Blog

Leak Nudes

Nothing can truly prepare you for the moment you see your nudes shared online. The uncertainty of the exposure, wondering if friends, family, or coworkers have seen the content, can be overwhelming. The shock can trigger a flood of thoughts and emotions, leaving you unable to decide what to do next. Despite everything you may be experiencing, protecting yourself from further abuse is the top priority. Continue reading to learn everything you need to know to take action after non-consensual intimate image abuse.

How Nudes Get Leaked

The perpetrators can be anyone: friends, family members, partners, acquaintances — and of course, strangers. However, most victims of non-consensual intimate image (NCII) abuse know their offender. According to a report from the Revenge Porn Helpline, almost 60% of identifiable perpetrators in NCII abuse cases were current or former partners.

Many instances of victimization stem from sexting. After engaging in a sexually intimate relationship, partners or former partners may feel slighted by a conflict in the relationship and retaliate by sharing nudes. Another common way nudes are shared is through unauthorized access to your device or accounts, either in-person or via hacking.

What Happens If My Nudes Get Leaked?

Unfortunately, having your nudes posted online can affect many areas of your life — like your relationships, career, and reputation. The platform used to share the nudes plays a vital role in how it will impact you.

Social media is a common platform for NCII abuse. While most platforms have community guidelines against nudity for public posts, these rules do not apply to direct messages. Perpetrators can exploit this by sending NCII content directly to the victim’s followers or friends.

On Twitter/X, for example, sexually explicit posts do not necessarily go against community guidelines. This allows cybercriminals to publicly share NCII material with minimal pushback from the platform since it struggles to differentiate between consensually and non-consensually distributed content. There are, of course, sexually explicit websites where this content can be hosted as well. These websites are more difficult to work with, which can make removing the content challenging.

What to Do If Your Nudes Get Leaked

Whether you are panicking or frozen in shock, your feelings are valid and normal to have. It’s extremely common to panic in the midst of having your intimate images exposed. However, this can often lead to hasty decisions that are not the best for your situation. There are actions you can take to protect yourself and mitigate the damage from the leaked nudes. However, you will need to act with urgency.

Don’t Blame Yourself

Revenge porn is a crime and a complete betrayal of trust. However, it’s normal to feel guilty after being betrayed. Victims often blame themselves when their nudes are leaked. However, it is never their fault that someone else invaded their privacy. Many of these criminals use emotional manipulation and vulnerabilities to gain the trust of unsuspecting victims only to exploit that confidence.

Assess Where the Leak Came From

Before you can take steps to protect yourself, you need to identify where the leak came from. We’ve discussed the most common perpetrators of NCII abuse. Based on the content that was shared along with other contextual details, you can narrow down if this was a former partner, someone you know, or a stranger. Once you have a good idea of how it was shared, you can take the proper steps to protect yourself.

Get Your Nudes Removed

Many online platforms and search engines have built-in tools that help victims get NCII content removed. Social media platforms have a reporting system that allows users to notify the platform about content that violates their community standards. Search engines like Google also have a content removal form specifically for NCII abuse, which can remove offending links from Google Search results.

Update Your Privacy and Security Settings

The uncertainty around how your nudes were leaked highlights the importance of victims securing their accounts and devices and protecting themselves from further abuse. Making your online profiles private can help prevent strangers with harmful intentions from targeting you with a scheme.

You should also enable two-factor authentication wherever possible. This setting can prevent account takeovers — even if your login credentials are compromised. The cornerstone of online security is passwords. In the modern age, passwords need to be complex and unique to keep your information safe.

Preserve All Evidence

When it comes to what to do if someone posts your nudes, protecting yourself is important — and so is taking action against your offender. Whether the perpetrator is anonymous or not, preserving the evidence of NCII abuse is essential to holding them accountable. Be sure to take screenshots of any communication with the attacker and the profile that originally shared the images or videos. You can also look for any evidence of account breaches, including the date and time they occurred, to establish a possible timeline of events.

Report to Law Enforcement

Reporting the NCII abuse to the authorities is always recommended when asking what you should do if someone shares your nudes. The police can help you file an official report that includes your collected evidence and helps build a case against the cybercriminal responsible.

For anonymous perpetrators, some local police departments have cybercrime units that specialize in cases like NCII abuse and can investigate the incident to uncover the offender’s identity. The FBI also has the Internet Crime Complaint Center (IC3), the national hub for reporting cybercrimes. Filing a report to the IC3 not only helps the FBI track trends, but they can also collaborate with international law enforcement agencies to pursue perpetrators — even if they are located outside of the U.S.

Use Victim Support Resources

There are many non-profits and online tools created to support victims and provide help on what to do if someone shares their nudes. Here are the main resources to look into:

  • Cyber Civil Rights Initiative (CCRI): A non-profit that supports victims of NCII with legal guidance, a 24/7 hotline for emotional support, and educational resources.
  • StopNCII.org: A global tool that allows victims to submit the content being posted without their consent and have it removed from certain social media platforms and websites.
  • National Domestic Violence Hotline: A free and confidential service that focuses on domestic abuse but also supports victims of NCII. You can call, chat online, or text the hotline to get in contact with a live advocate.

Talk to Someone

Being a victim of NCII abuse can be devastating on many levels. There is a lot of distress, fear, anger, and anxiety that can come from being exposed. However, what can make things harder is facing all of it alone. Talking to someone during this experience can alleviate the overwhelming emotions you are feeling. It can also help calm your mind, allowing you to make informed decisions. This person can be a trusted friend, family member, therapist, or advocate at a non-profit.

Identify the Perpetrator with Digital Investigators

The criminals responsible for NCII abuse tend to hide behind anonymity. This protects them from being held accountable and allows them to operate in secrecy. However, cybersecurity experts can investigate anonymous incidents and trace the exposure back to its original source. Using digital forensics, they can trace the digital footprint to the culprit’s geolocation and, in some cases, identify the perpetrator. The findings from the digital investigation can be used as evidence in court proceedings against the offender.

What to Do When Nudes Leak? Call Cyber Investigation for Help

Cyber Investigation has a team of cybercrime experts that know exactly what to do if your nudes are leaked. Using state-of-the-art technology, we can follow the digital trail of NCII abuse to its original source through methods like metadata analysis and IP tracking, which can help uncover the criminal’s geolocation. From there, we can work to identify the perpetrator and use their exposed identity as leverage to pressure them into removing the NCII content and stopping any further abuse.

We also work quickly to remove any private content that was posted online without your consent and offer an ongoing monitoring service that tracks any further postings after the initial incident has been handled. At Cyber Investigation, we provide all of this and more to protect your online reputation and to mitigate any damage from exposure. You don’t have to experience this alone. Reach out today and let our experts help you through it.

Read More
Report Sextortion on Snapchat

Snapchat is among the most popular social media platforms, especially among young people. While sharing photos and videos with friends can be a lot of fun, certain risks are associated with using the app. One of the most dangerous is sextortion, where a scammer threatens to release compromising images or videos if the victim does not pay up. Keep reading to find out all you need to know on how to report sextortion on Snapchat.

