Online predator — two phones, notification alerts
Module 02 of 06

How Grooming Actually Works

"It didn't look like danger. It looked like a friend."

Learning Objectives — By the end of this module, you will:

Sarah sat across from the school counselor with a printout she'd made the night before — a list of the messages, the username, the dates. She'd printed it because she wasn't sure she could say the words out loud.

The counselor read through it slowly. Then she looked up and said something Sarah hadn't expected: "This is a textbook case. Every one of these messages follows a pattern. He knew exactly what he was doing."

Sarah had been blaming herself for two weeks — for not seeing it sooner, for letting Lily have the tablet in her room. What she learned that day changed her entire frame. This wasn't random. It wasn't bad luck. It was a deliberate, practiced process. And once you understand the process, you can see it coming.

The 6-Stage Grooming Model

Every child exploitation case follows a recognizable progression. Predators aren't improvising — they're executing a process refined over years of practice. Understanding the stages lets you recognize the warning signs at each step, often long before a child realizes something is wrong.

1Stage
Targeting
Predators search deliberately for vulnerable children — kids who seem lonely, mention parental conflict, post at odd hours, or engage eagerly with strangers online. They scan public profiles, gaming lobbies, and comment sections. Your child doesn't need to do anything wrong to be targeted. They just need to be visible.
2Stage
Building Trust
Initial contact feels completely harmless — shared interests, compliments, asking about the child's life. Predators are expert listeners. They mirror the child's personality, remember details, and make the child feel uniquely seen and understood. This stage can last days or months. It feels like friendship.
3Stage
Fulfilling Needs
Once trust exists, the predator becomes a reliable source of what the child wants — emotional validation, gaming credits, gift cards, advice, someone who "gets it" when parents don't. This creates dependency. The child begins to protect the relationship without realizing why.
4Stage
Isolation
Gradually, the predator wedges the child away from trusted adults. "Don't tell your mom — she'll overreact." "Your parents don't understand you like I do." "This is our friendship, not theirs." The child begins keeping secrets not out of guilt, but out of loyalty to the relationship.
5Stage
Desensitization
Sexual topics are introduced incrementally — jokes, then questions, then images, then explicit requests. Each step is small enough that the child doesn't recognize the escalation. By the time explicit requests arrive, the child has been conditioned to receive them as normal within the relationship.
6Stage
Exploitation & Maintenance
Explicit images, in-person meetings, or sextortion begins. If the child tries to pull back, the predator uses blackmail, guilt, or fear to maintain control. The child is often too ashamed to tell anyone. 70% of identified child sexual abuse images in recent years were self-generated during exactly this stage.
Key Insight

Grooming doesn't always take weeks. It can happen in a single conversation. FBI data shows predators sometimes move from initial contact to explicit requests within hours when targeting particularly vulnerable children. Speed is a warning sign in itself.

What It Looks Like From Your Side

You won't see the messages. What you will see is your child's behavior shifting. These changes can be subtle — and they're easy to dismiss as "just being a teenager." That's exactly what makes them dangerous.

⚠ Behavioral Warning Signs — Take These Seriously

None of these signs alone is proof of grooming. All children go through phases of privacy and moodiness. What matters is clusters of change happening together, especially if they coincide with increased online activity and new contacts.

Module Video The Grooming Timeline Runway AI · 10 sec
A visualization of how predator contact escalates from Day 0 through Day 21. The chat bubbles represent real message pattern progression — friendly, then frequent, then insistent.
Module Assignment
Assignment 02 · Warning Signs Checklist
Have You Seen Any of These in the Last 30 Days?
Be honest. This is private. No wrong answers — only information.

Check every warning sign you've observed in your child in the past 30 days. You may be noticing things you haven't had a name for until now.

Your Assessment

Important: If you checked 3 or more warning signs, don't wait. Proceed through this course but also reach out to your child's school counselor or contact the AHA Foundation directly at info@theproudfootgroup.com.

Complete the warning signs assessment above to unlock Module 3.

Module 1
Module 2 of 6
Module 3: The Conversation