For millions of parents, the sounds of children playing online games like Roblox and Minecraft are a familiar backdrop to daily life. These platforms are hubs for creativity, social connection, and play. But beneath this veneer of innocent fun, a sophisticated and dangerous network is actively using these games as its primary hunting ground.
This is not a story about online bullying or teenage pranks. This is about a network called “764,” an organization the FBI has warned is a “nihilistic violent extremist” (NVE) network, with some experts and law enforcement treating it as an emerging terrorist threat. Run by teenagers, it preys on vulnerable children in the digital spaces they trust most, turning their online worlds into a living nightmare.
After a recent indictment of a 764 member, Attorney General Pamela Bondi said, “This defendant allegedly engaged in acts of extreme cruelty by exploiting a child, abusing animals, and threatening violence — his conduct reflects the depravity of ‘764. These networks seek to terrorize and destabilize our communities by preying on the most vulnerable, and the Justice Department will stop at nothing to dismantle this network and bring offenders to justice.”
It’s Not Just an Online Gang; It’s a Teen-Led Terrorist Network
It is crucial to understand that 764 is far more than a simple group of online troublemakers. Federal law enforcement identifies it as a nihilistic extremist community run by and composed of teenagers. Its ideology is not political in a traditional sense but is rooted in a desire for pure destruction and chaos. The network, founded by a Texas teenager named Bradley Cadenhead when he was just 15, operates under the mantra “no lives matter,” seeking to destroy civilized society through the corruption and exploitation of the vulnerable. According to court documents, Cadenhead, who named the group after his local area code, had been fascinated with online content depicting murder and torture since the age of 10.

The group draws its aesthetics and tactics from the esoteric militant movement known as the Order of Nine Angles (O9A), adopting its imagery and language to appear more dangerous and organized. While many members may not be true doctrinal believers in O9A’s complex ideology, they actively use its accelerationist tactics to achieve the same goals. The reality is as shocking as it is unprecedented: a decentralized, global, teen-led organization is being treated by federal law enforcement as a significant national security threat.
Popular Gaming Platforms Are the Primary Hunting Ground
The network’s predators operate where their victims feel safest: popular online games. According to a detailed analysis by global extremism researchers, games with young player bases, specifically Roblox and Minecraft, are “principal platforms for predation” by 764 members. The recruitment process is methodical and chillingly effective.
The FBI released a Public Service Announcement in March 2025, “warning the public of a sharp increase in the activity of “764” and other violent online networks which operate within the United States and around the globe. These networks methodically target and exploit minors and other vulnerable individuals, and it is imperative the public be made aware of the risk and the warning signs exhibited by victims.” They continued, “These networks exist on publicly available online platforms, such as social media sites, gaming platforms, and mobile applications commonly used by young people. Many threat actors systematically target underage females, but anyone — juveniles, adults, males, and females — can be targeted.”
Perpetrators first establish contact with a child through the games’ public chat features, often feigning friendship or shared interests. Once a connection is made, they invite the victim to a private space, most commonly a Discord server. It is in these unmonitored, private channels that the grooming, manipulation, and sextortion begin. The network specifically targets vulnerable youth, seeking out victims in online communities for LGBTQ+ individuals, racial minorities, and those struggling with mental illness, who may be more socially isolated or hesitant to seek help.
The Network Forces Victims to Become Abusers
One of the most insidious tactics employed by 764 is turning its victims into perpetrators. This cycle of violence is not an accident; it is a core mechanism for the network’s self-preservation and growth. Children who have been groomed, blackmailed, and traumatized are then coerced into inflicting the same abuse on others, including the horrific practice of “fan signing,” where new victims are forced to cut the names of group members into their skin.
This strategy traps victims in a web of complicity and fear. As one analysis notes, this cycle is essential to the community because “trauma preserves members who are either scared of losing social bonds or accepting what they have done.” By forcing victims to commit crimes, the network ensures they are too afraid and ashamed to seek help from parents or law enforcement, knowing they are now implicated in the abuse.
Child Exploitation Is a Gateway to Mass Violence
Within the 764 network, child sexual abuse material (CSAM) is not the endgame; it is a tool for radicalization. The abuse is viewed as a necessary prerequisite to desensitize individuals and prepare them for larger, public acts of violence. According to extremism experts, this tactic is drawn directly from the ideology of the Order of Nine Angles, which sees such criminal acts as a crucial stepping stone to terrorism. The depravity escalates from forced self-harm to coerced animal abuse and even livestreamed suicides.

