It just gathers hashes without judging or interpreting. This is the first phase. When a child porn picture is discovered and inquired about, they just compare the hash of it with what they have on database and see who had that picture on their phone as well, allowing them to build a nicely timelined trace of it and even discover the first source.