{"id":6761,"date":"2024-07-10T15:48:07","date_gmt":"2024-07-10T19:48:07","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=6761"},"modified":"2025-08-21T19:55:47","modified_gmt":"2025-08-21T19:55:47","slug":"should-i-block-a-sextortionist","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/","title":{"rendered":"Should I Block a Sextortionist or Blackmailer?"},"content":{"rendered":"\n<p>Choosing to immediately block a blackmailer is largely recommended by various sources. It\u2019s an easy way to shut out the threat and stop any further contact. However, what those sources leave out is the potentially devastating consequences of deciding to block a scammer. Ignoring or blocking your blackmailer can worsen the situation and often leads to catastrophic ramifications. This is why one of the main questions victims should consider is: \u201cShould I block a sextortionist?\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image alignnone wp-image-11984 size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1779\" height=\"834\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer.png\" alt=\"You often see clear recommendations online to block a blackmailer. Be careful, this is not always the right way.\" class=\"wp-image-11984\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer.png 1779w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer-300x141.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer-1024x480.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer-768x360.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer-1536x720.png 1536w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer-512x240.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer-920x431.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/07\/should-i-block-a-sextortionist-chatgpt-answer-1600x750.png 1600w\" sizes=\"auto, (max-width: 1779px) 100vw, 1779px\" \/><figcaption class=\"wp-element-caption\"><strong>Figure 1. You often see clear recommendations online to block a blackmailer. <span style=\"text-decoration: underline;\">Be careful, this is not always the right way!!!<\/span><\/strong><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-understanding-the-psychology-of-a-sextortionist\"><span class=\"ez-toc-section\" id=\"Understanding_the_Psychology_of_a_Sextortionist\"><\/span>Understanding the Psychology of a Sextortionist<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It\u2019s difficult to predict the behavior of a sextortionist. However, there are patterns worth noting. Many blackmailers work in organized groups. They coordinate their attempts to lure victims into sharing explicit content, often using other group members in their schemes. These networks work together to broaden their reach, targeting more victims and maximizing financial gain. Many groups are based in countries facing economic challenges like <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/how-does-a-nigerian-romance-scam-work\/\">Nigeria<\/a>, <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/thailand-dating-scams-how-to-stay-safe-online\/\">Thailand<\/a>, the <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/philippines-sextortion\/\">Philippines<\/a>, and the <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/tips-for-identifying-and-preventing-dominican-republic-dating-scams\/\">Dominican Republic<\/a>. While sextortionists are interested in money, they\u2019re also partially motivated by the power of having leverage over the victim. Most perpetrators have little regard for their victims\u2019 well-being, using devastating exposure as a coercive weapon.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-should-i-block-a-sextortionist-or-blackmailer-what-experts-say\"><span class=\"ez-toc-section\" id=\"Should_I_Block_a_Sextortionist_or_Blackmailer_What_Experts_Say\"><\/span>Should I Block a Sextortionist or Blackmailer? What Experts Say<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>According to a <a href=\"https:\/\/www.thorn.org\/research\/library\/financial-sextortion\/\" target=\"_blank\" rel=\"noopener\">report by Thorn,<\/a> Instagram and Snapchat are some of the <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/dating-apps-with-no-sextortion-risk\/\">most popular platforms for sextortion<\/a>. Those platforms also have tools to block and <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/top-resources-for-victims-of-online-blackmail\/\">report a blackmailer<\/a> if need be. This is a common response for sextortion victims, and it\u2019s also a recommended action by many reputable sources. However, deciding to block a blackmailer can lead to disastrous results. In many cases, blocking a blackmailer provokes them and triggers a retaliatory response. This can lead to exposure just to spite their victims. On top of that, you\u2019ll be unable to monitor what the blackmailer is doing once they are blocked.