The basic shape of online grooming
Almost every documented case of online grooming follows the same six-stage arc. First, target selection: a predator scans for vulnerable children — those posting about loneliness, family problems, mental-health struggles, or interest in a specific niche where the predator can pose as a trusted insider. Second, friendship formation: heavy attention, gifts, validation, claims of unique understanding. Third, isolation: positioning the predator as the only one who really gets the child, encouraging secrecy from parents and other friends. Fourth, desensitisation: gradual normalisation of sexualised content or conversation, often framed as just-between-us jokes. Fifth, sexual contact: requests for images, video calls, or in-person meetings. Sixth, maintenance: threats, blackmail, or further isolation to keep the child silent. The first three stages can take weeks or months and look superficially like a normal close friendship.
Stage one — target selection
Predators look for visible signs of need. A teen posting song lyrics about depression, a kid talking about a new step-parent they hate, a child posting in a fandom forum about how their friends don’t understand them. Teach your child that public posts about emotional states are not just visible to friends — they are visible to people who specifically search for that signal. This is not a reason to forbid emotional posting; it is a reason to talk about who is in the audience for it.
Stage two — friendship formation
The early grooming relationship feels intoxicating from the inside. The new contact is the most attentive person in your child’s life. They remember every detail. They send messages all day. They give compliments your child has never heard. They send small gifts, in-game items, gift cards. They are exactly the friend your child has been hoping to find. Several patterns distinguish grooming from a real new friendship: the relationship moves much faster than peer friendships normally do; the friend is older but claims to be much closer to your child’s age; the friend asks unusually personal questions early; the friend wants to move from the original platform to a more private one (Telegram is the current most common request) within a few weeks.
Stage three — isolation
The predator begins suggesting the friendship be kept private. Phrasings to listen for, all paraphrased from real cases: "your parents wouldn’t understand”, “your friends are jealous of how close we are”, “this is just for us”, “don’t tell anyone we talk”, “you’re the only one who gets me”. The child begins to choose this contact over real friends. School friendships start to fade. Family conversations become shorter. The child checks their phone constantly and reacts strongly when they cannot. The phone goes face-down on the table. Devices move from communal spaces to bedrooms.
Stage four — desensitisation
Sexualised conversation enters gradually, often as jokes, dares, or shared content from elsewhere. The predator tests the child’s reactions to mildly sexual material — adult memes, suggestive song lyrics, conversations about other people’s relationships. As the child becomes accustomed to these without the relationship breaking, the predator escalates. By the time explicit content or images are requested, the child has been gradually normalised over weeks and may not perceive the request as the rupture it is.
Stage five and six — escalation and control
Image requests, video calls with explicit content, requests to meet in person. Once intimate images have been sent, the predator usually pivots from friendship to control: threats to share the images with the child’s parents, friends, or school unless more images, money, or in-person meeting follows. This is sextortion — see our separate guide on it. The child enters the worst-feeling phase of grooming because they now believe they are responsible for what happened, which is exactly what the predator needs them to feel.
What to do if you see early-stage signs
Do not go through the child’s phone aggressively in the moment — almost guaranteed to break the trust you need to handle this. Open a conversation: “I noticed you’ve been talking a lot to someone called X. Tell me about them.” Listen for the patterns: how old, how did they meet, where do they live, has X asked to move to a different app, has X asked to keep the friendship private. If any of those answers raise the hair on your neck, slow down. Save screenshots. Talk to the platform’s safety team. If the contact is escalating, contact the police non-emergency line — they will refer to the cybercrime unit. In the U.S., reports go to the National Center for Missing & Exploited Children (NCMEC) and the FBI’s IC3.
How CalmKin helps
Grooming pattern detection is one of the things our language model is most carefully tuned for. We watch for the specific behavioural signature: rapid-intimacy escalation from a new contact, age-mismatch claims, requests to move to a private app, requests for secrecy from friends and family, and the early stages of sexualised conversation. We surface these patterns weeks before the relationship reaches the dangerous stage — when intervention is most likely to work and least costly to the child.
