Rising Online Risks to Children: The Alarming Increase in Self-Generated Child Sexual Abuse Material (CSAM) and Risky Interactions with Adults

Children today are facing unprecedented online risks, as highlighted in a recent report from Thorn, a technology nonprofit. This article aims to shed light on the concerning rise in certain online threats to children, including the surge in self-generated child sexual abuse material (CSAM) and risky interactions with adults. Additionally, we will explore the challenges posed by novel technologies employed by online predators, as well as the vital role of hashing and matching technology in combating these risks. Lastly, we’ll introduce Safer, a proactive CSAM detection tool developed by Thorn, offering a comprehensive database of known CSAM hash values.

Increase in Self-Generated CSAM

One distressing trend that has emerged is the increasing number of minors engaging in the taking and sharing of sexual images of themselves, both consensually and coercively. This dangerous behavior has significant implications for the well-being of these children, as it not only exposes them to exploitation but also has a lasting impact on their mental and emotional health. Shockingly, there has been a 9% increase in cases of self-generated CSAM from 2021 to 2022, indicating the urgent need for intervention and support for vulnerable youth.

Risky Online Interactions with Adults

The Thorn report also reveals that children are reporting a rise in risky online interactions with adults. These interactions can range from inappropriate conversations to grooming for sexual exploitation. The dangers involved in such encounters cannot be overstated, as they expose children to manipulation, coercion, and potential harm. It is crucial for parents, educators, and law enforcement agencies to remain vigilant and take active steps to protect children from these dangerous online engagements.

Surge in Reports of Child Sexual Abuse Material (CSAM)

The statistics from the National Center for Missing and Exploited Children (NCMEC) paint a distressing picture. Over the past five years, NCMEC has witnessed a staggering 329% increase in reported CSAM files. In 2022 alone, they received a shocking 88.3 million CSAM files. These alarming numbers underscore the urgent need for concerted efforts by tech companies, law enforcement, and policymakers to combat the proliferation of child sexual exploitation material.

Novel Technologies Used by Online Predators

Online predators are continuously evolving their tactics to ensnare vulnerable children. One concerning development is the deployment of chatbots to scale their enticement. These chatbots simulate real conversations, targeting unsuspecting children and luring them into dangerous situations. The scalability and effectiveness of these tactics pose a significant challenge, necessitating innovative solutions to counteract and neutralize these threats.

Rise in Reports of Online Enticement

The NCMEC report also reveals an alarming 82% increase in reports of online enticement of children for sexual acts between 2021 and 2022. This surge in predatory behavior further emphasizes the pressing need for enhanced preventive measures and decisive action to protect children online. Efforts must focus not only on identifying and apprehending predators but also on empowering children with the knowledge and skills to recognize and respond to potential threats effectively.

The Importance of Hashing and Matching Technology

In the fight against online exploitation, hashing and matching technology plays a crucial role. Tech companies can leverage this technology to protect users and platforms by identifying and blocking known CSAM (Child Sexual Abuse Material) hash values. With the ability to compare uploaded content against a comprehensive database of known CSAM hashes, potential instances of exploitation can be flagged and addressed proactively. This technology serves as a critical tool in preventing the dissemination and re-victimization of children through the online sharing of explicit material.

Safer: A Proactive Tool for CSAM Detection

Thorn’s Safer is a remarkable tool designed to proactively detect CSAM by providing access to a vast database aggregating over 29 million known CSAM hash values. By automatically scanning and comparing uploaded content against this extensive repository, Safer can swiftly identify and flag potentially harmful material. This technology offers a powerful resource for tech companies, law enforcement agencies, and other stakeholders committed to combating the exploitation of children online.

The rise in self-generated CSAM and risky online interactions with adults highlights the urgent need for heightened awareness, intervention, and preventive measures to protect children in the digital realm. The alarming increase in reports of CSAM and online enticement further underscores the necessity for multi-stakeholder collaboration and decisive action. Harnessing the potential of innovative technologies and tools like hashing and matching, as demonstrated by Safer, can pave the way for safer online spaces for children. It is our collective responsibility to prioritize the well-being and safeguard the innocence of our children by effectively addressing and combating these growing online risks.

Explore more

How AI Agents Work: Types, Uses, Vendors, and Future

From Scripted Bots to Autonomous Coworkers: Why AI Agents Matter Now Everyday workflows are quietly shifting from predictable point-and-click forms into fluid conversations with software that listens, reasons, and takes action across tools without being micromanaged at every step. The momentum behind this change did not arise overnight; organizations spent years automating tasks inside rigid templates only to find that

AI Coding Agents – Review

A Surge Meets Old Lessons Executives promised dazzling efficiency and cost savings by letting AI write most of the code while humans merely supervise, but the past months told a sharper story about speed without discipline turning routine mistakes into outages, leaks, and public postmortems that no board wants to read. Enthusiasm did not vanish; it matured. The technology accelerated

Open Loop Transit Payments – Review

A Fare Without Friction Millions of riders today expect to tap a bank card or phone at a gate, glide through in under half a second, and trust that the system will sort out the best fare later without standing in line for a special card. That expectation sits at the heart of Mastercard’s enhanced open-loop transit solution, which replaces

OVHcloud Unveils 3-AZ Berlin Region for Sovereign EU Cloud

A Launch That Raised The Stakes Under the TV tower’s gaze, a new cloud region stitched across Berlin quietly went live with three availability zones spaced by dozens of kilometers, each with its own power, cooling, and networking, and it recalibrated how European institutions plan for resilience and control. The design read like a utility blueprint rather than a tech

Can the Energy Transition Keep Pace With the AI Boom?

Introduction Power bills are rising even as cleaner energy gains ground because AI’s electricity hunger is rewriting the grid’s playbook and compressing timelines once thought generous. The collision of surging digital demand, sharpened corporate strategy, and evolving policy has turned the energy transition from a marathon into a series of sprints. Data centers, crypto mines, and electrifying freight now press