logo
Online campaign sheds light on sexual grooming in Malaysia

Online campaign sheds light on sexual grooming in Malaysia

The Star08-05-2025

In a recent Instagram post, Women's Aid Organisation (WAO) brought fresh attention to a deeply troubling issue that continues to plague many societies: sexual grooming.
The post, which is part of a social media campaign, was prompted by the tragic death of Korean actress Kim Sae-Ron, 24, whose past relationship with K-pop star Kim Soo-Hyun, 37, is now under renewed scrutiny.
Kim was reportedly groomed by Soo-Hyun from the young age of 15 – a disturbing but not uncommon pattern, as WAO reminded Malaysians.
Sexual grooming is a method of manipulation that predators use to exploit and abuse minors, often while flying under the radar.
It's subtle, calculated, and extremely dangerous – and worse, it is often misunderstood or dismissed altogether.
The perpetrator usually tries to gain the trust of the young person and makes them feel special or loved, with the aim of sexually exploiting them later. Grooming is not an act of sudden violence or overt threat. It is, by nature, insidious.
Groomers manipulate a child or vulnerable person through emotional control, gaining trust before exploiting them sexually or psychologically. It can be hard to detect because it often appears as affection, mentorship or friendship, says WAO.
The process typically follows five stages: target selection (identifying a vulnerable victim); gaining trust (befriending the child or their family); building emotional dependence (making the victim feel special or loved); desensitisation and isolation (introducing inappropriate topics or behaviour and cutting off other influences); exploitation and control (initiating abuse and ensuring silence through fear, guilt or shame).
Groomers could be anyone – a family friend, religious leader, teacher or even a potential romantic partner.
While global headlines may focus on celebrities, the issue is disturbingly close to home.
Malaysia has seen its fair share of cases where the offence was overlooked, even defended, says WAO.
Take the case of a Dublin-based child psychiatrist who groomed and abused a teenage girl with mental health struggles, offering her therapy in exchange for sexual access. According to an Irish Times report in December 2024, Amirul Arif Mohd Yunos was sentenced to eight years and six months' jail. But WAO says that despite his conviction, some people stood by him, offering glowing testimonials.
"This kind of support contributes to a culture where victims are silenced and abusers shielded," WAO adds.
"Equally troubling is the case of Nur Fitri Azmeer Nordin, who was convicted in Britain in 2015 for possessing over 30,000 images of child pornography. Because Malaysia's child sex offender registry was only established in 2017, his name was never included. He went on to study and teach – a chilling example of how the system has failed."
WAO points to the normalisation of grooming in Malaysian society.
"In another instance, a man (bus driver) known online as 'Abang Bas' posted a video on TikTok (in September 2024) about a nine-year-old schoolgirl on his bus, calling her his 'crush' with a heart emoji. Despite the inappropriateness, some netizens defended him – a stark sign of how society trivialises such behaviour," adds WAO. Globally, grooming is also masked as romantic relationships.
Hollywood celebrities like Demi Lovato and Henry Cavill have spoken of or been scrutinised for relationships with significant age gaps that began when one partner was a teenager. Lovato has since described these relationships as "gross" and symptomatic of her "daddy issues" – shedding light on how manipulation can be misinterpreted as love.
Why groomers prefer the young
At the core of grooming is the desire to control, says WAO.
"Men like Andrew Tate, a controversial online figure, publicly state their preference for young women ... when what they really mean is these young women are easier to manipulate. The law may say 18 is the legal age, but the line is often pushed further back through grooming."
"The idea of young girls being pure and naive is used as a justification for men to prey on them. The problem isn't just with individual predators. Often, it's with the systems and social attitudes that protect them," cautions WAO.
"This is a form of gender-based violence," it says. "Don't be afraid to speak up. And know that it's never the victim's fault."
WAO urges anyone who suspects grooming to contact their hotline to seek support.
More info: wao.org.my/ (WAO website) or @womensaidorg (Instagram)

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

This is the phishing scam that gets an identity theft expert in the US 'really, very angry'
This is the phishing scam that gets an identity theft expert in the US 'really, very angry'

The Star

time16 hours ago

  • The Star

This is the phishing scam that gets an identity theft expert in the US 'really, very angry'

