Proofs
Victims of sextortion should gather the following evidence:
- Screenshots of Messages and Threats: Save all threatening messages, emails, or social media conversations that include extortion demands. This can be crucial in identifying the perpetrator and proving the fraud.
- Records of Transactions: If the victim has already paid the extortionist, gather records of the transaction (bank transfer, cryptocurrency, gift cards, etc.).
- Intimate Images or Videos: If the victim still possesses the explicit material that was shared with the perpetrator, save these files (but ensure they are not shared further).
- Website and Profile Information: Save links to the hacker’s fake profiles or websites that were used to contact the victim. This can help law enforcement track down the criminal.
- Details of Communication: Gather information on how the communication began (social media platforms, dating apps, email, etc.) and any relevant details that can help identify the fraudster’s modus operandi.