Blog

Report Sextortion on Instagram

Instagram’s entire platform revolved around sharing photos and videos. Their logo is a camera, after all. As with many platforms where exchanging media is possible, sextortion has become a growing problem on Instagram. The evolution of generative AI and deepfake technology has made sextortion possible in cases where no intimate content was shared. As a result, all users need to be aware of the risks of Instagram sextortion and how to report it.

How Sextortion Occurs on Instagram

The scam typically kicks off with the perpetrator contacting you through a fake account created with fabricated details and stolen images. A more technically-savvy sextortionist may even compromise the account of a trusted individual. Regardless, they often begin buttering you up by using the information they’ve learned from your profile to appeal to your interests.

Things quickly become steamy as the perpetrator begins aggressively flirting before proposing the idea of exchanging nudes. Instagram allows users to share images both publicly and in private DMs, making this possible without having to switch platforms. The sextortionist may even send a fake or stolen image to initiate the swap.

Once the victim agrees to send an intimate photo, the curtain is pulled back and the perpetrator’s true intentions become clear. They begin threatening to expose your nudes unless you pay them. They may send you a screenshot with a drafted message containing your content ready to be sent to a group chat with your followers. What’s more, they may opt to post your content publicly.

How Does Instagram Help Sextortion Victims?

Instagram has tools in place to allow victims to report sextortion on the platform and receive help and support from dedicated resources. Furthermore, they are currently testing new features to be implemented that will expedite this process.

Tools to Prevent NCII Abuse

  • Take It Down Tool: Meta was one of the founding members of Take It Down, a tool run by the National Center for Missing and Exploited Children (NCMEC). The tool helps remove intimate images of minors and prevent their resharing, and it can be accessed through Instagram’s platform.
  • org: Similar to Take It Down, StopNCII.org is a tool for adult users who have had their nudes shared non-consensually. Likewise, Instagram provides an avenue for users to access this tool within the platform.
  • Lantern: Instagram is a participant in the Lantern program, an initiative to connect technology companies and allow them to share intel on sextortionists across platforms. This is integral since many perpetrators operate through numerous accounts on multiple online networks.
  • Blurred Content and Warnings: Instagram is preparing to roll out features that blur nude content in direct messages and warn recipients prior to opening. Additionally, users will be warned before sending explicit content. These features will be automatically enabled for minors, and adults will be prompted to enable them.
  • Sextortion Account Detection: Instagram is also developing technology that recognizes accounts that are participating in sextortion-related activities. Direct Messages from these accounts will be sent straight to the recipients hidden requests folder. Furthermore, minor accounts will not be reachable by flagged accounts.

How to Report Instagram Sextortion: Who Should Victims Inform?

Victims of Instagram sextortion need to act quickly to notify the proper authorities of the offense. This helps mitigate the damage and connects the victim with resources who can help them take action. Furthermore, it allows law enforcement and social media providers to gain insight into the latest cybercrime trends, creating a safer environment for all users.

Reporting Options on the Platform

Instagram provides an avenue for users to report profiles and shared content on the platform. The reporting process varies slightly for each, so we will cover the processes below:

  • Reporting an Account:
    • Open the profile you wish to report
    • Click the three dots next to their username
    • Select the ‘Report’ option
    • Follow the on-screen instructions and submit your report
  • Reporting a Post:
    • Open the post containing your intimate photos
    • Click the three dots above the post
    • Select the ‘Report’ option
    • Follow the on-screen instructions and submit your report
  • Reporting a Direct Message:
    • Open the chat and hover over the message you’d like to report
    • Click the three dots next to the message
    • Select the ‘Report’ option and choose the reason which best fits your situation
    • Follow the on-screen instructions and submit your report

Reporting to Law Enforcement

  • Local Police: As with any cybercrime, you should begin notifying the authorities by filing a report with your local police precinct. They may be able to help if your sextortionist is within close proximity to you. If not, you’ve successfully ruled out a local threat and have valuable documentation of the crime committed against you.
  • National Agency: Your next step should be to inform your national law enforcement agency. In the United States, the FBI is responsible for fielding reports of cybercrime. You can file a report at your local FBI field office or online through their Internet Crime Complaint Center (IC3).

How Professional Investigators Can Help

Dealing with the emotional toll of Instagram sextortion is exhausting enough on its own. Having to collect evidence, maintain the chain of custody, and produce the findings in accordance with regulations is a tall task for one individual to handle — if at all possible.

This is where professional digital investigators can be a huge asset. These experts can investigate your case, using advanced techniques like IP-tracing and metadata analysis to uncover the culprit and prove their guilt.

Reputable investigation firms will document their entire process, which ensures that the chain of custody is preserved. Your report can then be used to build your case and serve as evidence in future legal proceedings.

Staying Safe Moving Forward: How to Protect Yourself Online

Unfortunately, the threat of Instagram Sextortion is never a zero-risk. As new safety features are implemented, creative cybercriminals will find a way to work around them. This doesn’t mean you can’t enjoy the platform and feel secure in your interactions. Be mindful of these suggested practices to increase your safety and enjoyment on Instagram:

  • Increase Your Privacy Settings: Set your profile to private, limit who can reach you through DMs, and heavily vet your followers. We understand that a high follower count can feel like a symbol of social status, but it’s not worth the risk for accounts that aren’t run for business.
  • Use Strong Passwords: Use unique passwords that use a combination of cases, numbers, and special characters and update them regularly. You should also enable two-factor authentication (2FA) on Instagram and any online platforms that provide the option.
  • Avoid Oversharing: Instagram is like a window into your life. You wouldn’t leave the curtains drawn and the window open for anyone to enter your home. Instagram is much the same. Avoid revealing personal information to limit your potential exposure on the platform.
  • Trust Your Gut: If something feels off about an interaction online, listen to your instincts and end the conversation. It is possible that the person on the other end could be harmless, but the presence of sextortionists on the platform requires a zero-trust approach.
Read More
Prevent Facebook Messenger Sextortion

Recent studies have found that messaging platforms are the second-most common starting point for sextortion. Facebook is the largest social network, and its Messenger platform trails only WhatsApp and WeChat in monthly active users. With these figures in mind, it’s important to understand how to prevent Facebook Messenger sextortion. Keep reading to learn how you can keep yourself safe on the platform.

Identifying the Issue: Prevent Facebook Messenger Sextortion Before It Starts

The first and largest battle in your effort to prevent Facebook Messenger sextortion is recognizing these schemes before they develop. This is a task that is easier said than done, but one that is very possible nonetheless. By learning the commonalities of sextortion and safe online practices, you can position yourself to safely use platform.

Common Red Flags of Facebook Messenger Sextortion

Sextortion is often conducted by organized cybercrime groups based overseas. They follow scripts similar to cold calling, leading to common tactics popping up across different scams. These parallels can help you recognize and prevent Facebook Messenger sextortion.

  • Unsolicited Messages. Any message in your inbox that you didn’t initiate or expect should be assessed with caution. Think about it — how often do you send messages to random people online?
  • Suspicious Profiles. Although it’s an exciting prospect, it’s unlikely that a wealthy, attractive individual is looking for love on Facebook Messenger. You should also be wary of unusual account behavior, such as weird posting habits or unnatural friend lists.
  • Fast Movers. It’s not uncommon to connect with someone online and hit it off early on in the conversation. However, what is unusual is passionate declarations of love in the beginning stages. Sextortionists often “love bomb” their targets.
  • Unusual Requests. It should be alarming if anyone online begins making requests for money, gifts, or personal information. In the case of sextortion, the request is for explicit content under the guise of an attractive suitor.

Practices That Can Help Prevent Facebook Messenger Sextortion

Knowing that sextortionists inhabit Facebook Messenger may deter you from using the platform. However, it is possible to avoid these criminals without having to delete the app. In addition to knowing what to look for, there are measures you can take to prevent Facebook Messenger sextortion.

  • Optimize Your Security Settings. Set your account to private and limit who can reach you through Facebook Messenger. You can do this under “Privacy and safety” in your account settings.
  • Avoid Oversharing. If you choose to send intimate content, do so with extreme caution and confirm the recipient’s identity. But avoiding oversharing also means not posting or sending personal information online.
  • Protect Your Passwords. Use strong, unique passwords for each online account and keep them private. Update your passwords regularly and consider the benefits of a password manager. You should also enable two-factor authentication (2FA) whenever available.
  • Don’t Click Suspicious Attachments. It’s never a good idea to click links you don’t know the destination to, especially from an unfamiliar sender. Sextortionists and other cybercriminals often embed malware in messages as a gateway to their target’s device.

What is Meta Doing to Prevent Facebook Messenger Sextortion?

Over recent years, Meta has implemented many new features to help users prevent sextortion on Facebook and Facebook Messenger. This effort has been made in coordination with multiple internet safety organizations.

Take It Down Tool

Meta collaborated with the National Center for Missing and Exploited Children (NCMEC) to create and expand the “Take It Down” Tool. The tool helps minor victims of sextortion remove their intimate content and prevent it from being reshared. This is done by assigning a unique hash to the image that is detected if the image is reshared.

The tool was initially released in 2023 and was available in English and Spanish. However, Meta and NCMEC extended the reach of the tool in 2024 by making it available in 25 languages. In their press release announcing the expansion, Meta said this will make the tool accessible to millions more teens.

Collaborating with Thorn

Meta teamed up with Thorn, a nonprofit working to improve cybersecurity for minors, to improve their sextortion guidance page. The resource aims to provide victims with guidance on how to proceed if they are targeted by a sextortionist. It also includes ways you can help a loved one who is experiencing the crime. The page can be found within the Sextortion Hub of Meta’s Safety Center.

Messenger Restrictions for Minors

Messenger has several features in place to help prevent sextortion that are automatically turned on for users under 18. One of these is nudity blur on photos. This feature blurs any nude content on the receiving end and issues a warning to the sender to be cautious when sharing such content.

Furthermore, accounts flagged for potential scammer activity will have their messages automatically delivered to the “hidden requests” folder. Warning messages will be sent to users who are already messaging potential scammers. Additionally, adults will only be able to message teen accounts they’re connected with. The message option won’t appear for potential sextortion accounts, even if they are connected already.

“Staying Safe from Online Harm” Curriculum

On Safer Internet Day 2025, Meta partnered with Childhelp to create an educational cyber safety module for middle schoolers. The curriculum is available for free online and discusses how to recognize and prevent sextortion and other forms of child exploitation.

Other contributors include the NCMEC, Thorn, the Department of Homeland Security, Purdue University and the Crimes against Children Research Center. This service provides guardians and educators with the tools to educate the children in their care — from lesson plans to engaging videos and activities.

Creating a Safe Future: Prevention Through Education

After reading this article, you’ve already taken a huge step in your effort to prevent Facebook Messenger sextortion. However, the job is not finished. Cybercriminals are constantly evolving, and you need to keep up with them.

Continual research and education are required to remain on the forefront of the best practices in cybersecurity. Much like a history textbook becomes outdated, cybersecurity information is constantly being improved and expanded upon.

Luckily, there are experts who are working just as hard to provide up to date information and create a safer digital realm for everyone. At Cyber Investigation Inc., we are constantly adding to our database of educational material. Our blog page is a great place to find the latest expert advice.

And if you are ever faced with sextortion on Facebook Messenger, we can help you gather the evidence you need to fight back. You can call our Sextortion Helpline any time of day to speak with our specialists and regain control.

Read More
Facebook Blackmail Video

Blackmail remains a widespread threat to internet users. In 2024 alone, the FBI’s Internet Crime Complaint Center received over 86,000 extortion complaints. That same year, Meta removed over 60,000 accounts that were linked to blackmail schemes. This includes 5,700 Facebook groups in which scammers were offering advice on how to exploit other users. Blackmail with video on Facebook scams are a growing concern, and users need to know what to do if they are targeted.

Common Types of Blackmail with Video on Facebook Scams

Meta has removed over 1 billion fake accounts on Facebook to this point in 2025. This is a clear indicator of just how many suspicious users you need to watch out for on the platform. Blackmailers on Facebook use a variety of tactics to pressure targets into compliance. It’s important to familiarize yourself with their tactics so that you can recognize a scam before it’s too late. Here are the most common forms of blackmail with video on Facebook.

Blackmail with a Video Chat on Facebook

Facebook has evolved past the original purpose of being a social media platform. Now, it has a dating feature, communities, and a marketplace. However, that same versatility also creates opportunities for schemes like the blackmail with video on Facebook scam.

This blackmail with video on Facebook scam is when bad actors lure unsuspecting users into a fraudulent online relationship. Once enough trust is built, they convince the victim to engage in an explicit video call that is secretly recorded. Then, the scammer threatens to release the video publicly unless the victim meets their financial demands.

Blackmail with Shared Videos on Facebook

Similar to blackmail with a video chat on Facebook, catfishers will use fake profiles to lure victims into an online relationship. After gaining the victim’s trust, they persuade them into sharing explicit images. Then, they threaten to expose the images to the victim’s friends or family members unless the victim complies with their demands. This is otherwise known as sextortion.

Sexual Deepfakes

Unfortunately, deepfake technology and AI has only intensified the potential harm of online blackmail. Scammers are using the new technology to create fake explicit images and videos of victims. They may edit victims into already existing explicit videos or use undress AI applications to create false nudes.

Even though these deepfakes are not real, scammers still use them to blackmail victims. They will send direct messages threatening to send the deepfakes to the victim’s friends and family. The blackmailer typically demands a certain amount of money in exchange for keeping the deepfakes private.

Hacked Accounts or Devices

Social engineering tactics are used to manipulate victims into giving the scammers access to their own accounts. These scammers may impersonate trusted organizations or individuals close to the potential victim. Then, they will lure victims into clicking malicious links or visiting fake websites designed to steal their login credentials. After gaining access to the victim’s passwords or systems, they may find incriminating videos and use them for blackmail.

How to Identify the Signs of a Blackmail Attempt

To prevent yourself from falling victim to blackmail, you need to recognize the early signs of it. Scammers use similar scripts and tactics to target victims. This makes it easy to catch onto the common elements used. Here are the warning signs of a blackmail attempt.

  • Unsolicited friend requests and messages. Scammers send tens, if not hundreds, of messages to Facebook users hoping someone will respond. Approach all friend requests from someone you don’t know with caution.
  • Quickly advancing the relationship. Catfishers will use compliments and affection to quickly establish trust with victims. They will say things like “You’re my soulmate” and “Miss you already.”
  • Poor grammar or unnatural language. Many of these blackmailers are not native English speakers. They will make grammar mistakes or word choices that sound unnatural.
  • Profiles that were recently created or barely have any posts. Fake profiles are typically recently created and have little to no posts on their timeline.
  • Attempt to direct the conversation off the platform. Scammers will attempt to steer a conversation on Facebook off the platform and onto private messaging apps. Encrypted messaging platforms allow criminals to blackmail victims without a lot of oversight.

How to Respond to Blackmail with Video on Facebook Scams

If you have fallen victim to blackmail with video on Facebook, you are not helpless. And you are not alone. There are steps you can take to protect yourself and even fight back against your attacker. Follow these steps if you are dealing with blackmail with video.

  1. Do not comply. Victims of blackmail should never comply with the perpetrator’s demands. Giving in to the demands will only encourage the culprit to continue threatening you to extract as much money as possible.
  2. Record the evidence. Blackmail is a crime across the country and it’s important to document evidence of the crime. Take screenshots of the messages, the profiles involved, and anything else that is relevant.
  3. Report the profile on the platform. Facebook does not tolerate blackmail on its platform. It has a reporting system for users to file a complaint about any inappropriate behavior. This system is anonymous and can lead to the account being removed from the platform for good.
  4. Notify the authorities. Your local law enforcement is one of your greatest assets. Filing a report allows the police to create a timeline of events and have a record of your evidence. You should also report the crime to the FBI’s Internet Crime Complaint Center (IC3). The IC3 tracks national cybercrime trends and can be used to launch an investigation.
  5. Work with private cybersecurity firms. Experts at cybersecurity firms can protect victims of blackmail from exposure. Many offer services to detect and remove any images or videos posted without consent. Experts can also follow the data trail left behind by the perpetrator, revealing their geolocation and identity.

Real-Life Case: A Blackmail with Video on Facebook Scam

A sextortion group in the Ivory Coast used an attractive woman’s publicly available images to create an account on Facebook. They named themselves “Emily Thompson” and targeted a teenager in North Dakota. Emily was 20 years old and lived in Montana. The group messaged the victim and started a relationship with him.

Eventually, “Emily” tricked the victim into sharing a video recording along with some images of himself performing explicit acts. However, the events quickly took a turn. “Emily” threatened to expose the video and images unless the victim could meet their demands. However, the teenager couldn’t. Unfortunately, the sextortion group made good on their threat, and after experiencing exposure, the victim took his own life.

The sextortion group now faces charges of cyberstalking, wire fraud, and distribution of child sexual abuse material.

How To Stay Safe from Blackmail Scams on Facebook

The best way to protect yourself from blackmail with video on Facebook is to prevent yourself from being targeted in the first place. Below are proactive steps you should take to reduce your risk of being targeted and stay safe on Facebook.

  • Make your account private. You can make your account private, which limits the number of people that will be able to discover your profile. There are also privacy settings that allow users to control who can message them and who can see their profile details.
  • Strengthen security settings. If you are being targeted, cybercriminals may attempt to also gain access to your accounts. Make sure you update your passwords and enable two-factor authentication. Your passwords should be strong and unique to each account.
  • Avoid clicking any suspicious links. Hackers will use social engineering to lure victims into clicking malicious links, granting access to accounts or devices.
  • Vet your friends list. Bad actors who are already on your friends list will have more access to your posts and stories. Vet your friends list and make sure everyone is someone you can trust.

Your Privacy Matters. Protect it by working with Cyber Investigation

If you are a victim of blackmail with video on Facebook, Cyber Investigation can help. We are digital experts who have helped protect thousands of victims. Our experts make preserving your privacy the priority and work tirelessly to prevent exposure. We also have advanced technology that quickly detects and removes any non-consensually posted images and videos. Lastly, we have digital forensic experts who can trace the blackmailer’s digital footprint and put an end to the threats. Contact us today if you want experts to stand by your side.

Read More
Report Cyber Harassment

41% of all adults in the United States have experienced online harassment. In the under-30 age range, that percentage jumps up to 64%. And yet, it’s estimated that between 60-90% of harassment cases go unreported. Many victims feel too afraid or ashamed to come forward, but silence only perpetuates the cycle. It’s important that all internet users know how to report cyber harassment, so read on to learn more.

What Should I Do if I’m Being Harassed Online?

If you’re being harassed by someone online, it’s best to not engage with them. Make it clear to them that their behavior is unwelcomed but avoid any further communication. Instead, you should focus your efforts on collecting evidence of the harassment. This information will be critical when you are reporting the incident. It includes:

  • The name or account information of your harasser
  • The messages or interactions that are causing you distress
  • Timestamps of when the harassment occurred

It’s also important to mention that our experts advise against blocking the harasser. This may seem like the best way to cut them off, but blocking comes with the risk of deleting evidence. You should cease communication and mute the user, if the option is available, but leave them unblocked until you’ve completed your investigation.

Who Can I Report Cyber Harassment To?

There are numerous outlets who you can and should report online harassment to. They can help limit the perpetrator from reaching you, investigate the incident, and help you recover. Our analysts recommend reporting to the following organizations.

Online Platforms

You should report cyber harassment to the platform where it occurred. Most websites that allow for content sharing have safety features to report other users who are breaking the platform guidelines.

These reports are reviewed by the system administrator. If they determine a violation has occurred, the user may face consequences like suspension and permanent removal. This is an important step as it helps create a safer online environment for all of us.

Law Enforcement

You should always report online harassment of any kind to law enforcement. Start by filing a report with your local police. They may be able to help you investigate the incident and identify the perpetrator. If not, the report will still officially document the harassment.

Next, inform the FBI. They are the national agency tasked with handling cyber-enabled crimes, and they accept reports through the Internet Crime Complaint Center (IC3). Unlike local police, the FBI is less restricted by jurisdiction and can work with global law enforcement.

Cybersecurity Professionals

Consider the benefits of enlisting the assistance of cybersecurity experts. These firms have access to proprietary technology and can employ advanced digital forensics techniques to uncover evidence.

Every online interaction leaves a trail of code. Every file that is shared contains metadata that discloses information like creation date, devices used, and the region of origin. Cybersecurity professionals know how to locate and derive this information to identify the perpetrator.

How Do I Report Cyber Harassment?

We’ve addressed the proper initial response and who you report cyber harassment to. But what does the reporting process look like? Our team recommends the following steps to notify the proper authorities and hold the perpetrator accountable.

  • Organize your evidence. Store your documented proof in a secure place you will be able to access without issue. Assign descriptive names to the screenshots that will allow you to recognize the file. Add the time and date to the file name to help chronologize your evidence.
  • Report to the platform. Each platform has a slightly different way to report users or shared content. There is typically an options menu near profiles and content that provides options like “Report” or “Flag”. To find out how this is done on a specific platform, visit their help and safety center.
  • Report to your local police. You can file a police report by gathering your evidence and heading to your local station. You may also be able to do it over the phone or online. Provide as much detail as you can to construct the most accurate timeline of events. If you feel an immediate risk to your safety, contact 9-1-1.
  • Report to the FBI. This process is very similar to reporting to your local police. You can either visit the IC3 website or visit your nearest FBI field office. If the harassment includes more serious federal crimes such as violent claims and interstate criminal communication, report it to tips.fbi.gov.

Depending on the nature of the harassment, you may be able to pursue legal action against your harasser. These include court-ordered protections, civil suits, and criminal charges. You should consult a lawyer to discuss your options and the laws around harassment in your area.

Additional Resources for Victims of Cyber Harassment

There are also organizations that victims can turn to for guidance, emotional support, and an ear to listen. This can be just as important for recovery as holding the perpetrator accountable. Victims of cyber harassment are faced with a lot of complex emotions that can be hard to sift through on your own. Consider reaching out to these resources for help.

  • 988 Crisis Lifeline. This helpline runs 24/7 for anyone dealing with mental health struggles, emotional turmoil, substance abuse issues, or any other crisis.
  • Crisis Text Line. Similar to the 988 lifeline, this service allows users to connect with crisis counselors by texting “HOME” to 741741.
  • Online Harassment Field Manual. This guide provides concrete strategies to help internet users keep themselves safe from online abuse. The manual is tailored especially for groups that are disproportionately targeted but is universally helpful.

And if you need any help reporting cyber harassment, you can always depend on the team here at Cyber Investigation Inc. We can help you uncover evidence, organize your report, and connect you with law enforcement. All of this is done with complete confidentiality, so you can rest assured that your privacy is our priority. Reach out today to speak with one of our specialists.

Read More
Report a Scammer on Facebook

Since 2021, 25% of all people reporting lost money due to fraud said that the scam began on social media. At over 3 billion users, Facebook stands as the king of social media — and also one of the most likely spots to encounter scammers. Victims can endure a drastic toll on their emotional, physical, and financial wellbeing. It’s important that these scammers are reported for the good of all Facebook users. Continue reading for a current, comprehensive, and expert-driven guide breaking down how to report a scammer on Facebook.

Prepping to Report a Scammer on Facebook: Initial Steps to Take

If you cross paths with a fakebook scammer, your immediate response plays a huge role in your path forward. It is common for panic to set in, but you need to remain calm and use your limited time wisely. Here’s what you should do before you report a scammer on Facebook.

Identifying the Facebook Scam

The obvious first step in reporting any crime is realizing what is unfolding. Facebook scammers can be extremely stealthy in their approach, but there are often red flags that sneak through the cracks. The following are some of the common warning signs you can look out for.

  • Unnatural Profiles. Does the profile look too perfect? Or maybe it’s so bare bones that it doesn’t seem like a real person. Are their posting habits unusual? These are all signs of fake accounts that are often the culprits of Facebook scams.
  • Unreal Offers. An account may have messaged you with an opportunity to double your money while doing absolutely no work. Or maybe there’s a listing on the marketplace that seems too good to be true. If this is the case, it’s likely just that — untrue.
  • Urgent Deadlines. Scammers often pose their “opportunities” as limited time deals to drive their targets into hasty decisions. If you are proposed an idea with an impending deadline, it’s likely a scam.

Gathering Evidence

Now that you’ve recognized the Facebook scam, you will need evidence to support your report. Take screenshots of everything. Capture the account information, posts, messages, timestamps, and any other relevant data that can help you create a timeline of the scam. You should store this information securely on a separate device. Make sure to name files so that they can easily be distinguished and pulled when they are called upon.

How to Report a Scammer on Facebook

Facebook scams exist in many different forms. There could be individual posts, messages, listings, or entire profiles dedicated to the scheme. The process of reporting these different modes varies slightly, so we will provide an in-depth guide for reporting scammers on Facebook below.

Reporting a Facebook Scammer’s Profile

  1. Begin by opening up Facebook and pulling up the profile you wish to report.
  2. Click the three dots to open the “Options” menu
  3. Click “Report profile”
  4. Pick the option that best describes how the profile broke community standards.
  5. Submit your report.

Reporting a Facebook Scam Post

  1. Open the Facebook post that you are looking to report.
  2. Click the three dots in the top right corner of the post.
  3. Click “Report post”.
  4. Select the option that best fits your reason for reporting.
  5. Submit your report.

Reporting a Facebook Scam Message

  1. From Facebook, click the Messenger logo in the top-right corner. Or, open the messenger platform on mobile.
  2. Open the chat with the message you wish to report.
  3. Click the down arrow to open the “Options” menu.
  4. Select the “Report” option. If it doesn’t appear, go to “Privacy & support” and click “Report” from there.
  5. Select the option that best describes the community standards violation.
  6. Submit your report.

Reporting a Scam Listing on Facebook Marketplace

  1. Open up the Marketplace on Facebook from your feed.
  2. Click a listing from the seller you are reporting.
  3. Click the name of the seller below “Seller information”.
  4. Click the three dots to open the “Options” menu.
  5. Select “Report” and follow the on-screen instructions.

You can also report scam ads that are run on Facebook. To report an ad:

  1. Click the three dots next to the add on your feed.
  2. Select “Report ad” and follow the ensuing instructions.

Reporting Facebook Scams to Law Enforcement

Beyond reporting a scammer on Facebook, it’s also important that victims report these cybercriminals to law enforcement. Even if they are unable to pursue legal action against the scammer, reporting helps these agencies track current trends.

Begin by filing a report with your local police. They may have a dedicated cybercrime unit that can help. If not, this will still serve as valuable documentation moving forward. You should also inform the FBI. They are the national body entrusted with handling cybercrime. You can file a report at your local field office or through the IC3 portal.

Additional Resources That Can Help with Facebook Scams

Past the platform and the law, there are additional resources that can help victims navigate reporting a scammer on Facebook. These services can help the victim deal with the emotional fallout, gather evidence, and provide guidance on the reporting process. Consider the benefits of working with the following organizations when you report a scammer on Facebook.

  • Cyber Civil Rights Initiative. The CCRI is the nation’s leading nonprofit organization on the forefront of innovation to fight online abuse. The group works with legislators to advise on reform regarding cybersecurity. They also provide educational guides for victims of cybercrime.
  • Cybercrime Support Network. This non-profit works to help individuals and small businesses affected by cybercrime. They collect resources from around the internet and compile them in one location, including unification and peer support programs.
  • National Elder Fraud Hotline. The elderly are disproportionately targeted online. This hotline is run by the DOJ for victims of fraud who are 60 or older. They offer personalized, judgment-free service to help victims report and recover from these scams.
  • Cybercrime Investigators. These professionals have the tools and technical know-how to uncover evidence you wouldn’t have access to alone. By investigating the digital footprint, they can unmask the perpetrator and help you bring them to justice. They can also help guide you on the necessary steps to report the scam.
Read More
Hire a Hacker to Catch a Cheater

In this digital age, the dynamics of relationships have significantly evolved. With the advent of technology, infidelity has taken on new forms and dimensions. Consequently, many individuals in troubled relationships are considering unconventional methods to confirm their suspicions, one of which is hiring a hacker to catch a cheating spouse. However, it’s crucial to understand the ethical, legal, and emotional implications before embarking on such a course.

The Digital Dilemma

Why would someone consider hiring a hacker in the first place? The answer lies in the digital footprints we leave behind. Social media platforms, messaging apps, emails, and other online spaces can contain evidence of deceit. A skilled hacker can access these spaces, potentially unearthing proof of infidelity.

The Ethical Implications

While the idea of hiring a hacker might sound tempting, it’s essential to consider the ethical implications. Invading someone’s privacy, even if you suspect them of dishonesty, is a breach of trust. It’s crucial to ask yourself if the ends justify the means and if you’re ready to deal with the consequences of such an action.

Legal Concerns

In addition to the ethical considerations, there are also legal issues to think about. Unauthorized access to someone else’s personal accounts is illegal in many jurisdictions. Hiring a hacker could potentially land you in legal trouble, with penalties ranging from fines to imprisonment.

Emotional Fallout

Finally, there’s the emotional fallout to consider. Discovering a spouse’s infidelity can be devastating. However, finding out through such intrusive means can compound the pain and make reconciliation even more challenging.

Alternatives to Hiring a Hacker

Before resorting to hiring a hacker, consider these alternatives:

Open Communication: If you suspect your spouse is cheating, the first step should always be open, honest communication. Express your concerns and listen to their responses.

Counseling: Professional therapists or counselors can provide a safe space for both partners to express their feelings and concerns, helping to rebuild trust and understanding.

Private Investigators: If you still have suspicions, hiring a licensed private investigator is a legal and often effective method to discover the truth. They can gather evidence without breaching privacy laws.

Legal Advice: If you’re considering divorce based on infidelity, consult with a lawyer first. They can guide you on the best course of action and help protect your interests.

In conclusion, while hiring a hacker may seem like a quick solution, it’s important to consider the potential consequences. There are other, more ethical, and legal ways to address suspicions of infidelity. Open communication, professional guidance, and legal advice are often the most effective ways to handle such sensitive situations.

Read More
What to Do If You Are Being Stalked

Cyberstalking is one of the unfortunate consequences of the digital age. It can cause extreme emotional harm and sometimes escalate into more dangerous crimes. 7.5 million people are victims of cyberstalking every year, and there are no signs of that number slowing down. Anyone using online platforms is at risk of falling victim to a cyberstalker. Fortunately, we have created a guide that addresses what to do if you are being stalked online and how to protect yourself from being targeted.

What Cyberstalking Looks Like

Learning what to do if you are being stalked online starts with understanding what it looks like. Cyberstalking can manifest in many different ways. Stalkers will make persistent, unwelcome contact with potential victims. In the modern age, technology also offers multiple methods of making contact. Here is how cyberstalking can occur online.

  • Unwanted messages. The stalker sends a barrage of unwanted messages. These can be aggressive, disturbing, or obsessive.
  • Harassing comments. Victims may see recurring inappropriate comments made under their status updates from stalkers.
  • Fake profiles and impersonation. Perpetrators will create fake online profiles to impersonate people or organizations. They do this to gain trust and communicate with the victim secretly.
  • Spreading false information. The stalker may seek to cause emotional harm and will spread lies about the victim online.
  • Location tracking. Tech-savvy stalkers may hack into the victim’s GPS devices to track their real-life movements.
  • Computer or account hacking. Perpetrators may hack into the victim’s social accounts or devices to gain access to their sensitive data. This could lead to demands for money in exchange for keeping the information private.

The Dangers of Cyberstalking

Cyberstalkers have common traits that drive their behavior. They often want control and power over their victims. It’s also common for stalkers to be acting out of jealousy and insecurity. Other traits that stalkers tend to share are instability and obsessiveness, making them dangerous and unpredictable individuals. What begins as only online stalking can escalate into physical crimes, doxxing, or damage to the victim’s personal life.

The Emotional Toll of Being Stalked

Being stalked online can be traumatizing. It can last anywhere from months to years, and unfortunately, law enforcement often fails to handle the harassment seriously. This can lead to feelings of helplessness and constant fear for your safety. As stalking progresses, victims may even feel compelled to leave social media for protection. Victims of cyberstalking should always confide in someone they trust about their experience. This helps with emotional support and ensures that someone else is aware of your ongoing situation.

What To Do If You Are Being Stalked Online

Stalkers are often persistent and unpredictable. That’s why it’s critical that you act fast to protect yourself from these harmful individuals. However, there are key steps you should take to secure your online presence. If you are unsure what to do if you are being stalked online, take note of the following recommended practices.

  • Stop engaging. Stalkers desire any response from their targets. Ceasing any engagement with the online stalker avoids escalating the situation.
  • Document everything. Victims should document all instances of cyberstalking or harassment. This can serve as evidence to support future legal actions or investigations. You can take screenshots of messages and profiles, print out emails, save messages, etc.
  • Report the stalker on the platform. Online platforms typically allow users to anonymously notify the administrators of any behavior that violates their policies. Victims of cyberstalking or harassment should immediately report the incident to the platform. This could result in the removal of the perpetrator’s account, saving others from experiencing similar harm.
  • Report to law enforcement. Local law enforcement can play a vital role when it comes to bringing cyberstalkers to justice. They can also help you file an official report and create a timeline of events, which can also support future legal actions like a restraining order. Furthermore, report the stalking to the FBI’s Internet Crime Complaint Center (IC3). The IC3 is the national hub for reporting cybercrimes, and federal agents often use it to discover cases to investigate.
  • Seek help from cybersecurity experts. When it comes to what to do if you are being stalked online, you can also turn to a private cybersecurity firm. These firms have teams of digital forensic experts who can trace the stalker’s digital footprint and unmask their identity. They can also work with online platforms to get certain harmful profiles removed and aid law enforcement investigations.

An Online Stalking Cautionary Tale

In June 2015, Kassandra Cruz was a college student who became fixated on a woman she found on an adult website. She tracked down the woman’s social media accounts and created fake profiles to gain access to them. The victim was 18 years old at the time the explicit content was created, and it was 15 years later when Cruz rediscovered the content. Cruz then created a fake online profile posing as an attractive male U.S. marine and sent the woman a friend request. The victim accepted and Cruz immediately liked and commented on almost every picture the woman shared.

The victim found the behavior particularly suspicious when the fake profile sent friend requests to her friends as well. As a result, the victim blocked Cruz’s fake account. However, the situation only escalated when Cruz sent a barrage of messages to the victim from multiple other fake accounts. These messages included an attempt to coerce her into paying $100,000 in exchange for Cruz keeping her history with adult content a secret.

The relentless messages, emails, phone calls, and letters continued for months until the FBI stepped in. The FBI lured Cruz into an in-person meeting with the victim, which led to the perpetrator’s arrest. In August 2016, Cruz was sentenced to 22 months in prison for cyberstalking. Many victims seek guidance on what to do if you are being stalked online. However, this case serves as a reminder of just how essential it is to involve law enforcement.

Warning Signs That You Are Being Cyberstalked

Knowing what to do if you are being stalked online is important, but recognizing the red flags of cyberstalking early can prevent the situation entirely. Online stalkers can sometimes use subtle techniques to follow your activity. It’s common for victims to not notice cyberstalkers until things have progressed to an extreme point. Always stay vigilant and cautious of cyberstalkers when you are online, accepting friend or follow requests, and responding to messages. Here are some warning signs that may indicate you are being stalked.

