The TLDR

The greatest online risk to children is not a stranger in a chat room — it’s a groomer who presents as a peer first. The National Center for Missing & Exploited Children (NCMEC) received over 36 million reports of suspected child sexual exploitation in 2023. One in five children receives unwanted sexual solicitation online. The threat isn’t just on sketchy websites — it’s on Discord, TikTok, Roblox, Fortnite, Instagram, and Snapchat. The platforms your kids use every day are where predators operate, because that’s where children are.

The Reality

The Crimes Against Children Research Center data tells a different story than most parents expect:

Grooming Mechanics

The Grooming Cycle

Online grooming follows a documented pattern:

Stage 1 — Targeting: The predator identifies a vulnerable child. Indicators they look for: posting about loneliness, family conflict, low self-esteem, or looking for attention. Public social media profiles provide this information freely.

Stage 2 — Trust Building: The predator establishes rapport. They’re interested in the child’s problems. They’re supportive. They share “similar” experiences. On gaming platforms, this often starts with helping the child in-game — giving items, carrying them through difficult content, being the “cool older friend.”

Stage 3 — Filling a Need: The predator becomes an emotional resource the child depends on. For a lonely teenager, having someone who “gets them” and is always available is powerful. The relationship feels real and important to the child.

Stage 4 — Isolation: The predator moves communication to private channels — from a public Discord server to DMs, from Roblox to WhatsApp, from a game to Snapchat. They encourage the child to keep the relationship secret: “Your parents wouldn’t understand.”

Stage 5 — Desensitization: Gradual introduction of sexual content. It starts with “accidental” exposure — sharing adult memes, discussing sexual topics “as friends,” normalizing sexual conversations. The boundary erosion is gradual enough that the child doesn’t recognize the shift.

Stage 6 — Exploitation: Solicitation of images, video calls, or real-world meetings. By this point, the child is emotionally invested and may not recognize what’s happening as exploitation.

How Online Grooming Differs

In-person grooming requires physical proximity and carries higher risk for the predator. Online grooming can happen from anywhere, target multiple children simultaneously, and leaves the predator less exposed to detection. A single predator can groom dozens of children concurrently across different platforms.

Platform-Specific Risks

Discord

Discord is the default social platform for gaming communities and increasingly for general teenage social life. Its structure creates specific risks:

Gaming Platforms

TikTok

Snapchat and Instagram

CSAM — What Parents Need to Know

Child Sexual Abuse Material (CSAM) is a growing crisis. The NCMEC CyberTipline received 36.2 million reports in 2023.

Solicitation and Production

The most common scenario is not a predator secretly photographing a child. It’s a child being manipulated into producing images themselves — through grooming, through sextortion (threats of exposure), or through social pressure from peers.

AI-Generated CSAM

AI image generation tools have been used to create synthetic CSAM using non-sexual images of real children as reference material. This is a rapidly growing problem that NCMEC and the FBI have flagged as an emerging threat.

What to Do If You Find It

  1. Do not forward, copy, or share the material — possessing CSAM is a federal crime regardless of intent
  2. Report immediately to the NCMEC CyberTipline (online or call 1-800-843-5678)
  3. Report to the platform where it was found
  4. Contact local law enforcement if a child is in immediate danger
  5. Preserve evidence — don’t delete messages or conversations (screenshot without the imagery if possible), as these may be needed by law enforcement

Hidden Apps as Evidence

The Hidden Apps Protect guide covers detection. From a threat perspective:

Children may use hidden or disguised apps (calculator vaults, secret chat apps) to hide conversations with groomers. If you discover these on your child’s device:

  1. Do not immediately confront or destroy the evidence — this can compromise a law enforcement investigation
  2. Document what you find — take notes on app names and approximate dates
  3. Contact NCMEC or local law enforcement before taking action
  4. Talk to your child — but prioritize their safety and potential evidence preservation

Identity Theft of Children

A child’s Social Security Number is particularly valuable to identity thieves because:

The FTC recommends checking whether your child has a credit report (they shouldn’t). If a credit report exists, it likely means their SSN has been misused.

What You Can Do

Communication First

Technical controls matter, but the most effective defense is an ongoing, open conversation:

Platform-Specific Controls

Age-Appropriate Access

Not every platform is appropriate for every age:

If Your Child Is Being Exploited

  1. Believe them. Your reaction determines whether they’ll keep talking.
  2. Don’t blame them. The adult is always responsible. Always.
  3. Preserve evidence. Don’t delete messages or accounts.
  4. Report to NCMEC CyberTipline: missingkids.org/gethelpnow/cybertipline or 1-800-843-5678
  5. Contact local law enforcement.
  6. Get professional help. NCMEC can connect you with victim services.

Sources & Further Reading