Snapchat Safety Features

Before we dive into the specifics of reporting sextortion, it is imperative to understand some of the safety features already built into Snapchat. For example, the app allows users to block and report other users. This means that if someone is harassing you or sending you inappropriate content, you can take action to make sure they cannot contact you anymore. Snapchat also has a “Report a Safety Concern” feature, which allows users to report potential security or privacy issues to the app’s team.

Another great feature is Ghost Mode, which lets you keep your location hidden from possible scammers. Without Ghost Mode set, anyone can easily see your location by scrolling over the snap map. Another handy feature is 2-factor authentication, which adds an extra layer of security to protect your account from scammers. Overall, Snapchat offers a variety of benefits to enhance your user experience.

How to Track a Snapchat Scammer?

If a sextortion scammer on Snapchat has targeted you, you may wonder if there is any way to track them down and report them. Unfortunately, it can be challenging to do this, as many scammers use fake usernames, profiles, and locations to avoid detection. However, there are some steps you can take to try and identify the scammer.

  1. First, screenshot any photos the scammer sent without notifying them. Use privacy tools like Private Screenshots or the screen recorder on your phone.
  2. Once you have taken a screenshot, then you are going to run it through a reverse image search on Google. This can uncover other accounts the scammer may be using.
  3. Next, you can check their location. Check the Snapchat map to see if the criminal has left their location sharing on. Scammers often operate from different countries, such as Nigeria, the Philippines, or Ivory Coast.
  4. Finally, comb through their friends and followers on your other social media profiles. Scammers commonly follow their fake accounts with their real profiles to appear more legitimate.

By taking these additional steps, you can protect yourself from scammers and avoid falling prey to their tricks.

How to Report Sextortion on Snapchat?

If you are a victim of sextortion on Snapchat, it is vital that you report it immediately to protect yourself and others. The good news is that there are many steps you can take to do just that. First and foremost, report the incident directly to Snapchat by navigating to the “Support” section of the app and selecting “Report a Safety Concern.” Be sure to provide as much detail as possible, including relevant screenshots or other evidence. Rest assured that Snapchat takes these reports seriously and thoroughly investigates all incidents.

Furthermore, reporting the crime to the FBI’s Internet Crime Complaint Center is crucial. This will assist law enforcement in tracking down and prosecuting the person responsible. Finally, it is a good idea to report the crime to your local authorities and contact friends and family for additional support during this difficult time. Remember, speaking up can safeguard yourself and prevent others from becoming victims in the future.

Summary:

Sextortion is a serious issue, and it is something that everyone who uses Snapchat should be aware of. However, by taking the steps outlined in this post, you can protect yourself from scammers and report any incidents to Snapchat. Remember always to be cautious online and never give in to the demands of a sextortion scammer. By working together, we can make Snapchat a safer and more enjoyable place for everyone.

Cyber Investigation is here to help! If you or someone you know needs additional information on how to report incidents of sextortion on Snapchat, contact our sextortion helpline! Our expert team is dedicated to providing you with the necessary resources and guidance.

Read More
How to Deal With Blackmail

How to Deal with Blackmail

Everyone has the right to their privacy. It allows us to have autonomy over our lives, relationships, and reputations in different circles. Blackmailers are particularly dangerous because they look to violate and weaponize that privacy for personal gain. Not only can the threat of blackmail cause severe emotional distress, but it can also disrupt quality of life. Protecting yourself from online blackmail primarily starts with understanding how these scams work. Continue reading to learn how to deal with blackmail and protect yourself from being targeted.

In-Person vs Online Blackmail

Blackmail is a crime in which someone threatens to publicly expose information to coerce victims into complying with their demands. There are two main categories for blackmail: in-person and online.

In-person blackmail typically involves physical leverage and interactions. Things like photographs, letters, and bank statements are used as leverage to blackmail people for money. In-person blackmailers are not typically anonymous. They are often committed by perpetrators who know the victim or previously had a relationship with them.

On the other hand, online blackmailers are often anonymous. They use digital means to gain access to private data and threaten to publicly release it online if their demands aren’t met. Things like social media accounts, explicit messages, and hacked devices are commonly used for online blackmail.

Different Types of Online Blackmail

There are various types of online blackmail, and the number of forms continues to grow as technology advances. Different forms of blackmail are typically defined by the type of demands or leverage used against the victim. Take note of the following four main types of online blackmail that you need to be aware of.

Sextortion

Many people are looking for resources on how to deal with blackmail because of sextortion. Sextortion is a form of blackmail in which someone threatens to expose a victim’s explicit content unless their demands are met. The most common demand is for a certain amount of money, often requested through crypto or gift cards.

Sextortionists are known to use catfishing as their primary method of luring in potential victims. They will steal images from other online users who are deemed desirable. These catfish aim to build a fraudulent relationship with unsuspecting users, gaining trust and exploiting it. Sextortionists can also be previous partners who in the past had consensual access to the explicit content.

No matter the perpetrator, the effect on the victim is similar. They experience extreme fear, stress, anxiety, shame, or distress. The intense mix of emotions can be overwhelming for victims to handle alone and can lead to devastating consequences.

Sexploitation

Similarly, sexploitation is when someone threatens to release a victim’s explicit content unless their demands are met. However, the demands are specifically for more explicit content or sexual favors.

While sextortion is mainly financially motivated, sexploitation is not. This difference is also reflected in the type of criminal who commits each crime. Sextortionists are only interested in the victim’s money. Conversely, it’s common for sexploitation perpetrators to be attracted to their victims. In some cases, they may even stalk them.

Ransomware

Ransomware is malicious software that blocks access to systems, files, or data until a ransom is paid. If the demands are met, the perpetrator will send the victim a decryption tool to regain access to their assets. Ransomware is commonly used against organizations, but it can also be weaponized against individuals. 70% of reported cyberattacks in 2023 were ransomware, with more than 317 million attempts recorded.

Personal Information Blackmail

Certain cybercriminals will use any sensitive information they gain access to for blackmail. Login credentials, social security numbers, and credit card accounts are all examples of leverage in blackmail schemes. Hackers utilize phishing tactics to gain access to sensitive data. They will pose as trusted organizations or individuals and trick victims into clicking a malicious link. The link can either download malware onto your device or redirect you to a fake webpage designed to steal information. Once the perpetrators gain access to your data, they will look for compromising information for blackmail.

Account Takeover

With so much of our lives existing online, hackers now target online accounts for blackmail. Things like social media, email, and bank accounts are commonly used as leverage against victims. Similar to personal information blackmail, hackers use phishing tactics to gain access to accounts. Posing as legitimate organizations, they will send warning messages to victims that their account has been locked due to suspicious activity. However, the message is meant to lure victims into clicking on a malicious link, exposing their login credentials.

