{"id":4823,"date":"2024-04-19T00:00:00","date_gmt":"2024-04-19T04:00:00","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=4823"},"modified":"2025-06-27T15:15:08","modified_gmt":"2025-06-27T15:15:08","slug":"how-often-do-sextortionists-follow-through","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/","title":{"rendered":"How Often do Blackmailers and Sextortionists Follow Through?"},"content":{"rendered":"\n<p>For anyone who has been confronted with the threat of sextortion, they likely ask some version of the same question: \u201cWill Your Sextortionist Follow Through?\u201d In cases of <a href=\"\/blog\/sextortion-online\/financial-sextortion-how-to-protect-yourself-and-where-to-turn-for-help\/\">financial sextortion<\/a>, where a cybercriminal threatens to release sexual content of a victim unless they pay them, this is a real question and one that Digital Forensics Corp. receives daily from victims.<\/p>\n\n\n\n<p>Unfortunately, there&#8217;s no simple yes or no answer. Whether a sextortionist follows through on their <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-to-do-if-someone-is-blackmailing-you-with-photos\/\">threats to leak your photos<\/a> depends on various factors. It&#8217;s a complex situation where the cybercriminal&#8217;s motivations and calculations come into play. Understanding these influencing factors is crucial for victims trying to assess their risk and determine their next steps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-will-your-sextortionist-follow-through-on-their-threats\"><span class=\"ez-toc-section\" id=\"Will_Your_Sextortionist_Follow_Through_On_Their_Threats\"><\/span>Will Your Sextortionist Follow Through On Their Threats?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It is a possibility. <strong>From a 2023 survey conducted by Digital Forensics Corp., there was a 42% chance that, even if paid, a blackmailer could still follow through with their threat and release the incriminating images or <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-scammer-has-video\/\">videos they had of their victim<\/a><\/strong>.<\/p>\n\n\n\n<p><p>Although this number is alarming, it&#8217;s important to understand that victims can take action to stop a sextortionist from exposing their photos or videos. <a href=\"\/blog\/online-blackmail\/how-to-stop-a-blackmailer\/\">Stopping a blackmailer<\/a> involves being proactive, and victims should work with the right professionals to have their content removed from the blackmailer&#8217;s possession and prevent future threats.<\/p>\n<p><iframe loading=\"lazy\" title=\"Do Sextortionists Follow Through On Their Threats? Part 2\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/oe-IQr58aW8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-stops-a-sextortionist-from-following-through\"><span class=\"ez-toc-section\" id=\"What_Stops_a_Sextortionist_from_Following_Through\"><\/span>What Stops a Sextortionist from Following Through?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>For most sextortion scams, the goal of their blackmail is not to embarrass or humiliate their victim.&nbsp; Their goal is to hold leverage over their victim to extort them for as much money as possible.&nbsp; By using fear tactics and citing their ability to <a href=\"\/blog\/sextortion-online\/how-can-sextortion-ruin-your-life\/\">ruin their victim\u2019s reputation<\/a>, their hope is that they can continuously send request for money in exchange for continued silence.&nbsp; Depending on the victim, this extortion can begin at a low dollar amount and build overtime with the cybercriminal continuously testing the victim\u2019s desire to keep their content private.&nbsp; Below is a list of the top reasons why sextortionist do not typically release the content they have on their victims.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Loss of Leverage:<\/strong> If the blackmailer releases the content they have on their victim, they lose the leverage that would help them achieve their financial goals.<\/li>\n\n\n\n<li><strong>Increased Criminal Activity:<\/strong> Releasing this content also adds to their list of crimes. While <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/sextortion-laws-across-the-u-s-comprehensive-resources-federal-insights\/\"><u>sextortion is a crime punishable by law<\/u><\/a>, the release of explicit content without consent is also a crime with special considerations given if their victim is a minor. Cybercriminals are hoping to conduct their scams with anonymity and increased criminal charges can<\/li>\n<\/ul>\n\n\n\n<p>While this does not offer proper insurance against the potential release of a victim\u2019s content, it can give the victim time to fight back.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-factors-that-may-increase-the-chances-of-a-blackmailer-following-through\"><span class=\"ez-toc-section\" id=\"Factors_That_May_Increase_the_Chances_of_a_Blackmailer_Following_Through\"><\/span>Factors That May Increase the Chances of a Blackmailer Following Through<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A blackmailer&#8217;s decision to follow through with sextortion threats is influenced by several factors. Below are four vulnerabilities which our team of experts have advised increase the likelihood of the content being shared in <a href=\"\/blog\/sextortion-online\/real-sextortion-cases-examining-the-harsh-reality\/\">cases of sextortion<\/a>:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>The Victim:<\/strong> If the victim is a celebrity or a high-net-worth individual, a blackmailer may perceive this as a vulnerability to exploit. This could increase the likelihood that they may follow through with their threats.