You Are Being Extorted Help Is Private And Available Now
Sextortion is a crime. The shame belongs to the person extorting you, not to you. Petronella Technology Group handles these cases confidentially and professionally. What matters now is stopping further harm, preserving evidence, and engaging the right help. You are not the first, and you will not be the last. There is a working playbook.
What Do You Do Immediately If A Minor Is Being Sextorted?
Reading this section first is important. Sextortion cases involving minors have a specific, urgent response path.
Stop and go to the National Center for Missing and Exploited Children first. The CyberTipline at cybertipline.org accepts reports directly. The NCMEC Take It Down service at takeitdown.ncmec.org helps prevent intimate imagery of minors from spreading online. Call the CyberTipline at 1-800-843-5678. Contact local law enforcement. A forensics firm is a secondary resource in these cases. NCMEC and law enforcement come first.
If you are a minor or the case involves a minor, do not pay. Do not follow any further instructions from the extortionist. Tell a trusted adult immediately. Report to the NCMEC CyberTipline at report.cybertip.org or call the NCMEC hotline at 1-800-843-5678. They have dedicated takedown pathways with Meta, TikTok, Snapchat, Discord, and other platforms for cases involving minors.
The FBI treats sextortion of minors as a federal priority. Local police will engage the FBI Child Exploitation and Human Trafficking Task Force in most jurisdictions. Filing at ic3.gov and with local police is the correct starting point.
If you are a parent, we know this call is hard to make. Your first job is to make clear to your child that they are not in trouble with you. The extortionist's power depends on isolating the victim. Breaking that isolation without shame or anger is the single most protective thing a parent can do. Then you move into the practical steps below, or you call a firm like ours to walk through them with you.
Sextortion of minors has driven devastating outcomes in the United States in recent years. The urgency of a compassionate parental response and fast professional intervention is not overstated.
What Are The First Five Actions After A Sextortion Threat?
If the threat is live and the extortionist is still in contact, these actions take priority.
Do not pay. Do not reply. Preserve evidence by screenshotting every message, image, profile, and payment demand. Block after evidence is preserved, not before. Report to the platform and to the FBI IC3 at ic3.gov. Call (919) 348-4912 if you need help coordinating next steps. The overwhelming majority of sextortion threats fail when victims do not pay and do not engage.
Do not pay. Payment almost never ends it. It escalates demands.
Do not delete anything. Preserve every message, profile, and screenshot.
Stop responding. Silence is a strategic choice, not surrender.
Tell at least one trusted person. Do not handle this alone.
Call (919) 348-4912 or a similar forensic firm. Or FBI IC3 directly.
If a minor is involved, add: call NCMEC 1-800-843-5678 and use takeitdown.ncmec.org which provides a way to hash and report content proactively for takedown across participating platforms, including for minors who have already lost the original content.
Where Do You Report Sextortion And Begin Platform Takedown?
The first day is about getting the right reports filed and launching content removal.
For victims under 18, use NCMEC at cybertipline.org and takeitdown.ncmec.org. For all victims, file an FBI IC3 report at ic3.gov and report to every platform where the content is being threatened or hosted. Meta, Snap, Google, TikTok, X, and Discord each have dedicated abuse reporting paths. We can coordinate platform escalation where the standard path is not moving.
FBI IC3 report at ic3.gov. Include the extortionist's handles, platforms, messages, any crypto addresses, the content itself (summarized, not attached if you are uncomfortable), and your contact information.
Local police. In person or by phone. Request a case number. Ask for the detective who handles cyber, domestic violence, or if relevant child exploitation cases.
Platform reporting. Each major platform (Meta, TikTok, X, Snapchat, Discord, Reddit, Telegram) has a sextortion or non consensual intimate imagery report pathway. Include the extortionist's account identifier and summary of the threats.
StopNCII.org or TakeItDown. stopncii.org for adults, takeitdown.ncmec.org for minors. Both allow you to create hashes of the content so participating platforms can proactively block re uploads.
Account hardening. Change passwords from a clean device and enable strong MFA on email, social media, banking, and any account the extortionist may have attempted to access. If you suspect a device was compromised, hold off on resumed use until forensic examination.
Circle of trust. Tell someone. A spouse, parent, friend, pastor, employee assistance contact, or therapist. The isolation is the mechanism. Breaking it immediately reduces extortionist leverage and begins emotional recovery.