Common Threats Made in Online Blackmail

In the digital era, cybercriminals can commit blackmail with greater efficiency and scale. Blackmailers target dozens, if not hundreds, of people at a time. They rely on victims being unaware of their manipulative and coercive tactics. To help you better understand how to deal with blackmail, we compiled a list of threats you may encounter.

  • Exposing intimate images or videos. Criminals will threaten to expose private explicit images or videos publicly.
  • Sending intimate content to your supervisor or co-workers. Blackmailers will threaten to send intimate images or videos directly to your co-workers. They often use LinkedIn to discover professional contacts.
  • Exposing social security numbers. They may threaten to release your social security number on the dark web, forums, or in data breach dumps.
  • Deepfake nudes. Now, AI combined with deepfake technology can alter innocuous images or videos to manufacture explicit content. They may superimpose a victim’s face onto an already existing video or use undressing AI platforms to fabricate nudes.
  • Law enforcement impersonation. Your local authorities will never blackmail you for money or request funds through the phone. In certain sextortion schemes, perpetrators will pose as young adults to lure victims into a relationship. Once trust is built, they will suggest exchanging intimate content. At this point, the perpetrator reveals that they are actually a minor and will get the “police” involved. Posing as an officer, the perpetrator will then contact the victim to scare them into paying the demanded amount.
  • Account lockout and deletion. Once a hacker takes over an online account, they may only offer to return access after you’ve paid a ransom. They will threaten to lock you out of your account permanently or even delete your account if necessary.

How To Deal with Blackmail: Step by Step Guide

If you’re a victim of blackmail, it’s important to understand how to deal with blackmail — and how not to. Every step you take in response is an essential factor in how the scam will end. Follow these steps if you are wondering how to deal with blackmail.

  • Keep a cool head. It’s natural to panic when facing blackmail. However, this is what blackmailers are counting on to force you into a rash decision-making process. Instead, stay calm and turn to the advice experts give on how to deal with blackmail.
  • Save the evidence immediately. You need evidence of blackmail for experts to be able to perform their investigations. Make sure to immediately preserve the evidence and store it in a secure location. You can take screenshots of messages, ransom notes, emails, or even save infected files or data.
  • Never give in to the demands. You should never comply with a perpetrator’s demands. It is ineffective in putting an end to the blackmail and only encourages the criminal to continue making demands.
  • Avoid blocking the perpetrator. Blocking the blackmailer is a common approach. However, it can have devastating repercussions. Cutting off communications often pushes the perpetrator to make good on their threat in retaliation. You also won’t be able to monitor their actions or any threats they continue to make.
  • Use delay tactics. While you shouldn’t block the perpetrator, you should keep the line of communication open. If blackmailers use short deadlines to apply pressure on you, use delay tactics to buy time. Delay tactics give you a chance to turn to law enforcement or cybersecurity experts for help. Use excuses such as “I need to wait until my next payday,” or “I have to pull the money together.”
  • Report to the authorities. Victims of blackmail should always turn to law enforcement for assistance. They can help you file a report, officially documenting the crime. Certain agencies also have cybercrime units that can investigate your blackmailer. However, law enforcement agencies manage high caseloads, which can lead to delays when looking for help.
  • Work with cybersecurity experts. When it comes to how to deal with blackmail, private cybersecurity firms can offer immediate assistance to blackmail victims. These firms have experts who can trace the online footprint of your blackmailer, revealing their geolocation and identity. They can also monitor the internet to take down any non-consensual posting of your private data.

Our Helpline

If you need help from a cybersecurity firm, contact Cyber Investigation Inc. We have dedicated cybercrime specialists on standby 24/7 to help victims. Reach out to our Blackmail Helpline today to speak to one of our specialists.

Read More
Should I Block a Sextortionist?

Victims of sextortion experience a flood of thoughts and emotions while reading the threats on their screen. One question that is universally asked is, “Should I block a sextortionist?” The answer is mixed among online responses. Search results often deliver a decisive “Yes”, but doing so can potentially leave you in ruin. Blocking serves as an immediate means of cutting them off, but it won’t remove their ability to expose you. Keep reading to learn if you should block a scammer.

Online advice often tells you to block a sextortionist immediately, but be careful with it

Online advice often tells you to block a sextortionist immediately, but be careful with it

Should You Block a Sextortionist?

Our experts advise against blocking a sextortionist — at least right away. Many people think that blocking is an effective method for preventing further abuse. After all, blocking the perpetrator removes their access to your account.

However, this does not guarantee your attacker will not be able to reach you entirely. Blackmailers don’t always give up if you ignore them and may follow through on their threats. Furthermore, the negative ramifications of blocking can far outweigh any benefits of blocking.

Why Do So Many Results Suggest Blocking?

Many resources, especially AI-fueled responses, suggest blocking the sextortionist. This advice stems from the idea that a blackmailer can hurt you if they can’t reach you. Unfortunately, limiting a cybercriminal is not as simple as clicking block. What seems like a simple solution could actually expediate the scam. Where these suggestions and others based on them fall short, we are here to mend the gaps.

Potential Ramifications of Blocking

After asking yourself, “Should I block a sextortionist?”, the natural follow-up question is “Why shouldn’t I block a sextortionist?” Below are the reasons our analysts advise against it.

Loss of Evidence

If you block a scammer, you run the risk of permanently deleting critical evidence. As we will cover below, the entire interaction holds valuable evidence. You can use this data to identify the perpetrator and hold them accountable.

Blocking their account will delete the conversation and any evidence it contains. Even digital forensics professionals might be unable to retrieve this data.

Retaliation

Some suggest you block a sextortionist because they believe they will simply move on to a more willing victim. While this does happen, there are also cases with less appealing results. Cybercriminals are unpredictable and may act irrationally if they feel they are losing control. The perpetrator may have personal motives, such as a disgruntled former partner.

Some victims may read this and feel undeterred by the risk of exposure. However, it’s important to understand that risk does exist. You should consider the suggested path of stalling for time and seeking professional assistance.

Left in the Dark

This is arguably the worst consequence if you block a scammer. Blocking them leaves you completely unaware if they decide to follow through on their threats. The stress of not knowing can be as detrimental to your wellbeing as the fallout from potential exposure. Furthermore, it can elongate the exposure since you will be unable to respond if you don’t know it occurred.

Real-World Consequences of Blocking a Scammer

In one case shared to Reddit, an anonymous WhatsApp user was being targeted by a scammer on the platform. They expressed that the platform issued some warning after they selected the block option. However, they were not made aware the entire chat would be deleted. The user noted irony in WhatsApp support’s suggestion to report the instance to law enforcement after deleting the evidence.

Another user detailed an experience that included a barrage of spoofed texts and calls after blocking a scammer. These included messages designed to appear as if they came from a fellow victim of the scammer. The onslaught came just moments after blocking the scammer. These are just a couple examples of how blocking the perpetrator can worsen the victim’s situation.

What Do Our Experts Suggest Instead of Blocking?

