- Multiple/new social media accounts; hidden/locked chats; sudden changes in online behaviour.
- GPS/“Find My” tracking by partners/handlers; scripted messaging; fear of device checks.
- Unexplained deliveries, travel, or cashflows initiated after online contact.
"Online spaces are now primary crime scenes—where recruitment, grooming and control are orchestrated at scale. We help courts understand the digital pathways into exploitation."
– Dr. Grace Robinson
What is Online-Based Exploitation?
- Exploitation facilitated wholly or partly via digital platforms (social media, gaming, messaging apps, marketplaces).
- Includes grooming for sexual/criminal exploitation, recruitment for forced labour, sextortion, image-based abuse, doxxing, and tech-enabled coercion.
Who is Affected?
- Children and adults, including people with additional needs or social isolation. Perpetrators exploit accessibility, anonymity, and rapid contact at scale.
Relationship with Modern Slavery
- Online methods are enablers across all forms of modern slavery—used for recruitment, surveillance, threats, debt enforcement, and reputational control.
Signs of Online-Based Exploitation
Characteristics of Online-Based Exploitation
- Digital recruitment: victims approached via gaming platforms, social media, or dating apps.
- Hidden grooming: exploiters build trust through anonymity, gifts, or promises of friendship and opportunity.
- 24-hour access: exploitation continues beyond physical boundaries through messaging and live-streaming.
- Sextortion and blackmail: threats to share images or information used to force compliance.
- Remote control: victims directed online to commit offences or perform acts while under surveillance or instruction.
- Data and image abuse: personal data, photos, or videos shared, traded, or sold without consent.
- Cross-border element: perpetrators may operate from other countries, complicating detection and safeguarding.
- Rapid escalation: online grooming can transition to in-person abuse, trafficking, or further exploitation.
Best Practices in Identifying and Acting for Victims of Online-Based Exploitation
- Preserve digital evidence early: screenshots, metadata, chat exports, call logs, cloud backups.
- Engage cyber units/digital forensics; map online-to-offline transitions and control tactics.
- Safety plan for tech abuse (device resets, privacy settings, secure comms); refer to NRM.
Section 45 in Online-Facilitated Cases
- We examine how digital grooming, threats, doxxing, or extortion directly compelled alleged offending (e.g., drug supply, fraud, sexual offences).
- For children, we assess exploitation dynamics absent an adult-style “free choice.”
What is the Role of an Expert Witness in Online-Based Exploitation Cases?
- Explain platform-specific grooming patterns, coercion scripts, and surveillance/control.
- Clarify why victims may comply, delay disclosure, or maintain contact with controllers.
Step-by-Step Process and Requirements for Instructing a Online-Based Exploitation Expert Witness
- Contact us to scope questions.
- Confirm timelines and deliverables.
- Provide device downloads, OSINT, platform records, comms data, NRM documents.
- We review, assess the client, and deliver an admissible report.
- Court attendance as needed.
Tips on Instructing an Online-Based Exploitation Expert Witness for Court
- Request full digital disclosure (including cloud backups and provider returns).
- Flag time-critical preservation (platform retention limits).
- Consider psychologist input where cyber-enabled trauma or shame impedes disclosure.
Founded by Dr Grace Robinson in 2019.
OUR PRIMARY AIM IS TO SUPPORT VICTIMS AND INCREASE AWARENESS OF MODERN SLAVERY.