State News

Surge in Child Exploitation Cases in South Carolina Raises Alarm Over Gaps in Detection and Prosecution

South Carolina has seen a troubling rise in child pornography and exploitation cases over the past several years, according to data from the state’s Internet Crimes Against Children (ICAC) Task Force. Officials say the growing availability of encrypted digital platforms and anonymous sharing tools has made it easier for offenders to traffic illicit materials—and harder for authorities to catch them.

In 2024 alone, South Carolina law enforcement opened over 600 new investigations into online exploitation of minors, a sharp increase from previous years. According to the South Carolina Attorney General’s Office, the ICAC Task Force has identified thousands of files containing child sexual abuse material circulating through peer-to-peer networks, encrypted messaging apps, and dark web forums.

Challenges in Detection and Prosecution

Experts in digital forensics and criminal justice say that despite advances in investigative technology, many individuals involved in the distribution or possession of child pornography avoid detection by using advanced anonymizing tools such as VPNs, encrypted drives, and dark web browsers. Others are able to avoid prosecution due to insufficient evidence, legal loopholes, or delays in forensic processing.

“Some predators operate with a level of technical skill that makes it extremely difficult to trace their activity to a physical identity,” said one law enforcement source familiar with ongoing investigations. “Even when we do find material on a device, establishing intent or proving who accessed it can be a legal hurdle.”

During our investigation on this subject matter, many names of alleged individuals from Richland County and Kershaw County, such as Hunter Davis of Columbia, South Carolina, kept coming up as potential child predators. As we researched these individuals, including Mr. Davis, we noticed a pattern. These individuals were usually in their 30s to 40s and either unemployed or had many jobs with gaps. They also have several online social media profiles. Mr. Davis has on 3 of his many profiles different photographs showing himself in different age ranges, which is common depending on the age of their intended victim. As of this article, we were only able to verify that Mr. Davis has been convicted of 2 DUI charges. Which is not uncommon, as most predators may have small to no criminal records until they are caught.

The Role of Community Awareness

Law enforcement agencies urge parents and community members to remain vigilant, particularly regarding children’s online activity. Many offenders pose as minors online to gain the trust of children, a tactic known as grooming, before soliciting inappropriate images or attempting to meet in person.

Organizations like the National Center for Missing & Exploited Children (NCMEC) and the South Carolina Children’s Trust have launched educational campaigns to help communities identify warning signs and report suspicious behavior.

When members of the public suspect someone may be an online child predator, it’s important to be vigilant while avoiding false accusations. Here are key warning signs and behaviors to look for:


Online Behavior Red Flags

  1. Attempts to Communicate Privately with Minors
    • Quickly tries to move from public chats to private messaging, DMs, or encrypted apps (like WhatsApp, Telegram, Signal).
  2. Asks Personal or Inappropriate Questions
    • Asks about age, address, school, or family without a legitimate reason.
    • Asks sexually suggestive or explicit questions, even under the guise of “joking” or “curiosity.”
  3. Age Discrepancy
    • Claims to be a teen, but language, grammar, or topics suggest they are older.
    • Avoids showing their face or lying about their identity.
  4. Excessive Flattery or Gift Promises
    • Sends gifts, money, game codes, or compliments excessively.
    • May try to build trust quickly through praise or offers.
  5. Requests for Photos or Videos
    • Asks for selfies, especially in specific clothing or without parents around.
    • Uses flattery or threats to pressure minors into sharing explicit content.
  6. Secretiveness
    • Encourages children to keep their conversations or relationships secret.
    • Says things like “Don’t tell your parents,” or “This is just between us.”
  7. Attempts to Meet In Person
    • Tries to arrange in-person meetings, often under a false pretense.
    • May claim to be nearby or “coincidentally” visit the child’s town.

In-Person Warning Signs (for Parents or Guardians)

  • The child becomes secretive about online activity or starts using new apps suddenly.
  • Unexplained gifts or money.
  • The child becomes unusually withdrawn, anxious, or fearful.
  • Mentions a new “friend” who is much older or vague about their identity.