We’ve told you that the answer to “Should I block a sextortionist?” is no. You are now probably wondering what you should do instead. Don’t worry, we have you covered. Our experts recommend you take the following response toward sextortionist, blackmailers, and other online scammers.

Use Delay Tactics

At this point, you understand that you should never pay a sextortionist. However, you want the sextortionist to believe that you are willing to cooperate. If the sextortionist believes they cannot get money out of you, they may release your content in retaliation. This is why our experts suggest using delay tactics. They allow you to maintain contact without divulging any further funds or information.

The key to a good delay tactic is to be creative, yet realistic. You will want enough details that it doesn’t sound like a lie off the top of your head. However, too many minute details can make your claim feel scripted. Some phrases you can use to buys yourself some time include:

  • “I don’t get paid until Friday.”
  • “I need time to gather funds/sell items.”
  • “My account is frozen, and the bank said it could take a few days.”
  • “I tried setting up a crypto wallet and it will take a few days to verify.”

Secure Your Network

Regardless of what information the blackmailer has, you’ll want to make sure your device and accounts haven’t been compromised. Check your network for any unusual or unauthorized behavior. You should also run a reputable malware scan on your devices.

Additionally, take time to increase the privacy settings on any online accounts that the perpetrator could access. You should regularly update all of your passwords and use strong, unique passwords for each account. Use two-factor authentication (2FA) whenever it’s available for an extra layer of protection.

Collect Evidence

You will need proof of the crime that has been committed against you. Take the time you’ve gained through delay tactics to record the details of the attack. You should store this evidence on a separate, secure device. Name the files in a way that allows you to easily identify what each piece of evidence represents.

You should document the following variables of the crime:

  • The profile or contact information of the perpetrator.
  • Any images, files, attachments, or other content that was shared.
  • Any threatening or relevant messages.
  • Timestamps of when these exchanges occurred.

This may pose issues to individuals handling the investigation on their own. There is often crucial evidence that is inaccessible to the average internet user. It can be a huge help to seek the services of professional cyber investigators.

Get The Help You Need

Cybersecurity experts can help you gather evidence hidden within the code of your online interactions. They use proprietary tools and technology to execute techniques like IP tracking and metadata analysis. This can uncover critical evidence such as the geolocation, device network, and identity of the criminal.

Furthermore, expert cyber investigators will ensure your evidence is properly collected, documented, and preserved. They follow a strict chain of custody to maintain the integrity of their report. Each step is documented so the findings of the report are admissible as evidence in legal proceedings.

At Cyber Investigation Inc., we base our advice on our experience handling these cases. We recommend that you avoid blocking the scammer if you plan to proceed with a professional investigation. If you plan to handle the case alone, we still suggest you collect evidence before blocking. It’s ultimately your decision, and you should act as you see fit.

Read More
Should I Ignore Sextortion Emails

It’s a quiet afternoon and you’re relaxing on your computer when you see an email you would never expect. It makes an unsettling claim: the sender has been secretly tracking your activity and recording you through your webcam. They allegedly have compromising footage and promise to expose it unless you pay $1,000 in Bitcoin. You’re startled and baffled, wondering what footage they could have. You consider responding, but you also ask yourself: Should I ignore a sextortion email?

Sextortion is a rapidly growing cybercrime that is a threat to people of all ages worldwide. Awareness of sextortion is becoming essential in the digital age, especially when it comes to sextortion emails.

What Are Sextortion Emails?

Phishing scams are most often associated with email, while social media scams are commonly linked to catfishing and sextortion. However, sextortion via email is becoming more common.  Criminals take a different approach to carrying out sextortion through email. Instead of luring victims into a fraudulent relationship, perpetrators will immediately issue threats, whether they have leverage or not.

The Pegasus Email Threat

Pegasus spyware is a tool sold only to governments and nation-states to aid cybersecurity surveillance. However, sextortion emails will claim the perpetrator has obtained Pegasus spyware and accessed the victim’s data for months. The perpetrator suggests that the victim was secretly recorded in an embarrassing act and uses that for extortion. This is all an effort to push the recipient into a panic.

However, it’s important to note that these claims are often complete fabrications. They send this email hoping that the claims match up to the circumstances of a victim’s real life. Sextortionists attempt to force the victim to see meeting the financial demands of the criminal as the only solution.

Making Fake Threats Seem Credible

Sextortionists don’t just rely on empty threats to induce panic. They will also use manipulative tactics to make their claims seem convincing. In some of the more personalized sextortion emails, criminals will research the home address associated with a victim and attach a Google Maps screenshot to the email. Others may include a password that was exposed in a past data breach linked to your email. These details are meant to trick you into believing that they have compromised your devices, even when they’re secure.

Using Malware

Sextortionists may use emails designed to coerce victims into compliance. However, the intention can also be to trick victims into giving the cybercriminal access to their sensitive data. Perpetrators often claim possession of incriminating footage and may include an attachment or link with the supposed “evidence.” But the attachment or link is actually just malware, waiting to be downloaded onto your device. When a victim clicks on the link or attachment, they put their actual sensitive data at risk of exposure.

Common Phrases Used in Sextortion Emails

Sextortionists will use similar scripts, sending the same email to large amounts of people. The most common variation is known as the “Hello Pervert” email because it typically opens with that greeting. From there, the email typically uses shaming language to claim that they possess incriminating footage of you. The effectiveness of these emails relies on the recipient’s lack of awareness of their tactics. To help you recognize them, we’ve compiled a list of phrases typically found in these emails.

  • “I want to inform you about a very bad situation for you.”
  • “Have you heard of Pegasus?”
  • “It’s been a few months since I installed it on your devices.”
  • “I’ve recorded many videos of you.”
  • “Every number in your contact list will receive these videos of you.”
  • “This message was sent from your own Microsoft account.”
  • “You have a sick perversion.”
  • “I doubt you’d want your friends, family, and co-workers to know about it.”
  • “I can destroy your life in a second.”

Why Am I Being Targeted?

Gone are the days when someone actually needed your private information to extort you. Now, anyone can be a target for sextortion. If you’ve received one of these emails, it’s likely that your email appeared in a previous data breach. Scammers will use exposed email addresses in their mass spam campaigns to target victims. However, in some cases, a sextortion email could come from someone you know with more personal motives. You can verify if your email address has been exposed by visiting Have I Been Pwned.

Should I Ignore a Sextortion Email?

While sextortion emails may contain false claims, they still should not be ignored. You need to be proactive to protect your privacy and help put a stop to the sextortionist’s schemes. Many victims of sextortion emails feel compelled to immediately block the sender. However, this can worsen the situation if the claims are actually true. If you ignore a sextortion email and the threats are real, the attacker may expose explicit content in retaliation. The same is true if you block them. It’s important to verify the claims or threats before deciding what to do next.

