top of page

Support | Tip | Donate

Recent Posts

Featured Post

Sextortion

  • Writer: The White Hatter
    The White Hatter
  • Aug 30, 2022
  • 17 min read

Updated: May 19



CAVEAT


As the reader has probably guessed, the term “sextortion” is a neologism that combines the words “sex” and “extortion.” The term was first coined and used by the International Association of Women Judges (IAWJ) in 2009. They introduced it to describe a form of corruption in which individuals in positions of power—such as officials, educators, or employers—demand sexual favors in exchange for something within their control.


While the term originated in the context of institutional power abuse, today “sextortion” has evolved to encompass a broader range of exploitative online behaviors, especially those targeting youth. This chapter aims to help parents, caregivers, educators, and others understand the who, what, where, when, how, and why behind the world’s largest multinational blackmail scheme—commonly referred to as sextortion.


Sextortion Typology


It is crucial that youth—regardless of sexual orientation or gender identity—and their parents become more aware of the pretexts, tactics, and strategies used in online sextortion. As Sun Tzu, the ancient Chinese military strategist, once said:


“If you know the enemy and know yourself, you need not fear the result of a hundred battles.”


Sexting and sextortion were already topics of concern in our student presentations as early as 2012, as highlighted in this article:🔗 Oak Bay News – Sexting puts youth at risk, Victoria bullying expert


At that time, some individuals within the internet safety community dismissed our concerns as “fear-mongering.” How times have changed.


From our experience, sextortion involving youth and teens typically falls into two main categories:


#1 - Sextortion by someone the youth knows, loves, or trusts.


Nudes are shared within the context of an intimate relationship and are later weaponized—either after a breakup as revenge, during the relationship as a tool for control, or as a threat to prevent a partner from leaving.


#2- Sextortion by someone the youth does not know.


This is typically a stranger met online—someone we refer to as a capper, short for capturer. While cappers can be individuals within Canada or the U.S., it is our experience that many are linked to organized online crime groups operating out of regions such as Russia, India, the Philippines, Somalia, Nigeria, or the Ivory Coast.


Four Common Sextortion Coercion Typologies


#1 – Coercion for Images


The extorter demands additional intimate images in exchange for not releasing previously obtained ones.


  • Motivations:

    • Gratification

    • Power

    • Value (linked to Typology #2)


#2 – Coercion for Value


Sometimes called financial sextortion, but this can involve more than just money. The extorter demands something valuable in exchange for keeping the images private.


  • Common Demands:

    • Cryptocurrency (e.g., Bitcoin)

    • In-game items

    • Money transfer apps (e.g., CashApp, Venmo)

    • Gift cards

    • Trades or barters


#3 – Coercion for Other Demands


The extorter exerts control by demanding something unrelated to money or images.


  • Examples:

    • Reputation smearing avoidance

    • Control within a romantic or sexual relationship


#4 – Coercion for Ideologically Motivated Violent Extremism (Newly emerging)


Some cappers are now exploiting youth as part of extremist agendas.



Note: Email Sextortion Scams 



A subcategory of sextortion used by cappers involves mass phishing emails—like the infamous “Pegasus Scam Email.” In this scam:


  • The offender sends out templated emails claiming to have gained remote access to the recipient’s webcam and microphone while they were visiting adult sites.


  • To seem legitimate, they include the victim’s email and a leaked password from a previous data breach.


  • Some versions now include a screenshot of the victim’s home (via Google Maps) to increase fear.


These scams are fake, but extremely effective. If you or your child receives such an email:


Do not respond. Do not click links. Do not engage. Delete the message and block the sender.



Focus: “Capper” and Catfish Sextortion Scams


In this chapter, we are focusing primarily on the second group—the capper and the catfish sextortion scam—which specifically involves financial and image-based sextortion.


Between January 2020 and May 2025, we have helped 333 teens (all under the age of 18, the youngest being 12). Of these, 319 identified as male and 14 as female. All were targeted online by a capper—a sexualized online predator—and extorted for either money or more images.


Here are some important insights:


  • In all male-targeted cases, the capper demanded money.


  • In the fourteen cases involving teen girls, the capper wanted additional images or videos, not money.


