Is Your Child Secretly Being Threatened Online? A Parent’s Guide to Fighting Sextortion

It’s a scenario that’s become a silent nightmare in homes across the country. A teenager, maybe your own, is on their phone, smiling at messages that pop up. But in a matter of hours, that smile can turn to panic and terror. This isn’t just online drama; it’s a dangerous and sometimes deadly criminal scheme called “sextortion,” and it’s increasingly targeting teens where they feel safest: their phone’s text messages.

Tragic stories, like those of Elijah Heacock, David Gonzalez Jr., and Jack Sullivan, highlight a devastating reality. These boys were victims of sophisticated scams that ended in the worst possible way, leaving their families shattered and asking what they could have done.

AI Generated Image

Many parents are unaware of the specifics of this threat, and most teens are too ashamed or scared to speak up. This guide is meant to arm you, as a parent, with the knowledge to understand this threat, the tools to protect your children, and a plan of action if the unthinkable happens.

Understanding the Predator’s Playbook

Sextortion isn’t a random, clumsy attack. It’s a calculated scheme with a clear pattern. Here’s how criminals, often from overseas, execute their plan:

  1. The Approach: Scammers pose as teenage girls, often using social media platforms like Instagram or apps such as Wizz to make initial contact with teen boys. They befriend the target, building a quick and seemingly innocent rapport.
  2. Moving to a Private Space: The conversation quickly moves to a more private channel. Increasingly, criminals push to get a teen’s phone number to continue the chat on a texting app like Apple’s iMessage.
  3. The “Blue Bubble” Trust: For teens, an iMessage conversation (with its distinctive blue text bubbles) can feel more trustworthy and personal than a social media DM or a standard “green bubble” SMS text. Scammers exploit this misplaced trust.
  4. The Trap: The scammer sends explicit photos of a “girl” and pressures the boy to send one in return. Crucially, even if your child doesn’t send anything, the criminals may use AI to create a fake nude image of them.
  5. The Extortion: Once they have an image—real or fake—the friendly persona vanishes. It’s replaced by relentless threats to share the picture with the teen’s family and friends, whose names are often scraped from their social media profiles. Then come the demands for money, often for hundreds or even thousands of dollars.

What to Watch For: The Red Flags

Your child will likely be too afraid to tell you what’s happening. Look for these behavioral changes:

  • Sudden Secrecy and Anxiety: Is your child suddenly withdrawn, anxious, or irritable, especially concerning their phone?
  • Isolation: Are they avoiding friends and family?
  • Unusual Financial Distress: Are they suddenly desperate for money without a clear explanation or asking to use payment apps like Cash App?
  • Changes in Phone Habits: Are they either glued to their phone at all hours or avoiding it entirely?

Your Action Plan: Prevention and Response

You are not helpless. Your support and swift action can make all the difference.

Step 1: Prevention Through Open Conversation

This is your most powerful tool. You must talk to your kids about sextortion before it happens.

  • Name the Threat: Use the word “sextortion.” Explain the playbook so they recognize the red flags. Tell them scammers create fake AI images.
  • Create an “Amnesty” Policy: Promise them, and mean it, that they will never be in trouble for coming to you with a problem like this. Reassure them that your only goal is to protect them. As one grieving mother said, “If we knew then what we know now, we could have talked to him about it.”
  • Question “Online Friends”: Teach them to be skeptical of online “friends” who quickly ask for personal information or want to move to a private chat.

Step 2: Use the Tech Tools You Have

While scammers are moving to texting apps because they have fewer safeguards than social media platforms, there are still tools you can use.

Activate “Communication Safety”: On your child’s iPhone, you can enable a feature called “Communication Safety” through Family Sharing. It’s on by default for kids under 13, but you must manually enable it for older teens. This feature will blur nude images sent or received in the Messages app and present a warning, encouraging your child to talk to someone they trust. Google’s Messages app for Android has similar features.

Step 3: What to Do If It Happens

If you suspect your child is a victim, follow these steps immediately:

  1. Stay Calm and Reassure: Your child is the victim of a crime. Tell them you love them, they are not in trouble, and you will handle this together.
  2. Do NOT Pay: Paying the scammers will not make it stop. They will only demand more.
  3. Preserve Everything: Do not delete anything. Take screenshots of the conversations, the social media profiles, the phone numbers, and any payment requests. This is crucial evidence for law enforcement.
  4. Block and Report: Block the scammer on all platforms. Then, go to the social media app where the contact started (Instagram, Snapchat, etc.) and use their tools to report the user for harassment and exploitation.
  5. Contact the Authorities Immediately:

Your child’s trust in you is the ultimate defense. By fostering open communication and knowing how to respond, you can be the safe harbor they need to escape this terrifying storm.

What to Do If Your Child’s iPhone Got Lost or Stolen?

Losing a valuable item like an iPhone can be a distressing experience, especially when it belongs to your child. As a parent, it’s natural to worry about the potential consequences of a lost iPhone, such as unauthorized access to personal information or the loss of important data. However, it’s crucial to remain calm and take immediate action to increase the chances of recovering the device or protecting your child’s privacy. In this blog post, we will discuss the essential steps you should take if your child’s iPhone goes missing.

1. Stay Calm and Assess the Situation:

Panicking will not help the situation. Take a moment to gather your thoughts and assess the circumstances surrounding the loss. Ask your child when they last had the iPhone and if they remember any specific details that might assist in locating it. Remaining calm will enable you to think clearly and take appropriate actions.