How to Respond to Sextortion Emails

So, if you aren’t supposed to ignore a sextortion email, what should you do? How victims respond to sextortion emails is an important factor in what the outcome will be. It can also factor into whether the sextortionist will continue operating without consequence. There are best practices for victims to follow to protect themselves and maintain their peace of mind. Here are the best steps to take if you’re being targeted with a sextortion email.

  • Do not click any links or attachments. Sextortionists will often include links or attachments that inject malware onto your device when opened. Then, they will gain access to your sensitive data and anything compromising.
  • Verify the claims safely. Perpetrators typically allege to have recorded you performing explicit acts while watching adult content. However, it should be straightforward to verify the possible truth of these claims. Is any of the evidence provided? Does the email feel copied and pasted? You should also check your devices for any malware or unauthorized access.
  • Preserve the evidence. Take screenshots of the email and the header details. Keep the original message in a safe location like a special folder or archive. Make sure to also take note of date, time, and any actions you subsequently took.
  • Use delay tactics. In cases where the threats or demands are fabricated, it makes sense to ignore a sextortion email. However, any real threat needs to be handled strategically. You can use delay tactics to buy time before a deadline will need to be met. Make sure the excuses are believable, such as “I have to wait until I get my next paycheck” or “I have to get the money together.” Delay tactics are effective when you are also seeking out assistance from experts or law enforcement in the meantime.
  • Report to the email provider. You can report the email to the provider to help them improve the filtering of spam. Providers may also block a particular email address, domain, or IP address if enough users report the sender.
  • Notify the authorities. The local police are an essential resource for victims of sextortion. They can help you file a report, documenting the crime officially. The local authorities can also help you verify the validity of the threat. If a cybercrime unit is present, they may even launch an investigation into the criminal responsible for sending the email.
  • Work with cybersecurity experts. Private cybersecurity firms can help you verify if a threat is credible immediately. They can also scan your devices for any malicious programs and help strengthen your security. Certain firms specialize in protecting victims of sextortion from exposure, even detecting and removing non-consensual postings off the internet. Many of these experts, like the ones at Cyber Investigation Inc., offer immediate support. This ensures that victims can get help at any time.

If you have received a sextortion email and aren’t sure what to do next, reach out to Cyber Investigation Inc. We have experts available 24/7 to provide professional support. Contact us today to speak with one of our specialists.

Read More
How to Avoid Online Dating Scams

A person will inevitably encounter a scammer while seeking an online romance. Since the internet and social media allow people to be whomever they want, it’s easy for cybercriminals to disguise themselves as romantics looking for love. In reality, they are waiting to prey on the vulnerable to manipulate their way into their bank accounts. If you want to learn how to avoid online dating scams, keep reading.

What to do if you’ve been scammed on dating sites?

Most victims are unaware of the proper steps they should take after being scammed, which can worsen the situation. If you suspect you have been scammed, document all the details you can, including names, emails, numbers, and accounts, and take screenshots as evidence. It’s important not to send any more money to the scammer, no matter how guilty they try to make you feel or the threats they may cause.

Report the scammer’s dating profile on the platform you two met, so they can investigate and potentially remove the account to protect others. Also, remember to report the cybercrime to your local police and cybercrime experts, who can help track down the culprit. If you were scammed out of money, contact your bank or credit card company to try and recover your funds.

Grindr Sextortion

When online dating, it’s important to remember safety first! It’s always wise to practice caution when engaging with strangers online by avoiding giving out personal information such as bank account details or addresses. These extra steps can help keep you safe and secure while getting acquainted with new people online!

How to stop dating scammers?

The best way to stop a dating scammer is to seek professional help. It’s best to avoid trying to handle the scam on your own for many reasons, one being that you are already emotionally involved with this scammer, which can be confusing and hard to handle on your own.

Secondly, these scammers are particularly good at what they do. Instead of trying to handle it on your own, hire a cyber investigator. Cyber experts specialize in these cases and have a set of strategies to combat cybercrimes, so it’s best to leave it in their hands.

While you seek help from experts, we recommend doing the following three steps.

  • Do not send any more money to your scammer, no matter what threats they may make towards you. Instead, stall for as long as you can.
  • Document as much evidence as possible. This will help with an investigation.
  • Secure all of your online accounts and update passwords.

How to report a dating scammer?

If you have encountered a scammer, it’s essential to report them so that other people do not become their next victim. Most dating websites will have an option where users can easily report suspicious activity directly on their platform.

Reporting your suspicions directly to the website is often the best way to ensure the issue gets addressed quickly and efficiently. Additionally, if you feel comfortable doing so, consider filing a police report or contacting your local law enforcement agency so they can investigate further if necessary.

You can also report the crime to us here at Cyber Investigation. We are experts in handling online dating scams and other cybercrimes that can come from them, such as internet sextortion and online blackmail, ensuring your safety and security online.

It is crucial for those who use online dating platforms regularly to be aware of how scammers operate to protect themselves from becoming victims of fraud. Knowing how to spot warning signs and reporting any suspicious activity on your chosen dating site can help reduce the chance of falling prey to one of these scammers.

Learn how to avoid online dating scams by implementing safety measures such as refraining from disclosing your personal information. This approach can significantly aid in maintaining your safety when interacting with new individuals through the internet.

Read More
What To Do If Someone Has Your Nudes

As dangerous as it might be, people will share intimate pictures without thinking of the many risks. No matter how enticing it might be, there can be devastating consequences if you send nude photos to someone you know or a stranger online. This blog will provide you with a guide on what to do if someone has your nudes and is threatening to release them.

How to Respond If Someone Has Your Nudes

When someone has something as sensitive and personal as your nude photos and threatens to expose them online, it can feel like the world is ending. We understand the fear and panic being put in that position. However, the world is not ending, and you can overcome this situation.

The best way to respond to someone threatening to release your nudes is to be cool, calm, and collected. That may seem impossible when the threats of exposure are terrifying, but it’s best to be calm and not act on fear and make rash decisions. Making decisions out of anxiety and panic can make the situation worse for you down the road.

Most victims decide to block their blackmailer and not respond in hopes of making it all go away; however, most times, that does not work, and it instead causes their blackmailer to expose them to teach them a lesson. What you can do is stall for as long as you can. If they are asking for money, come up with excuses for why you can’t give any. You can say things like, “I need time to come up with the money,” or, “I need to wait to get paid.” Any excuse will give you time to report the crime and get help from experts so they can take over for you.

Signs that Someone May Have Your Nudes

Besides the unmistakable sign of your blackmailer providing you proof that they have your nude photos, there are other signs that someone may have your nudes without your knowledge or consent.

Strange Texts and Emails:

If you start receiving strange texts or emails asking for money or other favors in exchange for not releasing your nude photos, it’s a sure sign that someone may have them. Contact local law enforcement immediately if your nudes are being used against you.

Unexpected Reactions from Friends or Family:

Blackmailers often use a victim’s family and friends as leverage. They will threaten to expose their nude content directly to their victim’s loved ones so that they can give in to their demands. If you receive a message or a call from a family member or friend stating they are receiving messages from a stranger claiming they have something of yours, it is your blackmailer threatening to release your nudes.