Court documents reveal a consistent pattern. Members like Bradley Cadenhead and Chandler Pong first became known to law enforcement not for child exploitation, but for making terroristic threats or for their involvement with violent, racially motivated ideologies. Cadenhead was first investigated after being reported by an Assistant Principal in September 2018 for making such threats at school. The child pornography charges often came later, revealing that the abuse was part of a more violent goal.
As U.S. Attorney Edward R. Martin Jr. stated, the depravity of the network’s operations is staggering:
“The allegations in this case are not only disturbing, they are also every parent’s nightmare … The number of victims allegedly exploited by these defendants, and the depths of depravity are staggering.”
Arrests Aren’t Enough to Stop an Ideology
Law enforcement has mounted a significant response. “Operation Restore Justice,” a major FBI effort, resulted in 205 arrests. The bureau currently has over 250 ongoing investigations tied to the network. As confirmed by the head of the FBI’s Counterterrorism Division, this means every single one of its 55 field offices across the country is handling a 764-related case, ABC News reported.
Despite these successes, 764 persists because it is more of an ideology than a hierarchical organization. When leaders are arrested, the network doesn’t collapse; it adapts. It rebrands into splinter groups with names like Harm Nation, Sewer, and 764 Inferno, all sharing the same operational goals. The decentralized nature of the network, combined with its use of platforms like Discord and Telegram where messages can be permanently deleted, presents immense challenges for monitoring and dismantling these communities.
A New Battlefield for Parental Awareness
The rise of the 764 network is a terrifying reminder that the online spaces where our children play, learn, and socialize can also host sophisticated and depraved extremist threats. The line between a game and a hunting ground has been deliberately blurred by predators who are masters of manipulation.
This new reality demands a new level of awareness and vigilance from parents, educators, and law enforcement. As our children’s lives become increasingly digital, how can we adapt to protect them from ideologies that weaponize the very platforms meant for connection and play?
Closing the Gates: New Safety Measures from Roblox, Discord, and Minecraft
Major gaming and social platforms have introduced new “digital moats” specifically designed to break the recruitment cycle of violent networks. These updates focus on identity verification and restricting the ability of strangers to contact children.
- Roblox
Roblox is often the “contact point” where recruiters first identify victims before moving them to encrypted apps.
- Facial Age Verification: To prevent adults from posing as children, Roblox now requires users to verify their age using a government ID and a facial scan to access certain chat features and age-rated experiences.
- “Trusted Connections” Only: Default settings for users under 13 now block direct messages from anyone who is not added as a “friend.”
- Link Blocking: The platform has aggressively updated its chat filters to block links to Discord, Telegram, or other off-platform sites where radicalization occurs.
- Law Enforcement Integration: Roblox has a dedicated 24/7 escalation channel with the FBI and the National Center for Missing & Exploited Children (NCMEC) to report imminent threats of violence or self-harm detected in chats.
- Discord
Discord is considered the “operating base” for many violent online groups. In response, they have rolled out aggressive teen-safety tools.
- The “Family Center”: A new dashboard allows parents to see who their teen is talking to and which communities they have joined, without violating the teen’s privacy by reading the actual message contents. This helps parents spot if a child has joined a “Com” server or is messaging known bad actors.
- Sensitive Content Filters: A “blur” feature is now default for teens. It automatically detects and blurs explicit or gory images—a primary weapon used by “764” to desensitize or blackmail victims.
- Safety Alerts: If a teen receives a DM from a stranger who has been flagged for suspicious behavior, Discord displays a pop-up warning advising the teen not to respond.
- Minecraft (Microsoft/Xbox)
Since Minecraft does not have a central server browser, safety relies on the “Xbox Family Settings” ecosystem.
- “Cabined” Accounts: By default, accounts for users under 13 cannot access multiplayer modes or chat with strangers unless a parent explicitly unlocks these features via a PIN.
- Chat Isolation: Parents can set communication to “Friends Only” or “Nobody,” effectively cutting off the ability for recruiters to groom children on public servers.
- Player Reporting: A relatively new tool allows players to report abusive chat messages directly to Microsoft’s safety team, even on private servers.
Collective Defense: The “Lantern” Program
The most significant development in fighting groups like “764” is not visible to users. It is a backend collaboration known as Project Lantern.
Launched by the Tech Coalition (which includes members like Roblox, Discord, Google, and Meta), Lantern is a cross-platform “signal sharing” program.
- How it Works: If Discord identifies a user spreading child sexual abuse material (CSAM) or violent extremist content, they generate a digital “fingerprint” (hash) of that user and content.
- The Signal: This signal is instantly shared with other member platforms (like Roblox or Instagram).
- The Result: Even if the predator has not yet acted on Roblox, the platform can preemptively ban their account or block the content based on the evidence from Discord. This prevents “764” members from simply jumping from one app to another when they get caught.
