Predators and scammers use the same psychological playbook. Understanding it is your first line of defence.
Beth Andress
Digital Self Defence & AI Governance Educator
"The scammer doesn't start with a request. They start with a relationship."
The word 'grooming' is most commonly associated with child exploitation — and for good reason. But the psychological process it describes is not limited to predators targeting children. The same five-stage manipulation pattern that predators use offline appears in romance scams, investment fraud, sextortion, catfishing, extremist recruitment, and cult recruitment. The technology changes. The platform changes. The target changes. The playbook does not.
Understanding digital grooming as a unified concept — rather than a collection of separate fraud types — is one of the most important shifts in how we think about online safety. When you recognize the pattern, you can see it coming regardless of the specific form it takes. And that recognition, more than any technical tool, is what stops it.
**Stage One: Target Selection.** Groomers — whether they are predators, scammers, or recruiters — begin by identifying vulnerability. They look for signals of loneliness, financial stress, grief, recent loss, or inexperience online. Social media makes this easier than it has ever been. A public post about a difficult divorce, a job loss, or the death of a family member is a signal to someone looking for a target. This is not about blaming people for sharing their lives online. It is about understanding that vulnerability is actively sought, and that the initial contact is rarely random.
**Stage Two: Trust Building.** Once a target is identified, the groomer invests in building emotional safety. This stage can last days, weeks, or months depending on the goal. The groomer is attentive, consistent, and affirming. They remember details, ask questions, and make the target feel genuinely seen and understood. In romance scams, this is the stage where the relationship develops — often more intensely and more quickly than real relationships typically do. In investment fraud, this is where the 'friend' who happens to have found a remarkable investment opportunity establishes credibility. The emotional investment made during this stage is what makes the later exploitation so effective and so difficult to recognize in the moment.
**Stage Three: Isolation.** Having established trust, the groomer begins to move the relationship away from outside influence. In digital contexts, this typically means moving communication from public platforms to private messaging, and then from private messaging to encrypted apps where there is no record and no external oversight. They may also subtly discourage the target from discussing the relationship with friends or family — framing outside concern as jealousy, misunderstanding, or interference. This isolation serves two purposes: it removes people who might raise concerns, and it deepens the target's emotional dependence on the groomer as their primary relationship.
**Stage Four: Escalation.** With trust established and isolation achieved, the groomer introduces the actual objective. In financial fraud, this is where investment opportunities are presented, money is requested, or access to accounts is sought. In sextortion, this is where the exchange of images is introduced — often framed as a natural step in an intimate relationship. In extremist recruitment, this is where ideology is introduced and tested. The escalation is typically gradual, with small requests preceding larger ones. Each small compliance makes the next request easier to agree to. By the time the target recognizes something is wrong, they may already be significantly invested — financially, emotionally, or both.
**Stage Five: Exploitation.** The final stage is the extraction of whatever the groomer was seeking: money, images, access, influence, or information. In many cases, exploitation is not a single event but an ongoing process. Sextortion victims are often threatened with exposure unless they continue to comply with demands. Investment fraud victims are sometimes told they can recover their losses by investing more. The exploitation continues for as long as the target remains engaged and the groomer believes there is more to extract.
Three forces are making digital grooming more prevalent and more dangerous. The first is AI impersonation. Voice cloning and deepfake video technology now allow groomers to present a fabricated identity with convincing audio and visual evidence. A video call with someone who appears to be a real person, speaking in a real voice, is no longer proof that the person is who they claim to be. The second force is the intimacy of social media. Platforms are designed to create a sense of connection and familiarity with people we have never met in person. That sense of knowing someone — built through their posts, their photos, their stories — is something groomers exploit deliberately. The third force is the loneliness epidemic. Rates of social isolation have increased significantly in recent years, and loneliness creates the emotional vulnerability that groomers seek. This is not a personal failing. It is a human condition that is being systematically targeted.
The protective response to digital grooming is not suspicion of everyone or withdrawal from online life. It is pattern recognition. When a new online relationship moves unusually quickly, when someone seems almost too perfectly attuned to your needs, when communication is moved away from platforms where others can see it, when small requests begin to appear — these are the signals. None of them alone is definitive. Together, they form a pattern that is worth pausing to examine. The pause is the protection. The groomer's entire strategy depends on momentum — on keeping you moving forward before you have time to think. Stopping, naming what you're observing, and talking to someone you trust outside the relationship are the most effective responses available.
This is the core of digital self defence as I teach it: not technology, not passwords, not software — but the ability to recognize manipulation before it completes. The same awareness that helps someone recognize a physical threat before it escalates applies online. The patterns are different, but the principle is identical. Stop it before the door.
Next Step
Beth delivers digital grooming awareness training for workplaces, schools, community organizations, and public sector teams.
Book a Digital Safety WorkshopContinue Reading