What To Do About Blackmail
What To Do About Blackmail
Frank M. Ahearn is a privacy consultant who disappears people, and a blackmail expert who combats blackmail and sextortion. As well as the author of The New York Times Bestselling book, How to Disappear, and a public speaker.
Frank began his career as a skip tracer, where he located people from Boston to Bali. He did this by pretext and social engineering, which is extracting confidential data from large companies. Frank has found thousands of people worldwide and extracted private information from hundreds of global companies. However, his days of hunting and pretext are behind him, now preferring the world of privacy.
After writing an article titled How to Disappear, Frank became the go-to guy for people all over the world. The next thing you know, he is vanishing individuals without a trace. Eventually, The New York Times Bestseller, How to Disappear came to life.
For some, life can go south, and danger appears on their doorstep. Much of the time, it is a situation where law enforcement cannot help or become involved. So, a plan is created, and the client disappears. Although vanishing is not always the solution, digital disinformation or in-person "fixing" can resolve issues.
Falling under the umbrella of privacy is "the strange." It is when something occurs, and you are unsure who to contact for help. So, if there is that thing you cannot figure out how to resolve, Frank can.
These days Frank prefers to work with individuals affected by acts of indiscretion. Like, blackmail, sextortion, relationship blackmail, escort blackmail, or business blackmail. The damage done can flow online and offline and into one's personal and professional life. Frank M. Ahearn is the professional to contact when you need to stop blackmail.
There is a rise in Facebook blackmail. How it goes down is an attractive female friends you. Your curiosity is piqued, and you take a few minutes, do a little due diligence, and see she is friends with one of your friends. You think cool, let me check her out further, and notice she lives locally. What not to believe, a friendly little lady. The chatting begins.
Like all blackmailers, the chat is casual; what type of work do you do? Do you have LinkedIn, what about Instagram, etc.; it is an extraction of your private information. Some will keep the chat on Facebook and will suggest a video. Or your mobile number is requested to video on WhatsApp or via Skype.
A mobile number is the road to Jericho and the killer that can reveal everything. Be it popping it into a search engine or a database. Either way, a home address, family connections, employment, email address, and social sites are on the menu for taking.
For those of you who do not know how blackmailers execute blackmail, read carefully. There you are chatting away, and she is asking questions, out of nowhere, she either surprises you with a video call. Or a video is suggested. If you accept, doom is pending.
There she is all hot and ready to rock-n-roll. She gets funky and asks you to do the same. Those of you not caught in the snare, when online, always remind yourself that if it is too good to be true, it is! If you adhere to the digital fun, the blackmailer will send a photo or video of yourself in a matter of seconds; followed by a list of your Facebook contacts.
The knee jerk reaction is to block the scammer, which is a precarious solution. If the blackmailer cannot reach you, who do you think they will contact? Correct your people. You might have also provided them with other ways to communicate like email, mobile, or another social site. Do make your Facebook private, and take inventory of what you revealed. Now you are a full-fledged blackmail victim.
Naturally, the next question is what to do about blackmail. Start by making all your social media private and negotiate with the blackmailer. Stall for time, saying you are trying to get money to pay. Under no circumstance do you ever send money, which is a gateway to being a cash machine? If you pay, they will never go away.
There is no one strategy to combat blackmail. What you must do is protect your identity, prevent exposure, and rid yourself of the blackmailer. Anything less is a potential failure.
If you need help, Frank M. Ahearn STOPS Facebook blackmail
If you are in a situation and need to create extreme privacy or need to disappear, Frank M. Ahearn can help. If you are facing criminal charges, trying to obtain a new or fake identity, forget about it; however, if you have a legitimate reason, schedule a consultation.
Are you a victim of relationship, business, or online blackmail? Or in a relationship of "understanding" and need it to end? Frank stops blackmail, prevents exposure, and protects identities. If necessary, he can negotiate an exit when ending relationship blackmail.
What To Know About Blackmail?
All victims of blackmail want to avoid exposure; however, doing so is tricky. What you do not want to do is be cocky or brazen in your exchange. Some will try to trick the blackmailer by saying they told their spouse. Unfortunately, such statements can prompt the extortionist to send photos or videos to the spouse. The other issue is blackmailers are not picky about whom they will share your information. If they have your work, son, brother, or daughter's contact, they are fair game.
Going head to head will not work; remember, they threaten people every day. You do not combat sextortion every day, which puts you at a disadvantage. Trust me, they know how to manipulate better than you, as well as squeeze the fear that makes you want to pay. Never challenge the blackmailer because you will lose. There are things to think about before you act.
I know it is difficult but keep a cool head, but it is important. The first thing is to take inventory of what they know about you. There is a difference between saying they have your wife's contact and sharing the actual email address or mobile number. They could be lying about the data they possess. It is imperative to pay close attention to what information is put on the table. I have worked on several cases where the blackmailer did not have the correct identity of my client. Many of the online scammers pull data reports; however, they do not know how to decipher and determine what is accurate or current.