  • In a recent U.S. court case, investigators estimated that one organized crime group in Nigeria had profited over $2 million USD from sextortion crimes.


    🔗 Source – Plainsite Court Filing


  • In the majority of cases, the sextortion began within 30 minutes of initial online contact. Some tool place in under 5 minutes


This data highlights the real and immediate threat of sextortion by strangers, and why it’s essential to have honest conversations with youth about this form of exploitation.


Why Are Teen Boys Now the Primary Target?


“Yes,” teen girls are still being targeted by unknown online predators. However, over the past several years, teen boys have become the bigger target. Why?


Peer-reviewed research helps explain:


  • Compared to teen boys, teen girls are significantly less likely to:


    • Engage in risky online sexual behaviour.


    • Perceive any benefit in communicating with strangers for sexual purposes.


    • Sources: Baumgartner (2010), Montiel et al. (2016)


  • Boys, however, appear more likely to engage in:


    • Sexually revealing self-exposure online.


    • Risky interactions with unknown individuals.


    • Source: Jonsson et al. (2014)


Because of this, online cappers know that boys are often more vulnerable to manipulation, particularly when it comes to grooming and luring tactics. They exploit this vulnerability to:


  • Encourage boys to perform sexual acts.


  • Covertly record these acts.


  • Use the recordings as blackmail for money or more content.



False Confidence and Shame: A Dangerous Combo


  • Digital disinhibition leads many teen boys to believe that they’re anonymous and immune to consequences online.


  • They’re often overconfident, believing:


    “This won’t happen to me—I’m smarter than them.”


  • Boys are less likely to report the crime due to embarrassment or fear of judgment.


  • This stigma is well-known to cappers, who exploit it to maintain control.


Dr. Scott Hadland, Chief of Adolescent Medicine at Massachusetts General Hospital in Boston, explains:


“Teen brains are still developing. When something catastrophic happens—like a personal picture is released online—it’s hard for a teen to look past that moment and understand that in the big scheme of things, they’ll be able to get through it.”


Cappers count on this fear and psychological pressure to escalate their threats.


Update (February 2025)


We now know of 44 teen boysfive in Canada—who have died by suicide after being targeted by sextortion:


  • British Columbia: Two boys, ages 12 and 14


  • Manitoba: One boy, age 17


  • Prince Edward Island: One boy, age 17


  • New Brunswick: One boy, age 16



Stats and Facts from the Canadian Centre for Child Protection


The following data illustrates the growing threat of youth sextortion in Canada:


  • Between December 2021 and May 2022, the Canadian Centre for Child Protection (C3P) reported a 150% increase in sextortion cases involving youth.


  • Cybertips.ca, Canada’s tipline for reporting the online sexual exploitation of children, now receives over 50 sextortion reports per week.


  • In 2023 alone, they handled more than 2,300 sextortion reports involving Canadian teens and their families.


  • An estimated 87% of reported victims identified as teen boys.



Understanding the Numbers: Perspective Matters


While these numbers are deeply concerning, it's important to balance fear with perspective. According to a 2018 peer-reviewed study by Dr. Justin Patchin and Dr. Sameer Hinduja:


  • Only 5% of over 5,000 middle and high school students reported being victims of sextortion.


    🔗 Study Link


A 2022 peer-reviewed study of over 2,000 adults (18+) found:


  • 4.5% of men and 2.3% of women reported experiencing sextortion during the pandemic.


    🔗 Study Link


So yes—sextortion is real, and yes—we have seen an anecdotal spike during COVID-19, but statistically, it remains a rare occurrence. However, rarity means nothing if it happens to your child.


When Youth Seek Help Online


When sextortion does happen, many teens understandably turn to the internet for help. One of the most commonly searched platforms is Reddit, specifically:


In fact, multiple teens we’ve helped found The White Hatter through this subreddit and contacted us after learning about our support services.


The Capper’s Pretext


Cappers are highly strategic in how they initiate contact with youth online. They typically use popular platforms such as:


  • Instagram


  • Snapchat


  • TikTok


  • Wizz


  • Emerald Chat


  • Gaming platforms (e.g., Roblox, Fortnite, Discord)


Wherever teens are online, cappers are there, too—lurking and watching for opportunities to exploit.