Social Media Activity:

Keep an eye on your social media accounts for any unusual activity like random mentions of your name, pictures being shared without consent, group chats being formed, etc. An unusual activity like this might indicate that someone is trying to spread your private images without permission. If this happens, make sure your friends and family know what’s going on so they can help report your blackmailer and their salacious messages and posts.

Taking Action: What to Do If Someone Has Your Nudes?

Besides stalling as much as possible until you find expert help, here are a few more tips on what to do if someone has your nudes.

· Document as much evidence as you can. Take screenshots of the threats, names, accounts, emails, phone numbers, etc. This will help the police with their investigation.

· Do not, for any reason, give into your blackmailers’ demands. Sending them money or other goods will only encourage them to return for more.

· Implement strong privacy settings on your social media and online accounts.

· Report the abuse to the police and look into hiring a cyber investigator. They will likely be able to help promptly, then the police due to what they deem urgent and other circumstances.

Despite feeling embarrassed and vulnerable, never give up! You deserve to be supported and heard. Remember what to do if someone has your nudes: do not feel obligated to give in to their demands, document the harassment, and take steps towards protecting your online accounts with two-factor authentication and strong passwords. As a final note, remember that it’s never too late to report an incident of blackmail. No one should be made afraid or ashamed because they were threatened with having their private photos shared without consent; these situations should be met with community support rather than opprobrium or victim shaming. So please, speak up and report blackmail whenever you come across it!

Read More
Stop Blackmail on Facebook

According to a Gen Threat study, the risk of being targeted by a financial scam on Facebook increased by over 300% in the second quarter of 2025. Millions of daily active users on Facebook typically let their guard down while using the platform, making them more vulnerable to blackmailers and scammers. If you use Facebook, it’s important to understand how to stop blackmail on Facebook before scammers can target you. Keep reading to learn about how to deal with Facebook blackmail if it ever happens to you.

How to Deal with Facebook Blackmail Immediately

Once a blackmail threat has been made against you, your response needs to be strategic and decisive. There are actions that you shouldn’t take like confronting the blackmailer or calling their bluff, as these can escalate the situation. However, it’s also important to focus on the right steps to take to effectively stop blackmail on Facebook. Here is how to deal with Facebook blackmail if you are being targeted.

  1. Save the evidence. The first step you should take is to preserve all the evidence. Messages on Facebook can be deleted and profiles can be changed. It’s essential to save all evidence of blackmail immediately after receiving it. You can take screenshots of messages and anything else that is relevant.
  2. Do not give in to the demands. You should never consider complying with a blackmailer’s demands. Instead of stopping the threats and attacks, it encourages the criminal to continue the blackmail even more aggressively.
  3. Report the scam on Facebook. Victims of Facebook blackmail have a tool that allows them to fight back. You can notify the platform administrators of the scammer’s profile, messages, posts, and even comments. This could lead to the profile being removed from the platform. However, it doesn’t stop the scammer from making another account.
  4. Notify the authorities. Local law enforcement can assist you with filing an official complaint, which can be used to support future legal action. Next, you should notify the FBI’s Internet Crime Complaint Center (IC3). The IC3 processes and forwards each case to the appropriate agencies across the country.
  5. Secure your accounts. It’s vital to strengthen the security on your accounts when you are being targeted by a cybercriminal. Start by making sure that no unauthorized users have gained access to your accounts. Next, update your passwords. Use a strong, unique password for each account you have. You should also enable two-factor authentication for an added layer of security.
  6. Turn to cybersecurity experts. Private cybersecurity firms can guide victims on how to deal with Facebook blackmail. They can also prevent or mitigate the damage caused by exposure. Using digital forensics, they can also unmask the perpetrator’s identity.

What to Expect from Facebook Blackmailers

Blackmailers on Facebook are typically only interested in your money. They will use similar tactics to lure in potential victims and establish trust with victims. However, the more users are aware of Facebook blackmailers’ methods, the less effective their schemes will be. Fortunately, our analysts have compiled a list of common tactics used by blackmailers on Facebook. When it comes to how to deal with Facebook blackmail, the first step is to take note of the following techniques.

Emotional Manipulation

Blackmailers are manipulative and use emotions to pressure victims into compliance. They will use constant threats to intensify the fear, shame, and distress from the situation. Short deadlines are also used to amplify the feelings of urgency and encourage rash decisions.

Fake Profiles and Impersonation

Cybercriminals use social engineering to trick victims into performing an action that reveals sensitive information. In many cases, blackmailers will use the likeness of attractive individuals to lure potential victims into a romantic relationship.

After gaining enough trust through constant engagement and affection, they will suggest sharing explicit images. The blackmailer will go first as an “act of good faith”. However, once the victim shares their explicit content, the blackmail begins.

Blackmailers may also use fake profiles to trick victims into clicking malicious links. Posing as legitimate organizations, perpetrators send messages to you that include links filled with malware or that direct you to a malicious webpages. If you click the link, the criminal gains access to your device. The link can also direct you to a fake login page, designed to steal your credentials.

Steering the Conversation off the Platform

Facebook has strict policies against blackmail and can often respond quickly to any complaints of the crime. The platform has also implemented machine learning technology to detect and remove profiles engaging in inappropriate behavior before a user notifies the administrators. Because of this, perpetrators will steer conversations onto private messaging apps like WhatsApp or Telegram. These platforms have less oversight and provide the criminal more freedom to blackmail their victim.

Demands for Payment

When blackmailers demand money, they use methods of payment that are difficult to trace. It’s common for criminals to request money through cryptocurrency or gift cards. Cybercriminals are most concerned with maintaining their anonymity. This allows them to act without fear of repercussions.

How Law Enforcement Can Stop Blackmail on Facebook

The local authorities are a great resource for victims and can support efforts to stop blackmail on Facebook. They can assist you in filing a complaint, documenting the crime and creating a timeline of events. Some agencies will also investigate the perpetrator’s identity and location. However, police departments only have authority over local jurisdictions. If the cybercriminal is in another state or country, there is little they can do.

That is why you should also notify the FBI’s Internet Crime Complaint Center (IC3). The IC3 can track nationwide cybercrime trends and federal agents refer to the IC3 to launch new investigations. The FBI has jurisdiction over the country and even has connections to international law enforcement agencies.

The Role Private Cybersecurity Firms Can Play in Stopping Blackmail

Private cybersecurity firms have experts that specialize in digital forensics. They can trace the blackmailer’s digital footprint, uncovering their geolocation and, in some cases, their identity. This information can then be used as powerful leverage to stop blackmail on Facebook. Furthermore, firms can detect and remove instances of exposure over the internet to mitigate damage to your online reputation.

If you are a victim wondering how to deal with Facebook blackmail, contact Cyber Investigation. Our team of experts can protect your privacy and unmask your blackmailer’s identity. Call us today.

