Friday, February 23, 2018

Grooming Techniques

A pedophile utilizes grooming techniques to gain the trust of not only their intended victim but also the unsuspecting parents.  The plan is methodical and carried out to mask ulterior motives.  The end result is to gain access to the child, abuse the child for their own pleasure, then make sure the child remains silent for the rest of their life.

Trusted non-kin members of society such as teachers and priests, have had free access to children.  The public is more wary though recent lawsuits and court cases but still needs to keep vigilant over their all children's associates.

Parents are often not aware their child is associating with a pedophile because the plan is so secretive and subtle.  Professional pedophiles groom multiple children at the same time. They have various contingencies in case a child moves away, or turns out not to meet all their requirements.  There are others in various stages of training at all times.  They bottom line is, a pedophile must groom replacements for children as they mature and their bodies develop.

For a child, the ability to reason has simply not been developed. Kids are vulnerable.  They like to experiment with keeping secrets.  The pedophile is a pro at finding the triggers which keep a child silent.

Children live for puppies and candy and promises of fun, permissiveness and doing anything their parents won't allow them to do.  This vulnerability gives the pedophile great influence over their chosen victim.


Main Menu

Members : 24267
Content : 121
Web Links : 3
Content View Hits : 709854


Site Info


Links to this site are welcomed, but wholesale downloading for reproduction elsewhere by any means, print or electronic, is expressly prohibited and will be prosecuted under relevant Federal statutes. Written permission is required to mass produce, copy or reprint by any method. No permission is implied or granted to duplicate or distribute pages or graphics in any manner, either electronically or in printed form. No reprint in any form is allowed including storage in a retrieval system, transmitted or copied for public or private use other than for “fair use” as a brief quotation without prior written permission of the author.