Tactic: Illusion of Familiarity


Criminal groups often mass-send follow or friend requests to teen-focused communities such as:


  • Schools


  • Sports teams


  • Youth group pages


This creates the illusion of mutual connections, increasing the likelihood a teen will accept the request and respond.


Once Contact Is Made: The 3 Common Strategies


1. Baiting & Grooming


  • The capper pretends to be a peer, often the opposite gender of the target.


  • They use a sock puppet account—a fake profile filled with stolen images from elsewhere online.


  • After establishing trust, they ask the teen to move to a more private platform like (off-platforming):


    • Google Hangouts

    • Skype

    • Snapchat

    • Instagram DMs

    • Telegram


Once on a private platform, the conversation escalates to:


  • Flirtation


  • Sexualized language


  • Requests for nudes or live sexual activity via webcam


Unknown to the teen, everything—including text, images, and video—is being covertly recorded. The capper then uses this material for extortion.


2. Direct Threat


  • The capper sends screenshots of the teen’s social media followers, or even their school’s public account, threatening to distribute the explicit material unless demands are met (usually around $500).


  • Though most of these threats are not carried out, we have helped families where they were—particularly on Snapchat.


  • Cappers often lie to their victims, saying:


    “If you tell anyone, you’ll be arrested for child pornography.”


Let’s be crystal clear:


Youth who are victims of sextortion will not be arrested in Canada.They are not criminals, they are victims of a crime.


3. Implied Threat (Phishing Attack)


  • The capper pretends they’ve found “nudes” of the teen online.


  • They send a phishing link to a fake login page (e.g., Snapchat, Instagram).


  • Once the teen enters their credentials, the capper hijacks the account.


  • The account is locked, and the capper demands money or more content in exchange for returning access.



Important Note for Teens and Parents


To minimize the risk of being targeted:


  • Lock down all social media accounts.


  • Be cautious of who you let follow or message you—especially on Instagram.


  • Never include personal info in bios:

    • Full name

    • School name or initials

    • Links to other social platforms (e.g., Snapchat, TikTok, VSCO)


  • Cappers often screen-capture your friend list and use it as leverage. Some even:


    • Create fake group chats with your friends.

    • Share screenshots of this group to pressure you into compliance.


These tactics can be avoided with strong privacy settings and thoughtful social media hygiene.



Update (July 2024): Deepfake “Nudification” Sextortion


A new and deeply concerning trend has emerged: teens are now being targeted without ever having sent a nude.


Here’s how it works:


  • Offenders—often organized crime groups—screen capture fully clothed images from a teen’s public social media accounts (especially Instagram).


  • These images are then manipulated using AI deepfake tools to “nudify” the teen.


  • The fake nude images are used to:

    • Extort money, or

    • Pressure the teen to send real explicit content.


  • Threats include:

    • “I’ll send this image to your parents.”

    • “This will go public if you don’t comply.”


We recently assisted a family in which:


  • A teen had not sent a nude.


  • The capper had used an image from their public Instagram, manipulated it with deepfake software, and used it to extort them.


  • The teen proved their innocence by showing us the original photo that had been altered.




What Parents and Teens Need to Know


  • Privacy settings matter: Keeping social media accounts private reduces risk.


  • However, privacy is not a guarantee: images can still be copied, stolen, or reshared.


  • Education is key: Teens need to know that even innocent photos can be twisted by bad actors.


It’s essential for parents and caregivers to understand:


The image being weaponized may not be real or may not have been created by your child.


This is critical. In the case we helped with, the parent initially didn’t believe it was a manipulated image—because they had no idea such technology existed.


Update (February 2024): AI in Grooming and Luring


With the rapid advancement of AI, we’re now seeing cappers use AI in every stage of sextortion, including:


  • Grooming


  • Conversation scripts


  • Voice and video generation


  • Impersonation


  • Deepfake “nudified” images



Update (March 2025): AI-Generated Non-Consensual Intimate Video


We're now aware of incidents where:


  • AI is used to create full-motion, fake sexual videos using real faces.


  • These videos are then weaponized in the same way as real nudes: to extort, threaten, and control.


