Protecting Your Family's Digital Privacy from 'The Com': What Parents Need to Know
The Reality Check: Your teenager's gaming buddies might not be who they claim to be. The FBI has just issued urgent warnings about "The Com," a sophisticated criminal network that specifically targets young people through the very platforms your kids use daily—and privacy failures are putting families directly in their crosshairs.
If you think your family's digital privacy is just about preventing identity theft or avoiding annoying ads, it's time for a wake-up call. The FBI's recent warnings about "The Com" reveal how poor privacy practices can expose your children to criminal networks that blur the lines between cybercrime, extortion, and real-world violence.
Why Privacy Matters More Than Ever
The Com is a primarily English speaking, international, online ecosystem comprised of multiple interconnected networks whose members, many of whom are minors, engage in a variety of criminal violations. What makes this threat particularly insidious is how it exploits the very information we casually share online every day.
These aren't distant hackers targeting corporations. Young people are often recruited on gaming sites and social media platforms based on shared interests, or through other members of The Com. They're actively hunting for personal details about your family to use as weapons for recruitment, blackmail, and worse.
The Information They're After (And Where You're Leaking It)
Financial Information: The Primary Target
Cryptocurrency theft is the primary motivator for many Com actors, but they're not just looking for crypto wallets. Every financial detail you share online becomes ammunition:

What you're unknowingly sharing:
- Posts about new purchases, vacations, or financial milestones
- Location check-ins at expensive restaurants or events
- Photos showing luxury items, cars, or home interiors
- LinkedIn posts about promotions or salary increases
The privacy fix: Implement a "financial silence" policy. Never post about money, investments, purchases over $100, or financial situations on any public platform. Even "humble brags" about saving money can signal to criminals that you have assets worth targeting.
Personal Details: Building Your Profile
The Com's recruitment strategy depends on finding vulnerable targets, and they build detailed profiles using information that seems harmless in isolation:
Red flag sharing patterns:
- School names, sports teams, or extracurricular activities
- Relationship status changes or family problems
- Mental health struggles or difficult life transitions
- Friend groups and social circles
- Daily routines and locations
The privacy protection: Treat personal information like classified data. Before posting anything, ask: "Could this help a stranger manipulate my child or locate my family?"
Visual Intelligence: What Your Photos Reveal
Every photo you share is a treasure trove of intelligence for criminal networks:
Hidden data in your images:
- Home addresses reflected in windows or street signs
- School uniforms or logos identifying institutions
- Daily routines shown through timestamp patterns
- Financial status indicated by background objects
- Family relationships and social connections
Smart photo practices:
- Turn off location services on all social media apps
- Review photo backgrounds before posting
- Avoid posting real-time photos of children's activities
- Use privacy-focused photo sharing alternatives for family
Platform-Specific Privacy Vulnerabilities
Gaming Platforms: The Primary Recruitment Ground
Members of The Com typically range between 11 and 25 years old, and gaming platforms are their preferred hunting grounds. Here's how to lock down your family's gaming privacy:
Discord Safety:
- Disable friend requests from strangers
- Turn off direct messages from non-friends
- Never share personal Discord tags publicly
- Use voice channel recording as a deterrent
- Regularly audit server memberships
Steam/Console Gaming:
- Set profiles to friends-only visibility
- Disable location sharing in games
- Use platform parental controls aggressively
- Monitor friend lists and new connections
- Disable in-game voice chat with strangers

Social Media: The Information Goldmine
Every major platform is being exploited for recruitment and intelligence gathering:
Instagram/TikTok Protection:
- Switch to private accounts immediately
- Review follower lists monthly for suspicious accounts
- Disable location services and remove location tags from old posts
- Turn off "seen by" features and read receipts
- Use close friends features instead of public stories
Snapchat/BeReal Security:
- Disable "Quick Add" recommendations
- Turn off location sharing entirely
- Review who can contact you settings
- Regularly clear friend suggestions
- Never participate in location-based features

