Help With Sextortion
Help With Sextortion
Frank M. Ahearn is a privacy consultant who disappears people, and a blackmail expert who combats blackmail and sextortion. As well as the author of The New York Times Bestselling book, How to Disappear, and a public speaker.
Frank began his career as a skip tracer, where he located people from Boston to Bali. He did this by pretext and social engineering, which is extracting confidential data from large companies. Frank has found thousands of people worldwide and extracted private information from hundreds of global companies. However, his days of hunting and pretext are behind him, now preferring the world of privacy.
After writing an article titled How to Disappear, Frank became the go-to guy for people all over the world. The next thing you know, he is vanishing individuals without a trace. Eventually, The New York Times Bestseller, How to Disappear came to life.
For some, life can go south, and danger appears on their doorstep. Much of the time, it is a situation where law enforcement cannot help or become involved. So, a plan is created, and the client disappears. Although vanishing is not always the solution, digital disinformation or in-person "fixing" can resolve issues.
Falling under the umbrella of privacy is "the strange." It is when something occurs, and you are unsure who to contact for help. So, if there is that thing you cannot figure out how to resolve, Frank can.
These days Frank prefers to work with individuals affected by acts of indiscretion. Like, blackmail, sextortion, relationship blackmail, escort blackmail, or business blackmail. The damage done can flow online and offline and into one's personal and professional life. Frank M. Ahearn is the professional to contact when you need to stop blackmail.
There is a rise in Facebook blackmail. How it goes down is an attractive female friends you. Your curiosity is piqued, and you take a few minutes, do a little due diligence, and see she is friends with one of your friends. You think cool, let me check her out further, and notice she lives locally. What not to believe, a friendly little lady. The chatting begins.
Like all blackmailers, the chat is casual; what type of work do you do? Do you have LinkedIn, what about Instagram, etc.; it is an extraction of your private information. Some will keep the chat on Facebook and will suggest a video. Or your mobile number is requested to video on WhatsApp or via Skype.
A mobile number is the road to Jericho and the killer that can reveal everything. Be it popping it into a search engine or a database. Either way, a home address, family connections, employment, email address, and social sites are on the menu for taking.
For those of you who do not know how blackmailers execute blackmail, read carefully. There you are chatting away, and she is asking questions, out of nowhere, she either surprises you with a video call. Or a video is suggested. If you accept, doom is pending.
There she is all hot and ready to rock-n-roll. She gets funky and asks you to do the same. Those of you not caught in the snare, when online, always remind yourself that if it is too good to be true, it is! If you adhere to the digital fun, the blackmailer will send a photo or video of yourself in a matter of seconds; followed by a list of your Facebook contacts.
The knee jerk reaction is to block the scammer, which is a precarious solution. If the blackmailer cannot reach you, who do you think they will contact? Correct your people. You might have also provided them with other ways to communicate like email, mobile, or another social site. Do make your Facebook private, and take inventory of what you revealed. Now you are a full-fledged blackmail victim.
Naturally, the next question is what to do about blackmail. Start by making all your social media private and negotiate with the blackmailer. Stall for time, saying you are trying to get money to pay. Under no circumstance do you ever send money, which is a gateway to being a cash machine? If you pay, they will never go away.
There is no one strategy to combat blackmail. What you must do is protect your identity, prevent exposure, and rid yourself of the blackmailer. Anything less is a potential failure.
If you need help, Frank M. Ahearn STOPS Facebook blackmail
If you are in a situation and need to create extreme privacy or need to disappear, Frank M. Ahearn can help. If you are facing criminal charges, trying to obtain a new or fake identity, forget about it; however, if you have a legitimate reason, schedule a consultation.
Are you a victim of relationship, business, or online blackmail? Or in a relationship of "understanding" and need it to end? Frank stops blackmail, prevents exposure, and protects identities. If necessary, he can negotiate an exit when ending relationship blackmail.
What To Know About Blackmail?
All victims of blackmail want to avoid exposure; however, doing so is tricky. What you do not want to do is be cocky or brazen in your exchange. Some will try to trick the blackmailer by saying they told their spouse. Unfortunately, such statements can prompt the extortionist to send photos or videos to the spouse. The other issue is blackmailers are not picky about whom they will share your information. If they have your work, son, brother, or daughter's contact, they are fair game.
Going head to head will not work; remember, they threaten people every day. You do not combat sextortion every day, which puts you at a disadvantage. Trust me, they know how to manipulate better than you, as well as squeeze the fear that makes you want to pay. Never challenge the blackmailer because you will lose. There are things to think about before you act.
I know it is difficult but keep a cool head, but it is important. The first thing is to take inventory of what they know about you. There is a difference between saying they have your wife's contact and sharing the actual email address or mobile number. They could be lying about the data they possess. It is imperative to pay close attention to what information is put on the table. I have worked on several cases where the blackmailer did not have the correct identity of my client. Many of the online scammers pull data reports; however, they do not know how to decipher and determine what is accurate or current.
