ARE YOU A VICTIM OF ONLINE BLACKMAIL OR SEXTORTION?

We’ll help you fight back and keep explicit images and videos off the internet

So You've Received a Sextortion Threat and Demand?
How Can a Digital Forensics Examiner Help?

A Digital Forensics Examiner can extract data from emails, text messages, chats, game rooms social media accounts, images, video. and other resources to determine:

Is this is a real demand or a phishing attack?

If it is real, who is your “Sextortionist”?

What other information do you need to help defeat the Sextortion attack?

 

First, some advice to preserve evidence:

DO NOT panic

DO NOT cut off communication with the Sextortionist

DO NOT turn off your phone, computer, tablet or other devices

DO NOT disconnect from email, chats, game sites, discord servers or other shared sites.

DO NOT sign out of Social Media sites like Facebook, Instagram, TikTok, Dating Sites, etc. 

DO NOT pay a ransom or cooperate in some requested act

DO take screenshots of all illicit communication (texts, chats, etc.) 

DO contact a Digital Forensics Examiner like Garrett Discovery Inc.  

Why? – It’s likely that as an individual you do not have the skills or tools to identify him or her. Criminals generally try to hide their identities to make an arrest difficult, if not impossible. Garrett Discovery Inc. specializes in pursuing data for difficult matters, such as sextortion. Our specialists can find hidden clues in emails, text messages, chats, game rooms, social media accounts, images and videos. 

DO search for an attorney with experience in Internet Crimes.

Why? if a Digital Forensics analysis pinpoints an individual, an attorney will need to compel that person to turn over their phone or other instrument used to send the extortion notice.

What Tasks Will a Professional Digital Forensics Examiner Like 

Garrett Discovery Inc. do to Resolve The Situation?

Preserve Evidence of the Threats in Ways That Protect Your Privacy

a. If your communications were on a  phone or computer, the examiner will “freeze” a copy of the evidence in what is called a forensics image. In addition, this image would meet the requirements for use in litigation if your situation proceeds to court. 

b. If the threats came through a dating site, gaming site, or Social Media, the examiner will preserve the evidence only for the dates surrounding the incident. 

From the Preserved Data, the Forensics Examiner Will Attempt to Identify Your Attacker. Our Professional Examiners Have Tools Which Help Identify the Phone or Computer From Which the Attack Originated. Other Resources Can Often Identify Who Owns That Device and Where it Was Located. Still Others Can Investigate the Users in a Suspect Social Media Platform or on Dating Sites.

Prepare a Report to Let You Decide How to Proceed.

a. Should you engage an attorney? 

b. Should you inform law enforcement?

ARE YOU A VICTIM OF ONLINE HARASSMENT OR BLACKMAIL?

DEFEND YOURSELF AGAINST SEXTORTION

PREVENT EXPOSURE

We give law enforcement the evidence they need to make arrests and keep explicit images and videos online.

IDENTIFY CRIMINALS

We can track down the IP addresses and geographic locations of the people harassing you.

HIRE AN ALLY

We won’t judge you. We fight for you, and prevent exposure of intimate images and videos.

TAKE CONTROL

Don’t let extortionists destroy your life and reputations. Stop the blackmailers now.

DON'T LET THE BLACKMAILERS WIN

We offer immediate, 24/7 assistance from our team of investigators.