
Imagine the following scene: you are checking the 'likes' on your Instagram profile, yes in the one in which you publish (almost) daily photos of your baby. You notice that the last images that you have uploaded are being valued positively by another user; and one thing leads to another, who does not browse the profiles of their 'friends' on the Internet? What happens next causes you a feeling of surprise, well no ... it worries you, perhaps it also scares you a little; you actually get to feel all those things when you see that person has the photos of your son / daughter on it, as if they were his own. Ah but…! Wasn't it all just made up in terms of aberrant network behavior? It seems not, and what remains for us to see!
I have not seen the previous scene in a fiction film, and I have not dreamed of it, much less I have invented it because I enjoy these things. It is totally real: The practice is known as digital kidnapping., and in the United States the number of cases is increasing. I'm very sorry to be telling you, I hate that people are 'losing the north' and allow ourselves to misuse photos and other people's content, although on the other hand I am forced to know it, for my own good and mine.
For a father it would be horrible if his son had been kidnapped, without being able to protect him, and without knowing what is happening to him; it will surely be one of the most harrowing experiences. Wouldn't we feel something similar if the photos of the children were kidnapped? I acknowledge that I had never read about this, nor did I know that the situation could still get worse when the hijackers' accounts are specifically set up in order to encourage other users to participate in this kind of role play.
New identities are invented for children, things are told about them (which may be fictitious), and they are shared using hashtags such as #babyrp (baby role playing), #adoptionrp, #orphanrp; a quick search according to these criteria, can offer you more than 50.000 entries. Photos of toddlers and babies are often included, without their real parents giving permission, because they don't even know!
But why?

The behavior strikes me as extremely unhealthy, and even more so if I know that among the participants in this kind of game, roles are divided: the one who offers the baby, the one who wants to be its adopter (what a horror!); I have read that such behaviors are not illegal, but it is a problem to measure the importance of things based on legality, and not ethics. Also, what about privacy? I will talk about this below when I detail the ways you have to avoid these events.
However, the media consulted indicate that some participants / players may come to realize sexual fantasies using these photos, which is precisely the fear that we would have if it happened to us. And now, before you go running to delete the photos of your children in your accounts (5 or 10 more minutes does not mean anything to you), read below.
This we have to stop

The Internet has changed our lives, and we have to think that for the better, but it will only be so if we act with caution regarding our own content, with respect for others, and with the responsibility of being able to act against inappropriate content. You will know, and if I do not tell you: You have the possibility of interacting through the services that the platforms (read Social Networks) allow you to control your personal information.
From the material of a course that I completed this summer, and related to the ICT risk management, I am pasting below a phrase that calls for reflection:
The lack of privacy on the Internet is a reality that is already changing everyone's lives, creating victims and having very serious consequences for people who, without knowing it, have made their lives public. Thus, the terms of citizenship and social life have changed rapidly in the digital age, observing a trend towards the use of public forms as the default modality in the face of a decrease in the use of private communication strategies
Stay with the end: we are ceasing to have a private citizenship and social life to become public, have we weighed before the cost that this may have? We really like to expose the private life of our children (as if it were our own) and we love having 20 comments saying: 'how beautiful your girl!', 'what a nice baby!'… the ego traps us and takes us where it wants. On the other hand, it is natural to want to talk about them, but it is not the same that you tell your best friend on the phone, or the neighbor on the balcony, than to drop it on your wall (and I do not excuse myself). As it is not the same to tell a problem about your girl with her classmates to seek advice, than to do it with hair and signs and in front of 400 people! It is to think about it.
Safety recommendations

Do not post photos of your children and do not make private comments about them. But if this seems exaggerated:
- Configure the privacy options in your profile RIGHT, and review these settings periodically.
- We are older so that they tell us: 'do not add anyone that you do not know personally', but you can have references about future contacts. The one who shares 19 friendships with you, the one who is a childhood friend, the one your brother has recommended to you, the one who belongs to an association with which you want to comment on a specific topic.
- Think before you post, think before you share.
- Don't forget that once you post a photo, you have no control over it.
- If you upload photos, make sure that no one could locate your child in real life (what information about you is part of the profile? Do you use the location function?).
- The images - if possible - of low resolution.
- No photos of the naked children.
