‘The Five Stages a Predator Follows’: former Police Cyber Crimes detective shares the typical MO of an online predator

In a new excerpt from former cyber crimes detective Brett Lee’s book; Screen Resolution, he shares the process followed by online predators when they select and groom a victim. Based upon his experience.

Predators use techniques designed to break through the defences of even the best-trained children, and unfortunately, the nature of technology provides the perfect environment for them to achieve this.

Parents must be vigilant at all times in looking out for their children, both in the physical world and online. Knowing the five basic stages a predator follows will help in this.

Stage One — Identify a potential victim.

Selecting a child might involve viewing their Facebook profile picture. ‘That child is about ten, female, blonde…yep, that’s the type of child I would want.’ While some predators are less discriminate, they normally look for someone based on:

- Age

- Sex

- Location

- Build Features (e.g. hair colour).

Most predators require some form of profile when it comes to a victim, however slight, even opportunists. It might be a preference for boys over girls. Those who require no identification profile are the most dangerous. It broadens their threat level if they have no preference but just want access to any child at all.

Stage Two — Gather information about the child.

The predator delves into the child’s life, visiting sites where they can be found. They explore what the child looks like in different scenarios through their social network photos. This makes the child real. It brings them to life in the predator’s fantasies. The gathering of information satisfies two main requirements of the predator. Firstly, it makes the victim real in their minds, often heightening their illegal fantasy or activity. Secondly, it helps to determine in the predator’s mind whether a child who has drawn their attention is susceptible to being manipulated. Information collecting can include identifying the child and where they live. These details can be gathered not only from the online activity and communications with the potential victim but also from friends or contacts’ information.

Stage Three — Identify and begin to fill a need.

‘Ah, so that’s what they are missing — perfect!’ They take notice of what the child is talking about online and what is happening in their lives on the internet. A young girl might feel she is not as pretty as all her friends. Her low self-esteem is evident to the predator, who tunes into her self-deprecating communications, images, and posts. This gives the predator the green light they need to hone their attentions to this person. They take this opportunity to pose as a sixteen year old boy telling her she is the most beautiful girl that he has ever seen in his life, and that she is the answer to all his prayers. The predator’s strategy is to fill the need of the young person, to show full commitment to the child. The child’s natural defences can be down because of the false sense of security the internet gives. The gathering of information helps the predator begin conversations that interest the victim. They begin to form an online relationship. They establish trust, credibility, and rapport with their targeted victim. So often arrested predators confess how they were looking for an ‘in’ or a need. Predators look for young people who are dissatisfied with themselves and isolated from friends or family. Children who over sexualise themselves and readily share personal information with strangers. Children who try to portray themselves as being older or who act differently online than they would for their age in the physical world. Predators have confessed to me these behaviours indicate a need or that the child has low self-esteem. A child might indicate directly or indirectly they are from a broken family and there is no father in the home; they might need a father figure. Another child exploring self-harm might need a sympathetic shoulder to lean on. Perhaps a child and their parents are clashing in the home and an adult who finally understands is welcomed. Or a child is unhappy with their physical appearance — this covers most young people going through the pimples stage — and welcomes compliments on how beautiful they are. A predator does not need to be told what a child’s need might be. They can identify it by silently observing a child’s online activity and behaviour. They watch, wait, and prepare to capitalise. After pinpointing the child’s weakness, the predator is perfectly positioned to commit an offence through grooming, threats, blackmail, or intimidation. Predators often get aggressive if they discover a target victim talking to someone else on the internet. ‘Where have you been?’ they press. ‘Why have you taken so long to respond?’ They become possessive and jealous.

Stage Four — Desensitise the victim.

Lowering inhibitions is done by showing photos and videos and talking through inappropriate things online. ‘Now play through this, and in just a little bit, we’ll watch this,’ the victim is enticed. Other strategies a predator might use are, ‘You should meet me.’ Or, ‘We should do sexual things.’ ‘You’re going to be left out…All your friends are doing it, you may as well do it with me’ is a ploy that makes the victim feel left out and unimportant. Detectives are required to keep the computer running and the video rolling as offenders think they are performing their disgusting acts in front of young children. One of my colleagues used to keep sticky notes on hand and would paste one over the explicit parts so he did not have to see it all. Even after all this time, I cannot shake some of the more explicit and disturbing images I witnessed. As I engaged with these predators as an online detective, I felt the force of their persuasiveness, and it revolted me to know they thought they were destroying a child’s innocence. After viewing the depraved material predators expose a vulnerable young person to, it is inconceivable how damaging it would be on a developing child’s mind. It would not only desensitise or normalise depraved acts, but it could very easily leave a permanent imprint in a child’s memory. That is why this material should never be thought of as, ‘That’s just what children look at.’

Stage Five — Initiate abuse, often including trying to arrange a meeting in the real world.

The offender explores how far they can go in subjecting the child to further online abuse and may try to arrange a meeting in person.

Brett’s conversation starters to help reinforce the stranger danger message

1. Ask your kids what ‘friends’ they’ve made online. Younger kids are much more likely to divulge this information.

2. ‘How do you know this person is your age?’ - they’ll usually mention that they look young in their display photo, run the image through a Google reverse image search, here’s how. You may find that the image turns up on the social media page of another person.

3. ‘What do you and your online friends talk about’ - trust your gut, if any of their answers make you feel uncomfortable, it’s for good reason.

Managing cyber safety may seem daunting, but Family Zone and Brett are here to help. You can select Brett from Internet Safe Education as your Cyber Expert and he’ll provide tailored control settings for your family and ongoing advice for you on managing cyber safety and protecting your family from online risks.

You can purchase Brett's book: Screen Resolution from Amazon or click here.

Start your FREE Trial <https://www.familyzone.com/freetrial>

Topics: Parental Controls, Mobile Apps, Cyber Safety, grooming, online predators

    Try Family Zone for FREE

    Sign up now to try Family Zone for 1 month, totally free of charge.

    Free Trial
    Subscribe to our newsletter
    Follow us on social media
    Popular posts
    Parental Controls | Mobile Apps | Cyber Safety | teens on social media
    Can we talk? 100 questions your teen might actually answer
    Parental Controls | Screen time | youtube | smartphones | WhatsApp | suicide | self-harm | momo
    MOMO unmasked
    Parental Controls | Cyber Safety | Cyber Experts | parenting | roblox
    Roblox: What parents need to know about this popular gaming platform
    Parental Controls | Cyber Safety | tinder | Cyber Experts | parenting | yellow
    Yellow: The Tinder for Teens
    Parental Controls | Social Media | privacy | decoy app
    Hide It Pro: A decoy app to look out for
    Cyber Bullying | Parental Controls | Screen time | Mobile Apps | Cyber Safety | online predators | tiktok | paedophile | child predator | Likee
    LIKEE: What parents need to know about this risky TikTok wannabe

    Recent posts

    Press the reset button on your kid’s online routine

    COVID blew up our teens’ screen-time. It’s time to get them back on track. In the wake of the COVID pandemic, our children are facing a ...

    Bigger families face super-sized screen-time challenges

    If you have more than one child - and statistics show 86 percent of families do - then managing screen-time can be double trouble. Or ...

    'Bigorexia' a growing risk for today's boys

    We’re starting to understand how social media can damage girls’ self-esteem - but what about our boys? New research finds disturbing ...

    The metaverse: Brave new world - or an upgrade for predators?

    Mixing kids and adult strangers in a self-moderated online environment ... What could possibly go wrong?