top of page

PROJECT: SOCIAL MEDIA, CHILDREN, AND THE GROWING CRIME CRISIS (PART 1)

  • 1 hour ago
  • 8 min read

WHY COUNTRIES ARE MOVING TO BAN YOUNG CHILDREN FROM SOCIAL MEDIA

AND WHAT PARENTS MUST UNDERSTAND NOW


THE IMPACT ON CHILDREN IS NO LONGER A THEORY — IT IS A PROVEN PUBLIC SAFETY EMERGENCY


Across the world, governments, courts, investigators, educators, psychologists, and child protection experts

are increasingly reaching the same conclusion: social media is not merely an entertainment platform for children —

it has become a direct crime exposure environment.


In a landmark ruling delivered in the United States this week, a New Mexico jury found that Meta —

the parent company of Facebook, Instagram, and WhatsApp —

knowingly harmed children’s mental health and safety, and failed to adequately protect minors from exploitation.

The jury imposed a $375 million penalty, finding that Meta engaged in deceptive and unconscionable practices that took advantage of children’s vulnerabilities and inexperience. Evidence in the case included allegations of exposure of minors to predators, sexual solicitation, harmful content, and failures in safety systems. Meta has indicated it will appeal.


This is not an isolated controversy. It forms part of a far broader international pattern. In recent years, multiple countries have either already implemented restrictions or are actively considering bans on social media access for children, especially those under the ages of 14, 15, or 16. Australia has already enacted one of the toughest measures in the world, requiring major platforms to block children under 16, with penalties for non-compliance. Norway has proposed raising the age threshold, while other governments in Europe and elsewhere are considering similar restrictions.


Specialised Security Services believes the public must understand a very important truth:

These bans are not simply about “screen time.”

They are about crime prevention, child protection, psychological manipulation,

and the industrial-scale exposure of children to predators, extortionists, traffickers, and organised online exploitation.

SOCIAL MEDIA HAS BECOME A DIGITAL HUNTING GROUND FOR CRIMINALS TARGETING CHILDREN:

  • When a child opens a social media account, that child is not merely entering a “social space.”

  • That child is entering a global digital environment where criminals, predators, extortionists, scammers, groomers, sexual exploiters, traffickers, identity thieves, cyberbullies, and manipulative bad actors operate at scale.

  • Children are uniquely vulnerable because:

    • They are naturally curious.

    • They seek acceptance and approval.

    • They are easily influenced by attention and flattery.

    • They often do not recognise manipulation until it is too late.

    • They do not yet understand the criminal intent behind many online interactions.

    • They can be psychologically conditioned over time through repetition, validation, threats, or fear.

  • In practical terms, this means that social media places children directly in the path of criminal contact — often without parents even realising it.

THE PRIMARY CRIMES AFFLICTING CHILDREN EXPOSED TO SOCIAL MEDIA:

1. ONLINE GROOMING AND SEXUAL PREDATION:

  • This remains one of the most severe and urgent dangers.

  • Predators frequently use social media platforms to:

    • Identify children by age, interests, school uniforms, location clues, or emotional vulnerability.

    • Build trust over days, weeks, or months.

    • Isolate the child from parents or guardians.

    • Introduce sexualised conversation gradually.

    • Manipulate the child into secrecy.

    • Arrange in-person meetings.

    • Coerce the child into sending explicit photographs or videos.

  • The recent New Mexico case against Meta specifically centred, in part, on allegations that the company failed to prevent child exploitation and allowed its platforms to become venues where predators could reach minors. Investigators reportedly used undercover accounts to demonstrate the scale of the danger.

  • This is not “rare.” This is not “hysteria.” This is a documented criminal pattern.

2. SEXTORTION OF CHILDREN AND TEENAGERS:

  • One of the fastest-growing crimes affecting minors globally is sextortion.

  • This usually follows a pattern:

    • A criminal pretends to be a teenager or an attractive peer.

    • The child is manipulated into sharing an intimate image or joining a private video call.

    • The criminal captures the image or footage.

    • Threats begin immediately:

      • “Pay money.”

      • “Send more photos.”

      • “Do what I say.”

      • “I will send this to your school, your family, your church, your friends.”