How Do You Contain Sextortion Spread And Harden Your Accounts?
Week one is about closing technical doors, filing the right reports, and monitoring for any content spread or new contact attempts.
From a clean device, audit every social, email, and messaging account for unauthorized access, reset passwords with a password manager, enable hardware-based MFA, and review every authorized app. Consider making social accounts private for the near term. Set up alerts for your name on major platforms. Monitor for redistribution of content over the weeks and months following the initial incident.
Device forensics if compromise is possible. If the extortionist got content through a hacked account, a malware infection, or remote access, a device examination is essential. Petronella Technology Group handles this for victims.
Monitor for content spread. Set Google Alerts on your name, reverse image search any visible photos from the extortionist's profile to help narrow attribution, and watch the platforms where the extortionist threatened to post.
Identify scaffolding accounts. Extortionists often have multiple accounts used to launch attacks or spread content. Identifying and reporting the network of accounts, not just the single contact account, helps the platform disrupt the operation.
Engage counsel if warranted. For cases involving significant harm, public figure exposure, or legal questions, a short consultation with a victim rights attorney or a defamation attorney shapes the available options. Civil action, protective orders, and employer or school engagement all benefit from legal guidance.
Trauma informed therapy. Sextortion is a trauma. Victims routinely describe disordered sleep, anxiety, and a sense of loss of control. Licensed trauma informed therapy is effective and is part of a complete response. Reputable providers through Psychology Today's directory or your insurance carrier's behavioral health network.
Disclosure planning if needed. Some victims decide, with their therapist and counsel, to pre emptively tell key people in their life before the extortionist can threaten disclosure. This strips the extortionist of leverage. It is a personal decision made carefully, not in panic.
Petronella's Role In A Sextortion Case
Confidential Intake
First conversation is private. You decide what is shared, with whom, and when. We explain your options, not ours.
Evidence Preservation
Forensically sound capture of conversations, profiles, and threats. Chain of custody for any legal action.
Platform Takedown Coordination
Multi platform takedown requests with the right reporting routes. StopNCII and TakeItDown coordination.
Law Enforcement Package
Evidence in the format FBI IC3 and state investigators need. Many sextortion cases are connected to larger organized operations.
Device And Account Forensics
Check for remote access, stalkerware, and account compromise that may have enabled the extortion.
Crypto Payment Tracing
If payment has already been made, blockchain tracing and coordination with exchanges for possible freezes. See crypto forensics.
Honest Boundaries
We are not attorneys. Legal action, protective orders, and criminal complaints run through counsel. We work alongside your attorney to provide the technical evidence foundation.
We are not licensed mental health professionals. Sextortion causes real psychological harm. Licensed trauma informed therapy is part of a healthy response. We help connect you with reputable providers.
We are not law enforcement. We cannot arrest, subpoena, or compel platform disclosure. We provide the evidence package that lets law enforcement act.
We cannot promise total content eradication from the internet. What we can promise is rigorous takedown efforts, platform coordination, and an evidence trail that maximizes the chances of meaningful removal.
We do not encourage payment. If you have already paid, we will still help. One mistake does not disqualify you from professional help. Many victims pay once before realizing it will not end, and then call us. Call us earlier if you can, but call even if you have already paid.
Sextortion Questions
Will paying make it stop?
Almost never. Payment confirms you will pay and triggers escalating demands. The FBI, NCMEC, and every reputable victim advocate advise against payment.
Can the content really be removed?
Meaningful reduction is almost always achievable. Full eradication from every corner of the internet is not realistic. Hash based takedown across major platforms blocks most re uploads.
Will my employer or family have to find out?
Not necessarily. Many cases are resolved without broader disclosure. Strategic pre emptive disclosure sometimes removes leverage, but it is a decision for counsel and therapist, not a panic move.
How long does a case take?
Initial containment is days. Platform takedowns are days to weeks. Law enforcement investigation is months or longer. Most acute distress resolves within the first few weeks of a well organized response.
What if the extortionist is in another country?
Many are. FBI IC3 connects to international law enforcement cooperation channels. Platform takedowns work regardless of extortionist location. Attribution is harder internationally but not impossible.
Does this cost anything?