Digital thieves are nothing if not persistent and innovative. They keep finding new ways to try to part you from your money. Phishing – where thieves pose as trusted entities or send legitimate looking emails or messages to trick you into giving them access to your accounts – is a widespread method. And it is constantly evolving. 'We've seen phishing go through the roof,' said Eva Velasquez, the CEO of the Identity Theft Resource Center, a San Diego-based national nonprofit. But knowledge is power. So here are three emerging phishing threats to look out for, according to Internet safety experts. All three threats target key parts of people's digital lives: email attachments that lead to fake login pages, multi-factor authentication trickery and deceptive calendar invites. Spending a few minutes reading these pointers could help you avoid getting your ID or money stolen and save you countless hours of dealing with the fallout. HTML attachments that open fake login pages Imagine a busy professional who is in email action mode. In the past 30 minutes on a Saturday morning, he has filled out emailed liability waivers for his seven children's summer camps, filed an expense report for work, answered a secure portal message from the veterinarian about his sick puppy's prescription, skimmed 182 email subject lines and paid five bills from his email inbox, including a car insurance premium and his beloved cheese-of-the-month club. Amid this flurry of inbound emails, ads, invoices and secure messages, he is working on autopilot: opening messages, skimming, clicking and signing in. What a perfect opportunity. Scammers are taking advantage of user distraction – and their trust – by sending emails with HTM or HTML attachments. When clicked, those open a browser file that looks like secure, familiar login page. These pages might look like secure invoice viewers, file-sharing services like DocuSign or Dropbox, or sign-in pages to platforms including Microsoft 365. 'Once the user enters their credentials, they are sent surreptitiously to the attacker's server,' said Vlad Cristescu, the head of cybersecurity with ZeroBounce, a Florida company that helps businesses lower their rate of bounced marketing emails. Why this method is especially insidious: 'There isn't a clickable link in the email, so standard email security filters (which scan for malicious URLs or attachments like PDFs and ZIPs) may not catch it,' Cristescu added. To prevent this, he added, companies should 'restrict HTML attachments unless essential, and users should treat unfamiliar HTML files the same way they'd treat a suspicious link – don't open it unless you're absolutely sure of the sender.' If you do receive incoming communication with an HTML link or attachment, don't engage, said Velasquez, with the ITRC. 'Don't click on links, people. That's the big, overarching message,' she said. Instead, go to the source: call the phone number on the back of your credit card, visit the bank in person. Multifactor authentication tricks If you are one of the many people who uses multifactor authentication, take note. Multifactor authentication is still very helpful and should be used. But Cristescu flagged one way that scammers are taking this tool – which is designed to make people's online accounts more secure – and using it to slither in. As a refresher, multifactor authentication is an added layer of protection that prevents data thieves from logging into your accounts if they have your username and password. It helps ensure that you're the one who typed in your password when you log in, and not some scammer in the Philippines or Poughkeepsie. To use multifactor authentication, you typically download an app, such as Google Authenticator or Microsoft Authenticator. You register your sensitive online accounts, such as Facebook, bank or email, with that app. Then, every time you log into a registered website, the authenticator app generates a new, random code that you enter after your password as a second layer of verification. With the rise of this protection, a new threat has emerged: Scammers who have your username and password can send log-in requests to your authenticator app. Next, the scammer can pose as an IT expert from your workplace and ask you to approve the log-in request. If you fall for it, then boom – the scammer is in. This technique 'exploits a user's frustration and trust in IT. If you're receiving multiple (authenticator) prompts you didn't initiate, that's not a glitch – it's an attack,' Cristescu said. He recommends pausing, never approving these unexpected requests and flagging the interaction with IT. Velasquez added that if you get an authenticator notification and you didn't just log in yourself, 'That is a huge red flag. Stop and address it. Don't ignore it.' Anytime you interact with IT, be sure you're the one initiating that contact, she added. If someone from IT calls or emails you, disconnect and reach back out using a trusted method, such as the same phone number you always dial. Fake calendar invites A third technique data thieves are using is calendar invites. 'I just get really very angry about this one,' Velasquez said. 'It is super hard to detect.' Here's what to look out for. If you use an online calendar like Google calendar or the native iPhone calendar app, you might receive an invitation to an event you didn't see coming. Sometimes these meetings are legitimate. Sometimes, they are not. Scammers 'are now sending meeting requests with malicious links embedded in the invite or 'join' button. These invitations sync directly into calendars and often go unquestioned,' according to ZeroBounce. Scammers use calendar invites because they have 'built-in credibility – they're not usually scrutinised like emails,' Cristescu said. Look for meeting requests from unknown senders and vague event names like 'Sync' or 'Project Review,' he added. In some jobs or roles, meetings routinely get added to calendars by other people –clients, prospects, coworkers, bosses, peers. 'I have gotten these repeatedly,' said Velasquez, with the ITRC. 'Depending on your lifestyle and your job and how you work, these are going to be particularly challenging. They are real calendar invites. The problem is they have malicious software embedded in them – so when you click on portions of them, 'Click to join,' it's like opening an attachment (or) clicking on a suspicious link. It's the same principle.' Cristescu, with ZeroBounce, shared this tip: 'Treat those just like a phishing email. Disable auto-accept where possible and review every invite manually before clicking anything.' Never stop questioning what lands in your inbox or calendar, Cristescu added. 'Always verify the sender's email address, ensure that any link you click matches the legitimate domain, and look out for subtle red flags like spelling errors or unusual formatting.' A big picture pointer 'All three of these (scams) are so common that it has probably happened to every single person reading the article – at least one of them. That's how ubiquitous these are,' Velasquez said. She shared this broader thought: It's less important to know how to respond to each scenario and more important to pause, be skeptical, double check. It's important to be ever more sceptical, because AI makes it easier and easier for thieves to create convincing ruses, Cristescu and Velasquez both said. AI 'really helps with making these phishing offers look and sound so much more legitimate,' Velasquez said. 'And with the amount of data that is out there from public sources and from data breaches, it's very easy to see what relationships people have.' Where you bank, where you do business – that is all fodder for someone to create a copycat page designed to trick you into logging in. Adopt an 'investigator mindset,' Velasquez said. Use this helpful reminder: the acronym STAR, which stands for Stop. Think. Ask questions or ask for help. Reassess. – The San Diego Union-Tribune/Tribune News Service

