This process often involves a predator posing as a child or teenager themselves in order to gain the trust of the child, and can take place on a variety of platforms including social media, gaming sites, chat rooms, and forums. Once the predator has established a relationship with the child, they will often try to elicit personal information, photos or videos from the child, and may even try to ar ...