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-preserve-the-evidence-before-choosing-to-block-a-blackmailer\"><span class=\"ez-toc-section\" id=\"Preserve_the_Evidence_Before_Choosing_to_Block_a_Blackmailer\"><\/span>Preserve the Evidence Before Choosing to Block a Blackmailer<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If you decide to block a blackmailer, it\u2019s important to <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/collect-evidence\/\">save the evidence of the cybercrime<\/a> first. Blocking a user on many platforms can delete the correspondence from the perpetrator, which can remove evidence of the crime. Before blocking the user, you need to take screenshots of messages, the profiles involved, and anything else that\u2019s relevant. So, when it comes to the question, \u201cShould I block a sextortionist?\u201d, our experts have less risky methods of responding. However, it is always an option if you feel that is best.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Should You Block Your Blackmailer?\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/3AgY7bNOzN0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-our-experts-recommend-responding-if-you-re-a-victim-of-sextortion\"><span class=\"ez-toc-section\" id=\"How_Our_Experts_Recommend_Responding_If_Youre_a_Victim_of_Sextortion\"><\/span>How Our Experts Recommend Responding If You\u2019re a Victim of Sextortion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you\u2019re still asking, \u201cShould I block a sextortionist?\u201d, our team has more effective steps you can take. At Digital Forensic Corp., we help thousands of sextortion victims every year. Our team has seen the various ways that victims have responded to being targeted, whether it was effective or not. Based on our experience and expertise, we\u2019ve created a guide to help victims of sextortion avoid escalating the situation. Take a look at the following steps if you want to minimize the risk of exposure <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/stop-sextortion\/\">when facing sextortion<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-stay-calm\"><span class=\"ez-toc-section\" id=\"Stay_calm\"><\/span>Stay calm<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It\u2019s understandable to panic when someone is threatening to expose your explicit images or videos. However, blackmailers are relying on you losing your composure to make a rash decision. Instead, take a breath and refer to cybercrime experts on how you should proceed to best protect yourself.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-save-the-evidence\"><span class=\"ez-toc-section\" id=\"Save_the_Evidence\"><\/span>Save the Evidence<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>As previously mentioned, preserving evidence of sextortion is essential. Messages can change or be deleted so it\u2019s important to document your evidence immediately. Take screenshots of the threatening messages, the perpetrator\u2019s profile, and record other pertinent information. You don\u2019t, however, need to preserve your own private explicit content.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-use-delay-tactics\"><span class=\"ez-toc-section\" id=\"Use_Delay_Tactics\"><\/span>Use Delay Tactics<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Sextortionists use urgent deadlines to force victims into making a hasty decision. If demands are not met by that time, they threaten exposure. Our experts recommend that victims use delay tactics to push the deadline further back. <a href=\"\/blog\/online-blackmail\/delay-tactics-to-avoid-paying-your-blackmailer\/\">Delay tactics<\/a> are excuses that force the perpetrator to postpone before they can make good on their threat. These tactics help you buy time while you seek <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/report-cybercrime-private-investigator\/\">assistance from cybercrime experts<\/a> or law enforcement. Here are some common examples:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cI need to wait until my next payday.\u201d<\/li>\n\n\n\n<li>\u201cI need time to gather the money.\u201d<\/li>\n\n\n\n<li>\u201cI created a crypto account, but I have to wait a few days until my account gets verified.\u201d<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-never-comply\"><span class=\"ez-toc-section\" id=\"Never_comply\"><\/span>Never comply<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Giving in to the sextortionist\u2019s demands will not put an end to the <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/avoid-online-blackmail\/\">online blackmail<\/a>. It only communicates that you have the means and willingness to comply with their threats. You should never comply with a perpetrator, no matter the threat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-report-the-blackmailer-to-the-platform\"><span class=\"ez-toc-section\" id=\"Report_the_Blackmailer_to_the_Platform\"><\/span>Report the Blackmailer to the Platform<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Many platforms have a feature allowing users to report accounts that violate community standards. Facebook, for example, allows you to report a profile for \u201cThreatening to share my nudes\u201d or being a \u201cFake profile.\u201d Reporting accounts can lead to the removal of the cybercriminal\u2019s profile, saving other users from becoming victims. Most reporting tools are also anonymous which protects victims that use the feature.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-notify-the-authorities\"><span class=\"ez-toc-section\" id=\"Notify_the_Authorities\"><\/span>Notify the Authorities<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>We also recommend reporting sextortion to your local police. The authorities can help you file an official report, documenting the crime for future legal action. They can also help you with the next steps, including a potential investigation into the criminal responsible. You should also report sextortion to the FBI\u2019s <a href=\"\/blog\/extortion\/report-cybercrime-to-the-fbi\/\">Internet Crime Complaint Center (IC3).<\/a> The FBI\u2019s authority is not limited to local jurisdictions, and they also track cybercrime trends across the country.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Should You Block Your Sextortionist\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/5yj8JJ7r2zo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-should-i-block-a-sextortionist-or-not-a-real-life-case-study\"><span class=\"ez-toc-section\" id=\"Should_I_Block_a_Sextortionist_or_Not_A_Real-Life_Case_Study\"><\/span>Should I Block a Sextortionist or Not? A Real-Life Case Study<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A college student was messaged by a woman on Facebook that was around the same age and in a similar area. The woman showed interest in the man, and they developed a relationship over the next few days. The conversation quickly turned sexual, and the woman suggested exchanging explicit images. Once the victim sent his image, the sextortionist dropped the fa\u00e7ade and demanded money in exchange for keeping the images private. The victim panicked and paid the perpetrator twice. However, upon the third demand for money, he decided it was time to block the blackmailer. Unfortunately, the criminal retaliated by posting the images on a Facebook page filled with his classmates and professor. He quickly took action to remove the image from the page, but some classmates were exposed to the image.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-safer-alternative-to-blocking-working-with-dfc-experts\"><span class=\"ez-toc-section\" id=\"A_Safer_Alternative_to_Blocking_Working_with_DFC_Experts\"><\/span>A Safer Alternative to Blocking: Working with DFC Experts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>While there are many practices that can help reduce your risk of exposure, the best way to <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/how-to-stop-a-blackmailer\/\">stop the blackmail<\/a> is to work with Digital Forensic Corp. Our experts offer more than just privacy protection; we work to protect victims in any way we can. We immediately detect and remove any posting of your private images or videos without consent, mitigating damage. Our team also takes the fight to the sextortionists. We regularly trace the perpetrator\u2019s digital footprint, unmasking their geolocation and, in some cases, their identity. Our investigation can serve as digital evidence to be used to support future legal action or proceedings. If you are a victim of sextortion, contact our <a href=\"\/blog\/sextortion-online\/report-sextortion-online\/\">Sextortion Helpline<\/a> for expert help. We are available 24\/7 and always ready to support victims.<\/p>\n","protected":false},"excerpt":{"rendered":"Choosing to immediately block a blackmailer is largely recommended by various sources. It\u2019s an easy way to shut&hellip;","protected":false},"author":132,"featured_media":11982,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[767],"tags":[],"class_list":{"0":"post-6761","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sextortion-online","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Should I Block a Sextortionist or Blackmailer? Expert Advice<\/title>\n<meta name=\"description\" content=\"Should I Block a Sextortionist or Blackmailer? The answer isn\u2019t simple - learn the risks, safer steps, and expert tips to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Should I Block a Sextortionist? The Answer Isn\u2019t Simple\" \/>\n<meta property=\"og:description\" content=\"Should I Block a Sextortionist? The answer isn\u2019t simple - learn the risks, safer steps, and expert tips to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-10T19:48:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-21T19:55:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Should_I_Block_a_Sextortionist_-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benjamin Carpenter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Should I Block a Sextortionist? The Answer Isn\u2019t Simple\" \/>\n<meta name=\"twitter:description\" content=\"Should I Block a Sextortionist? The answer isn\u2019t simple - learn the risks, safer steps, and expert tips to protect yourself.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Should_I_Block_a_Sextortionist_-1.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benjamin Carpenter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/\"},\"author\":{\"name\":\"Benjamin Carpenter\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/773c64cac299aa62d21e9e41427e37b6\"},\"headline\":\"Should I Block a Sextortionist or Blackmailer?