764: The Child Exploitation Network the FBI Classified Like ISIS
Summary
764 is a decentralized child exploitation network founded by a 15-year-old Texas teenager named Bradley Chance Cadenhead, who operated under the alias 'Felix.' The FBI classified 764 as a Tier One threat, the same designation reserved for ISIS and al-Qaeda, after investigators identified more than 5,000 estimated victims across the US, UK, Australia, New Zealand, Germany, Spain, and Greece. The network recruits on Discord, Roblox, TikTok, and Telegram, targeting vulnerable minors and coercing them into producing child sexual abuse material, self-harm content, and livestreamed abuse. Victims are then forced to become recruiters, creating a self-replicating pipeline. Key prosecutions include Cadenhead (80 years), Prasan Nepal (charged with operating a global exploitation enterprise), and Baron Martin (first federal terrorism-related charge against a 764 member under 18 USC 2339A). Canada designated 764 a terrorist entity in December 2025. The United States has no domestic terrorism statute that applies, forcing prosecutors to rely on CSAM, RICO, and creative material-support charges.
Table of Contents
Felix Was Fifteen
Bradley Chance Cadenhead was fifteen years old and living in Texas when he started building what would become one of the most dangerous child exploitation networks ever documented. He called himself Felix. The year was 2020, give or take a few months on either side, and the platform was Discord, where Cadenhead had already spent enough time in the accelerationist fringes of the internet to understand something that most adults still have not absorbed: a teenager with a server and an ideology can do catastrophic damage to hundreds of children before anyone with a badge even knows the network exists.
By the time federal agents caught up to him, Cadenhead had constructed an enterprise that the FBI would classify as a Tier One threat. That designation places 764 in the same investigative priority tier as ISIS, al-Qaeda, and the most dangerous international terrorist organizations the Bureau tracks. He was convicted on nine counts. The sentence was eighty years. He was seventeen.
The name 764 itself carries no grand symbolism. It was a Discord channel number, an artifact of the platform’s random assignment protocol that became a brand, then a movement, then a classification problem that the federal government still has not resolved. Because 764 is not a traditional criminal organization. It has no fixed hierarchy, no membership rolls, no initiation ritual in the conventional sense. What it has is a model, a mechanism for converting vulnerable children into both victims and perpetrators, and that model has proven more durable than any individual leader.
The Recruitment Pipeline
The operational logic of 764 begins with access, and access begins where children already are. Discord servers dedicated to gaming, anime, mental health support, and LGBTQ+ community spaces. Roblox, where the average user is under sixteen. TikTok, where algorithmic amplification can put a predator’s content in front of a depressed thirteen-year-old within minutes of the child searching for self-harm content. Telegram, where encrypted channels provide operational security once a target has been isolated from the mainstream platforms.
The recruitment sequence follows a pattern that investigators have documented across dozens of prosecutions. An operative identifies a target who displays markers of vulnerability: depression, social isolation, gender identity questioning, self-harm ideation, family instability. The initial contact is friendly. Supportive, even. The operative presents as a peer, someone who understands what the target is going through, someone who has felt the same alienation and found a community that accepts them.
This grooming phase can last days or weeks. The operative builds rapport, learns what the target fears and wants, maps the emotional terrain. Then the pivot. The requests begin. Send a photo. Then another. Then something more explicit. The escalation is calibrated. Each demand builds on the last, and each piece of content the target produces becomes a weapon.
Because this is where 764’s model diverges from traditional exploitation patterns. In a conventional grooming scenario, the predator collects material for personal use or distribution. In the 764 model, the material serves a dual purpose: gratification and coercion. Once a victim has produced child sexual abuse material, the operative possesses permanent leverage. Comply with the next demand or the images go to your parents, your school, your friends, law enforcement. The demands escalate. Self-harm content, which 764 members call “cuts.” Livestreamed abuse. Content depicting violence against pets or younger siblings. And then the final turn of the screw: recruit someone else.
The victim becomes a perpetrator. The exploited child, now holding CSAM of another minor, is locked into the network by the same mechanism that trapped them. They cannot report what happened without exposing what they have done. They cannot leave without risking exposure. The pipeline is self-replicating. It does not require a central operator to sustain itself once the cycle begins.
