How We Help

Assess the Case and Ensure the Victim’s Immediate Safety

Our investigators will review your case with care and evaluate the severity of the threat. We’ll guide you through the immediate steps needed to minimize any risk to your privacy.

Detect and Remove Non-Consensually Shared Content

Our team actively monitors the internet for any unauthorized sharing of your images or videos and works with online platforms to have them quickly removed. We continue this service even after the blackmail has been stopped.

Investigate the Perpetrator’s Digital Footprint

We use cutting-edge digital forensics to trace the digital evidence left behind by the cybercriminal, helping us uncover key information like the culprit’s geolocation, devices used in the attack, and identity.

Put an End to the Sextortion

Our experts use insights from the investigation to apply strategic pressure on the blackmailer, persuading them to stop their attack or discouraging any further threats against you.

You’re Not Alone. We’re Here for You

Real support from cybercrime experts who care.

Have Peace of Mind Over Your Digital Reputation

Rest assured that steps will be taken quickly to either remove any non-consensual sharing of your content or prevent it from being posted altogether.

Hire an Ally to Stand by Your Side

Work alongside experts that make protecting your privacy their #1 priority.

App

Expose the Person Behind the Sextortion

Our experts use digital forensics and data tracing technology to break through the anonymity of sextortionists, uncovering key identifying information.

Regain Control Over Your Life

We will take on the burden of communicating with the sextortionist while you go on with your life.

Questions and Answers

What is sextortion?

Sextortion is when someone threatens to expose a victim’s explicit images or videos unless their demands are met. Perpetrators are known to use fake online profiles to hide their true identity and lure unsuspecting users into a relationship. However, what these users don’t know is that the criminal is only interested in exploiting their vulnerability for their own interests.

How can I get the sextortion to stop?

Stopping sextortion requires taking several important steps and a strategic, multi-faceted approach focused on your own safety. Follow this process if you are facing sextortion:

  1. Do not comply or engage further. Entertaining the criminal’s threats and demands only emboldens them to escalate the situation.
  2. Report the Facebook account. Facebook allows users to report sextortion on the platform and often takes action against the perpetrator’s account.
  3. Notify the authorities. Report the crime to your local law enforcement and to the FBI’s Internet Crime Complaint Center (IC3). They can document the crime officially and launch an investigation.
  4. Change your privacy settings. Cybercriminals will use the information on your Facebook profile, like your friends list and hometown, to make targeted threats to send your explicit content to friends or family.
  5. Preserve the evidence. Law enforcement and cybercrime experts need proof of sextortion in order to investigate the crime and pursue the perpetrator.
  6. Seek help from a private cybersecurity firm. Cybersecurity firms like Cyber Investigation Inc. can immediately assist victims of sextortion and investigate the data trail left behind by the criminal responsible.

Will the police actually help me?

Victims of sextortion should always report the crime to the local authorities. They are an essential resource that can help you file an official report, documenting the crime for court proceedings and future legal action. The police can also launch an investigation to uncover the perpetrator’s identity, leaving them vulnerable to legal consequences.

However, local police do face certain limitations. Their authority is restricted by jurisdiction and the need to identify suspects. This is why it’s also important to report sextortion to the FBI’s IC3, the national center for reporting cybercrime. The IC3 is not limited by local jurisdiction and can work with international police in other countries to bring sextortionists to justice.

Should I block the perpetrator?

Blocking the perpetrator or responding in a way that angers them may encourage the release of your explicit content as a retaliatory response. Instead, use Facebook’s anonymous reporting tool to notify the platform of the crime. This can lead to the criminal’s account being removed, but it doesn’t stop them from creating another one.

How do I report sextortion on Facebook?

To report a Facebook profile:

  • Go to the profile.
  • Click the three dots.
  • Select “Report.”
  • Choose “Something about this profile.”
  • Select “Adult Content” or “Bullying, harassment or abuse.”
  • Choose the option that best fits your circumstance.

To report a Facebook interaction:

  • Go to the messages.
  • Click the three dots.
  • Select “Report.”
  • Choose “Sharing inappropriate things.”
  • Choose the option that best fits your circumstance.

How do you ensure client confidentiality?

We follow strict legal guidelines for managing sensitive information and adhere to ethical standards that maintain integrity, ensuring the safety and confidentiality of everyone involved. Cyber Investigation Inc. can only assist minors with the written consent and direct supervision of a legal guardian or parent.

What if they post my picture or video publicly?

We understand how terrifying sextortion can be. It can trigger intense feelings of anxiety, distress, and shame — especially when the threat of exposure becomes real. However, even though exposure is troubling, you can still mitigate the damage from it and preserve your online reputation.

There are many organizations and tools available that can help victims, even after the event of exposure. If you’re concerned about your private content being released, take note of these resources:

  • Reporting to online platforms. Most online platforms have community standards against non-consensual intimate image (NCII) abuse. Use the report feature to notify the platform of any sharing of private content without your consent. For example, Google allows users to remove certain webpages from search results.
  • Using a content removal service. Take It Down is a tool designed for minors who are victims of NCII abuse to submit explicit content that they believe is going to be shared without their consent. The tool will mark the content across participating platforms with a unique number, and any identification of the number will result in removal. The StopNCII.org website has a similar tool, but it is designed for adults.
  • Get emotional support. Experiencing the strong emotions that come with sextortion can be overwhelming. However, it can help to speak to someone about what you are going through. We recommend talking with a trusted friend, family member, or counselor.

What free resources can help me right now?

Sextortion has been a growing issue for over a decade. Over time, organizations were created to combat sextortion and support victims. Here are a few organizations that offer free resources to help victims.

  • Cyber Civil Rights Initiative (CCRI). This organization was designed to combat online abuses that threaten civil rights and liberties. They have an image-abuse helpline to support victims and provide victims with legal assistance.
  • National Center for Missing and Exploited Children. The NCMEC is a non-profit with a mission to help exploited children. They have a CyberTipline for users to report sextortion against minors or child sexual abuse material posted online.
  • Meta Safety Center. Meta created a safety center with educational articles to help victims of Facebook sextortion navigate the situation.

Why should I trust you?

Our experts have years of experience fighting cybercriminals and are well-versed in the tactics used by sextortionists. We’ve supported many victims of Facebook sextortion and always prioritize protecting their privacy and safety above all else. Using digital forensics, we follow strict protocols and document chain of custody to ensure our investigation is admissible as evidence in court proceedings. With over 220 clients rating our services an average of 4.86 out of 5, we’re proud to assist victims with reliable and expert support.

Work Alongside Experts Who Understand and Respect the Importance of Your Privacy

Get Help Now