This represents a massive leap in the capabilities of online predators—and another reason why youth need guidance, not just protection.



Update (July 2022): Sock Puppets and Social Media Impersonation


One of the most common tactics used by cappers on platforms like Instagram and Facebook involves fake social media accounts, known as sock puppets.


Wherever youth go online, predators will follow—using fake identities to deceive, manipulate, and exploit.


Key Indicators of Sock Puppet Accounts:


  • A high number of followers and following, but with very few actual posts (often under 10).





  • A bio that includes contact details such as:


    • SnapChat usernames


    • Links to other platforms for private communication


  • A profile picture that is often a stolen image from:


    • Instagram


    • TikTok


    • OnlyFans


    • Porn sites


These sock puppet accounts are designed to appear legitimate just long enough to lure a teen into a private chat.


Real-World Example: First-Contact Sextortion Attempt


Here is an actual first-contact conversation initiated by a capper targeting a Canadian teen. This interaction began with a direct message and quickly progressed into a classic sextortion setup:


Capper: Hi, how are you doing?

Teen: Good, how are you?

Capper: Not bad either. Where are you from??

Teen: BC, Canada

Teen: WBU?

Capper: Vancouver

Teen: Nice, I’m from Langley

Teen: How old are you?

Capper: 17

Capper: 18 in a few weeks

Capper: HBU

Teen: 17 in a few months (actually much younger)

Capper: Oh cool

Capper: What do you do for fun?

Teen: Basketball

Teen: WBU?

Capper: I love to hang out with my friends

Capper: I love tennis and sexy games too

Teen: Nice

Capper: Yeah

Teen: Wdym (What do you mean) by sexy games? [laughing emoji]

Capper: It’s just an exchange of pictures without screenshots—but on Snapchat though

Teen: What’s your Snap?

Capper: xxxx_xxx

Teen: K, I’ll add you

Teen: Did you get it?


Shortly after moving to Snapchat, the teen sent intimate content that was then covertly recorded and used to blackmail them. This case followed the same pattern we’ve seen in hundreds of sextortion incidents.


Important Note


Sextortion scripts, like the one used in this case, are sold and traded online by offenders. These how-to guides teach cappers exactly how to manipulate victims, what language to use, and how to increase emotional pressure. 





This is not random—it is organized, practiced, and profitable.


Managing Sextortion: 10-Step Emergency Protocol


Over the past five years, five Canadian teens have tragically died by suicide after being targeted for sextortion. As of May 2025, we’ve now assisted 333 teens and their families facing similar threats.


The emotional, psychological, and social toll on youth in these situations is profound. As Dr. Scott Hadland, Chief of Adolescent Medicine at Massachusetts General Hospital, explains:


“Teen brains are still developing. When something catastrophic happens—like a personal picture being released online—it’s hard for the teen to look past that moment and understand that, in the big scheme of things, they’ll be able to get through it.”


This is why immediate intervention is so important. Reducing panic and restoring a sense of control can literally save lives.



We developed the following 10-step emergency protocol based on our experience helping hundreds of teens. It is designed to minimize harm, preserve evidence, and provide emotional support. 






 #1 – Stop All Communication


Immediately stop engaging with the capper.


  • Do not negotiate.


  • Do not reply.


  • The longer communication continues, the worse the situation usually becomes.



 #2 – Don’t Pay Any Ransom


Do not pay money, send gift cards, images, or videos.


  • If you pay once, they’ll label you a “whale” and come back for more.


  • According to Cybertip.ca:


    In 93% of cases where money is paid, the capper comes back with additional demands.


    🔗 Report


If a payment was made, immediately contact your bank or service provider:









 #3 – Screen Record or Capture All Communications


Preserve evidence:


  • Screen recording is ideal.


  • If not possible, take screenshots of every interaction.


  • Put your device in airplane mode to prevent remote deletion by the capper.



 #4 – Deactivate, Don’t Delete


Deactivate your account, but do not delete it yet.


  • Police may want to conduct an account takeover to track the offender.


  • Do not delete the image you sent—it may help with takedown protocols later.


Deactivation guides:




  • Snapchat: Snapchat can only be deactivated by deletion, but deletion gives a 30-day window to reverse.



