: Predators use social media, gaming platforms, and messaging apps to build trust with teens. They may use "catfishing" (creating fake identities) or "sextortion" (threatening to leak explicit images) to maintain control.
: Research indicates that youth in foster care or those experiencing conflict at home are at higher risk. A lack of strong social support networks makes teenagers more susceptible to groups—including gangs or extremist organizations—that offer a false sense of belonging. exploited white teens
The consequences of exploitation are severe and long-lasting, often affecting individuals well into adulthood: : Predators use social media, gaming platforms, and
Exploitation rarely happens in isolation. It is often the result of a combination of personal and systemic vulnerabilities: : Predators use social media
: Predators use social media, gaming platforms, and messaging apps to build trust with teens. They may use "catfishing" (creating fake identities) or "sextortion" (threatening to leak explicit images) to maintain control.
: Research indicates that youth in foster care or those experiencing conflict at home are at higher risk. A lack of strong social support networks makes teenagers more susceptible to groups—including gangs or extremist organizations—that offer a false sense of belonging.
The consequences of exploitation are severe and long-lasting, often affecting individuals well into adulthood:
Exploitation rarely happens in isolation. It is often the result of a combination of personal and systemic vulnerabilities: