{"id":1396,"date":"2024-04-19T00:00:00","date_gmt":"2024-04-19T00:00:00","guid":{"rendered":"https:\/\/digitalinvestigation.com\/blog\/?p=1396"},"modified":"2025-04-10T19:33:39","modified_gmt":"2025-04-10T19:33:39","slug":"how-to-respond-to-email-sextortion","status":"publish","type":"post","link":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/","title":{"rendered":"How to Respond to Email Sextortion?"},"content":{"rendered":"<p>You open your email and see a message from an unknown sender. They claim to have compromising photos or videos of you and threaten to release them to your friends and family unless you pay them money. Providing no evidence of the threat and you have no idea who they are. This scary situation is known as <a href=\"\/blog\/about-sextortion\/\">online sextortion<\/a>, and it&#8217;s a growing problem in the new age of the internet. Here&#8217;s what you need to know about how to respond to email sextortion, how to protect yourself and why it <a href=\"\/blog\/sextortion\/how-to-recover-from-sextortion\/\">takes time to recover<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Are_Sextortion_Emails_Common\"><\/span>Are Sextortion Emails Common?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Email sextortion usually involves the sender claiming they have access to the victim&#8217;s webcam\/passwords\/etc. or private and explicit information on you. Email threats like these are meant to prey on our most basic psychological instincts. Having read their generic email threat, you will start relating it to your interpersonal relationships. You could end up paying even if you haven&#8217;t done anything! Furthermore, they play on the power of shame. These emails often do not have any basis in reality. Most of the time, they threaten the recipient with vague information, forcing them to fill in the blanks on their own. Scammers are known to send hundreds of these emails out using multiple accounts so they can\u2019t be tracked. Email sextortion is as common as the everyday spam emails you receive. <a href=\"\/blog\/sextortion\/how-to-tell-if-sextortion-email-is-real\/\">Learn how to tell<\/a> if a sextortion email is real.<\/p>\n<p><a href=\"\/blog\/sextortion\/how-to-deal-with-sextortion\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1372 size-full\" src=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-deal-with-sextortion.jpg\" alt=\"How to Deal with Sextortion\" width=\"736\" height=\"150\" srcset=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-deal-with-sextortion.jpg 736w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-deal-with-sextortion-150x31.jpg 150w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-deal-with-sextortion-300x61.jpg 300w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-deal-with-sextortion-512x104.jpg 512w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_to_do_if_you_receive_a_Sextortion_Email\"><\/span>What to do if you receive a Sextortion Email?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you receive such an email, the best thing to do is not panic. Take a deep breath and try to assess the situation calmly. Here are some steps you can take:<\/p>\n<ul>\n<li>Check to see if the email address is registered with any websites you use. If it&#8217;s not, that&#8217;s a good sign that the person who sent the email may not have any compromising material on you.<\/li>\n<li>You can try searching for the exact message text online. You may find that other people have received similar emails and that there is no reason to be concerned.<\/li>\n<li>Do not respond or engage with them in any way.<\/li>\n<li>If you&#8217;re certain that the email is legitimate, contact your local law enforcement agency and file a report. \u00a0Also, report the email to the FBI\u2019S crime complaint center.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"What_Happens_if_you_Respond_to_it\"><\/span>What Happens if you Respond to it?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you respond to email sextortion you could be opening up your email to a realm of problems. It will put you on scammers\u2019 radars and make you vulnerable. Once you reply to a sextortion email, they can then sell your email address to other scammers because they will now know your email is active. You could accidentally leak your personal information just by responding! If you receive an email sextortion attempt, do not respond and do not pay the ransom. Instead, follow these tips below.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Tips\"><\/span>Tips:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Report the email to the Federal Bureau of Investigation (FBI) at <a href=\"https:\/\/www.ic3.gov\/\" target=\"_blank\" rel=\"nofollow noopener\">www.ic3.gov<\/a> and report it in your inbox and delete it. The best response is no response.<\/li>\n<li>You should also run a virus scan on your computer using reliable anti-virus software to be sure that your device has not been infected with malware by the scammer.<\/li>\n<li>Finally, change any passwords that may have been included in the sextortion email so that the scammer can no longer access your accounts.<\/li>\n<\/ul>\n<p><a href=\"\/blog\/sextortion\/how-to-report-a-sextortion-email\/\">Email sextortion<\/a> is a serious problem, but if you follow these steps outlined in the blog post you will protect yourself. If you receive such an email, don&#8217;t panic and don\u2019t respond. If you&#8217;re certain that the email is legitimate, contact <a href=\"\/\">Digital Investigation<\/a> right away! If you need help with sextortion emails, please feel free to contact our <a href=\"\/blog\/about-sextortion\/\">sextortion helpline<\/a>. We are ready to help you with expert advice &amp; Services 24\/7. We hope, that now you understand How to stop sextortion email.<\/p>\n","protected":false},"excerpt":{"rendered":"You open your email and see a message from an unknown sender. They claim to have compromising photos&hellip;","protected":false},"author":1,"featured_media":1398,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-1396","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sextortion","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Respond to Email Sextortion? Here\u2019s what you need to know<\/title>\n<meta name=\"description\" content=\"Learn how to deal with sextortion email threats. Here&#039;s what you need to know about how to respond to email sextortion and how to protect yourself\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Respond to Email Sextortion? Here\u2019s what you need to know\" \/>\n<meta property=\"og:description\" content=\"Learn how to deal with sextortion email threats. Here&#039;s what you need to know about how to respond to email sextortion and how to protect yourself\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/\" \/>\n<meta property=\"og:site_name\" content=\"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PDInvestigate\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-10T19:33:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-respond-to-email-sextortion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"736\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Derek J. Langford\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to Respond to Email Sextortion? Here\u2019s what you need to know\" \/>\n<meta name=\"twitter:description\" content=\"Learn how to deal with sextortion email threats. Here&#039;s what you need to know about how to respond to email sextortion and how to protect yourself\" \/>\n<meta name=\"twitter:creator\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:site\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek J. Langford\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/\"},\"author\":{\"name\":\"Derek J. Langford\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\"},\"headline\":\"How to Respond to Email Sextortion?