<\/li>\n\n\n\n<li><strong>Previous Compliance with Demands:<\/strong> If a victim agrees to any payments demanded by a blackmailer, it creates an expectation for future payments.<\/li>\n\n\n\n<li><strong>Communication With the Victim:<\/strong> While it is natural for a sextortion victim to feel angry, continuing to respond to the blackmailer&#8217;s messages may increase the likelihood that they will release the content.<\/li>\n\n\n\n<li><strong>Rash Decisions:<\/strong> Cyber criminals can act irrationally if they feel strung along or frustrated; they might impulsively release their leverage.<\/li>\n<\/ol>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/Factors_that_increase_Sextortion_Risks-1-scaled.jpg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/Factors_that_increase_Sextortion_Risks-scaled.jpg\"\n      alt=\"Factors that increase Sextortion Risks - Infographics\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-are-blackmailers-more-likely-to-follow-through-and-leak-your-content-on-social-media\"><span class=\"ez-toc-section\" id=\"Are_Blackmailers_More_Likely_to_Follow_Through_And_Leak_Your_Content_On_Social_Media\"><\/span>Are Blackmailers More Likely to Follow Through And Leak Your Content On Social Media?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The likelihood of a blackmailer leaking explicit content on social media depends significantly on the platform&#8217;s ability to recognize and prevent the sharing of such material. Below is an overview of how major platforms handle nude leaks, sextortion, and <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/social-media-blackmail-scams\/\">social media scams<\/a> involving explicit content:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-social-media-platforms-that-can-and-can-t-prevent-nude-leaks\"><span class=\"ez-toc-section\" id=\"Social_Media_Platforms_That_Can_and_Cant_Prevent_Nude_Leaks\"><\/span>Social Media Platforms That Can and Can&#8217;t Prevent Nude Leaks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Instagram (Meta): <\/strong>Instagram employs AI-based filters to detect and blur explicit content sent in direct messages and also warns the recipient that the content is potentially sensitive. However, it does not prevent the recipient from opening and viewing the content.<sup>(1)<\/sup><br>The program requires users to report the content as NCII before it can remove it and potentially prevent re-upload through <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/hash-based-matching\/\">hash-based matching<\/a>.<\/li>\n\n\n\n<li><strong>Facebook Messenger (Meta):<\/strong> Like Instagram, Meta does deploy similar AI to detect, blur, and warn recipients before they open explicit content. However, it does not prevent the opening of the content and also uses the same method to remove the <a href=\"\/blog\/sextortion-online\/ncii-abuse\/\">NCII content<\/a> from their platform. <sup>(2)<\/sup><\/li>\n\n\n\n<li><strong>TikTok:<\/strong> The TikTok platform prevents the sending of sexually explicit images and videos altogether. Making it one of the few social media platforms where direct content exposure or <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-someone-posts-your-nudes\/\">nude leaks<\/a> can not occur. Their admins have even taken steps to prevent exposure by implementing warnings for links that lead to exposure sites.<sup>(3)<\/sup><\/li>\n\n\n\n<li><strong>Snapchat: <\/strong>Snapchat uses AI-powered detection which can flag and warn users about a content being deemed inappropriate, but it does not prevent opening unless the user is underage or has parental controls on.<sup>(4)<\/sup><\/li>\n\n\n\n<li><strong>WhatsApp: <\/strong>Provides not controls for content. Exposure can occur without any blurring, which increases the risk of <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-to-do-if-someone-is-blackmailing-you-with-nudes\/\">blackmail with nudes<\/a>. The app currently relies on its reporting feature to flag and remove accounts associated with sextortion and online blackmail.<sup>(5)<\/sup><\/li>\n\n\n\n<li><strong>Discord:<\/strong> Discord servers allow explicit images to be shared and received without any warnings or protection. You must <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/top-resources-for-victims-of-online-blackmail\/\">report blackmail<\/a> to Discord administrators and follow-up to prevent nude leaks on the application.<sup>(6)<\/sup><\/li>\n\n\n\n<li><strong>Twitter\/X: <\/strong>The platform does not have any safety controls which would prevent the exposure of sextortion victims via public posts. The system does prevent the sending of explicit content via direct message. Reporting the post and the blackmailers account to Twitter\/X administrators is the only current recourse available.