Rising Online Risks to Children: The Alarming Increase in Self-Generated Child Sexual Abuse Material (CSAM) and Risky Interactions with Adults

Children today are facing unprecedented online risks, as highlighted in a recent report from Thorn, a technology nonprofit. This article aims to shed light on the concerning rise in certain online threats to children, including the surge in self-generated child sexual abuse material (CSAM) and risky interactions with adults. Additionally, we will explore the challenges posed by novel technologies employed by online predators, as well as the vital role of hashing and matching technology in combating these risks. Lastly, we’ll introduce Safer, a proactive CSAM detection tool developed by Thorn, offering a comprehensive database of known CSAM hash values.

Increase in Self-Generated CSAM

One distressing trend that has emerged is the increasing number of minors engaging in the taking and sharing of sexual images of themselves, both consensually and coercively. This dangerous behavior has significant implications for the well-being of these children, as it not only exposes them to exploitation but also has a lasting impact on their mental and emotional health. Shockingly, there has been a 9% increase in cases of self-generated CSAM from 2021 to 2022, indicating the urgent need for intervention and support for vulnerable youth.

Risky Online Interactions with Adults

The Thorn report also reveals that children are reporting a rise in risky online interactions with adults. These interactions can range from inappropriate conversations to grooming for sexual exploitation. The dangers involved in such encounters cannot be overstated, as they expose children to manipulation, coercion, and potential harm. It is crucial for parents, educators, and law enforcement agencies to remain vigilant and take active steps to protect children from these dangerous online engagements.

Surge in Reports of Child Sexual Abuse Material (CSAM)

The statistics from the National Center for Missing and Exploited Children (NCMEC) paint a distressing picture. Over the past five years, NCMEC has witnessed a staggering 329% increase in reported CSAM files. In 2022 alone, they received a shocking 88.3 million CSAM files. These alarming numbers underscore the urgent need for concerted efforts by tech companies, law enforcement, and policymakers to combat the proliferation of child sexual exploitation material.

Novel Technologies Used by Online Predators

Online predators are continuously evolving their tactics to ensnare vulnerable children. One concerning development is the deployment of chatbots to scale their enticement. These chatbots simulate real conversations, targeting unsuspecting children and luring them into dangerous situations. The scalability and effectiveness of these tactics pose a significant challenge, necessitating innovative solutions to counteract and neutralize these threats.

Rise in Reports of Online Enticement

The NCMEC report also reveals an alarming 82% increase in reports of online enticement of children for sexual acts between 2021 and 2022. This surge in predatory behavior further emphasizes the pressing need for enhanced preventive measures and decisive action to protect children online. Efforts must focus not only on identifying and apprehending predators but also on empowering children with the knowledge and skills to recognize and respond to potential threats effectively.

The Importance of Hashing and Matching Technology

In the fight against online exploitation, hashing and matching technology plays a crucial role. Tech companies can leverage this technology to protect users and platforms by identifying and blocking known CSAM (Child Sexual Abuse Material) hash values. With the ability to compare uploaded content against a comprehensive database of known CSAM hashes, potential instances of exploitation can be flagged and addressed proactively. This technology serves as a critical tool in preventing the dissemination and re-victimization of children through the online sharing of explicit material.

Safer: A Proactive Tool for CSAM Detection

Thorn’s Safer is a remarkable tool designed to proactively detect CSAM by providing access to a vast database aggregating over 29 million known CSAM hash values. By automatically scanning and comparing uploaded content against this extensive repository, Safer can swiftly identify and flag potentially harmful material. This technology offers a powerful resource for tech companies, law enforcement agencies, and other stakeholders committed to combating the exploitation of children online.

The rise in self-generated CSAM and risky online interactions with adults highlights the urgent need for heightened awareness, intervention, and preventive measures to protect children in the digital realm. The alarming increase in reports of CSAM and online enticement further underscores the necessity for multi-stakeholder collaboration and decisive action. Harnessing the potential of innovative technologies and tools like hashing and matching, as demonstrated by Safer, can pave the way for safer online spaces for children. It is our collective responsibility to prioritize the well-being and safeguard the innocence of our children by effectively addressing and combating these growing online risks.

Explore more

How Companies Can Fix the 2026 AI Customer Experience Crisis

The frustration of spending twenty minutes trapped in a digital labyrinth only to have a chatbot claim it does not understand basic English has become the defining failure of modern corporate strategy. When a customer navigates a complex self-service menu only to be told the system lacks the capacity to assist, the immediate consequence is not merely annoyance; it is

Customer Experience Must Shift From Philosophy to Operations

The decorative posters that once adorned corporate hallways with platitudes about customer-centricity are finally being replaced by the cold, hard reality of operational spreadsheets and real-time performance data. This paradox suggests a grim reality for modern business leaders: the traditional approach to customer experience isn’t just stalled; it is actively failing to meet the demands of a high-stakes economy. Organizations

Strategies and Tools for the 2026 DevSecOps Landscape

The persistent tension between rapid software deployment and the necessity for impenetrable security protocols has fundamentally reshaped how digital architectures are constructed and maintained within the contemporary technological environment. As organizations grapple with the reality of constant delivery cycles, the old ways of protecting data and infrastructure are proving insufficient. In the current era, where the gap between code commit

Observability Transforms Continuous Testing in Cloud DevOps

Software engineering teams often wake up to the harsh reality that a pristine green dashboard in the staging environment offers zero protection against a catastrophic failure in the live production cloud. This disconnect represents a fundamental shift in the digital landscape where the “it worked in staging” excuse has become a relic of a simpler era. Despite a suite of

The Shift From Account-Based to Agent-Based Marketing

Modern B2B procurement cycles are no longer initiated by human executives browsing LinkedIn or attending trade shows but by autonomous digital researchers that process millions of data points in seconds. These digital intermediaries act as tireless gatekeepers, sifting through white papers, technical documentation, and peer reviews long before a human decision-maker ever sees a branded slide deck. The transition from