

  8. AI-generated videos

  9. AI-generated videos of child sexual abuse a ‘stark vision of the future’

    A new report from the IWF shows how the pace of AI development has not slowed as offenders are using better, faster and more accessible tools to generate new criminal images and videos.

  10. Alexander Evans

  11. All IWF Hotline operations resume as new social distancing measures brought in

    Throughout the lockdown period the IWF Hotline has remained operational, but social distancing measures meant some activities had to be scaled back.

  12. All time hash data