It is tempting to think of online child exploitation as a hidden crime, confined to obscure corners of the internet. But recent investigations suggest something far more troubling: a global network of abusers, recruiting children themselves into its ranks, and constantly regenerating each time officials take out a leader. The most difficult task for law enforcement is not shutting down a single network, but fight conditions that allow others like it to emerge.

David Deegan
7 April 2026

In March 2024, “Wired” a US magazine which reports on intersections of technology and culture, shared investigative findings into the network known as “764” which operates across mainstream platforms, targeting minors through grooming, coercion and extortion, often forcing them into acts of self-harm while being observed online. The group has often been associated labelled Satanic.

The scale of that system has been confirmed by law enforcement. According to ABC News, the Federal Bureau of Investigation has opened more than 250 investigations linked to the network, with all 55 of its field offices involved. Officials described victims as young as nine years old, manipulated into producing explicit material or carrying out harmful acts that are then used for further coercion. What emerges from these accounts is not opportunistic abuse, but something structured and repeatable; an ecosystem in which methods are shared, refined and deployed at scale.

That structure is one of the defining features of the network. According to the Wired investigation, perpetrators exchange detailed instructions on how to groom and control victims, effectively turning abuse into a learned behavior. The ABC News report further noted that members staged so-called “watch parties,” in which abuse is observed collectively online. This level of coordination transforms what might once have been isolated crimes into something closer to a system, i.e. something that can persist even as individual participants are identified or removed.

Perhaps the most disturbing element of this system is who is participating in it. The “764″ network was founded in 2020 by 15-year-old American teenager Bradley Chance Cadenhead from Texas, named after his local zip code and many of its members are minors. This is not simply a case of adults targeting children; it is increasingly a case of children targeting one another. In November 2025, ABC News, cited FBI officials warning that perpetrators “often [pose] as peers” when grooming victims; a tactic that becomes even more effective when those perpetrators are, in fact, other young people. The traditional distinction between victim and offender begins to blur.

This blurring is not incidental: it is part of how the network sustains itself. Victims are sometimes coerced into participating in the abuse of others, either through blackmail or psychological manipulation. In this way, the network reproduces itself, drawing new perpetrators from its own victims. Experts have warned that this dynamic creates a cycle that is both difficult to detect and difficult to disrupt, because it embeds exploitation within peer relationships rather than imposing it from outside.

The methods used to control victims follow a recognizable pattern. According to a report by ABC7 New York, in June 2025, perpetrators typically begin by establishing contact through social media or gaming platforms, building trust before escalating to demands for explicit material. Once such material is obtained, it is used as leverage for further coercion. The same report describes cases in which victims were pressured into escalating behavior, including acts of self-harm, under threat of exposure. This combination of grooming and extortion, often referred to as sextortion, creates a form of control that can be both immediate and enduring.

In some cases, the consequences have been fatal. In April 2025, Washington Post reporters documented the case of a 13-year-old boy who was manipulated into taking his own life, with individuals linked to the network allegedly encouraging and observing the act online. The report, based on interviews and law enforcement sources, illustrates the extreme psychological pressure that can be exerted within these environments, where abuse is not only inflicted but performed.

The National Center for Missing and Exploited Children recorded a sharp increase in reports of online child exploitation in recent years and the FBI confirmed it had mobilized all of its field offices in response to the threat. Law enforcement agencies have also attempted to coordinate internationally; federal investigators reported working with counterparts abroad to track suspects operating across multiple jurisdictions.

Despite growing awareness of the network, efforts to dismantle it have faced persistent obstacles. One of the primary challenges is jurisdictional. Because perpetrators, victims and platforms may all be located in different countries, investigations often require complex legal cooperation that can take months or years. And these efforts struggle to keep pace with the structure of the network itself. During the time taken by investigative organizations to adapt to international regulations and procedures, groups can dissolve and re-form under new identities. Law enforcement officials admit that the decentralized nature of the network means there is no single point of failure; despite several high-profile convictions, there is no central leadership whose removal would bring the system down.

Technology presents another major obstacle. Much of the activity takes place on encrypted or semi-private platforms, where monitoring is limited. Even on mainstream services, content can be quickly deleted, accounts recreated, and users dispersed across multiple channels. Attempts by platforms to remove such networks often result in temporary disruption rather than permanent elimination. The underlying communities simply migrate and reassemble.

The age of many perpetrators introduces further complications. When those involved are minors, legal systems must balance prosecution with child protection considerations, which can limit the scope and speed of enforcement. In addition, the use of peer-to-peer grooming makes detection more difficult, as interactions may not initially appear predatory. Investigators have noted that this creates blind spots, where harmful behavior can develop without triggering the same safeguards designed to identify adult offenders.

Taken together, these factors point to a deeper problem: the combination of decentralization, global reach and peer-to-peer recruitment makes networks like 764 unusually resistant to traditional forms of policing. Even where arrests are made, the underlying system remains intact, sustained by a constant flow of new participants and the ease with which communities can reorganize online.

What emerges, then, is not just a story about one network, but about a shift in how exploitation operates in the digital age. The crime is no longer hidden in distant or inaccessible spaces; it is embedded in the same platforms where young people communicate and socialize. It is structured, repeatable and, most troublingly, capable of reproducing itself.

Image: Child in front of computer screen. Designed on canvas © iGlobenews
WordPress Cookie Notice by Real Cookie Banner