  • Unsolicited contact. One of the first signs you should look for is any reoccurring unsolicited messages from multiple fake profiles. It’s rare for strangers to message you out of the blue, especially multiple times in a short span.
  • Invasive and inappropriate comments. Look out for constant comments under your status updates and published content. You should also look at the content of the comments. It can also be a red flag if they are inappropriate or inauthentic.
  • Aggressive language. Stalkers typically use aggressive language immediately or eventually when the victim resists their attempts at making contact.
  • Fake profiles or impersonating someone you know. Perpetrators may impersonate family members or friends to get close to you. It’s a warning sign to receive messages from people you know through unfamiliar accounts. Make sure to verify the owner of the account before engaging.
  • Knowing personal details about you. If an online user mentions personal information that you did not share, it’s a clear indication that they have looked deeply into you — which can be a warning sign.

How to Protect Yourself from Stalkers Online

Many online platforms provide a variety of different tools for users to protect themselves from malicious behavior. It’s important for users to review all the settings available to make sure their profiles are as secure as possible. Here are some practical ways to protect yourself from being targeted by online stalkers.

  • Update your privacy settings. Set all your social accounts to private to limit your exposure to malicious users. Many online platforms will allow users to control who can message you, see your status updates, or add you to groups.
  • Vet your friends or follower list. Cybercriminals are known to create fake profiles to trick you into accepting their friend or follow request. You should always verify the identity of profiles befriending you and also review your current friends list.
  • Strengthen your security settings. Stalkers are unpredictable and if you are targeted, you should protect yourself as much as possible. For one, you should update your security settings. Make sure your passwords are strong and secure. You should also enable two-factor authentication when available.
  • Limit publicly sharing personal information. Bad actors will look through profile bios and status updates for personal information about their targets. You should always limit what information is shared online to prevent stalkers from learning too much about you.

How Cyber Investigation Helps Victims Reclaim Their Online Safety

Our cybersecurity firm is dedicated to helping victims of cyberstalking reclaim control over their digital lives. We specialize in removing what perpetrators value most — their anonymity. Our team can track the data left behind by the stalker to uncover their geolocation and, in many cases, identity. Our investigation can also be used to apply strategic pressure onto the criminal, discouraging them from continuing their abuse.

At Cyber Investigation, we know exactly what to do if you are being stalked online, and make your online safety our top priority. Contact us today to speak to one of our experts.

Read More
Video Call Scams

When the world shut down in 2020, businesses turned to virtual communication methods to keep operations running. Many of these practices have persisted in the after the pandemic period, both in our professional and personal interactions. As is the case with any popular online platform, video call services have become an avenue for cybercrime. But how do scammers manipulate video calls — and what can you do to stay safe? Read on to learn more about video call scams.

How Do Scammers Use Video Calls?

There are a number of ways that a cybercriminal can manipulate video calls to carry out various schemes. Often as part of a phishing, romance, or investment scam, scammers may steal videos or create their own using AI.

Next, the scammer will use a program like ManyCam that allows them to replace the video feed from their webcam with the prerecorded footage. From there, the video call scammer can easily deceive the person on the other end of the call. After all, most people use video calls to confirm the identity of other users online.

How to Recognize Video Call Scams

It takes a significant level of technical skill and computing power to fake a video call. High-quality video fakes can be harder to discern than vishing and smishing attempts. However, mistakes arise due to the sophisticated process of creating and employing an augmented video call.

Here are some red flags that could help you recognize a video call scam:

  • Video quality. The video quality of a deepfake may be poor because of the amount of data required to run the feed. A regular video call may suffer similar issues due to poor connection. However, if the video seems overly grainy, it could be a sign of a manipulated call.
  • Weird cuts and glitches.Much like the video quality, the ability for the feed to play at all may struggle due to the file size. This can lead to the video cutting and freezing often. You may also notice weird lighting or distortion around the person on the call. The call might extend past the video’s length, resulting in a noticeable loop.
  • Lips don’t sync with dialogue. Do the words coming from the speaker not match the movement of their mouth? Is the area around their lips distorted or fuzzy when they speak? This may indicate that the video feed has been doctored.
  • Video resolution.If the perpetrator is repurposing a stolen video, there’s a good chance the original clip does not match the resolution of the call. If the feed looks stretched or distorted, it may mean that it’s a resized clip and not a live video.
  • Inconsistent Identity. Does the person in the video match who you are supposedly speaking with? Are the things they are doing or saying consistent with who they claim to be? If not, it’s likely a stolen or manipulated video.

Deepfake Detection Tools

The growth of generative AI has led cybersecurity experts to develop tools that can differentiate digitally altered content from legit videos. These programs use advanced algorithms and techniques to analyze digital content and identify irregularities that go unseen by the naked eye. There are various reputable services that can help you detect deepfake media

Steps That Can Help You Avoid a Video Call Scam

Just because bad actors are capable of manipulating video call platforms doesn’t mean you need to sacrifice your online freedom. It is possible to safely avoid video call scammers, but you need to be aware and act accordingly. The following are practices that can help you do just that.

  • Avoid calls from unknown users. This is the best way to avoid falling into a video call scam. Cybercriminals will often reach out to unsuspecting users hoping they will curiously join the call. Ignoring calls from people you don’t know will prevent them from getting this opportunity.
  • Use heightened security settings. Most video call platforms provide a security feature that allows you to silence unknown callers. This can help eliminate the guess work of deciding which calls to decline.
  • Don’t engage in compromising calls. A common tactic is to play a video of an attractive individual participating in explicit behavior. The goal is to encourage the target to do the same. You should avoid these types of interactions, especially with callers who are unknown to you.
  • Reverse image search. If you’re already on the call and start to suspect it may be a scammer, take a screenshot of the feed. You can use it to run a reverse image search to find if any similar frames are floating around online.
  • Stay informed on cybercrime trends. Cybercriminals are constantly evolving the methods they use to target their victims. It’s necessary that you keep the pace with your cybersecurity knowledge. Our blog library is a great resource that can help you do this.

What to Do if a Video Call Scammer Contacts You

  • Cut off communication. It’s best to end the call as quickly as possible. The longer you stay on, the greater the chances of the perpetrator gaining information or footage they can use to fuel their scheme.
  • Collect evidence. If you’re in the call, take a screenshot of the video being displayed. You should also document the caller’s contact information and any other contact that has been made. Record time stamps to reconstruct the timeline of the scam.
  • Report the call and the user. You should inform the platform of the scam call and the account responsible so they can be held accountable. Furthermore, you should report the matter to law
  • Consider professional cybersecurity assistance. These experts can retrieve data that is inaccessible to the average internet user. Cybersecurity firms can use advanced techniques to unearth evidence such as the perpetrator’s IP address and device network.

Real-World Cases

If you fall into a video call scam, you are not the first. Video call scammers have successfully attacked countless victims, taking on targets from everyday people to multinational companies. There are lessons to be learned from these experiences. Whether it’s gaining insight on the scammers’ strategies or learning from the response of the victim, these cases can provide valuable knowledge that can keep you safe.

UK Engineering Firm Loses Millions to Deepfake Video Conference

In early 2024, British engineering company Arup fell victim to an AI-fueled fraud scam. The perpetrators were able to use deepfake technology to digitally clone company executives, including the CFO.

