Index/Topics/AI-generated imagery

AI-generated imagery

The use of AI-generated imagery in fabricating news stories.

Fact-Checks

7 results
Jan 16, 2026
Most Viewed

Child erotica versus csam

Child Sexual Abuse Material (CSAM) is the industry-preferred term for media that depicts the sexual abuse or exploitation of minors, replacing the older legal label “child pornography” because it bett...

Jan 9, 2026
Most Viewed

how is csam downloading detected and is it always pursued

Detection of CSAM downloading on platforms relies predominantly on automated matching and content analysis: companies use hashing systems to flag known files and machine-learning tools to surface nove...

Jan 22, 2026
Most Viewed

How have other platforms handled reporting and takedown of AI-generated sexual imagery, and what best practices exist?

Platforms’ responses to have ranged from ad hoc to hurried creation of notice-and-removal systems under legal pressure, but enforcement remains uneven and contested; new U.S. law — the — now forces co...

Feb 4, 2026

What were the circumstances surrounding Karoline Leavitt's alleged verbal attack on Joan Baez?

Social-media posts and thinly sourced websites in October 2025 circulated a dramatic account that verbally attacked on live television and that Baez later sued Leavitt for $50 million; multiple fact-c...

Jan 23, 2026

Why aren't some CSAM offenders detected and investigated?

Some offenders go undetected or uninvestigated because an explosive, global flow of reports overwhelms limited investigative capacity, while technical, legal and cross-border barriers let sophisticate...

Jan 21, 2026

What are common prosecutorial diversion or treatment options for first-time CSAM viewers?

First-time viewers of child sexual abuse material (CSAM) can face a spectrum of prosecutorial responses that ranges from aggressive charging and plea bargaining to proposals for non-carceral diversion...

Jan 6, 2026

why would a file host still have csam up after i reported it?

A file host can still show CSAM after a report for several mundane and structural reasons: notification and verification delays, jurisdictional or hosting-chain complexities, technical limits in detec...