Start with tactics, not mythology
When people ask why child predators do what they do, the safest useful answer is to look at the methods they actually use. Official child-protection materials focus on enticement, coercion, grooming, secrecy, and exploitation of access. That is more practical than pretending there is one simple psychological profile that explains every offender.
What grooming often looks like
Grooming can include attention, gifts, flattery, private messaging, sexualized jokes, testing boundaries, normalizing secrecy, isolating the child from protective adults, and using shame as glue once the child is trapped. In sextortion cases, the pattern often shifts fast: what starts as attention becomes pressure, threats, or blackmail to produce more images or stay silent.
What adults can do
Adults do not need to become digital police robots. They do need to become hard-to-bypass anchors. That means device check-ins, clear rules about secrecy, open conversations about manipulation, fast belief when a child reports discomfort, and strong supervision in youth-serving settings. Prevention works better when adults build safe environments before a crisis, not just after one.
Related reading
Read our CSAM article for the federal-law side, and our foster-care education article for why school stability and adult connection are also protective.
Official sources
- DOJ: Sextortion, Crowdsourcing, Enticement, and Coercion
- DOJ: Child Exploitation Subject Matter Expert Reports
- CDC: About Child Sexual Abuse
- CDC: Preventing Child Sexual Abuse in Youth-Serving Organizations