Help With Sextortion
Help With Sextortion
Frank M. Ahearn is a privacy consultant who disappears people, and a blackmail expert who combats blackmail and sextortion. As well as the author of The New York Times Bestselling book, How to Disappear, and a public speaker.
Frank began his career as a skip tracer, where he located people from Boston to Bali. He did this by pretext and social engineering, which is extracting confidential data from large companies. Frank has found thousands of people worldwide and extracted private information from hundreds of global companies. However, his days of hunting and pretext are behind him, now preferring the world of privacy.
After writing an article titled How to Disappear, Frank became the go-to guy for people all over the world. The next thing you know, he is vanishing individuals without a trace. Eventually, The New York Times Bestseller, How to Disappear came to life.
For some, life can go south, and danger appears on their doorstep. Much of the time, it is a situation where law enforcement cannot help or become involved. So, a plan is created, and the client disappears. Although vanishing is not always the solution, digital disinformation or in-person "fixing" can resolve issues.
Falling under the umbrella of privacy is "the strange." It is when something occurs, and you are unsure who to contact for help. So, if there is that thing you cannot figure out how to resolve, Frank can.
These days Frank prefers to work with individuals affected by acts of indiscretion. Like, blackmail, sextortion, relationship blackmail, escort blackmail, or business blackmail. The damage done can flow online and offline and into one's personal and professional life. Frank M. Ahearn is the professional to contact when you need to stop blackmail.
There is a rise in Facebook blackmail. How it goes down is an attractive female friends you. Your curiosity is piqued, and you take a few minutes, do a little due diligence, and see she is friends with one of your friends. You think cool, let me check her out further, and notice she lives locally. What not to believe, a friendly little lady. The chatting begins.
Like all blackmailers, the chat is casual; what type of work do you do? Do you have LinkedIn, what about Instagram, etc.; it is an extraction of your private information. Some will keep the chat on Facebook and will suggest a video. Or your mobile number is requested to video on WhatsApp or via Skype.
A mobile number is the road to Jericho and the killer that can reveal everything. Be it popping it into a search engine or a database. Either way, a home address, family connections, employment, email address, and social sites are on the menu for taking.
For those of you who do not know how blackmailers execute blackmail, read carefully. There you are chatting away, and she is asking questions, out of nowhere, she either surprises you with a video call. Or a video is suggested. If you accept, doom is pending.
There she is all hot and ready to rock-n-roll. She gets funky and asks you to do the same. Those of you not caught in the snare, when online, always remind yourself that if it is too good to be true, it is! If you adhere to the digital fun, the blackmailer will send a photo or video of yourself in a matter of seconds; followed by a list of your Facebook contacts.
The knee jerk reaction is to block the scammer, which is a precarious solution. If the blackmailer cannot reach you, who do you think they will contact? Correct your people. You might have also provided them with other ways to communicate like email, mobile, or another social site. Do make your Facebook private, and take inventory of what you revealed. Now you are a full-fledged blackmail victim.
Naturally, the next question is what to do about blackmail. Start by making all your social media private and negotiate with the blackmailer. Stall for time, saying you are trying to get money to pay. Under no circumstance do you ever send money, which is a gateway to being a cash machine? If you pay, they will never go away.
There is no one strategy to combat blackmail. What you must do is protect your identity, prevent exposure, and rid yourself of the blackmailer. Anything less is a potential failure.
If you need help, Frank M. Ahearn STOPS Facebook blackmail
If you are in a situation and need to create extreme privacy or need to disappear, Frank M. Ahearn can help. If you are facing criminal charges, trying to obtain a new or fake identity, forget about it; however, if you have a legitimate reason, schedule a consultation.
Are you a victim of relationship, business, or online blackmail? Or in a relationship of "understanding" and need it to end? Frank stops blackmail, prevents exposure, and protects identities. If necessary, he can negotiate an exit when ending relationship blackmail.
What To Know About Blackmail?
All victims of blackmail want to avoid exposure; however, doing so is tricky. What you do not want to do is be cocky or brazen in your exchange. Some will try to trick the blackmailer by saying they told their spouse. Unfortunately, such statements can prompt the extortionist to send photos or videos to the spouse. The other issue is blackmailers are not picky about whom they will share your information. If they have your work, son, brother, or daughter's contact, they are fair game.
Going head to head will not work; remember, they threaten people every day. You do not combat sextortion every day, which puts you at a disadvantage. Trust me, they know how to manipulate better than you, as well as squeeze the fear that makes you want to pay. Never challenge the blackmailer because you will lose. There are things to think about before you act.
