Select Page

Presentation – How Do Online Predators Find Victims?

This presentation about online predators is the creepiest I’ve ever done. Maybe the creepiest I will ever do. In the academic tower, cybersecurity deals with the confidentiality, integrity, and availability of data. Use CIA as a memory aid. We mostly focus on confidentiality issues such as data breaches, ransomware, and phishing. We should focus more on integrity, because today’s predators violate integrity by spewing lies across the internet to groom victims. That sanitary academic view carries gut-wrenching repercussions with real life online predators.

As a cybersecurity professional, I need to think like an attacker so I can craft good defenses. So, if I were an online predator, here’s how I would go after victims. Also see my blog post on this.

If anyone doesn’t believe this stuff happens on a large scale, just study Jeffery Epstein, Ghislaine Maxwell, and their cronies.

If you’re a parent, future parent, teenager, or future teenager, then please invest 18 minutes of your time to watch. If you want me to talk to your group, contact me and we’ll set something up.

For a couple great non-fiction books on this topic, see:

And see my novel, Trafficking U, available now.