Digital predators

How parents can shield their children in the online wilderness

Jess Oaks
Posted 5/7/25

GOSHEN COUNTY – The Mayberry of yesterday is dead. In what feels like mere moments, our peaceful small-town life has been transformed into a digital battleground where predators lurk behind …

This item is available in full to subscribers.

Please log in to continue

Log in

Digital predators

How parents can shield their children in the online wilderness

Posted

GOSHEN COUNTY – The Mayberry of yesterday is dead. In what feels like mere moments, our peaceful small-town life has been transformed into a digital battleground where predators lurk behind screens, waiting to exploit our most vulnerable citizens – our children.

An incident involving a minor receiving inappropriate Facebook communication from an adult male has sent shockwaves through the community. The pressing question parents now face: How can we protect our children from digital predators who have unfettered access to their lives?

This could have ended much worse.

Hannah Spencer of Torrington stared down every parent’s nightmare when she discovered an older man sending messages to her younger sister, Kaia. Despite establishing open communication and warning her sister about online dangers, the situation quickly escalated.

“I had warned her about the dangers online and told her to bring any issues to me,” Spencer explained. “When she mentioned a man was making her uncomfortable online, we immediately investigated.”

What Spencer discovered sent chills through her: a series of Facebook messages from a grown man targeting her 17-year-old sister, Kaia. After Spencer captured evidence, the man deleted his profile picture in an apparent attempt to hide his identity.

“When I saw his face, I took pictures of the messages. Afterward, he deleted his picture,” Spencer recalled. “I warned Kaia this could have ended so much worse if she had continued the conversation. Thankfully, she told us before it got too dangerous.”

Law enforcementís limited power

Despite providing evidence to authorities, Spencer hit a frustrating wall. The man, operating under a false name but traced to Casper, faces minimal consequences for his predatory behavior, if any.

“I called Casper Police Department and the operator dismissed me without even hearing my full complaint,” Spencer said. “Torrington police made a report, but there’s little they can do beyond warning him not to contact Kaia again.”

Spencer’s terror extends beyond her family.

“If he can manipulate a 17-year-old this way, imagine what he could do to a much younger girl who doesn’t understand the dangers. We think ‘that would never happen to me’ or ‘that’s only in movies’ until it happens personally,” Spencer explained.

“I explained to Kaia, you can’t give out your location to anyone because they could find you. If he was willing to drive here to meet a 17-year-old girl, I don’t know what else he’s capable of,” Spencer warned. “This man was friends with my sister on Facebook, which means he’s connected to other kids. He’s hiding behind fake accounts, which is terrifying.”

Local law enforcement shares parents’ frustrations but emphasizes that vigilance saved Kaia from potential harm. The reality: most parents are dangerously behind in understanding the digital landscape their children navigate daily.

“It’s moving so fast that it’s nearly impossible to keep up, and that’s one of our biggest challenges today,” Torrington Assistant Police Chief Patrick Connelly said. “Discord’s hot today, tomorrow it’s WhatsApp, and the next day something that hasn’t even been released yet. There are so many platforms that parents are perpetually playing catch-up.”

Connelly outlines critical steps parents must implement immediately:

“Download monitoring software like NetNanny, but more importantly, establish absolute control over your child’s device,” Connelly insists. “Ensure you have all passwords and make it crystal clear: their phone is NOT private. Inspect it regularly.”

Connelly recommends systematically examining every app on your child’s device.

“Many parents don’t want to be parents. They think, ‘That’s my child’s private stuff.’ No – you’re my child, I pay for that phone, nothing is private. I have rights to everything in your life. Get over it,” Connelly said.

Torrington Police Chief Matt Johnson notes a dangerous cultural shift. 

“Kids now view a cell phone as a constitutional right. Parents used to only provide clothing, shelter, and food. Now it’s clothing, shelter, food, and a smartphone with unlimited data. That’s a radical, dangerous change in our society,” Johnson said.

Both law enforcement leaders emphasize setting non-negotiable boundaries the moment a child receives a phone.

“Set those boundaries immediately,” Connelly stresses. “Make it clear: ‘This is not yours. This is mine. I will examine it anytime. I will know all your passwords. Nothing will be hidden from me.’”

“Friend them on all social media platforms,” Connelly adds. “You may not see private messages, but you’ll know what they’re posting publicly.”

Connelly issues a stark warning about self-deleting message apps. 

“I strongly recommend against Snapchat or any platform with disappearing messages. That level of anonymity is dangerous for children,” Connelly said.

“We used to joke that Halloween was the worst night for violence because everyone wore masks and felt anonymous,” Johnson added. “Social media has brought that same danger into our homes. People pretend to be someone else to commit horrific acts—whether bullying, sexual misconduct, or theft. That complete anonymity fosters criminal behavior. As human beings, we don’t function safely this way.”

Parents must restrict app store access.

“Configure devices so children can’t download applications without parental authorization,” Connelly advises. “Don’t share your iCloud password. Force them to request permission for new apps, giving you time to research potential dangers.”

“Don’t fear setting firm limits,” Connelly emphasizes. “If they say, ‘My friends are on WhatsApp,’ respond firmly: ‘I’ve researched WhatsApp and know what happens there. You will not use that platform.’”

“Scrutinize their friends list,” Connelly instructs. “For each person, demand: ‘Who is this? How do you know them?’ Until you can identify everyone. If someone raises concerns – like ‘Jim Bob Joe who’s supposedly 14 from Alabama’ whom your child has never met – delete that contact immediately.”

“Being vigilant takes time and work,” Connelly acknowledges. “But the alternative is unthinkable.”

Parents must decode the digital communication their children use. 

“Regularly check Urban Dictionary for modern slang. Google acronyms and emojis you don’t recognize. Everything children use to hide their activities; you can find ways to decode online,” Connelly suggested.

“It’s not something that should consume all your time, but when you see unfamiliar acronyms, out-of-context emojis, or terms you’ve never heard, investigate immediately,” Connelly urged. “Children today speak an entirely different language designed to exclude adults.”

“If you suspect online sexual activity or drug-related communication, research those terms,” Connelly warns. “It will lead you into ugly places – be prepared for that.”

The complexity of prosecuting online predators presents significant challenges.

“Wyoming statutes are extremely complex,” Connelly explained. “We practically need flowcharts to determine whether a sex crime has occurred. We analyze each case individually, establish intent, and determine which statute might apply.”

“With online relationships, it ultimately comes down to whether that person is asking or encouraging a minor to do something illegal,” Johnson clarified. “This can be challenging because these predators are incredibly manipulative – similar to romance scammers who convince adults to surrender their life savings.”

Even when communication isn’t technically illegal, parents have options.

“If a parent tells someone to stop contacting their child and that person persists, we might be able to pursue stalking charges or support documentation for a protection order,” Johnson said.

“Parents should know they can apply for protection orders on behalf of their children,” Connelly emphasized. “The stalking statute addresses a pattern of behavior intended to harass, including electronic surveillance, tracking, or sending inappropriate content.”

“The digital world presents unique challenges in identifying perpetrators,” Johnson concluded. “Even when we can identify them, we may face limitations in addressing their actions from a law enforcement perspective.”

The message is clear: parents must take immediate, aggressive action to protect their children online. The digital world is not Mayberry – it’s a hunting ground where predators roam freely, and your child could be their next target unless you intervene.