If you send money, you are opening a door that will be challenging to close. Like rats, you feed them one, and they come back for more. One of the other issues is if you pay by PayPal, it could be an email address that further identifies you. Yes, you are supplying more information. Many want you to take a photo of the Western Union or MoneyGram transfer sheet. If you do, you exposed your real name and address.
The very second you are hit with the blackmail, you need to jump online and turn all your social media private. The scammer may not have located your online sites, or they are on the hunt for it. Even if they have your social sites, turn them private.
If you block the extortionist and they have contact info on another person in your life, they will make contact. By keeping in communications, you have control, and the time and opportunity to figure a plan. Also, blocking might get you instantly exposed, be it to contacts or posted on porn sites.
Do not pay, negotiate, stall, lie, or hire a professional.
What is help for blackmail?
Frank M. Ahearn is a global privacy expert who stops blackmail and protects identities.
One of the pitfalls of fighting blackmail is being myopic and only focusing on the here and now. Yes, it is important to protect your identity and prevent exposure currently and ridding yourself of the blackmailer. However, the strategy should not end there but include a long-term plan because most blackmailers return.
When the criminal finally goes silent, most victims assume it is the end of the terror; it is not. There is no reason for them not to come back for a second round. When planning your strategies, incorporate future protection. Ask yourself or the professional assisting you; will this tactic protect me, my family, and my job. If not, the plan is flawed.
Some websites and law enforcement agencies suggest ignoring the blackmailer, which is a big old mistake. You might be trying to forget them, but they sure do not forget you. Why should they? You are a potential cash cow. Ignoring could prompt them to contact someone you know or post your content online. Putting your head in the sand and hoping is lose, lose.
Protecting against future harassment involves manipulating what they know about your identity and tightening up your online presence. Imagine starting a new job, and you post it on LinkedIn, and the blackmailer discovers it. You are back to square one, and it won't be pretty. Some victims need to think about protecting their spouse or children's online data. Every contact of yours the blackmailer knows is a risk. One of my expertise is creating fake families, friends, and employees who become the blackmail target, not your real contacts.
The plan to stop blackmail must include protecting your identity, which means manipulating what the blackmailer knows. Preventing exposure, involves negotiating with a manipulated strategy, though you never pay. Ridding yourself of the blackmailer is creating alternate yet realistic contact information. As the blackmailer manipulated you, you must do the same to them.
I have been in contact with enough blackmailers while posing as a victim to know that coward best describes them. Besides their outrageous demands for money, they tend to get off controlling and tormenting their victims—all the while hiding behind fake email addresses and mobile phone apps. They have no balls whatsoever!
The scammers I have dealt with like to exude power, and while barking orders for money, they claim it is their money. Imagine that, as if the world owes them something, or they are the collectors of your faux pas. Ball-less wonders! At first, I thought it was a technique or tactic to extract funds, but no, they dig the power trip and feel that they did the work to scam you, and you owe a payment. You do not owe money to these roaches. Their goal is to beat you into submission verbally and take you for all you have. You cannot allow the blackmailer to dominate the situation.
A victim needs to embrace a bit of warrior and strategize their exit from the situation. A plan is necessary because sextortion and blackmail do not go away on their own. There are three keys to combating blackmail: protecting your identity, preventing exposure, and getting rid of the blackmailer. Anything less is a failure.
Your strength must lie in creating a plan to get out of Dodge. The first step is not acting on emotions or fear but recognizing you have something they want. Even though they threaten to expose immediately, most will not; they want your money and make concessions. The trick is to push off paying for the next day, which creates an opportunity to go dark online and get qualified help.
The blackmailer is never your friend; do not believe a word they say. The cry for one last payment is an empty promise. They will not delete the file, leave you alone, and their sister is not ill. Keep to the forefront of thought that this is a piece of garbage with no boundaries, and they make no bones about destroying your life. One last payment for a hundred dollars is not about the hundred; it is the hook that keeps you paying.
Get your head together, and do not jump in your pockets, assuming it will solve your problem. Claim you have no money, and it will take a day or two to borrow. There is no reason the blackmailer should call the shots. You live in the hopes of not getting exposed, and they live in the hopes of getting paid—play on what they want, not what they are doing to you.
In the great word of Frank M. Ahearn, be cool, and prepare for war!
Do not let the blackmailer control you or the blackmail.
Persönliche Informationen sind im digitalen Zeitalter zur Ware geworden. Anhand von Kreditkartenkäufen, Suchanfragen und Klickverhalten werden Kundenprofile generiert und persönliche Daten gespeichert.
Frank M. Ahearn, author of The New York Times Bestseller, How to Disappear.