PAS leaders slam Anwar's immunity bid in civil lawsuit as anti-reform
PAS leaders slam Anwar's immunity bid in civil lawsuit as anti-reform

Focus Malaysia

timea day ago

  • Focus Malaysia

PAS leaders slam Anwar's immunity bid in civil lawsuit as anti-reform

SENIOR leaders of PAS have strongly rebuked Prime Minister (PM) Datuk Seri Anwar Ibrahim over his bid for immunity in a civil lawsuit brought against him by former research assistant Muhammed Yusoff Rawther, who has accused the PM of sexual assault. PAS Pahang information chief Ustaz Aireroshairi Roslan and PAS Youth deputy chief Ustaz Mohd Hafez Sabri condemned the move as a betrayal of Anwar's reformist rhetoric and an attempt to evade accountability. Hafez asserted that no one, including the PM, should be above the law. He criticised Anwar for suing other politicians such as Kuala Terengganu MP Datuk Ahmad Amzad Hashim and Kedah Menteri Besar Datuk Seri Muhammad Sanusi Md Nor, who faced their lawsuits openly while Anwar seeks to avoid the same process. 'This undermines the rule of law and the credibility of national leadership,' Hafez said. Aireroshairi described Anwar's immunity bid as a sign of 'weakness and fear' of the judicial process, arguing it contradicts the principles of democracy and justice. He noted that the alleged incident occurred on Sept 2, 2018, when Anwar was a private citizen, not PM, making his claim to immunity inappropriate. 'This is a legal manoeuvre to escape accountability,' Harakahdaily quoted Aireroshairi as saying, pointing to Yusoff's polygraph test at Bukit Aman, which found him truthful, followed by charges against him for drug and firearm offences, raising concerns of targeted oppression. PAS Youth Malaysia proposed that Anwar withdraw his immunity application, cooperate fully with the judicial system, and support the creation of a National Leadership Ethics Commission to ensure transparency. 'If innocent, prove it in court. If guilty, seek forgiveness for justice,' Hafez urged, emphasising that true reform requires leaders to face accountability head-on. The controversy has sparked calls for Malaysians to demand transparency, with PAS leaders insisting justice must apply equally to all, especially those in power. — May 31, 2025 Main photo credit: Sinar Harian

