If you are reading this, you probably just Googled “what is sextortion” because you heard the term on the news, a friend mentioned it at school pickup, or your child is acting differently and you cannot figure out why. Whatever brought you here, this guide gives you clear, actionable information so you can protect your child — and help them if something has already happened.

Sextortion is one of the fastest-growing online threats targeting children and teenagers. It is not a distant, abstract risk. The FBI has called it an escalating crisis, and the National Center for Missing & Exploited Children (NCMEC) has reported a dramatic increase in cases involving minors. This guide covers the sextortion meaning, how it works, the warning signs, how to report sextortion, and — most importantly — how to protect kids from sextortion before it happens. If your child is already affected, jump straight to sextortion what to do.


What Is Sextortion and How Does It Work?

Sextortion is a form of online blackmail in which someone threatens to share intimate, sexual, or compromising images of a person unless their demands are met. Those demands are usually more images, sexual acts over video, or money. When the target is a child, the predator almost always has a calculated playbook.

The typical pattern

Understanding how sextortion works is the first step toward preventing it. The process usually follows a recognizable pattern:

  1. Contact. The predator reaches out through social media, a gaming platform, or a messaging app. They often pose as an attractive peer — a teenager the same age as your child.
  2. Trust-building. Over days or weeks, they build a relationship through flattery, shared interests, and emotional support. To your child, this person feels like a genuine friend or romantic interest.
  3. Escalation. The conversation gradually becomes more personal and sexual. The predator may share fake intimate images first to normalize the exchange and pressure your child to reciprocate.
  4. The trap. Once the child shares a compromising image or video, the dynamic changes instantly. The predator reveals their true intent and begins making threats.
  5. Demands. The predator threatens to share the images with the child’s friends, family, or school unless the child sends more content or pays money. The cycle of exploitation continues.

In many cases involving minors, the predator is not a lone individual — they are part of organized criminal networks operating from overseas, running the same scheme on dozens or even hundreds of victims simultaneously. This is not about romance or relationships. It is a calculated crime.

Financial sextortion: a growing variant

A newer form of sextortion specifically targets teenage boys. Instead of demanding more images, these predators demand money — often through gift cards, cryptocurrency, or payment apps. The FBI has noted a sharp increase in financially motivated sextortion, with some victims losing thousands of dollars before telling anyone. The shame and fear of exposure keep victims paying, which is exactly what the predators count on.


How Common Is Sextortion? (Statistics Parents Need to Know)

Sextortion is not rare, and it is not something that only happens to other families. The numbers tell a sobering story:

Why these numbers matter: Many parents assume their child is not at risk because they are “too young” or “too smart.” Sextortion does not discriminate. Predators are skilled manipulators who exploit normal adolescent curiosity, loneliness, and trust. If your child has a phone and internet access, they are a potential target.

Where Sextortion Happens: Social Media, Gaming, and Messaging Apps

Sextortion can happen anywhere your child interacts with strangers online. But certain platforms appear more frequently in reported cases.

Social media

Snapchat is one of the most commonly cited platforms in sextortion cases involving minors. The disappearing-message feature creates a false sense of security — children believe their images cannot be saved. But screenshots, screen-recording apps, and external cameras make that belief dangerously wrong. Predators specifically exploit this misconception. If your child uses Snapchat, enabling parental controls and setting the account to private are essential first steps.

Instagram is another high-risk platform. Predators initiate contact through DMs, fake follow requests, or comments on public posts. Public profiles make it easy for strangers to find and target your child. Review your child’s Instagram privacy settings and ensure their account is set to private with restricted messaging from unknown contacts.

Gaming platforms

Online games with chat features — including Fortnite, Roblox, and Minecraft — are increasingly used as initial contact points. Predators join games, befriend children during gameplay, then move the conversation to a private messaging platform. Discord, widely used alongside gaming, is a common bridge between the gaming world and private, unmonitored conversations.

Messaging and dating apps

WhatsApp, Telegram, and other encrypted messaging apps are often where the exploitation itself happens, even if initial contact occurred elsewhere. Some teens also use dating apps despite age restrictions, putting themselves in direct contact with older individuals who may have predatory intent.

The platform matters less than the pattern. Predators go where children are. They adapt to new apps faster than most parents learn about them.


Warning Signs Your Child May Be a Victim

Children who are being sextorted almost never tell a parent on their own. The shame, fear, and confusion are overwhelming. But there are behavioral changes that can signal something is wrong.

Emotional and behavioral changes

Device-related changes

Other signals

No single sign confirms sextortion. But if you notice several of these changes happening together, trust your instinct. A calm, non-judgmental conversation is always the right first step.


AI Deepfakes and Nudify Apps: The New Sextortion Tool

There is a disturbing new dimension to sextortion that every parent needs to understand: your child does not need to share a single image for it to happen.

AI-powered “nudify” apps and deepfake generators can take a fully clothed photo — from a social media profile, a yearbook, or a group photo — and generate a realistic-looking nude image within seconds. These tools are widely available, often free, and require no technical skill to use. A classmate with a grudge, a stranger who found a public Instagram post, or a predator building leverage — any of them can create fabricated intimate images of your child.

The school impact

In recent years, schools across the United States, Spain, South Korea, and the UK have reported incidents where students used nudify apps to create and circulate fake nude images of classmates. In some cases, the images were shared in group chats with dozens of students before any adult became aware. The psychological harm to victims is severe and immediate — the images are fake, but the humiliation, social damage, and emotional trauma are real.