The New Privacy Mindset for Families
Think Like a Target, Not a User
Traditional privacy advice focuses on preventing data collection by companies. The Com threat requires thinking like a potential victim of a sophisticated criminal network.
The shift in thinking:
- Old mindset: "I don't have anything to hide"
- New mindset: "What could criminals do with this information?"
- Old approach: Limiting what companies can see
- New approach: Assuming criminals are actively hunting your family

Operational Security (OpSec) for Families
Military and intelligence professionals use operational security to protect sensitive information. Your family needs the same approach:
Family OpSec Rules:
- Information compartmentalization: Different family members should have different levels of online visibility
- Communication security: Use encrypted messaging for any sensitive family discussions
- Digital footprint management: Regularly audit what information is publicly available about your family
- Counter-surveillance awareness: Watch for signs that someone is gathering information about your family
Creating a Family Privacy Plan
Step 1: Audit Current Exposure
- Google every family member's name and variations
- Check social media platforms for public information
- Review photo metadata and location history
- Assess gaming and app privacy settings
Step 2: Implement Immediate Protections
- Enable two-factor authentication on all accounts
- Switch to private profiles across all platforms
- Remove location data from photos and posts
- Set up Google alerts for family names
Step 3: Ongoing Privacy Maintenance
- Monthly privacy setting reviews
- Quarterly social media cleanup
- Regular family discussions about online interactions
- Annual threat assessment and plan updates

Warning Signs Your Child May Be Targeted
The FBI recommends the public consider the following when sharing information or engaging online: Monitor children's online activity and discuss risks associated with engaging with others in online platforms.
Behavioral red flags:
- Sudden secrecy about online activities
- New "friends" they won't discuss in detail
- Unexplained money, gifts, or cryptocurrency knowledge
- Increased gaming or online time with mood changes
- Defensive behavior when asked about online interactions
Technical warning signs:
- New apps or platforms you don't recognize
- Encrypted messaging apps appearing suddenly
- Changes to privacy settings without explanation
- Multiple accounts on the same platform
- VPN or anonymization tools on their devices
When Privacy Fails: Incident Response
Despite best efforts, your family might still become a target. Having a response plan ready is crucial:
Immediate response checklist:
- Document everything - screenshots, usernames, communications
- Change all passwords immediately
- Contact local law enforcement and file a report
- Report to FBI's Internet Crime Complaint Center (ic3.gov)
- Contact NCMEC if children are involved
- Notify schools and employers if necessary
- Consider temporary social media breaks
Building Privacy-Aware Digital Citizens
The goal isn't to keep your family offline—it's to make them privacy-conscious digital citizens who understand the real-world consequences of online actions.
Teaching moments:
- Explain why privacy settings matter using real examples
- Practice identifying suspicious online behavior together
- Discuss the permanence of digital information
- Role-play responses to manipulation attempts
- Celebrate good privacy decisions
The Bottom Line for Parents
The Com represents a new breed of threat that specifically exploits the casual attitude most families have toward online privacy. The FBI estimates thousands of individuals identify as current or recent members of The Com with varying levels of associated activity, and they're actively looking for your family's information right now.
Your family's digital privacy isn't just about avoiding spam emails anymore—it's about preventing criminals from gathering the intelligence they need to target, manipulate, or harm your children. The stakes have never been higher, and the time for casual privacy practices is over.
Every piece of information you share online is a potential weapon in the wrong hands. Make your family a harder target by taking privacy seriously, implementing real security measures, and staying vigilant about the evolving threat landscape.
Take action today:
- Audit your family's online presence this weekend
- Implement the privacy settings described above
- Have honest conversations with your children about online risks
- Create your family incident response plan
- Stay informed about emerging threats through official FBI channels
The criminals are organized, sophisticated, and patient. Your family's privacy strategy needs to be equally serious.
For official information and reporting resources, visit the FBI's Internet Crime Complaint Center at ic3.gov. If you suspect your family is being targeted, report it immediately.