2. Use the ‘Find My’ App:

Apple provides a powerful tool called the “Find My” app that can be used to track lost or stolen iPhones. Access this app on any other Apple device or use the iCloud website through a computer browser. Sign in with your child’s Apple ID and password and select the “Find iPhone” option. From there, you can view the device’s location on a map, play a sound to help locate it, lock the iPhone remotely, or even erase its contents to protect sensitive information.

3. Inform the School and Other Relevant Parties:

If your child’s iPhone was lost or misplaced at school or during extracurricular activities, inform the relevant authorities, such as the school administration or activity organizers. They may have a lost and found department where the device could potentially be turned in. Providing them with all the necessary details can help in the search process.

4. Report the Loss:

Contact your local law enforcement agency to report the lost iPhone. Provide them with any relevant information, such as the device’s serial number, IMEI number (found on the original box or in the device settings), and a description of the device. While the chances of immediate recovery may be very low, having an official record can be helpful to protect your family if the stolen iPhone is used for illegal activities.

5. Inform the Mobile Service Provider:

Reach out to your child’s mobile service provider, inform them about the lost iPhone and request to deactivate the SIM card. They can help suspend or deactivate the device temporarily, preventing unauthorized use or changes to the account. Additionally, they might be able to assist you with tracking the phone or providing information on insurance or warranty coverage for lost or stolen devices.

6. Consider Remote Data Erasure:

If you are concerned about the sensitive information stored on your child’s iPhone falling into the wrong hands, and you have been unable to locate or recover the device, you may consider remotely erasing the data. This action will restore the iPhone to its factory settings and wipe out all personal information. 

To erase the phone remotely: Login to icloud.com and click ā€œFind Devicesā€, then select the stolen device. Click Erase iPhone to wipe all of the phone’s data remotely.

7. Change Passwords and Enable Two-Factor Authentication:

Encourage your child to change their Apple ID and other important passwords associated with the lost iPhone. This step will prevent unauthorized access to personal accounts, emails, social media, and other sensitive information. Enabling two-factor authentication adds an extra layer of security and ensures that even if someone has the device, they won’t be able to access your child’s accounts without a verification code.

8. Educate Your Child about Security Measures:

Use this incident as an opportunity to discuss the importance of responsible phone usage and the need to take precautions. Teach your child about the “Find My” app and other security features, such as setting strong passwords, using biometric authentication, and avoiding suspicious links or downloads. Emphasize the significance of reporting any loss or theft immediately to minimize the risks involved.

9. Take Preventive Measures:

To minimize the risk of losing a device in the future, take preventive measures. Set up strong passwords or biometric authentication methods on the iPhone to protect sensitive data. Encourage your child to be responsible for their belongings and emphasize the importance of keeping track of their device. 

Screen protector: To prevent thieves watching you typing the phone password, consider using a screen protector with a privacy filter.

Parental control: If you apply Screen Time parental controls to your child’s iPhone, a thief who gets your iPhone passcode would need a second passcode to change phone account. In Settings, go to Screen Time and scroll down to set a passcode (one different from iPhone’s). Then tap Content & Privacy Restrictions, enable that and scroll down to the Allow Changes section. Choose ā€œDon’t Allowā€ for passcode, account and cellular data.

Hide sensitive information: Some thieves have opened credit cards using victims’ Social Security information, which was found on the phone. Search the Notes and Photos apps and remove any sensitive data, such as photos of the passport.Ā 

Set debit-card limits: Thieves have linked debit cards stored in Apple Pay to Apple Cash to drain financial accounts. If your child has a debit card stored in Apple Pay, call your bank to lower the debit card’s daily purchase and withdrawal limits.Ā 

Conclusion:

Losing a child’s iPhone can be a distressing experience, but it’s important to stay calm and take immediate action. Utilize tools like the “Find My” app to track the phone, report the loss to the authorities and the service provider, change passwords, and educate your child about security measures. By following these steps, you can increase the chances of recovering the device or protecting your child’s privacy. Remember, it’s essential to prioritize your child’s safety and well-being throughout this process.

Stopping Human Trafficking Using Technology

There are few times I go like “Why didn’t I think of that?”, when I see a new mobile app. I got one of those moments when I saw “TraffickCam” mobile app which is available for both iOS and Android. The app uses crowdsourcing to stop the human trafficking.

What is human trafficking? It’s a modern day slavery.

Source: Unicef
Source: UNICEF

There it is, from UNICEF.

I wrote a non-fiction for the parents who are not technically-savvy to deal with many issues seriously worsened by the Internet. Human trafficking is one of those issues. The criminals use the Internet to kidnap and sell the children who have to go through unimaginable torture.Ā More thanĀ 300,000 American children and about 1.2 million children worldwide are trafficked each year.Ā Most of these children are aged between 12 and 14. “TraffickCam” app will help to catch the criminals if all of us work together.

Traffickers regularly post the pictures of their victims posed in hotel rooms for online advertisements. Yes, that’s happening more often than you think. There are websites right here in the United States that do it. “TraffickCam”Ā appĀ asks all the users to take the pictures of hotel rooms they stay in when they travel. When many travelers do this, that essentially creates a huge database of the images of various hotel rooms across U.S. and also the globe. This database can be used by law enforcement investigators to track the hotel room in which the children are locked up by the perpetrators. The app helps the investigators by analyzing the patterns of the carpet, furniture, lighting, windows, walls, etc., in the hotel rooms’ images and compare it with the images posted by the traffickers in the underground websites.

The app is free. Please download it and take the picture of hotel rooms when you travel next time.