- Download an application that allows you to insert a watermark to the photos, something like indicating that the photo was taken by you, that it belongs to you. This can discourage anyone who wants to appropriate the image, because it is treated.
- Do not share other people's photos without permission from the child's parents.
- 'We will always have the email', I say this because to share with family and friends there is that possibility if I have discouraged you.
- Make sure that everyone is who they say they are in the instant messaging groups (whatsapp) in which you participate and share photos.
And what is the response of those responsible for social networks in which they 'steal' photos of other people's babies? In the case of Dallas' mother Diana Patterson, Facebook initially told her that company rules were not being violated, and also the contact (fictitious name Figueroa) blocked her when she tried to make him see the inappropriateness of her action. However, after the publication of the news by the information media, the social network acted, after all the security measures are re-elaborated with some frequency, Why not do it with more emphasis when it comes to children?
Image- (the first) umpcportal.com.
Sharenting: everyday exposure with real risks
El sharenting It is the habit of mothers, fathers, or caregivers to regularly share images, videos, and stories about their children. It is a widespread custom that, although born from pride and affection, increases the digital footprint of minors and opens the door to unwanted uses. Academic research and research by specialized organizations have found that A vast majority of images seized from sex offender files are non-sexualized photos taken from social media and family albums. This reality refutes the false sense of security that "if the photo is innocent, there's no risk."
Furthermore, international entities dedicated to child protection point out that Content associated with child sexual abuse has grown exponentially in the last decade. This increase is influenced by the volume of publications: every day, massive amounts of photos and videos are uploaded to social networks, and a relevant percentage corresponds to minors in everyday situations (birthdays, beach, school). Even if the intention is positive, the range outside the close circle is unpredictable.
Law enforcement agencies and cybercrime experts warn of several risk vectors: storage and redistribution of images by criminal groups; creation of fake profiles to approach minors (grooming); and social engineering aimed at families by leveraging data visible in publications. Even the profile picture in messaging apps may expose the minor if the number is added to other people's address books and the visibility is public.
In the legal field, the image is a personal data: its processing by third parties without a legal basis or without consent is unlawful. Hence the recommendation of restrict visibility of publications, limit contacts to known people and periodically review who can view, comment or download.
How do digital kidnappers operate and what signs to watch for?
Digital kidnapping relies on the systematic collection of public material: open profiles, name tags, locations, and high-quality photos. With this content, attackers create false identities of the minor, they integrate it in “role games” (#babyrp, #adoptionrp, #orphanrp) or they set up mirror beads who appear to be from the family. Sometimes they change the child's name, invent biographies, and simulate emotional ties to attract audiences or for criminal purposes.
Warning signs: appearance of repeated likes or comments from unknown accounts in photos of your children; unrelated followers with your real network; use of your images by third parties (reverse searches can detect it); profiles that ask for more content or information about routines, school, or hobbies. In role-playing communities, the organizers assign “roles” and plots Using other people's photos, they stimulate participation and invite the normalization of identity appropriation.
The next step may be the extortion (threat to spread images if more material or money is not delivered), the child abduction with profiles “of their age”, or the sale of photo packages on hidden forums. The line between “role-playing” and abuse of personal data crosses quickly.
Risks driven by artificial intelligence
The emergence of tools of generative artificial intelligence has lowered the technical barrier to creating deepfakes from ordinary photos. With just one image where the minor appears frontally, some criminals can making fake videos highly plausible. There are also models of voice cloning which, with just a few seconds of audio, allow calls or messages from the minor to be simulated. These uses can trigger blackmail, fraud or impersonation with great emotional impact on the family.
Another technique is Morphing: manipulation to make the minor appear to be in a situation that never occurred. And even without manipulation, it is enough extract fragments of photos (hands, face) to recombine them into harmful content. Therefore, it is key reduce resolution of what is shared, disable metadata and avoid backgrounds that give clues to the real environment.
Other dangers associated with publishing data and images
Beyond digital kidnapping, there are collateral risks that are often overlooked. One common one is the use of implicit data In the photos: approximate age, school (by uniforms or badges), usual places, club or team name, license plates or recognizable streets. This information is used to “virtual kidnapping” scams and for targeted social engineering attacks.
