The company said it was moving towards encryption as part of a drive to become a “privacy-focused” social network.
Last year, the US National Center for Missing and Exploited Children said 12 million of the more than 18 million reports of child abuse images it received in 2018 came from Messenger.
Mr Bailey said: “When you look at Facebook’s latest decision to end-to-end encrypt Facebook Messenger, they are simply turning around and saying: ‘Okay we’re not listening to you. We don’t care – privacy’s more important.’
“How can any reasonable person think that that is alright?”
The senior officer, who is also the Chief Constable of Norfolk Constabulary, said in the 1990s there had been less than 10,000 child abuse images in circulation online, whereas now the UK database had almost 14 million known images.
He added: “If I have one really significant regret around my leadership and our response to this, it’s the fact that we have struggled to land with the public the true scale of what we are dealing with [and] the horrors of what we are dealing with.
“I’d like to have thought that actually the Facebooks, the Microsofts, the Apples, the Googles of this world would had to have done something more than what they’ve currently done because, candidly, they are paying, in my opinion, lip service to the threat.
“They hold the key to so much of this. Their duty of care, I think, to children – they have completely absolved themselves of that.”
A spokesman for Facebook said: “Keeping young people safe on our platforms is our priority and our systems remove 99 percent of child abuse content before it’s reported to us.
“In addition to using technology to proactively detect grooming and prevent child sexual exploitation on our platforms, we work with child protection experts, including specialist law enforcement teams like CEOP in the UK.
“We are also investing in technology that detects patterns of harmful behaviour so that we can ban and report those responsible.
“We’re consulting closely with child safety experts and others on the best ways to implement safety measures before fully implementing end-to-end encryption.” ”