<sup>(7)<\/sup><\/li>\n<\/ol>\n\n\n\n<p>In summary, while platforms like Instagram, Facebook Messenger, and TikTok have measures to prevent the dissemination of explicit content, others such as WhatsApp and Discord face challenges due to encryption and decentralized moderation. Consequently, the effectiveness of these platforms preventing <a href=\"\/blog\/online-blackmail\/social-media-blackmail-scams\/\">social media blackmail<\/a> is less than desirable.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How Long Can Online Blackmail Last? What You Need to Know\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/vNFaxmWu530?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-can-you-do-if-threatened-with-sextortion\"><span class=\"ez-toc-section\" id=\"What_Can_You_Do_If_Threatened_with_Sextortion\"><\/span>What Can You Do If Threatened with Sextortion?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you or someone you know is a victim of sextortion, there are important steps you can take to decrease the likelihood of the sextortionist following through with their threats.&nbsp; You are not powerless and there are actions you can take instead of giving into their demands. Taking these steps is the most effective way to <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-to-recover-from-sextortion\/\">recover from sextortion<\/a> and regain control of your digital life.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-1-do-not-block-them\"><span class=\"ez-toc-section\" id=\"Step_1_Do_Not_Block_Them\"><\/span>Step 1: Do Not Block Them<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Many victims of blackmail hope that <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/do-blackmailers-give-up-if-you-ignore-them\/\">ignoring their blackmailer<\/a> will protect them from the danger of exposure. However, <a href=\"\/blog\/sextortion-online\/should-i-block-a-sextortionist\/\">blocking or cutting off contact too quickly can trigger unpredictable consequences<\/a>. Instead of rushing, it is often safer to slow down the interaction and use <a href=\"\/blog\/online-blackmail\/delay-tactics-to-avoid-paying-your-blackmailer\/\">delaying tactics<\/a> until you can get proper help. In addition, do not pay a blackmailer threatening you with sextortion. While the messaging your blackmailer may use promises they will delete the content if you pay them, that is a ploy to ensure they receive the first payment.&nbsp; Once the payment is received, most blackmailers will begin to send messages more frequently increasing their threats and demands.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-2-report-your-blackmailer\"><span class=\"ez-toc-section\" id=\"Step_2_Report_Your_Blackmailer\"><\/span>Step 2: Report Your Blackmailer<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When reporting a blackmailer, it is important to inform the proper authorities and services that can help you not only report your blackmailer\u2019s crimes but also increase your chances of stopping them from releasing the content.<\/p>\n\n\n\n<p><strong>File A Report With Local Authorities.&nbsp; <\/strong><\/p>\n\n\n\n<p>Filing a <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-can-the-police-do-about-blackmail\/\">report with local law enforcement<\/a> is a good first step in dealing with digital blackmail.&nbsp; Not only will you be able to file a report, but local law enforcement may provide guidance on whether you should file further reports with the <a href=\"\/blog\/extortion\/report-cybercrime-to-the-fbi\/\">FBI\u2019s Internet Crime Complaint Center (IC3)<\/a><\/p>\n\n\n\n<p><strong>Report Your Blackmailer on the Application: <\/strong><\/p>\n\n\n\n<p>If your blackmailer used any social applications to conduct their scam, it is important that you report them on these sites. Getting their account suspended\/removed can decrease their ability to release the explicit content to your personal network. Below is a list of helpful resources with instructions on how to <a href=\"\/blog\/sextortion-online\/report-sextortion-online\/\">report sextortion<\/a> on major dating and social media applications.<\/p>\n\n\n\n<p>Instructions for reporting blackmail and sextortion on different social media applications are available below: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"\/blog\/online-blackmail\/how-to-report-blackmail-on-facebook\/\">How to report Blackmail on Facebook<\/a><\/li>\n\n\n\n<li><a href=\"\/blog\/online-blackmail\/how-to-report-blackmail-on-instagram\/\">How to report Blackmail on Instagram<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-to-do-if-someone-blackmails-you-on-snapchat\/\">How to report Blackmail on Snapchat<\/a><\/li>\n\n\n\n<li><a href=\"\/blog\/online-blackmail\/tiktok-blackmail-what-to-do-if-youre-being-blackmailed\/\">How to report Blackmail on TikTok<\/a><\/li>\n\n\n\n<li><a href=\"\/blog\/sextortion-online\/bumble-sextortion\/\">How to report Blackmail on Bumble<\/a><\/li>\n\n\n\n<li><a href=\"\/blog\/sextortion-online\/tinder-sextortion-how-to-protect-yourself-if-youre-a-victim-of-sextortion-on-tinder\/\">How to report Blackmail on Tinder<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/grindr-sextortion-resources-for-victims\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to report Blackmail on Grindr<\/a><\/li>\n<\/ul>\n\n\n\n<p>When filing any of these reports, it is important that you know you will not be asked by any legitimate organization or law enforcement officer to showcase any of the intimate content being used to blackmail you.