EXPLOITATION VECTORS (Click to Expand)

Exploitation is defined as "the act of using someone or something unfairly for one's own advantage or gratification." This page categorizes the primary vectors through which children are exploited online. The following vectors represent the most common and emerging methods of online child exploitation. Click on each to explore detailed information, case studies, and statistics. In practice, perpetrators often combine multiple vectors simultaneously.

Grooming

The process of building trust and emotional connection with a child to facilitate exploitation. Groomers often pose as peers, use manipulation tactics, and gradually escalate inappropriate behavior. Reports of online enticement increased by 322% between 2019–2023, with 40% of children online reporting grooming attempts.

Sextortion

The use of threats, coercion, or blackmail to force children into producing sexual content or engaging in sexual acts. Sextortion reports to the FBI increased 1,050% between 2021 and 2023. 91% of victims are boys aged 14–17, and 70% of cases originate from organized groups operating outside the U.S.

CSAM (Child Sexual Abuse Material)

The production, distribution, and possession of sexually explicit material involving minors. NCMEC received over 20.5 million CyberTipline reports in 2024, averaging more than 50,000 per day. 1 in 3 CSAM victims in 2023 were between ages 7–10, and 79% of imagery of this age group was self-generated via webcam or phone.

AI-Generated Child Abuse Material (AI-CSAM)

An emerging threat where artificial intelligence is used to generate realistic sexual imagery of children. AI-generated CSAM reports rose from 4,700 in 2023 to 67,000 in 2024—a 10× increase. Over 50 AI tools can generate child sexual abuse imagery with no safeguards, and 1 in 4 law enforcement agencies report encountering AI-CSAM in current cases.

Online Luring and Social Engineering

The use of deception, manipulation, and psychological tactics to lure children into exploitative situations. Instagram, Snapchat, and Facebook were used in more than 70% of online solicitation cases involving minors. 95% of grooming victims did not report it immediately because the offender gained trust or threatened them.

Criminal Networks and Trafficking

Organized criminal groups that facilitate, finance, or coordinate child exploitation through online platforms and networks. These networks often operate across multiple jurisdictions, use sophisticated technology to evade detection, and may involve hundreds of perpetrators targeting thousands of victims.

Statistics and Data

Comprehensive statistics, trends, and data analysis across all exploitation vectors. Includes reports from NCMEC, Thorn, IWF, and other research organizations.

Important Context

It is critical to understand that while exploitation can be conducted through online mediums, this is not always the case. However, exploitation committed in person can often be detected, attributed, and ultimately prosecuted through evidence found in online activity.

The digital footprint left by perpetrators—whether through file-sharing networks, encrypted communications, or cloud storage—has become a crucial tool for investigations. The case study below illustrates this point.

TW: The following case study contains graphic content.

During an interview with law enforcement, Bleyle compared the number of victims [children] he r---d to the number of snowflakes in a snowfall. Bleyle was caught by investigators not due to reports by hospital staff or victims, or to a CyberTip; he was caught by an investigation of his use of a P2P file-sharing program.

Source: Child Exploitation on P2P File-Sharing Apps - Increasing the Efficacy of Investigations of Online Child Sexual Exploitation, pg 51

Research Notes

These vectors are not mutually exclusive. Perpetrators frequently combine multiple methods:

  • Grooming often precedes sextortion or CSAM production
  • Social engineering tactics are used across all vectors
  • Criminal networks may coordinate multiple exploitation methods simultaneously
  • AI-generated content is increasingly used to facilitate grooming and extortion

Understanding the interconnected nature of these vectors is essential for developing comprehensive prevention, detection, and intervention strategies.