 #5 – Notify the Police


Sextortion is a crime. Reporting to police is important—even if the capper is overseas.


  • If you still have the image, police can request a digital fingerprint (hash) through the Canadian Centre for Child Protection.


  • This helps programs like Project Arachnid detect and remove the image from the surface and deep web.


    🔗 Project Arachnid


Don’t want to involve police?You can still report to Project Arachnid directly or, in the U.S., use:🔗 NCMEC’s Take It Down tool



***Note***


It’s very common that the capper will state that if you notify the police, you will be arrested because if you are under the age of 18 you broke the law by creating and sending in their words “child pornography” which is illegal.  However, in Canada, this assertion is legally inaccurate, and you WILL NOT face arrest. This misinformation is intended to heighten pressure for compliance with their demands and dissuade you from contacting law enforcement.



 #6 – Block and Delete (When Safe to Do So)


After police have advised it’s safe to do so, block and delete the capper across all platforms.


  • If you choose not to involve police, go ahead and block the individual—but only after you’ve saved all evidence and deactivated your account.


  • Make your account private, change your password, and enable two-factor authentication.



 #7 – Don’t Accept New Requests for 48 Hours


After blocking the capper, they will likely try to reconnect using a different account or alias.


  • For the next 48 hours, do not accept any new friend or follow requests on any platform.


  • Ignore all unknown calls or messages, even if they appear to be from someone familiar—this could be part of their pressure campaign.

Based on our experience with 333 teenagers we’ve assisted, it’s “likely” that the nude images won’t be widely redistributed. In fact, we haven’t encountered a single instance where the sent nudes were widely disseminated. While we can’t guarantee this won’t occur (as we’ve heard reports of it happening elsewhere), none of our cases have resulted in widespread distribution – not one. However, in six instances, the nude images were shared with one or two friends as part of the coercion tactics to compel payment of the ransom. It’s not uncommon for the perpetrator to send you screenshots of your friends on social media to increase pressure for compliance with their demands. If this happens, and your face was not in the picture, then you have deniability and can say “that’s not me” to those few friends and followers who were sent the picture/video.  If your face was in the picture, it does make it more difficult, but good friends will not re-distribute.


Additionally, it’s crucial to understand that several leading social networks employ highly effective artificial intelligence (AI) systems. These systems can swiftly detect and remove nude content posted in public areas of their platforms, although this isn’t always guaranteed. If such content isn’t promptly removed, it’s advisable to contact the social media platform directly to request its removal.



 #8 – Set Up Google Alerts


Use Google Alerts to monitor if your name appears online in connection to the incident.


  • You’ll need a Gmail account.


  • Set up an alert using your full name in quotes, e.g., "Jordan Smith".


  • If the image gets posted to the surface web, Google may detect it and notify you.


⚠️ Important: If you receive an alert, don’t panic. Many people share the same name—verify it’s really you before taking further action.



 #9 – Don’t Hire Fee-for-Service Takedown Companies


Beware of companies that claim, for a fee, they can:


  • Stop sextortion,


  • Recover images,


  • Guarantee takedowns.


We’ve worked with several families who paid hundreds or even thousands of dollars to these companies, only to be told later that “nothing could be done.”


There are free, legitimate resources available that are far more effective, including:





 #10 – Change Your Phone Number


If you shared your phone number with the capper or received threatening messages via text:


  • Contact your mobile provider and change your number.


  • We’ve seen multiple cases where cappers sold victim phone numbers to other scammers.


While inconvenient, this step can prevent future contact and re-victimization.


Final Words of Support


We know how traumatic this experience can be for youth. When sextortion occurs, the capper’s goal is to:


“Induce stress, anxiety, or discomfort so the victim will make decisions that go against their best interest.”


That pressure is even more intense for youth who may feel alone, ashamed, or scared.


The Good News


In the vast majority of cases we’ve helped with—when the capper was a stranger:


  • The nude was never widely redistributed.


  • After 48 hours of no contact, the capper usually moved on to another target.


Why? This is about money, not revenge. These criminals are running a business—and time is money. 