Scoped per case. A focused evidence preservation, takedown coordination, and IC3 filing engagement is a modest fixed fee. Extended attribution work is additional. Minors and active crisis cases get priority triage regardless of payment complexity.
I think I might be overreacting. Should I still call?
Yes. A fifteen minute call costs nothing. If it turns out to be a low severity situation, we will tell you and help you assess. Better to have the conversation.
Teen And Young Adult Sextortion
The fastest growing sextortion pattern in the United States targets teens and young adults, often young men, through apparently casual social media or gaming contact that moves fast.
The pattern to know: a stranger makes contact through Instagram, Snapchat, Discord, or a gaming platform, warm small talk turns sexual within a short period, images or video are exchanged, and the extortion begins within minutes or hours. The speed is part of why this catches so many victims off guard.
If you are a parent, the first response matters more than any other. Tell your child, clearly and without hesitation, that they are not in trouble. That the adults around them will help. That this is a crime against them, not something they did wrong. Many families report that this one sentence makes the difference between a fast, well managed recovery and a tragic outcome.
Resources specifically for parents: NCMEC's CyberTipline (report.cybertip.org or 1-800-843-5678), FBI sextortion resources, and the NCMEC TakeItDown service (takeitdown.ncmec.org) which lets you create a hash of the content for takedown across major platforms without having to submit the content to anyone.
For ongoing support, many communities have youth mental health crisis services that can meet the family same day. Your pediatrician is often the fastest referral path to a trauma informed therapist who works with teens. Schools typically have a counselor who can coordinate with academics and peer dynamics in a way that protects the victim from school side harm.
Finally, talk to other teens in the household and in the family social circle. The same tactic often works on the same demographic for weeks. A family that has just experienced sextortion can protect friends and cousins with a short, non judgmental briefing on what to watch for.
The Four Common Sextortion Patterns
Understanding which variant you are dealing with helps focus the response.
Bulk email bluff sextortion. A generic threatening email claiming the sender installed malware on your computer, recorded you, and will send the recording to contacts unless you pay. Often includes an old password from a data breach to appear credible. In the vast majority of cases the sender has nothing. No video exists, no malware was installed. Do not pay. File FBI IC3 and move on. Change the password referenced in the email just in case.
Financial sextortion targeting youth. The fastest growing variant. Usually via Instagram, Snapchat, Discord, or gaming platforms. A stranger poses as a peer, moves quickly to sexual conversation, requests images, and begins extortion within hours. Demands are typically Apple gift cards, Cash App, Zelle, or cryptocurrency. FBI and NCMEC have dedicated takedown and investigation pathways. Do not pay. Call for help.
Ex partner or acquaintance revenge sextortion. A current or former intimate partner threatens to release intimate content to hurt the victim's life, employment, or relationships. Distinct from random internet sextortion because the attacker is known. Legal options are typically stronger because identification is not in question. Protective orders, civil suits, and criminal complaints are all on the table.
Compromised account sextortion. A stranger who gained access to the victim's email, cloud storage, or social media finds intimate content and uses it for extortion. The technical response includes full account recovery, device forensics, and usually extends into a broader incident if the victim stores sensitive material across cloud services.
Each variant has a slightly different response, but the common principles hold: do not pay, preserve evidence, report, take down, harden, and engage professional help.
A Note On Sensitive Material
We understand that the evidence itself is painful to handle. Here is how we help minimize that burden.
You do not need to send sensitive images or videos to us or to anyone to receive help. Evidence preservation can be done with metadata and context only. Hashes of the content can be generated on your device without transmitting the content itself. Platform takedown requests can be made with content descriptions and link references rather than attached files. StopNCII and TakeItDown explicitly work without uploading content to their services.
For law enforcement reports, FBI IC3 has specific handling procedures for sensitive content, and you can request that no one outside the sworn investigator team see the material. If evidence must move to a police department, officers are trained to handle this kind of material and the physical or digital file is kept in a sealed evidence process.
If any of this feels too heavy to think about in the moment, we handle the procedural side so you do not have to. That is part of what professional help looks like here. You should not be managing platform reporting forms, hash submissions, and FBI IC3 intake on your own while processing a traumatic event.
A good response team lets you focus on yourself and the people who matter to you. The paperwork and the protocol go to us and to counsel. That distribution of weight is part of the design.