Federal Guidance: How to Build a Digital Defense
While the threat of violent online networks and grooming pipelines like “764” can feel overwhelming, federal agencies emphasize that parents are not powerless. Both the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have outlined clear, tiered strategies to combat online exploitation.
The defense strategy relies on three pillars: Understanding the problem, Knowing the threats, and Taking action.
1. Establish the “Human Firewall”: Communication
The FBI and DHS agree that technical controls are secondary to open communication. A child who knows how to identify a “safe adult” is less likely to seek validation from a predator.
For Younger Children:
- The “Pop-Up” Rule: Teach them never to click on pop-ups or unexpected windows.
- Stranger Danger: Explain that online friends are not the same as real-life friends. If someone makes them feel nervous, scared, or uncomfortable, they must tell a trusted adult immediately.
- Privacy First: instill the rule that they must never share passwords, addresses, or school names with anyone online.
For Tweens and Teens (The High-Risk Demographic):
- The “Platform Switch” Red Flag: This is the most critical rule regarding the Roblox-to-Discord pipeline. Warn your child that they should never leave a game to chat with someone on a different platform. If a “friend” in Roblox asks them to move to Discord, Snapchat, or Instagram, it is an immediate warning sign of grooming.
- Secrecy vs. Privacy: Explain that safe adults do not ask children to keep secrets from their parents. If an online friend asks for a secret channel or separate chat, they are a threat.
- Data Permanency: Discuss that sexting and sending photos is permanent. However, ensure they understand that it is never too late to ask for help, even if they have already made a mistake or shared a compromising image.
2. Hardening the Target: Technical & Physical Controls
Federal agents emphasize that predators rely on anonymity and lack of supervision. You can reduce these risks by “hardening” the environment your child operates in.
- Supervise the Environment: Keep computers and gaming consoles in open, common areas of the home. The FBI suggests setting strict time limits and device check-in times to prevent late-night radicalization or grooming.
- Audit the Apps: Review every game and app before allowing a download. Pay special attention to apps featuring end-to-end encryption or user anonymity (like Discord or Telegram), as these are the primary tools for online child predators.
- Lock Down Settings:
- Set all accounts to Private.
- Turn off location services for social media and camera apps.
- Password-protect the App Store to prevent unauthorized downloads of encrypted messaging apps.
- Know the Friends List: Regularly review who your child is connecting with. If you don’t know them in real life, remove them.
3. Recognizing the Signs of Compromise
According to FBI, violent online networks target vulnerable children by manipulating them into producing self-harm or gore content. Parents must be vigilant for behavioral changes that indicate a child is being coerced.
Watch for:
- Attempts to conceal online activity or quickly switching screens when a parent enters the room.
- Withdrawn behavior, depression, or sudden anxiety.
- Angry outbursts when asked to get off the device.
- Possession of multiple accounts on a single platform (e.g., a “decoy” account for parents and a “real” account for the group).
4. Crisis Response: What to Do If You Find Evidence
If you discover your child has been targeted, or if they confess to being involved in a group, your immediate reaction is critical to the investigation.
The FBI advises the following “Do’s and Don’ts”:
- DON’T Delete Evidence: Do not delete messages, images, or videos sent by the predator. Do not delete the app. This data is crucial for law enforcement to track and prosecute the offender.
- DO Capture Everything: Take screenshots of usernames, conversation histories, IDs, and images.
- DO Report Immediately:
- Call 911 if there is an immediate threat to physical safety.
- File a report with the FBI at tips.fbi.gov or the Internet Crime Complaint Center at www.ic3.gov.
- Contact NCMEC: Call 1-800-843-5678 or visit report.cybertip.org.
Additional Resources on Online Child Safety
- DHS Know2Protect
- FBI: Parents, Caregivers, and Teachers: Protecting Your Kids
- U.S. Secret Service
- Internet Crimes Against Children (ICAC) Task Force Program
- National Center for Missing and Exploited Children: Prevention Education and Professional Training
Feeling lost in the digital world? Dr. Tom is here to help!
Join Dr. Tom every week in his column, Dr. Tom’s Cyber Bits and Tips, for byte-sized advice on all things cyber and tech. Whether you’re concerned about online safety, curious about the latest cybercrime trends, or simply want to navigate the ever-evolving digital landscape, Dr. Tom has you covered.
From practical cybersecurity tips to insightful breakdowns of current threats, Dr. Tom’s column empowers you to stay informed and protect yourself online. So, dive in and get savvy with the web – with Dr. Tom as your guide!
Sign up for our Sunday Spectator. Delivered to your inbox every Sunday, with all the news from the week.