Here's a free in-depth video that we have produced on the topic of sextortion for parents, caregivers, and educators






Parenting Through Sextortion: What Your Child Needs Most


When a child discloses that they are being sextorted, your immediate response as a parent or caregiver matters more than anything else.


 Pause. Breathe. Respond, Don’t React.


If your child comes to you and says they are being sextorted, they have done something incredibly brave. Disclosing something so personal, embarrassing, and terrifying takes immense courage.


Your first job isn’t to punish—it’s to protect.


  • Take a deep breath.


  • Thank them for telling you.


  • Hug them (if they’ll let you).


  • Reassure them that they are not alone and that you’re going to get through this together.


Avoid Blame or Shame


Now is not the time for judgment. Don’t say:


  • “Why did you send that photo?”


  • “I told you not to talk to strangers!”


  • “What were you thinking?”


These responses can drive your child into isolation or prevent them from ever coming to you again when something serious happens online.


Instead, say:


  • “Thank you for telling me.”


  • “I’m here to help, not to judge.”


  • “We’ll figure this out together.”


Your Guidance is Critical


Yes, consequences can be discussed—but after the crisis has passed. Right now, your child needs you to be:


  • A calm leader


  • A fierce advocate


  • A source of emotional safety


Remember:


In most families, love is unconditional. Even if you don’t like what your child did, you still love them, and they need to hear that.


Support Recovery with Professional Help (if needed)


Being a victim of sextortion can lead to:


  • Anxiety


  • Shame


  • Depression


  • Suicidal ideation


Professional counselling can help your child:


  • Rebuild self-esteem


  • Process trauma


  • Develop resilience


Even if your child insists “I’m fine,” consider counselling as a preventative step, not just a reaction to crisis.


Intimate Image Takedowns:


As social media vendors update their reporting protocols, takedown procedures can change without warning.  The below noted procedures were current at the time of publishing this Chapter in May 2025.


No matter what social media platform you will be connecting with to request a takedown, it is important that you share these six essential elements with the social media vendor if possible:


  • Screen Capture the intimate image/video that was posted as evidence, as well as it’s URL (where it is located on the platform/internet). The URL is required in most takedown requests.


  • Confirm that you are the person in the intimate image/ video that was posted.


  • Confirm your age at the time the intimate image/video was posted, this is especially true if at the time of the production of the picture/video you were under the age of 18yrs, which would make it “child pornography” and is a federal crime in Canada and in most countries.


  • Confirm you did not post the intimate image/video, and you did not give consent to anyone else to post the image/video – which is a federal crime in Canada.


  • If you notified the police, provide the name of the police department, the police case number, and the investigating officer. Often, this can expedite a social media platform to take an image down.


  • Include the section of the social media Terms of Service (TOS) that the image/video violates. Most social media vendors state clearly that the posting of any nudity is a clear violation of their policy and subject to immediate removal.


Important Note:


If you are reporting the non-consensual distribution of an intimate image/video to the police (which we highly encourage), we recommend that before you start connecting with a social media platform to have it taken down, ensure that the police give you the go-ahead to do so first.  In some cases, and depending upon the police agency, law enforcement may need to gather required evidence before a takedown action is initiated.


The White Hatter guide on how to request the removal of non-consensual posted intimate images/video from popular social networks. Click the below-noted link, then click the PDF link, then click open:




Legal Help: British Columbia's IIPA


If you live in British Columbia, the province has passed the Intimate Image Protection Act (IIPA).


This law provides free legal help to teens and adults who are victims of sextortion or non-consensual image sharing. It enables them to:


  • File claims


  • Obtain takedown orders


  • Regain control over their digital identity



The Province of British Columbia has established the Intimate Image Protection Service—a unit we’ve helped train—that offers free support in getting your intimate image or video removed if it has been shared online without your consent. Learn more:





No matter your teen’s sexual orientation or gender identity, they deserve to be safer online. And no matter what they’ve done or shared, they are not to blame for being targeted by a predator.


As we emphasized at the beginning:


“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu


Through awareness, open communication, privacy education, and compassion, we can equip our youth to recognize, resist, and recover from sextortion.

Support | Tip | Donate
Featured Post
Lastest Posts
The White Hatter Presentations & Workshops
bottom of page