There’s a reason criminals wear masks. Without an identity to link to the crime, criminals can operate with impunity and experience no disruption in their personal lives. The same can be applied to cybercriminals. Using fake profiles as a mask, these digital deviants can not only hide their identity but also attack people on a mass scale. While anonymity is a core defense for cybercriminals, there are multiple ways that victims and cybersecurity experts can trace criminals and catch a blackmailer.
What is Digital Forensics?
Digital forensics is the process of collecting and analyzing digital data in a way that preserves its admissibility as evidence in court. It is used by law enforcement and private cybersecurity experts to investigate cybercrimes. This forensic science can also support criminal and civil legal proceedings.
Like police officers collecting evidence from a crime scene, digital forensic experts follow a similarly strict process to avoid any tampering. Digital forensics is often used to identify the geolocation of the culprits, details about the device used to commit the cybercrime, and more. This data can lead to the perpetrator’s true identity, removing any anonymity they were hiding behind.
How Experts Can Catch a Blackmailer
Cybercrime investigations rely on a variety of different methods, technologies, and specialized tools. When an expert helps a blackmail victim, they will take over communications with the blackmailer and analyze data left behind from their interactions with the victim. Here is how digital forensic experts track and uncover the identity of blackmailers.
- Follow the Money: Every financial transaction leaves behind data that can be tracked. Depending on the payment method, experts will work with financial institutions like banks and crypto exchanges to trace money transfers and track laundering paths.
- IP Tracing: Tracing the IP address of a blackmailer is an important step in identifying the location of the criminal. However, getting to this step can be a challenge. Cybercriminals often use VPNs and proxies to shield their IP addresses.
- Communication Takeover: Cybercrime experts understand blackmailers and the tactics they use to target unsuspecting users. After taking over communications, they can flip the script by employing social engineering tactics to gain intel on the perpetrators. This data can then be used to convince blackmailers to abandon their schemes.
- Metadata Analysis: If the criminal doesn’t strip the metadata before sending files like images, videos, audio clips, and documents, an expert can gather clues about the location or tools used by the criminal. Metadata can reveal the device used to create the file, the software used, date of creation, geolocation, and file paths. However, opening a file from a cybercriminal can be dangerous, as it could be embedded with malware.
How to Respond to a Blackmail Attempt
When a blackmailer is threatening you with your own private information, they are relying on scare tactics to force you into compliance. They will impose urgent deadlines and make constant threats against you, claiming that the exposure will ruin your life or career. Of course, this is all just to overwhelm you emotionally, leading you to believe that compliance is your only option. However, working with experts is a way to fight back. On top of that, you can use these three tips to improve your situation.
- Do Not Give In: Complying with a blackmailer’s demands often has the opposite effect. Rather than staying true to their word to end the blackmail, they will continue to threaten you and increase their demands.
- Do Not Engage: Even responding to blackmailers can encourage them to intensify their threats against you. Instead, keep your communication with the perpetrator to an absolute minimum.
- Preserve Evidence: Law enforcement and digital forensics experts need evidence of the blackmail in order to properly investigate the crime. It’s important that you take screenshots of any correspondence with the blackmailer, along with the profiles used to target you. Anything relevant is important to record.
Tools Victims Can Use to Catch a Blackmailer
Open-Source Intelligence (OSINT) is the process of collecting and analyzing publicly available information to take action. Using OSINT tools, victims can investigate users before they continue engaging with them. Here are three OSINT tools to take note of.
- Reverse Image Searching: Websites like Tineye and Copyseeker allow users to discover other places where images have been published. This can help victims spot stolen images on profiles and identify the origin of the images.
- Check for Reused Usernames: Scammers tend to diversify the platforms they use to increase their chances of finding a victim, which can lead to the reuse of certain usernames. Searching for these usernames on different platforms can reveal information about their activity and tactics.
- WHOIS Lookup: If you receive a suspicious email or a threat to release your information on an unknown website, victims can use WHOIS Lookup to uncover more details about the attacker. A WHOIS Lookup reveals public registration information about a domain, including its registrant name, date of registration, and IP address. While many cybercriminals will take steps to protect themselves from a WHOIS Lookup, some will overlook this and make mistakes.
Reach Out to Law Enforcement for Expert Help
The authorities are always a valuable resource when facing blackmail. Your local police department can help you file an official report, recording the evidence of the blackmail to be used in legal proceedings. In some cases, law enforcement will have a cybercrime division with experts that specialize in digital forensics. However, there are two main factors that limit law enforcement’s ability to pursue cybercriminals.
- The authority of police departments is confined to their specific local and state jurisdictions.
- Police can’t act against a perpetrator that stays anonymous.
It’s best to also notify the FBI’s Internet Crime Complaint Center (IC3) of the online blackmail. They are not limited to local jurisdictions and have a wide variety of resources to identify and catch the blackmailer. In either case, a high volume of cases can slow down law enforcement’s response to your situation.