\",\"datePublished\":\"2024-07-10T19:48:07+00:00\",\"dateModified\":\"2025-08-21T19:55:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/\"},\"wordCount\":1242,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Should_I_Block_a_Sextortionist_-1.jpg\",\"articleSection\":[\"Resources for Victims of Internet Sextortion\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/\",\"name\":\"Should I Block a Sextortionist or Blackmailer? Expert Advice\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Should_I_Block_a_Sextortionist_-1.jpg\",\"datePublished\":\"2024-07-10T19:48:07+00:00\",\"dateModified\":\"2025-08-21T19:55:47+00:00\",\"description\":\"Should I Block a Sextortionist or Blackmailer? The answer isn\u2019t simple - learn the risks, safer steps, and expert tips to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Should_I_Block_a_Sextortionist_-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Should_I_Block_a_Sextortionist_-1.jpg\",\"width\":2560,\"height\":1120,\"caption\":\"Should I Block a Sextortionist or Blackmailer?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/should-i-block-a-sextortionist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources for Victims of Internet Sextortion\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Should I Block a Sextortionist or Blackmailer?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/773c64cac299aa62d21e9e41427e37b6\",\"name\":\"Benjamin Carpenter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"caption\":\"Benjamin Carpenter\"},\"description\":\"Cybercrime Content Strategist and Victim Advocacy Writer \\\"Online abuse can happen to anyone \u2014 my job is to make sure they know what to do next.\\\" \u2014 Benjamin Carpenter &#xa0; Benjamin Carpenter is a digital safety content specialist dedicated to empowering individuals and organizations with the knowledge and tools to defend themselves against cybercriminals. With a background in communication and a deep understanding of online threats, Benjamin focuses on creating content that bridges the gap between a general unawareness of cyber threats and application of the best online safety practices. &#xa0; Expertise Benjamin\u2019s work centers around some of the most pressing and emotionally charged areas in cybersecurity today: \u2022 Data breach response and regulatory compliance \u2022 Legal protections against non-consensual image sharing (NCII) \u2022 Blackmail and sextortion response strategies \u2022 Victim-centered resources and education \u2022 Analysis of trending cybercrime tactics &#xa0; Role at Digital Forensics Corp. At Digital Forensics Corp., Benjamin plays a critical role in creating valuable educational content for victims, families, and corporate teams. He collaborates with cybercrime experts and legal professionals to ensure accuracy, and his work helps readers navigate crises with confidence. Benjamin\u2019s content has become a go-to resource for individuals facing cybercrime, and he has developed subject-matter depth in: \u2022 Sextortion and blackmail targeting minors and adults \u2022 U.S. and international legislation related to image-based sexual abuse \u2022 Incident response frameworks for individuals, families, and organizations under attack &#xa0; Notable Publications &amp; Projects \u2022 \u201cSextortion Targeting Minors: A Booklet for Parents\u201d \u2013 A parent-friendly resource on how to identify warning signs, talk to children at risk, and prevent manipulation by online predators. \u2022 LinkedIn Educational Campaign for IT Security Professionals \u2013 A content series exploring digital privacy law, NCII laws, and organizational incident response plans. \u2022 \u201cSextortion: A Comprehensive Guide\u201d \u2013 A long-form resource going through sextortion tactics, victim support organizations, and the value of cybercrime experts. &#xa0; Professional Values Benjamin believes digital safety content should be practical, empathetic, and transparent. His approach combines: \u2022 Insights from cybersecurity experts \u2022 Real accounts from cybercrime victims \u2022 Empirical data from industry research &#xa0; Education \u2022 B.S. in Communication and Media Studies Ohio University &#xa0;\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/benjamin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Should I Block a Sextortionist or Blackmailer? Expert Advice","description":"Should I Block a Sextortionist or Blackmailer? The answer isn\u2019t simple - learn the risks, safer steps, and expert tips to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/","og_locale":"en_US","og_type":"article","og_title":"Should I Block a Sextortionist? The Answer Isn\u2019t Simple","og_description":"Should I Block a Sextortionist? The answer isn\u2019t simple - learn the risks, safer steps, and expert tips to protect yourself.","og_url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2024-07-10T19:48:07+00:00","article_modified_time":"2025-08-21T19:55:47+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Should_I_Block_a_Sextortionist_-1-1.jpg","type":"image\/jpeg"}],"author":"Benjamin Carpenter","twitter_card":"summary_large_image","twitter_title":"Should I Block a Sextortionist? The Answer Isn\u2019t Simple","twitter_description":"Should I Block a Sextortionist? The answer isn\u2019t simple - learn the risks, safer steps, and expert tips to protect yourself.","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Should_I_Block_a_Sextortionist_-1.jpg","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Benjamin