How predators use AI-generated images

Sextortion predators have begun using deepfakes as the initial leverage. Instead of tricking a child into sending a real image, they create a fake one and then threaten to distribute it unless the child complies with demands. The child, seeing a realistic-looking image of themselves, often believes there is no way out. Some predators combine real and AI-generated images to make it impossible for the victim to distinguish what is real from what is fabricated.

The legal landscape

Laws are struggling to keep pace with this technology. As of early 2026, several U.S. states have passed or proposed legislation specifically criminalizing AI-generated non-consensual intimate images, especially those involving minors. At the federal level, the DEFIANCE Act and TAKE IT DOWN Act have expanded legal protections. However, enforcement remains difficult when the tools are operated anonymously and often hosted overseas.

What parents can do about deepfakes


What to Do If Your Child Is Being Sextorted (Step-by-Step)

If you discover or suspect that your child is a victim of sextortion, the next few hours matter. Here is exactly what to do.

Step 1: Stay calm and listen.

Your first reaction sets the tone for everything that follows. If your child came to you, they are terrified. If you discovered it on your own, they may be even more afraid. Do not raise your voice. Do not express anger at them. Say: “I am glad you told me. This is not your fault. We are going to handle this together.”

Step 2: Do not engage with the predator.

Stop all communication immediately. Do not respond to threats, do not negotiate, and do not pay any money. Paying or complying with demands does not make the predator stop — it signals that the victim will keep complying, which escalates the abuse.

Step 3: Preserve evidence.

Do not delete messages, images, or accounts. Take screenshots of all threatening messages, the predator’s profile and username, any payment requests or transaction details, and timestamps. This evidence is critical for law enforcement investigation.

Step 4: Report to NCMEC.

File a report with the National Center for Missing & Exploited Children (NCMEC) through their CyberTipline at CyberTipline.org. NCMEC works directly with the FBI and can fast-track cases involving children.

Step 5: Report to law enforcement.

File a report with your local police department. If the case involves financial demands or organized criminal activity, also report to the FBI’s IC3 at ic3.gov. Bring your preserved evidence.

Step 6: Report the account on the platform.

Every major social media platform has a reporting mechanism for sextortion. Report the predator’s account on the platform where the exploitation happened. Platforms like Snapchat, Instagram, and Discord have specific categories for reporting sexual exploitation of minors.

Step 7: Get your child support.

Sextortion is a traumatic experience. Consider connecting your child with a therapist who specializes in adolescent trauma or online exploitation. The Crisis Text Line (text HOME to 741741) and the 988 Suicide & Crisis Lifeline are available 24/7 if your child is in acute distress.

If your child is in immediate danger or expressing thoughts of self-harm or suicide, call 911 or the 988 Suicide & Crisis Lifeline immediately. Sextortion-related suicides are a documented reality. Take every expression of hopelessness seriously.

How to Prevent Sextortion: Conversations and Settings

Prevention is built on two foundations: open communication and practical safeguards. Neither works alone.

The conversation that matters most

The single most important thing you can do to prevent sextortion is to have an ongoing, honest dialogue with your child about online risks. This is not a one-time lecture. It is a relationship dynamic where your child knows they can come to you without fear of punishment.

Key messages to communicate:

Privacy settings and digital boundaries

Conversations build the foundation, but practical settings provide an additional layer of protection:

What not to do

Surveillance without communication backfires. If your child discovers you have been secretly monitoring their accounts, you lose the trust that is your strongest protective tool. Transparency is essential. “I want to help keep you safe, so let’s set up these privacy settings together” is fundamentally different from secretly installing monitoring software.


Age-by-Age Prevention Guide (10–13, 14–17)

The conversation and protective measures should evolve as your child grows. What works for a 10-year-old will feel patronizing to a 16-year-old.

Ages 10–13: Building the foundation

This is when most children first gain access to a smartphone or social media account. They are curious, eager to connect with peers, and largely unaware of how predators operate. At this age, your approach should be protective with education.

Ages 14–17: Shifting to collaboration

Teenagers have more autonomy, more social media presence, and more exposure to situations where sextortion can occur. Direct control becomes less effective. Your approach should shift to collaborative safety.

Age-by-age sextortion prevention at a glance
Age Group Primary Approach Key Actions Conversation Focus
10–13 Protective with education Delay social media; review contacts; establish clear messaging rules; practice scenarios “Some people online trick kids. If anyone makes you uncomfortable, tell me.”
14–17 Collaborative safety Full sextortion education; consent discussions; platform reporting skills; open-door policy “If something happens, I will help you — not punish you. We handle it together.”

If your child is a victim of sextortion, there are established reporting channels and legal resources available. Knowing where to turn saves critical time.

Reporting organizations

Image removal resources

Crisis support

Legal protections

Sextortion is a federal crime. Under U.S. law, producing, distributing, or possessing sexual images of a minor is a felony regardless of the method used to obtain them. The PROTECT Act, the EARN IT Act, and recent state-level legislation have expanded the legal framework for prosecuting offenders. AI-generated intimate images of minors are increasingly covered under both existing child exploitation statutes and new deepfake-specific laws.

If you are unsure about legal options in your state, consult an attorney who specializes in cybercrime or contact NCMEC for guidance. Many legal aid organizations offer free consultations for families dealing with online exploitation of children.

A reminder for parents: In some jurisdictions, a minor who shares an intimate image of themselves could theoretically face legal consequences. This is a controversial area of law. If this concern arises, consult a lawyer immediately — and reassure your child that your priority is their safety, not legal technicalities.