I know it is difficult but keep a cool head, but it is important. The first thing is to take inventory of what they know about you. There is a difference between saying they have your wife's contact and sharing the actual email address or mobile number. They could be lying about the data they possess. It is imperative to pay close attention to what information is put on the table. I have worked on several cases where the blackmailer did not have the correct identity of my client. Many of the online scammers pull data reports; however, they do not know how to decipher and determine what is accurate or current.
If you send money, you are opening a door that will be challenging to close. Like rats, you feed them one, and they come back for more. One of the other issues is if you pay by PayPal, it could be an email address that further identifies you. Yes, you are supplying more information. Many want you to take a photo of the Western Union or MoneyGram transfer sheet. If you do, you exposed your real name and address.
The very second you are hit with the blackmail, you need to jump online and turn all your social media private. The scammer may not have located your online sites, or they are on the hunt for it. Even if they have your social sites, turn them private.
If you block the extortionist and they have contact info on another person in your life, they will make contact. By keeping in communications, you have control, and the time and opportunity to figure a plan. Also, blocking might get you instantly exposed, be it to contacts or posted on porn sites.
Do not pay, negotiate, stall, lie, or hire a professional.
What is help for blackmail?
Frank M. Ahearn is a global privacy expert who stops blackmail and protects identities.
One of the pitfalls of fighting blackmail is being myopic and only focusing on the here and now. Yes, it is important to protect your identity and prevent exposure currently and ridding yourself of the blackmailer. However, the strategy should not end there but include a long-term plan because most blackmailers return.
When the criminal finally goes silent, most victims assume it is the end of the terror; it is not. There is no reason for them not to come back for a second round. When planning your strategies, incorporate future protection. Ask yourself or the professional assisting you; will this tactic protect me, my family, and my job. If not, the plan is flawed.
Some websites and law enforcement agencies suggest ignoring the blackmailer, which is a big old mistake. You might be trying to forget them, but they sure do not forget you. Why should they? You are a potential cash cow. Ignoring could prompt them to contact someone you know or post your content online. Putting your head in the sand and hoping is lose, lose.
Protecting against future harassment involves manipulating what they know about your identity and tightening up your online presence. Imagine starting a new job, and you post it on LinkedIn, and the blackmailer discovers it. You are back to square one, and it won't be pretty. Some victims need to think about protecting their spouse or children's online data. Every contact of yours the blackmailer knows is a risk. One of my expertise is creating fake families, friends, and employees who become the blackmail target, not your real contacts.
The plan to stop blackmail must include protecting your identity, which means manipulating what the blackmailer knows. Preventing exposure, involves negotiating with a manipulated strategy, though you never pay. Ridding yourself of the blackmailer is creating alternate yet realistic contact information. As the blackmailer manipulated you, you must do the same to them.
When people play online, the greatest mistake committed is not protecting their identity. Many overlook the basics of strangers, don't talk with them, or take the candy. In the digital age, it is easy to forget that an online profile might not be real. We have let our guard down and accept strangers for face value.
When climbing into the dark wells, an instinctual mindset triggers us, reminding us to hide the actions from those in our circle. We do not want our private play revealed to the public; therefore, we take precautions to keep "things" out of sight. The paradox comes into play on the flip side—many who indulge take minimal or no steps to guard against the stranger danger. Players tend to give up personal data or not consider the info they reveal when signing up for websites.
Some social sites and websites use an email address san the ampersand as a profile name. If connected with your identity, you are identifiable. A predator needs only to search the profile name on a search engine, leading to a treasure boat about you. A photo on a dating app is easily copied and uploaded to a reverse image site. If it does not find that picture, it locates similar faces. If there is a profile photo of you on a company website, you have problems.
I could list ten different ways people make people make themselves vulnerable. The sword that pierces deepest is the surrendering of your mobile number. Pop your mobile into a search engine or database; see what you find. Databases are the killer; it can lead to your spouse, home address, family, and friends. If you gave Facebook your number, it could show up in the Facebook name search.
Caution is always best! I never call strangers on my real mobile number. When emailing an unknown person, I turn off my Wi-Fi and turn on my VPN. You never know who is lurking or scheming—playing safe saves you and those in your circle. Every digital action needs to have the question asked and answered, will this lead to my identity.
Safe play is not about taking actions to prevent getting caught. It is about protecting your job and those you love. Blackmail can stretch beyond the victim and affect those closest. Threatening to expose you to your spouse is one thing; some blackmailers will go after in-laws, children, and neighbors.
Stranger danger is real!
Persönliche Informationen sind im digitalen Zeitalter zur Ware geworden. Anhand von Kreditkartenkäufen, Suchanfragen und Klickverhalten werden Kundenprofile generiert und persönliche Daten gespeichert.
Frank M. Ahearn, author of The New York Times Bestseller, How to Disappear.