Another threat is the password weakness based on birthdays visible in posts. Dates, pets, colors, and sports mentioned in profiles become clues to dictionary attacksThe solution is to strong and unique passwords, password manager and double factor authentication on all accounts.
On an emotional level, sharing “funny” or embarrassing scenes can lead to memes and cyberbullying when the school environment accesses the content. Reports with children and adolescents show that a significant proportion of minors are is ashamed or distressed by parental publications. Sustained exposure impacts self-esteem, confidence and relationships with peers and adults.
There is also the reputational impact In the long term: the digital footprint created by third parties (including parents) accompanies the person in academic and work processes. There are already cases of young people who have claimed or reported to their parents for the dissemination of their image without consent during childhood.
Image rights and basic legal framework
The image of a minor is a especially sensitive personal dataIn many countries, the processing of this data requires express consent of the legal representatives and must respect the best interests of the minor. The regulations on data protection and legal protection of children recognize the right to privacy, honor and one's own image of children and adolescents. If a third party uses the image without legal basis, they incur illicit treatment of data.
When there is monetization (“family vlog” accounts or child influencers), some states and countries have begun to regulate commercial exploitation of the image of minors, forcing them to reserve part of their income for them and to establish safeguards labor and privacy. The international trend also points to limit overexposure and strengthen reporting mechanisms on platforms.
Sharenting in schools and extracurricular activities
Many educational centers publish on websites and social networks galleries with recognizable photos of the students. Although the intention is to show projects and achievements, this practice exposes minors to a uncontrolled diffusionMany families choose not to assign image rights for this reason. The best practice is to use private channels with restricted access, apply pixelated when necessary, and offer inclusive alternatives that do not discriminate against students whose families do not authorize publication.
Digital citizenship education must include the entire community: management teams, teachers, families and students. Schools can be models if they adopt Privacy Policy clear, minimize data and apply the criterion of “need to publish” against the custom of documenting everything.
Response Plan: What to Do if Your Children's Photos Are Stolen
If you notice that your children's photos are being used without permission, act with caution. speed and method:
- Collect evidenceScreenshots with URL, date, and time. Avoid hostile interactions with the offender to avoid alerting them and causing them to delete evidence.
- Report on the platform: use the options of report for impersonation, misuse of the image of minors, or exploitation. Request urgent withdrawal of content and account closure.
- Go to the authorities: in Spain, contact the Group of Telematic Crimes of the Civil Guard and Specialized and Violent Crime Unit of the National Police. For situations of bullying, you can also count on the ANAR Foundation.
- Data Protection: processes the removal of content and the blocking of data processing before the Spanish Agency for Data Protection where applicable.
- Child care: If there has been violent or humiliating exposure, seek Psychological Support and informs the educational center if there is an impact on school coexistence.
- Helpline: remember that the 900 018 018 It is a resource for addressing bullying and other risks to minors.
For cases with international connections, consider reporting to organizations specializing in online child exploitation. In all scenarios, document every step and avoid on your own tactics that may hinder the investigation.
Advanced Good Practices for Families
In addition to what has already been recommended, adopt measures that increase protection:
- Default privacy: closed profiles, best friend lists, and quarterly permission review.
- Less is more: Avoid full names, uniforms, license plates, addresses, schedules, and geotags. Disable geolocation and delete EXIF metadata before posting.
- Resolution and cuts: upload images with low resolution, cut out backgrounds and make sure they don't appear other minors without express permission.
- Discreet watermark: discourages reuse and facilitates attribution if there is abuse.
- Private albums: use spaces with password for family members (no public links). Rate sharing by email or encrypted services.
- Contact hygiene: clear your address book of strangers; deactivate that “any" can see your profile picture in messaging; monitor who can Resend your stories.
- Technical security: unique passwords, password manager, 2FA and login alerts. Activate login reviews open sessions.
- Family agreements: agree on rules about what is published, ask consent the minor when he is old enough and respects his right not to be exposed.
- Digital education: talk about grooming, privacy and how to ask for help. Teach them not to share photos with unknown nor accept calls outside the app.
Protecting children's image online requires a cool head, empathy, and judgment: post less and better, review your settings, and respond promptly to abuse. Technology changes, but the most protective guidelines remain the same: put the child's interest before social validation and build a family culture where privacy is part of the care we offer them.
