Online grooming is a systematic process, not a spontaneous crime. Groomers identify vulnerable targets on social media and gaming platforms, build relationships over weeks or months, introduce sexual topics gradually, and ultimately exploit the trust they have built to obtain intimate images or meet in person. With minors, the obtained images are frequently used for sextortion — threatening to share them unless the victim provides more. With adults, grooming can facilitate relationship-based NCII (images obtained during a relationship that are later shared). Recognizing grooming behavior is critical for prevention.

Key facts about this term

  1. Grooming is a process, not a single event Perpetrators typically spend weeks or months building trust before introducing sexual elements. The gradual escalation is designed to normalize exploitation and create dependency.
  2. Gaming platforms, social media, and messaging apps are common grooming environments Groomers target platforms where minors spend time. Parental monitoring of online relationships — particularly with unknown adults — is important for child protection.
  3. Intimate images obtained through grooming are still NCII Images shared 'consensually' during a groomed relationship — particularly involving minors — are covered by NCII law. A minor cannot provide valid consent to intimate image creation or sharing.

Frequently asked questions

What are warning signs of online grooming?

Warning signs include: an unknown adult showing intense personal interest; gift-giving or offering privileges; encouraging secrecy; gradually introducing sexual topics; and pressuring for photos or in-person meetings.

Where do I report suspected grooming?

Report to the NCMEC CyberTipline at cybertipline.org, the FBI's IC3 at ic3.gov, and local law enforcement. If a child is in immediate danger, call 911.