$0 5 Things Rescue Workers Wish Parents Would Stop Teaching Their Kids

How to Prevent Online Predators from Targeting Your Child

Online predators don't look the way most parents imagine. They don't send unsolicited explicit messages to strangers. They build relationships — over weeks, sometimes months — before the harm begins. Understanding how the process actually works is the most important thing you can do to protect your child, because no parental control in the world catches behaviour your child doesn't recognise as a problem.

How Online Grooming Actually Works

Grooming is the process by which an adult builds trust with a child (and often with the child's family) in order to create opportunities for exploitation. The National Center for Missing and Exploited Children (NCMEC) processed 20.5 million reports of suspected child sexual exploitation in 2024, analysing over 62.9 million files. The vast majority of those cases began not with a stranger sending threatening messages, but with a seemingly friendly relationship.

The grooming process typically follows a predictable pattern:

Stage 1: Target and access. The predator identifies a child on a platform where children are active — gaming communities, fan forums, Discord servers, Instagram comments, TikTok. They look for children who seem isolated, who post frequently, who respond enthusiastically to compliments, or who express family conflict. The targeting is patient and methodical.

Stage 2: Building the relationship. Contact begins with normal, friendly interaction. Shared interests in games, shows, or hobbies. The adult presents as a peer or slightly older, cooler friend. They are consistently positive, validating, and attentive — often in ways the child's real social environment is not.

Stage 3: Isolation. The adult works to reduce outside oversight. They encourage the child to move to a more private platform (from public comments to DMs to WhatsApp or Discord). They position parents as the enemy: "your parents wouldn't understand," "this is between us," "they'd overreact if they knew." They may introduce the idea of keeping the friendship secret.

Stage 4: Desensitisation. Sexual topics are introduced gradually — jokes, questions, observations — to normalise them before any explicit requests are made. Children who have not been taught what grooming looks like often rationalise each individual step as harmless.

Stage 5: Exploitation. By the time explicit requests arrive — for photos, for meetings — the child has often been isolated from the parent as a resource, has kept the relationship secret for long enough that they feel complicit, and has been conditioned to feel that the adult relationship is genuinely important or caring.

The Financial Sextortion Variant

NCMEC recorded close to 100 reports per day of financial sextortion targeting minors — a variant where a child is manipulated into sending explicit images and then threatened with public exposure unless they pay money. This crime has driven dozens of minors to suicide since 2021. The victims are disproportionately boys aged 14–17, targeted through Instagram and Snapchat by organised criminal networks, often operating internationally.

Children need to know this exists by name before they encounter it. A child who has never heard the word "sextortion" does not have a mental category for recognising it when it happens. A child who knows that this tactic exists, that it is a crime, that the material can be reported and removed, and that telling a parent is the fastest path to resolution — that child has a measurably better chance of stopping the harm early.

In the UK, over 9,600 grooming attempts were flagged in just a six-month period, according to law enforcement and tech companies. In Australia and New Zealand, the Australian Centre to Counter Child Exploitation (ACCCE) reports consistent year-on-year increases. This is a global issue.

What "E-Safety" Actually Means

E-safety (electronic safety, also called online safety or digital safety) refers to the practical knowledge and behaviours that protect children in digital environments. It covers three interlocking areas:

Contact risks: Exposure to adults who want to exploit, groom, or harm children. Content risks: Exposure to harmful, violent, or age-inappropriate material. Conduct risks: Behaviour by the child themselves — sharing personal information, participating in cyberbullying, sending images — that creates risk.

Most parental control systems address content risks reasonably well. Contact risks and conduct risks require education, not just technical barriers.

Free Download

Get the 5 Things Rescue Workers Wish Parents Would Stop Teaching Their Kids

Everything in this article as a printable checklist — plus action plans and reference guides you can start using today.

Why Online Safety Education Matters More Than Control

The research on surveillance-heavy parenting approaches consistently shows a specific failure mode: children who know their parents will confiscate devices or impose severe punishments for online incidents stop reporting those incidents. The grooming and sextortion cases that escalate most severely are almost always the ones where the child hid the situation longest. They hid it because they feared the parental response more than they trusted it.

This is not an argument against rules. It's an argument for building a reporting relationship alongside the rules. The most protective thing a parent can do is establish, explicitly and repeatedly, that no disclosure will result in punishment. The behaviour gets addressed; the communication channel stays open.

Practical Prevention Steps

Teach grooming warning signs directly. Children as young as 8–9 can understand that adults online sometimes pretend to be kids, and that certain behaviours are warning signs: asking to keep the friendship secret, asking for photos, offering gifts or money, moving conversations away from a main platform. These are not subtle — but children who haven't been taught to recognise them often don't.

Establish the "tricky adult" rule. A safe adult online will not ask a child to keep a friendship secret from their parents. Will not ask for photos. Will not offer money. If any of those happen, the conversation stops and the child tells a parent immediately — with no punishment for disclosure.

Review privacy settings together. On every platform your child uses, set accounts to private. Disable location sharing. Turn off features that allow strangers to initiate contact. Do this as a family activity, not as a confiscation exercise, so your child understands the reasoning rather than resenting the restriction.

Keep the conversation open. Monthly check-ins — "anything weird happen online this month?" — normalise the conversation and lower the activation energy for disclosure. Children who are regularly asked are more likely to tell.

Know which platforms your child uses. Not generally ("they're online a lot") but specifically — which apps, which communities, which usernames. You cannot monitor something you don't know exists.

Have the sextortion conversation. For children aged 12 and over: tell them explicitly that some people online use tricks to obtain explicit photos and then threaten to share them. Make clear that if this ever happens, the answer is to stop responding and tell a parent immediately. The material can be reported and removed. They will not be punished. Emphasise that the crime is being committed by the other person, not by them.

For a complete guide to online safety education — including the age-specific conversations to have, warning sign checklists, a family safety agreement, and the offline safety protocols that complement the digital framework — the Child Safety Action Kit covers it all in one structured system.

Get Your Free 5 Things Rescue Workers Wish Parents Would Stop Teaching Their Kids

Download the 5 Things Rescue Workers Wish Parents Would Stop Teaching Their Kids — a printable guide with checklists, scripts, and action plans you can start using today.

Learn More →