Investigators who have worked 764 cases describe this victim-to-perpetrator conversion as the network’s signature innovation. It is not unique to 764 in concept. Gangs have used similar coercive bonding for decades. But the scale at which 764 operates this model, leveraging platform infrastructure that connects millions of minors with effectively zero identity verification, represents something qualitatively different from what law enforcement encountered in the pre-social-media era.
Five Thousand Victims and Counting
The FBI’s conservative estimate places the number of 764 victims above five thousand. The actual number is almost certainly higher, because the network’s decentralized structure means that cells operate independently, victimization often goes unreported due to the coercive silencing mechanism, and the platforms where the exploitation occurs have historically been slow to detect, report, or preserve evidence.
The geographic scope spans at least six countries. The United States, where the network originated. The United Kingdom, where several prosecutions have proceeded. Australia and New Zealand, where linked cases have surfaced. Germany and Spain, where investigators have identified 764-connected activity. Greece, where one of the network’s co-founders was arrested and where extradition proceedings have generated international legal disputes.
Within the United States, the cases have emerged from coast to coast. Texas, where Cadenhead operated. Arizona, where Baron Martin ran a 764 cell. Maryland, where Erik Lee Madison exploited at least ten girls. The distribution reflects the network’s platform-native character. 764 does not recruit in a particular city or region. It recruits wherever Discord, Roblox, and TikTok have users, which is to say everywhere.
The severity of the documented abuse has shocked investigators who have spent careers in child exploitation units. Court filings describe victims as young as eight being coerced into producing sexual abuse material. Self-mutilation documented on camera. Victims forced to carve words or symbols into their own skin. Animal abuse. Threats against family members. Suicide attempts by victims who saw no other exit from the coercion cycle. At least one victim death has been publicly linked to 764-related exploitation.
The Prosecutions
The federal response to 764 has produced a growing list of convictions and pending cases, each revealing a different facet of how the network operates.
Bradley Chance Cadenhead: The Founder
Cadenhead’s prosecution established the baseline. Arrested as a minor, tried and convicted on nine federal counts, sentenced to eighty years. The sentence reflects both the severity of the conduct and the extraordinary volume of victimization attributed to his direct actions and the network he created. Cadenhead will be in his nineties before he is eligible for release, assuming no modification to the sentence.
His case also exposed the challenge of prosecuting juvenile offenders for crimes of this magnitude. Cadenhead was fifteen when he built 764. He was operating in a legal gray zone where juvenile protections collide with conduct that, in scope and impact, rivals organized crime. The eighty-year sentence signals that the federal system will treat the architects of these networks as adults regardless of the age at which they began offending.
Prasan Nepal: The Co-Founder Charged in 2025
Prasan Nepal, who operated under the alias “Trippy,” was charged in April 2025 with operating a global child exploitation enterprise. Nepal served as a co-founder alongside Cadenhead, and his indictment describes a leadership role in coordinating the network’s recruitment operations, managing distribution channels for CSAM, and directing other operatives. His case remains pending.
Leonidas Varagiannis: The Extradition Battle
Leonidas Varagiannis, known online as “War,” was another co-founder of 764. Greek authorities arrested Varagiannis, but the extradition process has been contested. The legal dispute centers on jurisdictional questions that arise when a cybercrime network operates across multiple countries simultaneously, with servers in one jurisdiction, operators in another, and victims scattered across a third. The Varagiannis case has become a test of whether existing extradition frameworks can handle the geography of platform-native crime.
Baron Martin: The Terrorism Precedent
Baron Martin’s prosecution in Arizona may prove to be the most consequential 764 case from a legal standpoint. In October 2025, Martin was charged with twenty-nine counts, including a charge under 18 USC 2339A, the federal material support for terrorism statute. This marked the first time a 764 member faced a terrorism-related federal charge.
Martin, who used the alias “Convict,” operated a 764 cell that prosecutors allege engaged in the full spectrum of the network’s coercive activities: grooming, CSAM production, self-harm coercion, and recruitment of new victims. The material support charge represents a creative legal theory. Prosecutors argue that Martin provided material support, in the form of personnel, training, and resources, to an enterprise that uses violence and intimidation to achieve ideological objectives.