The video call scammers then arranged a conference with an employee of the firm working in Hong Kong. They convinced the employee to make 15 transfers to five different bank accounts. The transfers totaled to roughly 200 million Hong Kong dollars, or just under $25.5 million USD.

This case serves as evidence that nobody is too big to fall for these scams — even large corporations. It also illustrates the importance of verifying who you are virtually speaking with, especially when it concerns financial transactions.

Gurugram Man Scammed by Whatsapp Call

In 2023, a 25-year-old man was sitting in his father’s office at a law firm in Gurugram’s 17th sector. He received a WhatsApp call from an unknown caller and decided to answer. When he did, he saw a woman on the other end who began undressing.

The man reportedly ended the call immediately and fainted in shock of what he’d seen. However, the video call scammers took screenshots of the obscene call and blackmailed the man for “participating”.

It doesn’t take long for scammers to gain the leverage needed to execute their schemes. This example displays the ability for video call scammers to commit sextortion, even if the victim simply answered and hung up the call.

Cartell Kidnapping Video Call Scam

In 2020, the FBI released a public warning around an uptick in “virtual kidnapping” schemes. Perpetrators pose as criminal organizations like drug cartels and call hotel rooms to inform occupants that the building is “surrounded”.

They convince the targets to join video calls where they take screenshots of the individuals. With this, they reach out to the target’s family and convince them they have been kidnapped and demand a ransom payment.

This example shows the versatility of schemes that can be pulled off with a simple video call. It also shows the potential for these video call scams to perpetuate far past the initial victim.

Facing a Video Call Scammer? We can Help

Video call scams are a serious threat to your online security. However, these schemes don’t have to be so devastating, and you don’t have to handle them alone. Our team of experts can follow the digital footprint left behind from these video calls to help you identify the scammer.

Get the professional help you need to regain control today. Contact our Helpline to speak with one of our specialists and figure out your first step toward recovery.

Read More
to find blackmail expert

Technological advancements and barriers to holding cybercriminals accountable have created an online environment where bad actors are free to terrorize vulnerable users. Online blackmail is particularly dangerous because it can be committed from anywhere, at any time, and anonymously. One of the biggest mistakes victims of blackmail make is not asking for help, especially from the right experts. Just like any crime, experts are essential to investigate and put an end to the online blackmail for good. If you’re wondering how to find a blackmail expert, continue reading to find out.

Criteria for Choosing a Blackmail Expert

Not every cybersecurity expert can help with blackmail. It takes specialized expertise and experience to effectively handle a blackmail case and protect victims from exposure. When trying to figure out how to find a blackmail expert, there are 5 key areas you should focus on.

1. Expertise in Cybersecurity and Digital Forensics

Blackmailers will often use hacking techniques to gain access to a user’s accounts or devices to look for sensitive information. Cybersecurity experts understand how to determine if your private information has been accessed. They also know how to prevent criminals from gaining access in the future.

On another note, digital forensic experts specialize in collecting and analyzing digital data. They also preserve the data in a way that is admissible as evidence in legal proceedings.

2. Experience with Blackmail Cases

Blackmailers are difficult to predict and can be quick to escalate. However, experts who are well-versed in how cybercriminals operate understand how to communicate with them effectively. They can work to reduce the risk of exposure and rely on their experience to navigate tricky situations.

3. Integrity and Confidentiality

Online blackmail involves sensitive information that needs to be kept private. You need to work with experts who are trained to uphold the utmost respect for privacy. It’s also important for experts to thoroughly document their process, maintaining integrity and transparency when working with blackmail victims.

4. Availability and Response Time

Experts with a high case load can have a delay in response time or limited availability. This can be concerning for blackmail victims that are receiving a barrage of hostile messages and need assistance immediately. Law enforcement agencies, for example, can experience a high volume of cases, leading to slower response times.

5. Reputation and Feedback

Blackmail is a traumatizing experience, and it’s important that any experts you turn to are effective in handling such cases. Looking at reputation is a vital part of how to find a blackmail expert. However, not all blackmail experts are the same. Some may have questionable ethics. You can look at reviews and existing feedback to get a clearer sense of how they operate.

How Experts Can Help with Blackmail and Extortion

Cybercrime experts can help in a multitude of ways. They can help victims fight back against their attackers and can even provide emotional support to help victims recover after being blackmailed. Take note of the following ways experts can help with blackmail and extortion.

  • Investigate the cybercrime. Digital forensic experts can follow the trail of data left behind by your blackmailer — revealing their geolocation, the device used in the attack, and identity.
  • Preserve evidence. Experts can preserve the evidence discovered in their investigation for victims to use to support future legal actions.
  • Take over communications with the blackmailer. Some experts are heavily experienced in communicating with cybercriminals and how to lure them into traps that can be used against them.
  • Help with legal action. Legal professionals can help victims take action against their blackmailers. This could be a lawsuit or restraining order.
  • Provide emotional support. Blackmail experts understand the emotional distress that can come from being a victim of the crime. They can be a confidant for you to discuss what you’re going through or help you with immediate steps that can protect your privacy.
  • Prevent future incidents. Experts can help secure your accounts and devices, reducing the risk of future hacking attempts. They can also educate you on the best online safety practices to avoid falling victim to blackmail in the future. 

How to Find a Blackmail Expert and Where to Find Them

Now that we’ve covered how to find a blackmail expert, we should go through where you can find them. You can work with blackmail experts on either a free or paid basis. Take a look at the following options to see who can assist with blackmail cases.

Law Enforcement

Blackmail victims should always file a report with their local law enforcement. A police report will officially document the crime and can be used to support future legal action. Some departments also have cybercrime units that can launch an investigation to identify the perpetrator. However, local police departments have limited jurisdiction, and they can only pursue identifiable criminals.

Because of this, you should also report the crime to the FBI’s Internet Crime Complaint Center (IC3). The IC3 is the national reporting center for cybercrimes, and agents refer to the IC3 to identify cybercrimes to investigate. The FBI has federal jurisdiction and even has connections to international law enforcement in other countries. You can report to the IC3 by visiting your local field office or going to their website.

Private Cybersecurity Firms

Law enforcement departments are largely driven to pursue criminals and bring them to justice. While this is helpful with online blackmailers, private cybersecurity firms will focus on protecting the victim’s privacy and putting an end to the blackmail. These experts use specialized forensics techniques to trace the perpetrator’s virtual footprint, revealing their geolocation and identity.

They use this information to apply strategic pressure onto the blackmailer to abandon their scheme and leave the victim alone. These firms also typically respond quickly to blackmail reports and will actively monitor the internet for any nonconsensual publishing of your sensitive data. However, keep in mind that working with cybersecurity firms often comes at a cost.

Nonprofits

There are many nonprofit organizations that combat cybercrime and specific forms of online blackmail. Many of them provide emotional support to victims and operate 24/7 helplines. Some organizations specifically fight against sextortion or image-based sexual abuse. Here are a few nonprofits to look into when facing blackmail.

Fightcybercrime.org. A nonprofit that provides educational resources for those affected by cybercrime. The organization works within law enforcement and consumer protection ecosystems.

Cyber Civil Rights Initiative. The CCRI helps victims of nonconsensual intimate image abuse, including sextortion. They offer resources to find blackmail lawyers and 24/7 support for victims.