Notes For Long Term Wellness
Being the target of sextortion leaves real psychological traces. Treating those traces early leads to better long term outcomes.
Research on sextortion survivors consistently finds elevated rates of anxiety, depression, disordered sleep, and hypervigilance in the weeks after. For youth victims, the severity can be acute. Licensed trauma informed therapy is the single highest leverage recovery tool. Cognitive processing therapy, EMDR, and structured CBT have solid evidence bases for this class of trauma. Your therapist will match treatment to the particulars.
Support groups, online or in person, help survivors see that they are not alone and that the shame they feel is a product of the crime, not a reflection on them. Organizations like the National Center on Sexual Exploitation, RAINN (1-800-656-HOPE), and the Cyber Civil Rights Initiative offer survivor networks, legal referral lists, and educational materials built from years of work with extortion survivors.
For parents, a short course of family therapy after a teen sextortion event is often recommended to process the event together, rebuild trust, and establish ongoing openness about digital life. Many insurance plans cover short courses of family therapy under mental health benefits.
Returning to normal digital life is a gradual process. Many survivors reduce their social media exposure in the months after an incident, tighten privacy defaults, and are more intentional about what imagery exists of them online. That is healthy caution, not paranoia. A therapist and a trusted advisor (our team included, for the technical side) can help calibrate what feels protective and what is overcorrecting into isolation.
If you or someone you know is in acute crisis, the 988 Suicide and Crisis Lifeline is available 24/7 by call or text. Sextortion of minors has contributed to tragic outcomes in the United States. If you recognize warning signs in a young person after a sextortion event, act with urgency. Do not assume it will pass on its own. Pediatric crisis teams, school counselors, and family therapists can all help in the first hours.
Why Petronella Handles These Cases
A short credibility note. Sextortion victims are aggressively targeted by follow on scams, so vetting the firm you call matters.
Petronella Technology Group is at 5540 Centerview Drive, Suite 200, Raleigh NC 27606. Founded 2002. BBB A+ since 2003. CMMC-AB Registered Provider Organization #1449, verified publicly at cyberab.org. NC Private Protective Services Board accreditation. Craig Petronella is a Digital Forensics Examiner (DFE #604180) with long standing specialty in sextortion, romance scams, SIM swap, crypto theft, and business email compromise.
We do not operate out of a virtual office. We do not take cryptocurrency payment. We do not promise guaranteed recovery. We charge scoped fees for work actually performed. You can walk into our office during business hours and meet the team. That level of verifiability is not optional in this category of work, because the alternatives too often include secondary fraud.
If you call any firm for sextortion help, verify their physical office, verify their licensing, and verify that their engagement model is honest. If a firm asks for upfront cryptocurrency payment, or promises full recovery or full eradication, hang up. Call us instead, or call the FBI IC3 line for vetted referrals.
What To Expect From The First Call
A short map of the first fifteen minutes on the phone so the unknown feels a little less unknown.
When you call (919) 348-4912 for a sextortion case, the first thing we do is listen. No fast questions, no scripted intake. The goal of the first few minutes is to understand what you are dealing with, whether a minor is involved, whether payment has already moved, and whether you are in immediate psychological crisis. That shapes the next conversation.
We then walk through the immediate protective actions if they have not happened yet. That is preservation, silence, reporting intake, and the first steps of hardening. We can guide you through these in real time on the call, or we can schedule a dedicated session within the next few hours if now is not the right moment.
From there we scope what more involved help looks like. A typical light engagement includes evidence preservation, platform takedown coordination, FBI IC3 intake support, and one session with a therapist referral we trust. A heavier engagement adds attribution work, device forensics, crypto tracing if payment has moved, and ongoing monitoring. The scope fits your situation, not the other way around.
You do not have to decide anything on the first call. Many victims call, get the immediate steps, and then wait twenty four to seventy two hours before deciding about deeper engagement. That is fine. The initial call costs nothing. What you do next is up to you.
If the case becomes a legal matter, we coordinate directly with your counsel. If the case becomes a law enforcement matter, we coordinate with the investigating agency. We do not try to be your sole point of contact on a situation like this. We work alongside the other professionals who make up a good recovery team.
Call A Private, Professional, Competent Team
Petronella Technology Group handles sextortion cases with discretion. The conversation is confidential. You decide what happens next. You deserve help, and help is available at (919) 348-4912.