top of page

What Every Parent Needs to Know About “The Com” Threat

  • Writer: Seek & Shield
    Seek & Shield
  • Sep 9
  • 4 min read

Protecting Kids from Online Predators: What Every Parent Needs to Know About “The Com” Threat


The FBI has issued an urgent warning: a cybercrime collective known as “The Com” is deliberately targeting young people ages 11–25 across gaming platforms, social media apps, and messaging services. Their reach is global, their tactics are ruthless, and their victims include everyday kids and teens who believed they were simply chatting with friends online.

At Seek & Shield, we believe that awareness + preparation is the strongest protection. This article breaks down what’s happening, what red flags parents must watch for, and how you can create layers of defense for your family.


Who (or What) Is “The Com”?

“The Com” isn’t a single person—it’s a network of online offenders working together in private forums and encrypted spaces. They lure, groom, and exploit kids for different reasons:


  • Money: extorting teens for cash or gift cards through sextortion.

  • Power: manipulating kids into harmful “challenges” or dares.

  • Sexual gratification: coercing kids into sharing explicit images or livestreaming abuse.

  • Notoriety: swatting, online hoaxes, or daring others into dangerous acts just for laughs or recognition.


The FBI estimates thousands of youth have been drawn into this ecosystem, often starting with a single “friend request” in a game or social app.


three  tween girls on a bed in their room each looking at their cell phone.

🎮 Where They’re Targeting Kids

Predators go where kids spend time. Today, that means:

  • Gaming platforms: Roblox, Fortnite, Minecraft, and Discord servers.

  • Social apps: Instagram, Snapchat, TikTok, and Kik.

  • Anonymous chat sites: Omegle-style platforms, often disguised as “teen hangouts.”

  • Messaging apps: WhatsApp, Telegram, and even built-in PlayStation/Xbox chat.

They rarely appear as “strangers.” Instead, they pose as peers or mentors—an older gamer, a new classmate, or even a fake romantic interest.


Teen girl by herself at home with her cell phone looking concerned

⚠️ Red Flags: Signs a Child May Be Targeted

Parents should watch for sudden shifts in behavior, secrecy, or digital activity, such as:


  • Withdrawing from family or friends without explanation.

  • Covering up arms/legs (possible self-harm scars).

  • Using slang or inside jokes from online groups they can’t explain.

  • Receiving gifts, money, or new gear from “friends” you’ve never met.

  • Sudden fear or panic when notifications pop up on their phone.

  • Unexplained injuries or talk of “challenges.”


🛡 What Parents Can Do — Layered Protection


1. Open Conversations (Without Judgment)


The biggest weapon predators use is secrecy. Kids keep things hidden when they fear punishment. Start every digital talk with reassurance:

“You won’t get in trouble for telling me if someone online made you uncomfortable. My job is to help keep you safe.”


2. Monitor Devices Wisely


Don’t just block apps—guide and monitor use. A few effective parental tools include:

  • Bark: monitors texts, email, and 30+ platforms; AI alerts parents to sextortion, bullying, or grooming attempts. (in our personal experience kids can bypass rules by turning off thier VPN to gain wider internet access, but you atleast get instant notification that they disrupted their monitoring so you can decide if you need to look into their activity further).

  • Qustodio: detailed activity reports, screen time controls, and web filtering.

  • Net Nanny: strong real-time blocking of porn, violence, or harmful content.

  • Apple Screen Time / Google Family Link: built-in, free parental controls every parent should learn to use.


Combine screen limits + monitoring alerts so you see problems before they spiral.


3. Teach Kids the “BST Rule”


At Seek & Shield, we teach kids this easy-to-remember rule:

  • Block the predator.

  • Screenshot any messages or images.

  • Tell a trusted adult right away.


Repetition makes it automatic—like stop, drop, and roll.


Teenage boy sitting on the floor against a couch with his [phone looking concerned.

4. Know the Predators’ Scripts


Offenders often use similar approaches. Teach kids to spot these:

  • Flattery: “You’re so mature/pretty/smart, you’re different from other kids.”

  • Secrecy: “Don’t tell your parents, they won’t understand.”

  • Guilt: “If you don’t do this, I’ll be upset/hurt.”

  • Threats: “If you don’t send more, I’ll share what you already sent.”


The earlier kids recognize these tactics, the faster they can shut them down.


birds eye view of parents and daughter on different technology devices at their kitchen table

5. Create a Family Tech Agreement


Instead of daily battles, create a written agreement that covers:


  • Screen time windows (school nights vs weekends).

  • Where phones live at night (charging station in the kitchen).

  • Which apps are allowed and which are off-limits.

  • Rules for adding new friends or joining private chats.


When rules are written down, they feel less like “mom nagging” and more like family standards.


-> If Your Child Has Been Contacted

  • Stay calm. Reassure them you’re glad they told you.

  • Save the evidence. Take screenshots, record usernames, and note times.

  • Report it. File a report with the NCMEC CyberTipline (CyberTipline.org or call the 24/7 hotline 1-800-THE-LOST (1-800-843-5678) and notify local law enforcement.

  • Block the offender. Remove them from all apps and games.

  • Seek support. Kids may feel shame or fear—counseling or support groups help them heal. (Emotional and survivor support (Team HOPE, therapy referrals) Contact: gethelp@ncmec.org or 1-877-446-2632 ext. 6117

    Services include peer support, family advocacy, legal help, and content removal assistance.


Final thoughts from our team


The rise of groups like “The Com” is a reminder that predators are no longer lurking in dark alleys—they’re in the devices our children use daily. But with awareness, open dialogue, monitoring tools, and clear boundaries, parents can shield their families from digital threats.


At Seek & Shield, we believe moms and dads are the first line of defense. Equip yourself, talk openly, and make safety part of your family’s everyday routine. Because a Shielded Family is a safer family.


If you need help looking into your child/teens spehere of influence drop us a line and we are here to help! (info@seekandshield.com)

 
 
 

Comments


bottom of page