Read More
Should You Ignore Sextortion on Facebook?

One of the most common responses to sextortion on Facebook is to simply ignore it. Victims will delete messages or block the sextortionist in hopes that the criminal was making empty threats. However, this is not the most effective way to respond to sextortion. In many cases, ignoring the perpetrators will only make the situation worse. We’ve created a resource that addresses three of the most common questions about responding to sextortion: Do sextortionists follow through? Can sextortion ruin your life? And should you ignore sextortion on Facebook?

Do Sextortionists Follow Through on Facebook?

A 2023 survey found that 42% of sextortionists do follow through, even if the victim pays. This may look like an alarming number. However, the likelihood of exposure depends on many key factors. Take note of the following determinants.

  • Vulnerability of the victim. Celebrities, politicians, and high net worth individuals are often targeted by sextortionists. Perpetrators are also more likely to make good on their threats toward these individuals since they heavily value their reputation.
  • Targeted attacks. If a sextortionist is targeting you, they have likely invested time to research you and your close connections. This increases the likelihood that they’ll directly share the compromising content with those people if their demands are not met.
  • Likelihood of compliance. Entertaining the attacker’s demands in messages or sending them money is never a good idea. Compliance of any kind will only bolster the criminal to continue sending their threats.
  • Type of incriminating content. Some scammers will use AI deepfake technology to create fake explicit content to threaten victims. They may also threaten to use compromising content that does not clearly show your face or other identifiable features. This content is not as incriminating and can reduce the risk of exposure.
  • Impulsiveness of the sextortionist. There is no telling how likely an anonymous sextortionist is to make good on their threat. These criminals can be impulsive and unpredictable, releasing the content out of anger or vindictiveness.
  • The victim’s response. How the victim responds to the sextortionist can increase or decrease the likelihood of exposure. There are best practices victims can follow to protect themselves in case they are targeted. When it comes to the question of should you ignore sextortion on Facebook or not, it’s important to be proactive and strategic in your response.

Can Sextortion on Facebook Ruin Your Life?

It is possible for sextortion to ruin your life, but that is not often the case. Even in cases of exposure, there are tools that can quickly remove the content from certain platforms. However, sextortionists do want their victims to believe that they can ruin their lives. That’s why they will make malicious threats against the victim’s reputation to induce panic. It’s important to be aware of possible ramifications while also knowing the scare tactics sextortionists use.

Career

Sextortionists are aiming to cause extreme emotional distress and they will often threaten your career to cause that. Using LinkedIn or other investigative methods, they will look for co-workers or supervisors to coerce you into compliance. Public-facing careers, such as teachers and police officers, are also more vulnerable to sextortion. These careers value reputations and how they can reflect on their institutions.

Financial Ruin

Victims should never pay a sextortionist. Not only does it communicate that you have the money to pay, but it also signals that you are susceptible to their threats. Unfortunately, many victims pay the sextortionist to maintain their online reputation, losing thousands of dollars. There have been cases where victims have exhausted their life savings to appease sextortionists, with the demands continuing indefinitely.

Personal Relationships

The main threat that sextortionists will make is toward the victim’s relationship with family, friends, and peers. They will research the target to discover the online accounts of their close connections, threatening to send the explicit content directly to them. On Facebook, they may even create a group chat with your friends for more leverage. In many cases, perpetrators will send explicit content to some followers or in group chats before moving onto another target.

Should You Ignore Sextortion on Facebook?

Many victims feel compelled to completely ignore threats of sextortion out of extreme anxiety. They often will block the sextortionist on Facebook. However, this can lead to devastating consequences. Sextortionists can notice when they are blocked and may publicly expose the explicit content in retaliation.

So, should you ignore sextortion on Facebook? While not responding to the sextortionist is a good step, not taking any further action is a common mistake. There are additional steps you should take to ensure the incident is reported and protect yourself — even if exposure occurs.

What Should You Do When Facing Sextortion on Facebook?

We’ve covered whether you should ignore sextortion on Facebook or not. Now, let’s walk through what you should do when facing sextortion. Follow these steps to protect yourself and respond to sextortion effectively.

  • Keep communication open with the criminal. When considering should you ignore sextortion on Facebook, it’s best to leave the line of communication open. However, you shouldn’t engage any of their demands. Instead, our experts suggest using delay tactics to stall for time while you connect with the proper experts.
  • Preserve all the evidence. You need evidence of the sextortion in order to report the crime to law enforcement. You can take screenshots of messages, the profiles involved, and anything else that is relevant.
  • Report the user on Facebook. Sextortion goes against Facebook’s community standards. Users can report the user on the platform along with posts or messages. Make sure to report the perpetrator, as it can lead to account removal.
  • Notify the authorities. Your evidence can be used to file a report with local law enforcement. The report will be officially documentation of the crime, which can support future legal actions. You should also report the crime to the FBI’s Internet Crime Complaint Center (IC3). The FBI has federal jurisdiction and connections to law enforcement in other countries.
  • Work with cybersecurity experts. Experts at private cybersecurity firms can work to protect the privacy of victims and mitigate the damage of any exposure. They also offer services to investigate and unmask the criminal responsible.
  • Reach out for emotional support. Being a victim of sextortion is overwhelming to go through, especially on your own. It’s important to confide in a trusted friend, family member, or a counselor to alleviate some of the emotional burden of the incident.

Tulsa Victim Speaks Out: Should You Ignore Sextortion on Facebook?

In 2024, a woman named “Jane” received a text message from the hacker group that calls themselves “Anonymous”. The message demanded that she pay 1K Bitcoin within an hour or else they will post explicit images on her Facebook. There was also a file attached. Jane responded with “Whatever, you’re bluffing,” and clicked on the link. The link contained multiple images.

However, minutes later, the file appeared in the comments of her Facebook posts. Jane then deleted the comments and made her profile private. What Jane didn’t know is that clicking the link granted the hackers access to her device and any images on it. Jane decided to file a report with her local police department about the incident.

How to Protect Yourself on Facebook

Facebook provides multiple tools for users to prevent being targeted by sextortionists in the first place. You should also follow online safety practices to protect your privacy from scammers. Here is how you should protect yourself on Facebook.

  • Lock down your account. Scammers will often scour the platform for possible targets. Make your account private to limit the exposure of your profile.
  • Be cautious with friend requests. Catfishers will begin relationships with targets on Facebook with unsolicited friend requests and messages. You need to stay vigilant when accepting and responding to message requests.
  • Adjust privacy settings. Facebook allows users to control who can message them or view their profile details, friends list, and posts.
  • Avoid sharing intimate content. Sharing explicit content online is always a huge risk. Even though sexting is common, there is no telling what the person on the other end will do with the content. Even if you are messaging a significant other, a falling out can lead to sextortion years later.
  • Strengthen security settings. Make sure your password is complex and two-factor authentication is enabled. You can also check if your password has been exposed by visiting Have I Been Pwned.
Read More
Harassment on Facebook

As new forms of communication are developed, it’s safe to assume that someone will find a way to use them for harassment. Facebook is no exception. In the third quarter of 2024, Facebook took action on 7.6 million pieces of content connected to bullying or harassment. With this level of prevalence, it’s important that all users are aware of harassment on Facebook and effective response methods.

