🚨 Malicious Actor Threats

Real and present dangers: who targets youth online, how they operate, and what they're after.

⚠️ Parental Alert

The threats listed below are active and growing. Understanding them is the first step to protecting your family. Knowledge is power — not fear.

Types of Threats

Each card describes a category of threat actor or tactic. Tap or hover for details.

🗻

Sexual Predators & Grooming

Predators build trust over time through flattery, gifts, and emotional manipulation. They exploit social media DMs, gaming chats, and forums to isolate youth. Sextortion — threatening to release intimate images — is on the rise among teens and even pre-teens.

💻

Hackers & Exploitation

Hackers target personal accounts to exploit, blackmail, and harm — financially and emotionally. Compromised accounts can be used to impersonate a child, harvest contacts, or extort families. Weak passwords and lack of two-factor authentication make youth easy targets.

💳

Identity & Data Theft

Children's clean credit histories make them prime targets for identity theft. Personal data shared on social media, gaming profiles, and school accounts can be aggregated and sold. Victims often don't discover the damage until they apply for jobs or college.

🧠

Social Engineering & Psyops

Sophisticated psychological operations manipulate youth's beliefs, emotions, and behaviors. These can be carried out by individuals, groups, or even state actors. Techniques include fear-based messaging, manufactured outrage, and coordinated inauthentic behavior across platforms.

🤖

AI Fakes & AI-Driven Manipulation

Deepfake videos and voice-cloning technology can create convincing fake content of anyone. Bad actors use AI to generate fake conversations, manipulate images of minors, and create highly targeted phishing attempts. Children may not recognize synthetic content as fake.

🎭

Impersonation & Catfishing

Pretending to be someone a child trusts — a friend, teacher, pastor, or family member — is a common tactic. Compromised accounts make impersonation seamless. Youth may share sensitive information or agree to meet someone they believe they know.

😤

Cyberbullying, Doxxing & Stalking

Online harassment can follow a child 24/7 into their home. Doxxing (publishing private information) puts families at physical risk. Persistent bullying is linked to anxiety, depression, self-harm, and suicide in young people — know the behavioral warning signs to watch for.

🕷

Malware, Viruses & Keyloggers

Malicious software can be delivered through game mods, free downloads, email attachments, and compromised websites. Keyloggers silently record every keystroke — passwords, messages, and personal data. Some malware cannot be detected or removed by standard antivirus tools.

📈

Addictive & Polarizing Algorithms

Companies design algorithms to keep users polarized and addicted so they keep coming back to engage, can be targeted by ads, and have their data sold. Your youth are the product. These systems exploit psychological vulnerabilities and are specifically tuned to maximize engagement — regardless of the content's impact on mental health.

🔗

Organized Criminal Networks

Groups like the 764 Network represent an extreme and organized threat — coordinating abuse, blackmail, and even violence against minors at scale. Over 2,000 extreme cases of abuse and death have been linked to such networks. They recruit through Discord, Telegram, and gaming platforms, often targeting vulnerable and isolated youth.

💥

Radicalization & Extremist Recruitment

Extremist groups — ideological, political, and religious — actively recruit youth using a grooming-like pipeline. They target isolated, vulnerable teens through gaming communities, forums, and social media. Recruitment begins with relatable content and a sense of belonging, then gradually escalates toward extreme beliefs and real-world action.

💰

Scammers & Financial Fraud

Fake giveaways, influencer scams, crypto schemes, romance scams, and fraudulent "scholarship" offers target teens who voluntarily hand over money or personal information. No hacking required — just deception. As youth gain access to payment apps and digital wallets, they become increasingly attractive targets for financial fraud.


What You Can Do Right Now

  • 🔐
    Secure all accounts with strong, unique passwords and two-factor authentication. See our Online Controls guide for specific tools and steps.
  • 💬
    Talk to your children about these threats in age-appropriate ways. Open dialogue is the strongest defense. Our Guidance page provides faith-based principles and conversation starters for parents.
  • 🔍
    Monitor online activity regularly. Review friend lists, app installs, and messaging platforms. Our age-based recommendations outline exactly what to look for at each stage of your child's development.
  • 🚨
    Report suspicious activity immediately to the platform, your local law enforcement, and the National Center for Missing & Exploited Children (NCMEC) CyberTipline.
  • 📖
    Educate yourself continuously. Threats evolve quickly — visit our Resources page for up-to-date materials.