Engagement, Entrapment, and Abduction

ENGAGEMENT

Social media is typically the first place a stranger looks to groom children to abduct them to harm or traffick them via social media, on smartphones, predators and traffickers typically steal an identity of a child similar in age, and post as a peer.

ABDUCTION

It’s usually just a matter of time before the predator or trafficker will ask your child to meet them after school, or during recess or lunch with the intention to abduct, molest, or traffick them.

ENTRAPMENT

Often, a predator or trafficker will move the conversation to more meaningful topics, so they can gain your child’s trust in an attempt to obtain other means of communication, like SMS or an internet chat room.

In an internet chat room, a perpetrator moves to gain a deeper relationship, then maneuvers to manipulate and control your innocent and unsuspecting child. This is where they ask for your child’s address, phone number, and other means of contact. Predators and traffickers will often ask to trade nude photos or request to see photos of your child without clothes. They often send photos of what appears to be a peer of your child without clothes on to manipulate and con your child into sending one as well.