The 2339A charge is significant because it tests whether the federal terrorism statutes, originally designed for organizations like al-Qaeda and ISIS, can be applied to domestic networks that blend ideology with exploitation. If the charge survives legal challenge, it opens a new prosecutorial pathway for 764 cases and potentially for other accelerationist networks that use child exploitation as a tool of ideological violence.
Richard Densmore: The Marine
Richard Densmore, who went by “Rabid,” was a United States Marine and a member of both 764 and the Order of Nine Angles. His case illustrates the overlap between child exploitation networks and neo-fascist accelerationist movements. Densmore was sentenced to thirty years for his role in 764’s operations. His military status added a dimension of institutional embarrassment for the Department of Defense and raised questions about extremist infiltration of the armed services.
Cameron Finnigan: The UK Prosecution
Cameron Finnigan, alias “Acid,” was prosecuted in the United Kingdom and sentenced to six years. His case demonstrated that 764’s reach extended well beyond US jurisdiction and that British law enforcement had independently identified the network as a serious threat. The relatively lighter sentence compared to US prosecutions reflects differences in sentencing frameworks between the two countries rather than differences in the severity of the conduct.
Erik Lee Madison: Maryland
Erik Lee Madison exploited at least ten girls through 764-connected activity before entering a guilty plea in March 2026. His case is notable for the number of identified victims and for the geographic specificity of his operations in Maryland, which provided investigators with a concentrated evidence base.
Kyle William Spitze: Thirty Years Pending
Kyle William Spitze entered a guilty plea in December 2024 and faces up to thirty years. His case adds to the growing body of convictions that, taken together, map the network’s operational footprint across the country.
The Order of Nine Angles Connection
764 did not emerge from a vacuum. Its ideological architecture descends from the Order of Nine Angles, a neo-fascist occult network that has operated in various forms since the 1970s. O9A’s core doctrine centers on what its texts call “the Sinister Tradition,” a framework that treats violence, transgression, and the deliberate infliction of suffering as initiatory acts. Within O9A’s logic, extreme acts are not merely tolerated but required as proof of commitment and as a mechanism for personal transformation through destruction.
The connection between O9A and 764 is not metaphorical. Richard Densmore was an active O9A adherent. Court documents in multiple 764 cases reference O9A texts, symbols, and organizational concepts. The victim-to-perpetrator pipeline that defines 764’s recruitment model mirrors O9A’s concept of “insight roles,” in which initiates are instructed to infiltrate institutions and commit acts that test and harden their commitment to the ideology. Many of those texts were published through Martinet Press, operated by FBI informant Joshua Caleb Sutter.
What 764 added to the O9A template was platform infrastructure. O9A in its traditional form was a small, diffuse network that spread through printed texts, personal contacts, and later through obscure internet forums. 764 took the same ideological kernel and deployed it through Discord servers, Telegram channels, and social media platforms with hundreds of millions of users. The result was O9A’s violence doctrine at consumer-technology scale.
This ideological dimension is what separates 764 from a conventional child exploitation ring. The network’s operators are not simply collecting CSAM for personal gratification or commercial distribution, though both occur. They are using child exploitation as a tool of ideological violence, a form of accelerationism in which the degradation and destruction of vulnerable people serves as both recruitment mechanism and proof of concept for a worldview built on the premise that civilization should be destroyed through its weakest members.
Platform Accountability
Discord occupies a central position in the 764 story, because Discord is where the network was built, where most of the recruitment occurred, and where the exploitation was coordinated. The platform’s architecture, which allows anyone to create private servers with minimal moderation oversight, provided the operational environment that 764 required. Invite-only servers, nested channels, role-based permissions, and the ability to rapidly create new servers when old ones were reported or shut down gave the network resilience against takedown efforts.
Discord has invested in trust and safety infrastructure over the past several years, and the company points to its collaboration with law enforcement and the National Center for Missing and Exploited Children. The company has reported millions of accounts removed for child safety violations. But the 764 cases reveal a persistent structural problem: the platform’s design prioritizes community creation and privacy in ways that systematically advantage coordinated predator networks over the detection systems meant to stop them.