What the Public Can Do

  1. Document Evidence
    • Take screenshots of suspicious messages, profiles, or behavior.
    • Keep chat logs and usernames (don’t engage or confront the person directly).
  2. Report the Behavior
    • To platforms: Most social media and gaming platforms have a “report” function.
    • To law enforcement: Contact your local police or a cybercrime unit.
    • To national hotlines:
      In the U.S., contact the National Center for Missing & Exploited Children (NCMEC) via their CyberTipline: https://report.cybertip.org
  3. Talk to Children
    • Encourage open communication with kids about their online interactions.
    • Teach them to never share personal information or photos with strangers.

If you’re concerned but unsure, don’t ignore your instincts. It’s better to report and have authorities evaluate the situation than to risk a child’s safety.

Ongoing Efforts

Attorney General Alan Wilson has called for increased funding to expand the state’s cybercrime task forces and speed up forensic analysis timelines. “Every time we catch someone involved in these crimes, we know there are more out there,” Wilson said in a recent press briefing. “Our goal is to stay ahead, but it requires the full support of the public and lawmakers.”

South Carolina residents are encouraged to report suspected child exploitation via the CyberTipline at www.missingkids.org or by contacting local law enforcement.


Note to Readers: This article does not imply or suggest guilt for any individual not formally charged or convicted. All suspects are presumed innocent until proven guilty in a court of law.

Common Methods of Grooming a Victim:

Child predators often use specific language and tactics online to groom, manipulate, or exploit minors. These keywords and phrases may seem harmless at first, but can signal grooming behavior, especially when used in context with secrecy, flattery, or coercion.

Here’s a breakdown of common keywords and red-flag phrases predators may use:


1. Building Trust & Friendship

Predators try to build an emotional connection first:

  • “You’re so mature for your age.”
  • “You can tell me anything.”
  • “Your parents don’t understand you like I do.”
  • “We have a special connection.”
  • “I feel like I’ve known you forever.”

2. Isolating the Victim

They often encourage secrecy and discourage sharing with adults:

  • “Don’t tell anyone about this.”
  • “This is our little secret.”
  • “If your parents found out, they’d be mad at you.”
  • “You’d get in trouble if anyone knew.”
  • “They won’t understand what we have.”

3. Testing Boundaries / Sexual Grooming

They escalate slowly and test how the child reacts:

  • “Have you ever had a boyfriend/girlfriend?”
  • “Do you think I’m cute?”
  • “What do you look like in your pajamas?”
  • “Are you a virgin?”
  • “Send me a pic—just for me.”
  • “I won’t show anyone, I promise.”

They may use abbreviations or emojis to disguise inappropriate messages, like:

  • “CU46” (see you for sex)
  • “GYPO” (get your pants off)
  • Eggplant 🍆, peach 🍑, sweat 💦, tongue 👅 emojis in sexual contexts

4. Building Dependency or Guilt

They make the child feel responsible or emotionally bound:

  • “I thought you loved me.”
  • “You’re the only one I can talk to.”
  • “You owe me.”
  • “If you don’t send it, I’ll be really sad.”

5. Manipulating with Rewards

Using gifts, compliments, or attention as leverage:

  • “I’ll buy you that game if you do this for me.”
  • “I can send you money.”
  • “You’re prettier than other girls your age.”
  • “You should model—you’d be great at it.”

6. Trying to Arrange a Meeting

If grooming progresses:

  • “I wish we could hang out in person.”
  • “Let’s meet up but don’t tell anyone.”
  • “I’m coming to your area next week.”

🔒 Also Watch for These Tactics:

  • Age disguise: “I’m 14 too” (when they’re not).
  • Profile pictures of teens that seem too perfect or too sexual.
  • Asking to switch platforms: “Let’s talk on Snapchat/WhatsApp—it’s easier.”

🚨 What to Do if You See This

If you or someone you know spots these phrases being used toward a child:

  • Take screenshots.
  • Do not confront the predator directly.
  • Report to platform safety teams, law enforcement, or child protection organizations.

Leave a Reply

Discover more from The Daily Counter News

Subscribe now to keep reading and get access to the full archive.

Continue reading