\",\"datePublished\":\"2024-04-19T00:00:00+00:00\",\"dateModified\":\"2025-04-10T19:33:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/\"},\"wordCount\":651,\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/how-to-respond-to-email-sextortion.jpg\",\"articleSection\":[\"Sextortion Victim Support\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/\",\"name\":\"How to Respond to Email Sextortion? Here\u2019s what you need to know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/how-to-respond-to-email-sextortion.jpg\",\"datePublished\":\"2024-04-19T00:00:00+00:00\",\"dateModified\":\"2025-04-10T19:33:39+00:00\",\"description\":\"Learn how to deal with sextortion email threats. Here's what you need to know about how to respond to email sextortion and how to protect yourself\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/how-to-respond-to-email-sextortion.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/how-to-respond-to-email-sextortion.jpg\",\"width\":736,\"height\":150,\"caption\":\"How to Respond to Email Sextortion?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/how-to-respond-to-email-sextortion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Respond to Email Sextortion?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"name\":\"Articles on Sextortion & Blackmail - Expert Advice on the Blog\",\"description\":\"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less\",\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\",\"name\":\"Digital Investigations\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"width\":216,\"height\":65,\"caption\":\"Digital Investigations\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PDInvestigate\",\"https:\\\/\\\/x.com\\\/PDInvestigate\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/digitalinvestigation\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCc5KctfM3-tMserIsMhWUrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\",\"name\":\"Derek J. Langford\",\"description\":\"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.\",\"sameAs\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Respond to Email Sextortion? Here\u2019s what you need to know","description":"Learn how to deal with sextortion email threats. Here's what you need to know about how to respond to email sextortion and how to protect yourself","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/","og_locale":"en_US","og_type":"article","og_title":"How to Respond to Email Sextortion? Here\u2019s what you need to know","og_description":"Learn how to deal with sextortion email threats. Here's what you need to know about how to respond to email sextortion and how to protect yourself","og_url":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/","og_site_name":"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog","article_publisher":"https:\/\/www.facebook.com\/PDInvestigate","article_published_time":"2024-04-19T00:00:00+00:00","article_modified_time":"2025-04-10T19:33:39+00:00","og_image":[{"width":736,"height":150,"url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-respond-to-email-sextortion.jpg","type":"image\/jpeg"}],"author":"Derek J. Langford","twitter_card":"summary_large_image","twitter_title":"How to Respond to Email Sextortion? Here\u2019s what you need to know","twitter_description":"Learn how to deal with sextortion email threats. Here's what you need to know about how to respond to email sextortion and how to protect yourself","twitter_creator":"@PDInvestigate","twitter_site":"@PDInvestigate","twitter_misc":{"Written by":"Derek J. Langford","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/#article","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/"},"author":{"name":"Derek J. Langford","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82"},"headline":"How to Respond to Email Sextortion?","datePublished":"2024-04-19T00:00:00+00:00","dateModified":"2025-04-10T19:33:39+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/"},"wordCount":651,"publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-respond-to-email-sextortion.jpg","articleSection":["Sextortion Victim Support"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/","url":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/","name":"How to Respond to Email Sextortion? Here\u2019s what you need to know","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/#primaryimage"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-respond-to-email-sextortion.jpg","datePublished":"2024-04-19T00:00:00+00:00","dateModified":"2025-04-10T19:33:39+00:00","description":"Learn how to deal with sextortion email threats. Here's what you need to know about how to respond to email sextortion and how to protect yourself","breadcrumb":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/#primaryimage","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-respond-to-email-sextortion.jpg","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/09\/how-to-respond-to-email-sextortion.jpg","width":736,"height":150,"caption":"How to Respond to Email Sextortion?"},{"@type":"BreadcrumbList","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/how-to-respond-to-email-sextortion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalinvestigation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Respond to Email Sextortion?"}]},{"@type":"WebSite","@id":"https:\/\/digitalinvestigation.com\/blog\/#website","url":"https:\/\/digitalinvestigation.com\/blog\/","name":"Articles on Sextortion & Blackmail - Expert Advice on the Blog","description":"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less","publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalinvestigation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalinvestigation.com\/blog\/#organization","name":"Digital Investigations","url":"https:\/\/digitalinvestigation.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","width":216,"height":65,"caption":"Digital Investigations"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PDInvestigate","https:\/\/x.com\/PDInvestigate","https:\/\/www.linkedin.com\/company\/digitalinvestigation","https:\/\/www.youtube.com\/channel\/UCc5KctfM3-tMserIsMhWUrg"]},{"@type":"Person","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82","name":"Derek J. Langford","description":"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.","sameAs":["https:\/\/digitalinvestigation.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/1396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/comments?post=1396"}],"version-history":[{"count":6,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/1396\/revisions"}],"predecessor-version":[{"id":5466,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/1396\/revisions\/5466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media\/1398"}],"wp:attachment":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media?parent=1396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/categories?post=1396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/tags?post=1396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}