Senator Mark Warner has been among the most vocal congressional figures pressing Discord and other platforms on their child safety failures. Warner’s office has pushed for greater transparency in how platforms detect, report, and respond to child exploitation on their services, and has specifically cited 764 as evidence that voluntary self-regulation has failed.
Roblox and TikTok face similar scrutiny. Roblox’s user base skews younger than Discord’s, meaning the platform serves as a first-contact point where 764 operatives identify targets before migrating them to more private channels. TikTok’s recommendation algorithm, which surfaces content based on engagement signals rather than safety filtering, has been documented directing vulnerable minors toward content and accounts associated with self-harm and exploitation communities.
The platform accountability question ultimately reduces to a design problem. These companies built products optimized for engagement, growth, and community formation. The same features that make a platform attractive to a fourteen-year-old looking for friends make it attractive to a predator network looking for victims. Until the platforms redesign for safety at the architectural level, rather than bolting detection systems onto engagement-optimized infrastructure, the dynamic will persist.
The Legal Gap
The FBI classified 764 as a Tier One threat. Canada designated 764 as a terrorist entity in December 2025, the first country to formally apply counterterrorism law to the network. The United States has done neither.
This gap is not an oversight. It is a structural feature of American law. The United States has no federal domestic terrorism statute that provides the charging framework necessary to prosecute 764 as a terrorist organization. The material support statutes, 18 USC 2339A and 2339B, were designed for foreign terrorist organizations designated by the State Department. Applying 2339A to a domestic network, as prosecutors did in the Baron Martin case, requires legal creativity and carries significant appellate risk.
The absence of a domestic terrorism statute means that federal prosecutors must assemble 764 cases from a patchwork of existing laws. CSAM production and distribution charges under 18 USC 2251 and 2252. Racketeering charges under RICO when prosecutors can establish the necessary enterprise elements. Conspiracy charges. Witness tampering and obstruction when victims are threatened into silence. Each of these tools addresses a component of 764’s conduct, but none captures the full scope of what the network represents.
Canada’s December 2025 designation demonstrated what becomes possible when a legal framework exists. Once 764 was listed as a terrorist entity under Canadian law, prosecutors gained access to terrorism-specific investigative tools, sentencing enhancements, and the symbolic weight of calling the network what it is. The designation also triggered international intelligence-sharing protocols that may prove more significant than any individual prosecution.
In the US, the debate over a domestic terrorism statute predates 764 and involves political complications that have nothing to do with child exploitation. Civil liberties organizations have expressed concern that a broad domestic terrorism law could be weaponized against protest movements, political dissidents, or disfavored ideological groups. These concerns are legitimate. But the 764 cases expose the practical cost of the gap: a network that the FBI itself classifies alongside ISIS cannot be prosecuted under the same legal framework.
The Baron Martin case will test the outer limits of what existing law can do. If the 2339A charge holds, it establishes precedent for treating 764-type networks as terrorism under current statutes. If it fails, the argument for legislative action becomes considerably stronger.
The Organizational Innovation
Understanding why 764 has proven so difficult to disrupt requires understanding what kind of organization it is. Or, more precisely, what kind of organization it is not.
764 is not a hierarchy. Removing Cadenhead did not stop the network. Arresting Nepal, Varagiannis, Densmore, Martin, and the others has not stopped it either. The prosecutions have been significant, and each conviction removes an active predator from circulation. But the network continues to operate, because the network is not its members.
764 functions as a brand that cells adopt and discard. A group of operatives in one country can use the 764 name, methods, and ideology without any formal connection to the original founders. When law enforcement disrupts one cell, others continue. When a Discord server is shut down, a new one appears within hours. The operational knowledge required to run a 764 cell is not proprietary. The grooming playbook, the coercion escalation sequence, the victim-to-perpetrator conversion technique: all of it circulates freely in the channels and forums where the network’s ideology lives.