If you send money, you are opening a door that will be challenging to close. Like rats, you feed them one, and they come back for more. One of the other issues is if you pay by PayPal, it could be an email address that further identifies you. Yes, you are supplying more information. Many want you to take a photo of the Western Union or MoneyGram transfer sheet. If you do, you exposed your real name and address.
The very second you are hit with the blackmail, you need to jump online and turn all your social media private. The scammer may not have located your online sites, or they are on the hunt for it. Even if they have your social sites, turn them private.
If you block the extortionist and they have contact info on another person in your life, they will make contact. By keeping in communications, you have control, and the time and opportunity to figure a plan. Also, blocking might get you instantly exposed, be it to contacts or posted on porn sites.
Do not pay, negotiate, stall, lie, or hire a professional.
What is help for blackmail?
Frank M. Ahearn is a global privacy expert who stops blackmail and protects identities.
One of the pitfalls of fighting blackmail is being myopic and only focusing on the here and now. Yes, it is important to protect your identity and prevent exposure currently and ridding yourself of the blackmailer. However, the strategy should not end there but include a long-term plan because most blackmailers return.
When the criminal finally goes silent, most victims assume it is the end of the terror; it is not. There is no reason for them not to come back for a second round. When planning your strategies, incorporate future protection. Ask yourself or the professional assisting you; will this tactic protect me, my family, and my job. If not, the plan is flawed.
Some websites and law enforcement agencies suggest ignoring the blackmailer, which is a big old mistake. You might be trying to forget them, but they sure do not forget you. Why should they? You are a potential cash cow. Ignoring could prompt them to contact someone you know or post your content online. Putting your head in the sand and hoping is lose, lose.
Protecting against future harassment involves manipulating what they know about your identity and tightening up your online presence. Imagine starting a new job, and you post it on LinkedIn, and the blackmailer discovers it. You are back to square one, and it won't be pretty. Some victims need to think about protecting their spouse or children's online data. Every contact of yours the blackmailer knows is a risk. One of my expertise is creating fake families, friends, and employees who become the blackmail target, not your real contacts.
The plan to stop blackmail must include protecting your identity, which means manipulating what the blackmailer knows. Preventing exposure, involves negotiating with a manipulated strategy, though you never pay. Ridding yourself of the blackmailer is creating alternate yet realistic contact information. As the blackmailer manipulated you, you must do the same to them.
There is a crew of blackmailers who operate out of the Dominican Republic, and they are scamming victims on Instagram and Facebook. The sextortion starts simple, where an attractive woman connects with the target, and makes a little conversation. The profile has a religious tilt to it, making it appear less threatening. Quickly she will suggest getting off the social site and going to Google Hangouts.
On Hangouts, the female becomes more provocative and suggest the same to the victims. Note, she will never speak on video, but type. You may hear moaning and groaning, but sorry to say it is a looped video. If does ne indulges in play, it is downhill from there. In a matter of an instant, you will receive a video clip of you doing the deed.
The blackmail begins!
The demand for money is aggressive, and they will expect a large payment. To convince you, the blackmailer will send you photos of your friends or followers. Specifically, family members. The threat is not only your photos, but they claim you exposed yourself to a minor. If you are reluctant to pay, you will receive a text from one of your connections claiming they received a message with your compromised photos and info about the minor. The contact from the friend is fake; it is the blackmailer spoofing you with a phony number. At this point, most victims pay.
The next part of the scam comes when another friend (fake) contacts you and claims they, too, are a victim of the fraud. They suggest contacting a police detective in the Dominican Republic who helped them. Naturally, a victim will agree. When the detective makes contact, they state they found the blackmailer; however, to expedite an arrest, the victim must pay X amount of dollars. Most victims pay.
The next contact comes from the cousin of the blackmailer. They know you had them arrested, and they demand X amount of dollars to bail here out of they will expose you. They even go so far as to send photoshopped pictures of them ready to text your spouse, friends, or employer. Most victims pay.
The fake detective contacts again and tells you they were unaware that you exposed yourself to a minor. He will claim that he must file charges with your local police or Interpol. However, for X amount of dollars, he will let it go. Again, most victims pay.
I have worked with individuals who lost thousands of dollars in the Dominican Blackmail Scam. They become so overwhelmed because the extortion hits them from multiple directions. They find themselves spiraling and into a rapid vacuum of confusion. Trying to get their head above water is difficult.
The Dominican Blackmail Scam is a prime example of why you should never pay a blackmailer. As you can see, they come back for more and more. If you are a victim and need help getting out of the situation, I can help. I work to protect your identity, prevent exposure, and rid you of the blackmailer.
Persönliche Informationen sind im digitalen Zeitalter zur Ware geworden. Anhand von Kreditkartenkäufen, Suchanfragen und Klickverhalten werden Kundenprofile generiert und persönliche Daten gespeichert.
Frank M. Ahearn, author of The New York Times Bestseller, How to Disappear.