&nbsp; You will only be asked to submit screenshots or other evidence showing the threat and the account the messages originated from.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-step-3-contact-digital-forensics-corp-nbsp\"><span class=\"ez-toc-section\" id=\"Step_3_Contact_Digital_Forensics_Corp\"><\/span>Step 3: Contact Digital Forensics Corp.&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>At Digital Forensics Corp, we employ digital forensics, <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/social-engineering\/\">social engineering<\/a>, and legal experts that work tirelessly to <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/how-to-stop-a-blackmailer\/\">fight back against online blackmailers<\/a>, sextortionists, and other cyber criminals.&nbsp; In some cases, our investigative process can also <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/recover-funds-from-scammers\/\">help victims recover stolen funds<\/a>, depending on how the payment was made and how quickly action is taken. Our mission is to end digital blackmail and restore our clients\u2019 peace of mind by working on their behalf to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Locate your blackmailer and remove their anonymity to <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/report-cybercrime-private-investigator\/\">stop cybercrime<\/a>.<\/li>\n\n\n\n<li>Identify key info on the tools and channels they have used to blackmail you.<\/li>\n\n\n\n<li>Leverage this information to ensure your blackmailer deletes the content they have gathered on you.<\/li>\n<\/ul>\n\n\n\n<p>As an added measure to protect our clients\u2019 reputation, we deploy different strategies to reduce potential exposure removing the threat of blackmail and restoring peace of mind.<\/p>\n\n\n\n<p>If you or someone you love is <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/stop-sextortion\/\">facing sextortion<\/a>, please contact our <a href=\"\/blog\/sextortion-online\/report-sextortion-online\/\">Sextortion Helpline<\/a> for immediate assistance 24\/7. Our experts can provide a complimentary review of your current situation and equip you with the information you need to move forward.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sources\"><span class=\"ez-toc-section\" id=\"Sources\"><\/span>Sources:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/help.instagram.com\/1443273235892548\/?helpref=related_articles\" target=\"_blank\" rel=\"noopener\">https:\/\/help.instagram.com\/1443273235892548\/?helpref=related_articles<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.facebook.com\/help\/263149623790594\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.facebook.com\/help\/263149623790594\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/support.tiktok.com\/en\/safety-hc\/report-a-problem\/report-a-user\" target=\"_blank\" rel=\"noopener\">https:\/\/support.tiktok.com\/en\/safety-hc\/report-a-problem\/report-a-user<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/help.snapchat.com\/hc\/en-us\/sections\/5690119073428-Report-an-Account\" target=\"_blank\" rel=\"noopener\"> https:\/\/help.snapchat.com\/hc\/en-us\/sections\/5690119073428-Report-an-Account<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/faq.whatsapp.com\/1142481766359885\/?cms_platform=web\" target=\"_blank\" rel=\"noopener\">https:\/\/faq.whatsapp.com\/1142481766359885\/?cms_platform=web<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/discord.com\/safety\/360044103651-reporting-abusive-behavior-to-discord\" target=\"_blank\" rel=\"noopener\">https:\/\/discord.com\/safety\/360044103651-reporting-abusive-behavior-to-discord<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/help.x.com\/en\/rules-and-policies\/x-report-violation\" target=\"_blank\" rel=\"noopener\">https:\/\/help.x.com\/en\/rules-and-policies\/x-report-violation<\/a><\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"For anyone who has been confronted with the threat of sextortion, they likely ask some version of the&hellip;","protected":false},"author":126,"featured_media":11514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[767],"tags":[],"class_list":{"0":"post-4823","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sextortion-online","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Do Sextortionists Follow Through? What You Must Know<\/title>\n<meta name=\"description\" content=\"Worried they\u2019ll follow through? Learn why some do, why others don\u2019t - and what to do now. Expert help if sextortionists follow through.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do Sextortionists Follow Through? What You Must Know\" \/>\n<meta property=\"og:description\" content=\"Worried they\u2019ll follow through? Learn why some do, why others don\u2019t - and what to do now. Expert help if sextortionists follow through.