This structure is not new in concept. Decentralized terrorist networks have operated on similar principles since al-Qaeda’s post-2001 franchise model. What is new is the combination of decentralized ideology with platform infrastructure that provides instant access to millions of potential victims. A sixteen-year-old with a Discord account and a copy of the playbook can stand up a functional 764 cell in an afternoon. No travel required. No physical meetings. No weapons procurement. No border crossings. Just a screen, a server, and a target.
The FBI’s Tier One classification reflects an institutional recognition that traditional disruption strategies, arrest the leaders, seize the assets, dismantle the hierarchy, do not map onto a network that has no leaders, no assets, and no hierarchy in the conventional sense. The mechanism is the ideology plus the platform infrastructure, and as long as both persist, the network regenerates.
This is the core challenge that 764 poses to law enforcement, to platforms, and to the legal system. The threat is not a person or a group. The threat is a model, and the model works.
What Remains
Eighty years for a seventeen-year-old. Thirty years for a Marine. Six years in Britain. A contested extradition in Greece. A terrorism charge being tested in Arizona. A terrorist designation in Ottawa. And somewhere, on a Discord server that has not been reported yet, a fourteen-year-old is receiving a message from someone who seems to understand exactly what they are going through.
The prosecutions will continue. The FBI’s Tier One classification ensures sustained investigative resources. Canada’s terrorist designation may prompt other Five Eyes nations to follow. The Baron Martin case may reshape the legal landscape if the terrorism charge survives appellate review.
But the 5,000 victims already identified are not an endpoint. They are a snapshot of a network that was designed, from its founding by a fifteen-year-old in Texas, to grow faster than any institution can contain it. The victim-to-perpetrator pipeline ensures geometric expansion. The platform infrastructure ensures unlimited access to targets. The decentralized structure ensures resilience against disruption.
764 is not a crime ring that the FBI will eventually dismantle. It is a proof of concept for a form of organized violence that exists entirely within the architecture of the platforms we built for our children to use. The question is not whether law enforcement can arrest enough people to stop it. The question is whether the platforms, the laws, and the institutions responsible for child safety can adapt faster than the model replicates.
The evidence, so far, suggests they cannot.
Sources
- DOJ — “Texas Teen Sentenced to 80 Years for Leading Child Exploitation Network” — Press release, 2023
- DOJ — “Prasan Nepal Charged with Operating Global Child Exploitation Enterprise” — Press release, April 2025
- DOJ — “Baron Martin Charged with Material Support for Terrorism in Connection with 764 Network” — Press release, October 2025
- DOJ — “Richard Densmore Sentenced to 30 Years for Child Exploitation” — Press release, 2024
- DOJ — “Erik Lee Madison Pleads Guilty to Exploitation of Minors” — Press release, March 2026
- DOJ — “Kyle William Spitze Pleads Guilty in 764-Related Case” — Press release, December 2024
- Public Safety Canada — Currently Listed Entities: 764 — Government of Canada, December 2025
- UK Crown Prosecution Service — Cameron Finnigan Sentencing — 2024
- FBI — Domestic Terrorism: Tier One Threat Classification — Referenced in 2024 congressional testimony
- Sen. Mark Warner — Senate Intelligence Committee Statements on Platform Accountability — 2024-2025
- NCMEC — CyberTipline Annual Reports — National Center for Missing and Exploited Children, 2023-2025
- Europol — Referral Action Day Targeting Online Child Exploitation — 2024
- Court filings — United States v. Martin, District of Arizona — October 2025
- Court filings — United States v. Cadenhead, Northern District of Texas
- Court filings — United States v. Nepal — 2025
- BBC News — “764: The Online Network Targeting Children” — Investigative series, 2024
- Wired — “Inside 764, the Network the FBI Treats Like ISIS” — 2024
- NBC News — “FBI Classifies Child Exploitation Group as Top-Tier Threat” — 2024
Frequently Asked Questions
What is the 764 network? ▼
Why did the FBI classify 764 as a Tier One threat? ▼
Who is Bradley Cadenhead and what was his role in 764? ▼
How does 764 use Discord and other platforms to exploit children? ▼
Has 764 been designated a terrorist organization? ▼
How does 764 recruit new victims and members? ▼
Get case updates in your inbox
New investigations, case developments, and cold case breakthroughs. No spam.