  • For many children, the emotional pressure is overwhelming. Some become trapped in months of blackmail. Some withdraw socially. Some become severely depressed. Some self-harm. Some tragically take their own lives.

  • SSS warns parents: sextortion is not just a morality issue — it is a high-pressure, organised criminal extortion model.

3. CHILD SEXUAL ABUSE MATERIAL (CSAM) CREATION, DISTRIBUTION, AND RE-VICTIMISATION:

  • Children who are groomed or manipulated online may become victims of the creation or circulation of child sexual abuse material (CSAM).

  • This is one of the most devastating forms of long-term victimisation because:

    • The abuse may be recorded.

    • Images may be copied endlessly.

    • Content can be traded across multiple platforms.

    • The child may be re-victimised repeatedly for years.

    • Removal is often incomplete or delayed.

    • The child may never know where the content has spread.

  • The Meta ruling included findings tied to the concealment of child sexual exploitation concerns and allegations of failures around protecting children on its platforms.

  • For families, the trauma is profound. For law enforcement, the challenge is enormous. For the child, the damage can last a lifetime.

4. CYBERBULLYING, DIGITAL HARASSMENT, AND TARGETED PSYCHOLOGICAL ABUSE:

  • Many parents still underestimate the severity of cyberbullying.

  • Unlike traditional schoolyard bullying, digital abuse can be:

    • Constant.

    • Anonymous.

    • Viral.

    • Public.

    • Recorded.

    • Shared repeatedly.

    • Escalated by group participation.

  • Children may be subjected to:

    • Humiliation pages.

    • Fake profiles.

    • Edited images.

    • Rumour campaigns.

    • Public shaming.

    • Doxxing or exposure of personal details.

    • Threats of violence.

    • Sexual rumours.

    • Social exclusion campaigns.

  • This can produce:

    • Anxiety.

    • Panic attacks.

    • Eating disorders.

    • School refusal.

    • Self-harm.

    • Suicidal ideation.

    • Isolation.

    • Long-term trauma.

  • A child does not need to be physically assaulted for the damage to be catastrophic.

5. IDENTITY THEFT, IMPERSONATION, AND DIGITAL FRAUD TARGETING MINORS:

  • Children and teenagers are also highly vulnerable to identity theft and online fraud.

  • Criminals exploit minors through:

    • Fake giveaways.

    • Gaming “rewards”.

    • Influencer impersonation.

    • “Brand ambassador” scams.

    • Phishing links.

    • Fake login pages.

    • School-related forms.

    • “Verify your account” messages.

    • Requests for selfies, ID documents, or banking-linked data.

  • A child may not understand the consequences of sharing:

    • Full name.

    • Date of birth.

    • School name.

    • Home suburb.

    • Parent’s cellphone number.

    • Email password.

    • One-time PINs.

    • Photographs revealing documents in the background.

  • This information can later be used for:

    • Account hijacking.

    • SIM-swap attempts.

    • Social engineering against parents.

    • Financial fraud.

    • Identity impersonation.

    • Credential stuffing across multiple platforms.

6. LOCATION EXPOSURE, STALKING, AND REAL-WORLD TARGETING:

  • Children often unknowingly disclose:

    • Their school.

    • Their sports field.

    • Their lift route.

    • Their shopping centre.

    • Their bedroom layout.

    • Their family vehicles.

    • Their after-school routine.

    • Their live location through posts, tags, or metadata.

  • This can enable:

    • Stalking.

    • Targeted harassment.

    • Luring attempts.

    • Abduction planning.

    • Residential reconnaissance.

    • Targeting of affluent families.

    • Contact by criminals posing as friends or service providers.

  • In South Africa, where hijacking, kidnapping, extortion, and targeted crime remain serious concerns, the careless online exposure of children can create direct real-world security risks for the entire family.

7. HUMAN TRAFFICKING RECRUITMENT AND LURING:

  • Traffickers and recruiters often do not begin with violence.

  • They begin with:

    • Attention.

    • Gifts.

    • “Modelling opportunities”.

    • Friendship.

    • Emotional dependency.

    • False romance.

    • Escape fantasies.

