Today’s Online Risks To Teens Don’t Look Dangerous

Untitled design

For years, much of the advice around online safety has been built on a familiar concept, “stranger danger.” The idea is simple, avoid people you don’t know and anything that seems suspicious. It is well-intentioned, but it has always been incomplete, because risk has never come only from strangers, and it no longer reflects the reality students are navigating.

In both offline and online environments, harm has often come from people who feel familiar, not from those who appear obviously dangerous. That same dynamic now extends into the spaces where students spend much of their time communicating, learning, and interacting. Many of the most serious risks young people face online today do not look unusual or alarming. They do not feel threatening. In many cases, they feel familiar, friendly, and even trustworthy. And that is exactly why they work. Today’s risks unfold through conversation rather than confrontation, build gradually rather than immediately, and are personalized rather than generic. Students are not being presented with something that looks dangerous. They are being drawn into situations that feel normal.

This is consistent with what law enforcement and national data are reporting across Canada. According to Statistics Canada, police-reported incidents of online child sexual exploitation have increased significantly in recent years, with over 19,000 cases reported annually and substantial year-over-year growth. At the same time, Cybertip.ca, Canada’s national tipline for reporting online sexual exploitation of children, continues to receive tens of thousands of reports each year, many involving grooming, sextortion, and the non-consensual sharing of images.

The RCMP has also issued repeated public warnings that sextortion is one of the fastest growing threats targeting youth in Canada, often escalating within minutes of initial contact and causing significant emotional harm.

The environments students are using every day are designed to encourage connection, interaction, and engagement. The same features that make platforms useful and appealing also make them effective tools for building trust quickly. Bad actors do not rely on obvious deception. They rely on familiarity.

Copy of scams detect part1 transaction scam text image

A message appears to come from someone in the same school. A conversation begins around shared interests. A request feels small, reasonable, and easy to respond to. In many cases, there is no clear moment where something feels wrong. Trust is not broken immediately. It is built, and then slowly redirected.

It is easy to assume that students should be able to recognize these risks. After all, they are often told to be careful, not to share personal information, and not to engage with strangers. But these situations rarely feel like those warnings apply. Students are not stopping to analyze risk in a structured way. They are responding in real time, socially and emotionally, often in environments where speed and interaction are expected.

They are thinking that the situation feels normal, that the person seems real, that nothing stands out as a problem. By the time something does feel off, the situation has already changed.

This is why framing online safety as a knowledge problem falls short. Most students already know the rules. The challenge is not awareness. The challenge is recognizing when those rules apply in situations that do not look risky.

In many of the cases being reported across Canada, including sextortion and online luring, the interaction begins with something simple and unremarkable. It may start with a casual message or a shared interest. It may move quickly into something more personal, or it may unfold over time. What these situations have in common is not a technical failure, but a moment of trust that is used to create pressure, influence, or control.

This is also why these issues are often difficult to talk about. They do not fit neatly into the categories that parents and educators are used to addressing. There is no obvious warning sign, no clear point where a rule has been broken. Instead, there is uncertainty. And uncertainty is harder to respond to than something clearly wrong.

Charting your course player to player phishing example 1 1

If risk does not look dangerous, then awareness alone is not enough. Students need to be prepared for situations that are unclear, evolving, and sometimes emotionally charged. They need to understand how interactions unfold over time, how trust can be built and redirected, and what to do when something feels off, even if they cannot explain why.

For parents, this often means shifting from rules to conversations. Instead of focusing only on what not to do, the focus becomes understanding how children are interacting online, who they are talking to, and how they make decisions in those moments. For educators, it means creating space for real discussions, not just general guidance. It means walking through scenarios, exploring how situations change, and helping students think through what they would do, not just what they should do.

These conversations are not always easy to start. Many parents and educators are unsure what to say, how much to share, or how to approach these topics without creating fear. This is where practical, scenario-based resources can make a difference.

At KnowledgeFlow, we’ve developed short videos, tip sheets, and guided discussion resources specifically to support these conversations. These tools are designed to reflect real situations, not just general advice, and to give parents and educators a starting point for talking about topics like sextortion, manipulation, and online trust in a way that is clear and manageable.

When conversations are grounded in real scenarios rather than abstract warnings, they become more relevant, and more likely to stick.

1

Understanding that risk no longer looks suspicious is an important step. The next question is how these situations actually unfold, and what that means for recognizing and responding to them earlier.

In our next post, we break down how common online threats develop over time, and how a message can turn into something much more serious, often faster than expected.


Similar Posts