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-19T04:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T15:15:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/04\/Sextortionist-Follow-Through_-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Do Sextortionists Follow Through? What You Must Know\" \/>\n<meta name=\"twitter:description\" content=\"Worried they\u2019ll follow through? Learn why some do, why others don\u2019t - and what to do now. Expert help if sextortionists follow through.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/04\/Sextortionist-Follow-Through_.png\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"How Often do Blackmailers and Sextortionists Follow Through?\",\"datePublished\":\"2024-04-19T04:00:00+00:00\",\"dateModified\":\"2025-06-27T15:15:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/\"},\"wordCount\":1766,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Sextortionist-Follow-Through_.png\",\"articleSection\":[\"Resources for Victims of Internet Sextortion\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/\",\"name\":\"Do Sextortionists Follow Through? What You Must Know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Sextortionist-Follow-Through_.png\",\"datePublished\":\"2024-04-19T04:00:00+00:00\",\"dateModified\":\"2025-06-27T15:15:08+00:00\",\"description\":\"Worried they\u2019ll follow through? Learn why some do, why others don\u2019t - and what to do now. Expert help if sextortionists follow through.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Sextortionist-Follow-Through_.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Sextortionist-Follow-Through_.png\",\"width\":1280,\"height\":560,\"caption\":\"Do Sextortionist Follow Through?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/how-often-do-sextortionists-follow-through\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources for Victims of Internet Sextortion\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Often do Blackmailers and Sextortionists Follow Through?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Do Sextortionists Follow Through? What You Must Know","description":"Worried they\u2019ll follow through? Learn why some do, why others don\u2019t - and what to do now. Expert help if sextortionists follow through.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/","og_locale":"en_US","og_type":"article","og_title":"Do Sextortionists Follow Through? What You Must Know","og_description":"Worried they\u2019ll follow through? Learn why some do, why others don\u2019t - and what to do now. Expert help if sextortionists follow through.","og_url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2024-04-19T04:00:00+00:00","article_modified_time":"2025-06-27T15:15:08+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/04\/Sextortionist-Follow-Through_-1.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_title":"Do Sextortionists Follow Through? What You Must Know","twitter_description":"Worried they\u2019ll follow through? Learn why some do, why others don\u2019t - and what to do now. Expert help if sextortionists follow through.","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/04\/Sextortionist-Follow-Through_.png","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"How Often do Blackmailers and Sextortionists Follow Through?","datePublished":"2024-04-19T04:00:00+00:00","dateModified":"2025-06-27T15:15:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/"},"wordCount":1766,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/04\/Sextortionist-Follow-Through_.png","articleSection":["Resources for Victims of Internet Sextortion"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/","url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/","name":"Do Sextortionists Follow Through? What You Must Know","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/04\/Sextortionist-Follow-Through_.png","datePublished":"2024-04-19T04:00:00+00:00","dateModified":"2025-06-27T15:15:08+00:00","description":"Worried they\u2019ll follow through? Learn why some do, why others don\u2019t - and what to do now. Expert help if sextortionists follow through.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/04\/Sextortionist-Follow-Through_.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/04\/Sextortionist-Follow-Through_.png","width":1280,"height":560,"caption":"Do Sextortionist Follow Through?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/how-often-do-sextortionists-follow-through\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources for Victims of Internet Sextortion","item":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/"},{"@type":"ListItem","position":3,"name":"How Often do Blackmailers and Sextortionists Follow Through?"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=4823"}],"version-history":[{"count":49,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4823\/revisions"}],"predecessor-version":[{"id":12430,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4823\/revisions\/12430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/11514"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=4823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=4823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=4823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}