Empowering youth against radicalisation
Empowering youth against radicalisation

Focus Malaysia

timea day ago

  • Focus Malaysia

Empowering youth against radicalisation

THE 2025 Global Terrorism Index (GTI) reveals a troubling reversal in the global fight against terrorism. After nearly a decade of progress, the world has seen an 11% increase in terrorism-related deaths, with 66 countries reporting at least one attack in 2024 up from 58 the previous year. While Malaysia still ranks low in direct terrorism incidents, the recent Ulu Tiram attack where a lone assailant killed two police officers in Johor marks a significant and disturbing development. This incident is not just a singular tragedy it is a symptom of a broader, more insidious trend: youth radicalisation and the rise of lone-wolf extremism, driven by digital propaganda, identity politics, and ideological distortion. It is no longer sufficient to view terrorism as solely a security issue. Malaysia must treat it as a societal challenge, where the Education Ministry and the Youth and Sports Ministry are central to a national strategy. Lone wolves in our backyard The Ulu Tiram attacker had no known affiliation with global terrorist groups like ISIS or al-Qaeda. Like many perpetrators of lone-wolf violence in the West, he was reportedly radicalised through online content, consumed in digital echo chambers without formal recruitment or training. The GTI notes that 93% of fatal terror attacks in the West over the past five years were executed by such individuals self-radicalised, ideologically motivated, and increasingly young. Malaysia now faces a similar trajectory. Our youth, highly connected and socially aware, are also vulnerable to ideological manipulation, particularly in times of political instability, socioeconomic inequality, or perceived marginalisation. Race, religion, and the politics of division Malaysia's rich multi-ethnic and multi-religious composition, once a hallmark of national pride, is being increasingly weaponised. Certain political figures exploit race and religion to consolidate support, often at the expense of national cohesion. Simultaneously, hate preachers and religious extremists exploit online platforms and local sermons to propagate narratives that portray religious or ethnic groups as existential threats. When youth repeatedly encounter these messages whether through WhatsApp chains, social media, or even the pulpit they begin to internalise a distorted worldview: one that legitimises violence in defence of identity. The seeds of radicalisation are no longer planted by foreign fighters they are cultivated at home, in plain sight. Cultivating resilience in the classroom Education is Malaysia's most powerful tool in the fight against extremism. The Education Ministry must urgently revise its approach, ensuring that classrooms become incubators of tolerance, critical thinking, and civic responsibility. First, digital literacy and media awareness must be fully integrated into the national curriculum from primary school to tertiary education. Young Malaysians must learn how to evaluate sources, question narratives, and challenge extremist content. This skillset is not only academic it is a defence against ideological harm. Second, interfaith education and civic studies must be revitalised to promote mutual respect and national unity. Students should learn not only about their own heritage but also about the histories, beliefs, and contributions of others. These lessons humanise 'the other' and inoculate young minds against divisive rhetoric. Third, teacher training is essential. Educators must be equipped to detect early warning signs of radicalisation such as withdrawal, sudden changes in worldview, or fixation on identity-based grievances. But more importantly, they must be supported with referral pathways that connect schools to mental health professionals, social workers, and community organisations, enabling early intervention without criminalisation. Offering purpose and belonging Radical ideologies often prey on disenfranchised youth those who feel invisible, undervalued, or disempowered. The Youth and Sports Ministry must take proactive steps to provide these young Malaysians with meaningful alternatives to extremism. This includes expanding access to youth empowerment programmes, especially in underserved and high-risk areas such as Sabah, Sarawak, Kelantan, and parts of urban Klang Valley. Leadership development, skills training, sports leagues, and creative arts programmes should be used to build self-esteem, provide structure, and foster social inclusion. Youth centres can also become platforms for counter-narratives safe spaces where difficult issues can be discussed, identities explored, and dissent expressed without violence. By collaborating with athletes, influencers, musicians, and activists, the ministry can promote messages of unity, peace, and resilience on platforms where young people already engage YouTube, TikTok, Discord, and more. A youth security strategy Malaysia needs a coordinated, youth-centric national security strategy. The Education Ministry and the Youth and Sports Ministry should no longer operate on the sidelines of counter-terrorism but be fully integrated into the National Security Council's efforts. This strategy should include a National Youth Vulnerability Index to map communities at higher risk of radicalisation based on socio-economic indicators, digital activity, and reported grievances. Real-time monitoring and analysis of extremist digital content, using AI and partnerships with tech companies to flag recruitment materials and hate speech. Community-led rehabilitation and reintegration programmes, offering second chances to youth influenced by radical ideologies, with the involvement of psychologists, imams, teachers, and civil society leaders. Prevention is the new security Malaysia's current position on the GTI is relatively stable but it is no cause for complacency. The Ulu Tiram incident is not an anomaly it is a harbinger. Unless we act now, we risk a future where extremist violence becomes normalised, youth disillusionment becomes weaponised, and national unity unravels. By redefining education and youth development as security imperatives, Malaysia can lead the region in proactive counter-extremism. The Education Ministry and the Youth and Sports Ministry must not just participate in national security planning they must lead the charge in safeguarding Malaysia's future. The window for prevention is open. Let us not wait for it to close. ‒ June 5, 2025 R. Paneir Selvam is the principal consultant of Arunachala Research & Consultancy Sdn Bhd, a think tank specialising in strategic national and geopolitical matters. The views expressed are solely of the author and do not necessarily reflect those of Focus Malaysia. Main image: FMT

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store