The COM

Content Warning: This page contains information regarding child sexual exploitation, harm, and violence, which may be distressing. Below, you will find an introduction to ‘The Com’ along with warning signs and resource guides. A second section provides in-depth research and further insights for those seeking more detailed information.

What is The Com?

"The Com" (or "The Community") is a vast, interconnected network of digital spaces spanning both mainstream and encrypted platforms. This ecosystem consists of overlapping servers and forums that, while distinct, share a unified culture centered on anti-social behavior. Within this ecosystem, sub groups and members collaborate and compete, creating a volatile environment where activities frequently escalate into criminal behaviour and violent extremism. 

Who:

Victims and Perpetrators are male and females, typically aged between 11 and 24 years. Some victims have been as young as 8 years old and many victims can become perpetrators. Example sub-groups: 764, Harm Nation, No Lives Matter (NLM), CVTIST, Leak Society, Kasker, 7997, and H3ll.

How:

Perpetrators use popular games like Minecraft and Robolox, or other online mainstream spaces to access vulnerable individuals.

  • INITIAL CONTACT:

    Individuals are targeted in mainstream or gaming environments such as Minecraft or Roblox or on TikTok and Snapchat and other mainstream platforms like Pinterest or Reddit.

  • DIRECT MESSAGE:

    Initiate contact by sending direct messages to the individual while playing

  • PLATFORM SHIFT:

    Core tactic is to move the targeted individual to external platform like Discord or Telegram.

  • ESCALATION:

    Once moved to other platforms, interactions become coercive, sexualised or violent.

This process allows them to bypass safety features and content moderation built into children’s video games and platforms. By isolating their victims, these actors can more easily blackmail / extort the victim into acts of self-harm, animal cruelty, or sexually explicit acts. These activities are the leverage used to exploit the targeted individual, encouraging them to commit acts and/ or victimise others. More information and warning sign resources are below, signs can include self-harm,  harming others, and hurting pets. 

AI Image


Help and Advice:

Section Two

Content Warning: This content contains information regarding child sexual exploitation, harm, and violence, which may be distressing.

Audio - Ai discussion based on 20 studies/analysis & official reports on ‘The Com’. Time: 18 minutes All sources are listed at the bottom of this page.

The COM Ecosystem

As well as the names above other subgroups exist but branding can change or new subgroups emerge quickly. Other numerical codes are used as  group names include  2992, 6996, 545, 404. and 303. These groups often use symbols from Neo-Nazi or Satanic extremist groups, however this can be for shock value and intimidation rather than a true belief in what they stand for. These subgroups tend operate from three pillars depending on their motivations: Cyber com, Sextortion Com, and Offline com but there can be overlap.

Slang and Terms : (examples)

  • Lorebooks: .

    This refers to films or files created by abusers that contain sexually explicit content, self-harm images, and documentation of a victim’s extortion. These are circulated among the group to gain “clout” and are used as blackmail to exert further control over the victim.

  • Fansigning:

    A term for when victims are forced or manipulated into writing or cutting specific numbers, letters, symbols, or their abuser’s screen name cirectly into their skin.

  • Bricking:

    A term for throwing a brick through a window of a target’s vehicle or home, a acto of real-world violence encouraged or commissioned. Can be an initiation or intimidation.

  • Murder Points:

    A scoring system used by the M.K.Y subgroup to evaluate the productivity of its members, rewarding them for criminal and/or brutal acts.

  • Sim Swapping

    Telecomm provider is tricked into transferring your phone number to their device.

  • Swatting:

    Calling in a fake emergency that prompts a armed police response to the victim’s home. Includes bomb threats to schools. Can be used to threaten a victim into compliance

  • Doxxing:

    Obtaining and publishing personal idenitifying information online.

  • Edgelord:

    Some who deliberately posts shocking, offensive, or nihilistic content online to appear cool, or to provoke a reaction.

  • Saints:

    Glorification of mass murderers , especially school shooters.


Previous
Previous

The Sovereign Files

Next
Next

Profiles - Ideologues