Online Sextortion typically occurs on social sites. Hence the term Facebook Blackmail, Instagram Sextortion, etc. The setup is rather simple, a stranger friends or follows you, and then begins to chat. When the profile is searched, they are connected to one of your friends; therefore, they appear safe.
The blackmailer entices you to chat live on video, where they are half-dressed and in full seduction mode. You will note, they claim their audio is broke, and cannot speak. They convince you to indulge, and so you compromise yourself. Next comes a list of your Facebook Friends, or Instagram Followers. Pay X amount of dollars, or you will be exposed.
Likes sharks in the water, blackmailers hunt on dating and discretion apps. The blackmail occurs passively and aggressively. The victim searches and chooses someone to chat with, or the blackmailer does. A little chatting takes place where the extortionist extracts identifiers from you. They suggest a video on Skype, Google Hangouts, or WhatsApp. After you compromise yourself, they share what they know about you, like name, address, spouse, and employment. Pay X amount or else. Such is Ashley Madison Blackmail and dating app sextortion.
Escort and masseuse blackmail are quite common; some sex workers have a sideline in extortion. When you share and experience your deep dark fantasies with a stranger, you place yourself in a vulnerable position. The mistake is making contact on your real mobile phone and revealing personal details. The danger in this pandemic is sex workers are not making bank; some are demanding money in exchange for silence.
Text blackmail occurs when you are trying to connect with an escort or masseuse. Instead of reaching a legitimate person, it is a setup. Blackmailers post sex ads online, and when an individual texts for information, it becomes sexual. Your mobile number reveals your identity, and leads to your spouse and employment, which becomes the leverage. If not, you will receive gruesome photos of chopped body parts and a threat of killers coming to your home. Unless you pay.
A discreet relationship of understanding, aka sugar daddy blackmail is where one raises a person above their financial means in exchange for companionship. Problems occur when you want to end the relationship. What most victims are unaware of is their counterpart has prepared for a rainy day. They have photos, texts, emails, and financial transactions. Relationship blackmail can escalate into stalking.
Women are usually the victims of predator blackmail, which is when a degenerate blackmails not for money but explicit photos and videos. It is a terrorizing and frightening situation and can be difficult to combat.
If you are a blackmail or sextortion victim, you need to think quickly and clearly about your next step. Such as protecting your identity, preventing exposure, and ridding yourself from the blackmailer. Anything less will bring future problems to your doorstep.
The first question is, what does the blackmailer know about you? Do they know your social connections, mobile number, email, work, or spouse? If answered yes to any of these, you need to focus on protecting those in your circle. So, think, identity protection.
Some victims think that ignoring and blocking the scammer is the route. Even law enforcement will tell you the same. Ask yourself, how many blackmail cases have that cop investigated? The answer is probably zero. I speak from experience and have worked over a thousand blackmail cases.
If you do ignore the blackmailer, one of two things will occur. They will contact the people in your circle, or they upload your content to a porn site. They may not necessarily expose you but demonstrate their reach and power. Remember, blackmailers have no boundaries, and the situation is not solely about you anymore, but your everyone connected to you. I am not saying these things to frighten or stress you; this is sextortion. The other issue is in two, three, or four months; someone you know could discover your video or photo online.
Protecting your identity runs hand in hand with preventing exposure. The problem is there are several blackmail groups online, and the tactics to combat is different. The Moroccans are aggressive and prone to exposing. The Filipinos, Cote D'Ivoire, and Mali sextortionist push victims hard; they want every penny possible. Trust me, being a victim of online extortion is daunting.
I do suggest going dark online by closing or making all social media private. Again, do not block the scammer; keep the communications going until you can protect your identity, devise a plan, or get help.
Let me tell you what does not work when fighting blackmail. Some companies claim they will trace the blackmailer and convince them to stop harassing you. Good luck on that; if you believe someone can trace a scammer of a prepaid phone app in a foreign country, you are being duped. The other issue is your identity is not protected, and it does not prevent future exposure. Even if the company located scammer, why would they back off? Think before you pay.
Other extortion services, including lawyers, suggest sending a cease & desist letter. A criminal in a foreign country could care less. Imagine the blackmailer sending the cease & desist to your spouse or employer? Again, this action does not protect your identity or prevent exposure.
No matter how you deal with the current situation, it must be in the order of protecting, preventing, and ridding. What you are facing now will rear its nasty head in the future. You are a potential ATM; there is no reason for the criminal to stop. Your plan needs to involve a way of getting rid of the blackmailer, so they don't harass you until the end of days.
Why me, Frank M. Ahearn? I have been in the extreme privacy business for over thirty years. I have worked with thousands of victims, from stalking, personal danger, online blackmail, and extortion. I am the author of the New York Times Bestseller, How to Disappear. When not working with clients, I travel and speak for organizations about online and offline privacy.
My expertise is protecting your identity, preventing exposure, and making sure the blackmailer does not return. The difference between using my service and others is you get me, not an office full of people. Which keeps your secret safe. As far as companies online claiming they find the scammer, it is not happening, and I should know, I am one of the leading skip tracers (finds people) in the world.
If you want to learn more about me, read about me online, or my other website, www.FrankAhearn.com. You will also find that I am also a privacy consultant and the leading expert on disappearing people and information. If you want the best help available, you are in the right place.
I believe the most important tactic in combating blackmail is to protect your identity. I utilize methods that manipulate the blackmailer into thinking you are someone else. Plus, searching for the extortionist does nothing to prevent exposure. My tactics both protect and prevent those you know and love from finding out what occurred. Finally, saying to someone who is holding you hostage to stop is fantasy. My tactics assure future privacy.
There are different types of blackmail and blackmail groups; the consultation provides an opportunity for me to listen to your story, identify which organization, and create a tailored strategy for you. Depending on the situation will determine if you can take the tools and combat yourself.
For those who do not want to go at it alone, I offer an extended service where I direct you through the process and with you until you are off the hook. I also create online disinformation, which protects your identity, family, and employment. Dealing with sextortion is highly stressful and emotional. I become the sounding board and support you need.
What to do about blackmail, Facebook Blackmail, and Instagram Sextortion? Contact FA@FrankAhearn.com
Your head will be spinning and thinking about how your life will crumble if exposed. Be strong, be Stoic, and recognize that the fake negotiations allow you to create a game plan.
Frank M. Ahearn, author of The New York Times Bestseller, How to Disappear.
Persönliche Informationen sind im digitalen Zeitalter zur Ware geworden. Anhand von Kreditkartenkäufen, Suchanfragen und Klickverhalten werden Kundenprofile generiert und persönliche Daten gespeichert.