Carpenter","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/"},"author":{"name":"Benjamin Carpenter","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/773c64cac299aa62d21e9e41427e37b6"},"headline":"Should I Block a Sextortionist or Blackmailer?","datePublished":"2024-07-10T19:48:07+00:00","dateModified":"2025-08-21T19:55:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/"},"wordCount":1242,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Should_I_Block_a_Sextortionist_-1.jpg","articleSection":["Resources for Victims of Internet Sextortion"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/","url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/","name":"Should I Block a Sextortionist or Blackmailer? Expert Advice","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Should_I_Block_a_Sextortionist_-1.jpg","datePublished":"2024-07-10T19:48:07+00:00","dateModified":"2025-08-21T19:55:47+00:00","description":"Should I Block a Sextortionist or Blackmailer? The answer isn\u2019t simple - learn the risks, safer steps, and expert tips to protect yourself.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Should_I_Block_a_Sextortionist_-1.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Should_I_Block_a_Sextortionist_-1.jpg","width":2560,"height":1120,"caption":"Should I Block a Sextortionist or Blackmailer?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/should-i-block-a-sextortionist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources for Victims of Internet Sextortion","item":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/"},{"@type":"ListItem","position":3,"name":"Should I Block a Sextortionist or Blackmailer?"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/773c64cac299aa62d21e9e41427e37b6","name":"Benjamin Carpenter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","caption":"Benjamin Carpenter"},"description":"Cybercrime Content Strategist and Victim Advocacy Writer \"Online abuse can happen to anyone \u2014 my job is to make sure they know what to do next.\" \u2014 Benjamin Carpenter &#xa0; Benjamin Carpenter is a digital safety content specialist dedicated to empowering individuals and organizations with the knowledge and tools to defend themselves against cybercriminals. With a background in communication and a deep understanding of online threats, Benjamin focuses on creating content that bridges the gap between a general unawareness of cyber threats and application of the best online safety practices. &#xa0; Expertise Benjamin\u2019s work centers around some of the most pressing and emotionally charged areas in cybersecurity today: \u2022 Data breach response and regulatory compliance \u2022 Legal protections against non-consensual image sharing (NCII) \u2022 Blackmail and sextortion response strategies \u2022 Victim-centered resources and education \u2022 Analysis of trending cybercrime tactics &#xa0; Role at Digital Forensics Corp. At Digital Forensics Corp., Benjamin plays a critical role in creating valuable educational content for victims, families, and corporate teams. He collaborates with cybercrime experts and legal professionals to ensure accuracy, and his work helps readers navigate crises with confidence. Benjamin\u2019s content has become a go-to resource for individuals facing cybercrime, and he has developed subject-matter depth in: \u2022 Sextortion and blackmail targeting minors and adults \u2022 U.S. and international legislation related to image-based sexual abuse \u2022 Incident response frameworks for individuals, families, and organizations under attack &#xa0; Notable Publications &amp; Projects \u2022 \u201cSextortion Targeting Minors: A Booklet for Parents\u201d \u2013 A parent-friendly resource on how to identify warning signs, talk to children at risk, and prevent manipulation by online predators. \u2022 LinkedIn Educational Campaign for IT Security Professionals \u2013 A content series exploring digital privacy law, NCII laws, and organizational incident response plans. \u2022 \u201cSextortion: A Comprehensive Guide\u201d \u2013 A long-form resource going through sextortion tactics, victim support organizations, and the value of cybercrime experts. &#xa0; Professional Values Benjamin believes digital safety content should be practical, empathetic, and transparent. His approach combines: \u2022 Insights from cybersecurity experts \u2022 Real accounts from cybercrime victims \u2022 Empirical data from industry research &#xa0; Education \u2022 B.S. in Communication and Media Studies Ohio University &#xa0;","url":"https:\/\/www.digitalforensics.com\/blog\/author\/benjamin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/132"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=6761"}],"version-history":[{"count":14,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6761\/revisions"}],"predecessor-version":[{"id":13729,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6761\/revisions\/13729"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/11982"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=6761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=6761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=6761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}