National Cybersecurity Alliance. A nonprofit that works with companies and organizations to make cybersecurity more accessible. For example, the National Cybersecurity Alliance partners with Target, FBI, and Microsoft.

A Blackmail Lawyer

Similar to law enforcement, attorneys are only effective against identifiable perpetrators. They can help you file a restraining order, a cease-and-desist letter for online platforms hosting the sensitive content, or even a lawsuit. However, legal professionals can carry a significant price to work with. Many of them charge by the hour.

Working with Law Enforcement to Catch a Blackmailer

Between May 12 and 15, 2025, three women reported to police that they had been targeted by sextortion attempts involving threatening messages from an unidentified sender. One of the women was sent an explicit image that she recognized as a photo she previously sent to a man named Mikel Reyes. She confronted Reyes about it, but he denied any involvement.

A detective noticed that the messages were all sent from the same account using a text message service. He was able to get a search warrant, and the IP address linked to the account traced back to Reyes’s mother. The detective then got another warrant to seize Reyes’ devices. The police were able to uncover even more evidence that directly suggested that he was responsible for the sextortion attempts. As a result, Reyes was charged with multiple offenses, including three counts of first-degree larceny by extortion.

How To Protect Yourself During Blackmail

Understanding how to find and work with a blackmail expert is always important. However, you don’t have to wait for an expert to take action. There are immediate rules you should follow to reduce your risk of exposure.

For one, never give in to a blackmailer’s demands. This often escalates the situation and signals that you’re susceptible to intimidating messages. You also should immediately preserve the evidence of the blackmail. Take screenshots of messages and any other relevant evidence of the crime.

These initial actions will not only give you more control over the situation, but they will also help experts assist you. Blackmailers move fast, and it’s these quick but informed decisions that can make all the difference.

Cyber Investigation Inc. is a trusted cybersecurity firm that specializes in protecting blackmail victims. We have years of experience fighting against cybercriminals and will work tirelessly to put an end to the blackmail. If you want to work with experts, contact us today.

Read More
being blackmailed

Being blackmailed is not something anyone wants to experience. Online blackmail is a particular issue because of its widespread reach and the anonymity it offers its perpetrators. This has led to a growing epidemic of online blackmail that has put every user at risk. It’s more important than ever to understand what to do if you’re being extorted and how to reduce your risk of being targeted.

What Should I Do If Someone Is Blackmailing Me Online?

Having your private information weaponized against you is unsettling and terrifying. However, thousands of people deal with being blackmailed every year. According to the 2024 IC3 report, the FBI received over 86,000 extortion-related complaints, which included reports of online blackmail. When someone blackmails you, your response is an incredibly important factor in how the situation will end. If you are being blackmailed, follow these steps to protect yourself.

Don’t Panic

Blackmailers want you to panic and make rash decisions without thinking. That’s why they will use aggressive language and send a barrage of hostile messages to the victim. They will also use urgency in the form of short deadlines. All these tactics are meant to make the situation feel so overwhelming that the victim sees compliance as the only solution. However, you should avoid panicking and respond to being blackmailed carefully.

Gather Evidence

Users can edit or delete messages on online platforms. As such, it’s important to preserve the blackmail evidence so you can trigger an investigation into the perpetrator. Make sure to take screenshots of messages and other relevant evidence of being blackmailed.

Never Comply when Being Blackmailed

You may feel pressured to comply with the criminal’s demands, but doing so is an ineffective way to end the blackmail. Giving in to the blackmailer signals that you are susceptible to their tactics. This can escalate the situation and embolden the perpetrator to demand more. Once the blackmail starts, it’s best to immediately stop communicating with the perpetrator.

Report the Incident to Platform Administrators

Digital blackmail typically occurs on online platforms like Instagram and Facebook. Blackmailers will create fake online profiles, posing as legitimate entities or trusted individuals. Then, they will message and trick potential victims into giving the blackmailer access to their sensitive information.

Online platforms have implemented tools to combat online blackmail, including a reporting system and AI detectors for fake accounts. Reporting the blackmailer’s profile and messages to the platform administrators can result in their account being removed.

Notify the Authorities

Victims of online blackmail should always report the incident to the authorities. Your local law enforcement can help you file a police report and officially record the crime for potential use in future legal actions. They may also have a special cybercrime division that can launch an investigation into the crime. However, the authority of police is restricted to local jurisdictions.

If the blackmailer is across state lines or out of the country, you will need to report the crime to the FBI’s Internet Crime Complaint Center (IC3). The IC3 is the national reporting center for cybercrime. It tracks cybercrime trends across the country and FBI agents can refer to the IC3 to identify cases to investigate. You can report to the IC3 at your local field office or by visiting their website.

Secure your Account

Blackmailers will exploit any compromising information they have about you, either by gaining access to your devices or by tricking you into sending it directly to them. However, there are ways you can secure your account, reducing the risk of future blackmail attempts. Here are a few ways to secure your account:

  • Change your password. Your passwords should be strong and unique to each account. Make sure they are at least 12 characters long, mixing letters, numbers, and special characters.
  • Enable two-factor authentication (2FA). 2FA is a security setting that verifies every log in to your account by sending you an email or text message. It can protect your account in case your password is exposed. Check Have I Been Pwned to see if your password or emails have been publicly compromised in a data breach.
  • Verify account recovery information. If you are out of your account, you can use a secondary email address to regain access. However, you need to make sure all your account recovery information is up to date.
  • Update privacy settings. Blackmailers will often use the information about you that is available online to create a sophisticated trap. Not only can stricter privacy settings on social media restrict who can contact you, but it can also limit who can view your account.

Emotional and Legal Support for Those Being Blackmailed

Being blackmailed can trigger intense emotions like anxiety, stress, and even PTSD. It’s important to seek out emotional support as a victim to help you through this experience. Fortunately, there are resources that can help victims of blackmail deal with the emotional toll of the experience. The following are organizations to take note of:

  • Cyber Civil Rights Initiative (CCRI). The CCRI offers support for victims of image-based sexual abuse. They have a 24/7 helpline for emotional support, legal resources, and educational resources.
  • National Center for Missing and Exploited Children (NCMEC). This non-profit supports exploited children in many ways. They have a Cybertipline for people to report particular forms of blackmail and any NCII abuse against minors. The NCMEC also has a call center available 24/7.
  • Trusted friend, family member, or counselor. Talking with someone you trust about what you are going through can help alleviate the stress of the situation. Having a trusted confidant can make the process of dealing with online blackmail more manageable.

Someone is Trying to Blackmail Me. Can a Cybersecurity Firm Help?

Private cybersecurity firms have the expertise and state-of-the-art technology to help victims of online blackmail. Every online interaction leaves data behind, and these experts can use digital forensics to follow the trail. By tracing the online footprint of the perpetrator, cybersecurity professionals can unmask their geolocation and identity.

On top of identifying the perpetrator, private cybersecurity firms can also scan the internet for any unauthorized sharing of your private information and work to mitigate the damage of the exposure. These experts can also take on your case without delay, immediately catering to your needs.

If you are being blackmailed and need professional help, contact Cyber Investigation Inc. We are a cybersecurity firm that specializes in supporting blackmail victims and in taking the fight to the criminal responsible. Report your blackmail case to one of our experts today!

Read More