    • Job promises.

    • Lifestyle manipulation.

  • Children who feel isolated, misunderstood, or emotionally vulnerable are particularly at risk.

  • Social media provides traffickers with:

    • Direct access.

    • Large victim pools.

    • Pseudonymous contact.

    • Grooming time.

    • Visual profiling.

    • Location clues.

    • Opportunity to move the child onto encrypted messaging.

  • The progression from “friendly stranger” to “control and coercion” can happen far faster than parents imagine.

8. RADICALISATION, VIOLENT CONTENT NORMALISATION, AND CRIMINAL DESENSITISATION:

  • Children exposed to repeated violent, sexual, degrading, or extremist content can become desensitised over time.

  • Algorithm-driven systems may feed minors:

    • Violence.

    • Sexual exploitation themes.

    • Self-harm content.

    • Drug culture normalisation.

    • Crime glorification.

    • Gang aesthetics.

    • Dangerous dares.

    • Weapon fascination.

    • Hate content.

    • Extremist narratives.

  • The issue is not simply “bad content.”

  • The issue is behavioural conditioning.

  • Repeated exposure can alter what a child perceives as normal, acceptable, exciting, or socially rewarded.

9. SOCIAL MEDIA “CHALLENGES,” COERCION, AND GROUP-BASED CRIMINAL PEER PRESSURE:

  • Many children are drawn into risky or illegal behaviour through viral trends, peer pressure, or humiliation threats.

  • Examples include:

    • Dangerous physical dares.

    • Theft challenges.

    • Vandalism.

    • Assault filming.

    • Public indecency.

    • Cruelty to animals.

    • School sabotage.

    • Drug experimentation.

    • Reckless driving content.

    • Filming crimes for status.

  • This is not harmless imitation. In many cases, it is the gamification of delinquency.

  • A child may believe they are “joining in,” while in reality they are:

    • Creating evidence against themselves.

    • Being manipulated by peers.

    • Being exploited for clicks.

    • Being pushed toward criminal conduct.

    • Being exposed to disciplinary or legal consequences.

WHY COUNTRIES ARE NOW MOVING TOWARD BANS OR AGE RESTRICTIONS:

  • Governments are increasingly recognising that children cannot reasonably be expected to defend themselves against billion-dollar platforms designed to maximise engagement.

  • Australia’s law is the clearest example: Its Online Safety Amendment (Social Media Minimum Age) Act 2024 created a minimum age framework requiring age-restricted platforms to take reasonable steps to prevent under-16 users from holding accounts, with implementation commencing in December 2025 and significant penalties for non-compliance.

  • Reuters also reported that:

    • Norway proposed raising the age at which children can consent to social media terms from 13 to 15, while also exploring an absolute minimum age of 15.

    • Florida passed a law in 2024 banning under-14s from social media and requiring parental consent for 14- and 15-year-olds, though later court challenges blocked enforcement.

    • Mississippi pursued age-verification and parental-consent rules for minors, and litigation over constitutionality is ongoing.

  • The key point is this:

  • The world is moving because the risk is now visible, the evidence is mounting and the harm is no longer deniable.

Victims and families requiring experienced private investigative, crime intelligence, victim support,

or specialist intervention are urged to contact Mr. Mike Bolhuis of Specialised Security Services, together with his highly experienced Specialist Investigators, for professional guidance, strategic support, and appropriate referral where required.

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


How to Join the WhatsApp Channel:

1. Make sure you have the latest version of WhatsApp on your device.

2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

3. Follow the prompts to join the channel.

4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

CONTACT US

Pretoria, 75 Wapad, Leeuwfontein Estate, Roodeplaat, 0186, South Africa

​​

E-mail: mike@mikebolhuis.co.za
Mobile: 082 447  6116
International: +27 82
447 6116
Fax: 086 585 4924

  • Instagram
  • Facebook
  • YouTube
  • TikTok
chat with mike bolhuis on whatsapp

Thanks for submitting!

Copyright © mikebolhuis.co.za

MLB DIENSTE CC Reg: 1995/036819/23

PSIRA Reg: 1590364/421949

Web design by Mike Bolhuis Cybercrime Unit

bottom of page