What is Harassment on Facebook?

Meta has outlined what they consider to be harassment on Facebook and their other platforms. This includes any posts, comments, pages, and groups that are conducting in a manner that is intended to cause distress.

They differentiate their protections between public and private persons on the platform. This is to allow commentary on public figures that is often critical, such as news discussions of politicians. Some of these judgements would be harsh and unwarranted toward private individuals, leading to stricter restrictions on content posted about these users.

What is Facebook’s Stance on Harassment?

Bullying and Harassment are explicitly prohibited according to Facebook’s Community Standards. Violations of these guidelines should be reported to Facebook’s system administrator. What Facebook considers harassment varies based on the individual. Minors are more protected than adults, and private individuals are more protected than public figures.

According to Meta, there is a four-tier system to determine what behavior is considered harassment depending on the target. Each tier adds increased protection.

  • Tier One. This tier includes protections that are applicable to all Facebook users, regardless of age or social status.
  • Tier Two. These added protections apply to all minors, private adults, and limited scope public figures (activists, journalists, or involuntarily famous individuals).
  • Tier Three. These protections are in place for private minors, private adults, and minor public figures who became famous involuntarily.
  • Tier Four. This tier adds additional protections that only apply to private minors.

How does Facebook Help Harassment Victims?

Meta offers a number of features to help users combat bullying and harassment on Facebook. Within the safety center, there is a hub dedicated to combatting these issues with specific guidance for teens, parents, and educators.

The advice listed within the prevention hub is consistent with the recommendations of our experts.

  • Don’t engage the harasser, both in retaliation and compliance,
  • Don’t struggle alone. Talk with a trusted member of your support system.
  • Document the harassment. This will help support your case against the harasser.

How can You Prevent Harassment on Facebook?

The best way to combat harassment on Facebook is by taking measures to prevent it before it begins. Luckily, there are practices that can help you safely navigate the platform and mitigate the chances of being targeted by harmful conduct. Here’s what our experts suggest.

  • Keep Your Account Private. This step will make it more difficult for a harasser to reach you on Facebook. Unless you are using your profile for commercial purposes, it’s best to keep it private.
  • Be Selective with Your Friends. Piggybacking off the last suggestion, you should also vet your friends on Facebook. Having a high friend count can be alluring and feel like a reflection of your status. However, it’s best to limit it to people you know and trust.
  • Avoid Oversharing. It’s still possible that you could be harassed online without oversharing. However, the perpetrator will have less to try to harm you with. It’s always advised to avoid sharing personal information online.
  • Don’t Retaliate. If someone has already tried to harass you on Facebook, don’t respond. Most harassers are simply looking to get a reaction from their target. If you don’t give them this satisfaction, they will likely move on.

What Can You Do if You’re Facing Harassment on Facebook?

Unfortunately, harassment on Facebook can be targeted at anyone. Some groups are at higher risk than others, as displayed by the tier protection system. It’s important for all users on the platform to understand the steps you can take to respond to harassment on Facebook.

Document the Harassment

You will want proof of the harmful conduct that has been waged your way. You should document the entirety of the interaction. Take screenshots of the harasser’s profile and any posts, comments, messages, or content that was involved.

Include timestamps so you can accurately reconstruct a timeline of the harassment. Make sure to save your evidence and store it in a secure location. You should assign names to the files that help you easily determine the evidence it contains.

Unfriend the Person Harassing You

If the harassment is coming from someone on your Facebook friends list, you should unfriend them. To do this:

  1. Open their profile.
  2. Tap “Friends” at the top of the profile.
  3. Select “Unfriend” and click confirm.

It’s important to note that our experts advise against blocking the user until after you’ve completed your investigation. Blocking can result in the deletion of crucial evidence.

Reporting Harassment on Facebook

If it can be shared on Facebook, there’s likely a way it can be used for harassment. Likewise, there is a way for you to report it to the platform administrator. Profiles, posts, groups, comments, ads, hashtags, and more can all be reported for harassment. Each form of content on Facebook has a slightly unique process for reporting. They differ to some extent, but most consist of some variation of the following steps.

  1. Open the content that is being used to conduct harassment.
  2. Look for three dots or a drop-down arrow denoting the “Options” menu.
  3. Select the “Report” option and choose the most accurate reason for your report.
  4. Submit your report to Facebook.

Notify Law Enforcement

You should also report the Facebook harassment to law enforcement. Begin by filing a report with your local police squad. You can do this in person at the station, and some accept reports online or over the phone. If you feel an immediate threat to your safety, call 9-1-1.

Next, you should notify the FBI. They are the national agency responsible for handling cybercrime and don’t face the jurisdictional limitations of local police. You can file a complaint with the FBI by visiting your local field office or online though the Internet Crime Complaint Center (IC3).

Can You Take Legal Action Against Your Facebook Harasser?
Yes, there are legal avenues for you to combat harassment on Facebook. You may be able to acquire court appointed protective orders to halt the harassment. However, these are only achievable and enforceable if you know the identity of the perpetrator.

Depending on the severity of the case, you may be able to sue your harasser for damages for the harm they’ve caused. Civil harassment cases are typically fought on the grounds of defamation or intentional infliction of emotional distress. Like protective orders, you need to know the harasser’s identity to pursue litigation.

It’s important to note that the content of this section is not legal advice and should not be taken as such. You should consult an attorney in your area who specializes in cybercrimes to discuss your local laws and legal options.

Further Support for Victims of Harassment on Facebook

Additionally, there are support and guidance resources that can be beneficial to victims of online abuse like harassment on Facebook. They can discuss options, help victims plan their next steps, or simply lend an ear to their problem. The following outlets are some of the places victims can turn to for help.

  • Right To Be. Founded in 2005 as a platform against street harassment, Right To Be has expanded into an international movement tackling all forms of harassment. This includes their Heartmob platform, a service for online harassment victims. They have educational guides and support for victims and bystanders.
  • Cyber Civil Rights Initiative. This non-profit specializes in crimes related to non-consensual intimate image abuse and cyber harassment. They provide a 24/7 crisis center, legal guidance, and support in removing harmful content.
  • Pen America Online Harassment Field Manual. This manual is a one-stop shop for all things online harassment. The guide provides educational material for victims, allies, and employers and advises on prevention, response, and recovery.
  • Cybersecurity Professionals. These experts can help you uncover evidence that would be accessible to the average internet user. This can include tracking down the identity and location of an anonymous Facebook harasser.

If you are ever faced with harassment on Facebook, remember that you can count on Cyber Investigation Inc. You can reach our Helpline any time to connect with one of our specialists and begin your road to recovery.

Read More