Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
⚠
If you or your child is experiencing this: do not comply with further demands. Compliance almost never stops the demands — it escalates them. This is not your fault, regardless of what was shared. Help is available and this can be stopped.
Someone is using intimate images to control you or your child
They convinced you (or your child) to share an intimate image, and now they're using it as leverage — demanding more images, money, or compliance. The threat of exposure feels overwhelming, but compliance almost always leads to escalation, not safety.
What You Might Notice
Demands escalate after the first image is shared
What started as one image becomes demands for more, for video, for money, for meeting in person.
Threats to send images to friends, family, or school
The perpetrator uses the victim's social network as leverage — 'I'll send this to everyone you know.'
Your child suddenly becomes withdrawn, anxious, or changes device behaviour
Secrecy about their phone, staying up late, emotional distress — these can indicate sextortion.
Unexplained money transfers from your child's accounts
Some sextortion demands are financial — the child may be sending money to make it stop.
What You Can Do
Stop all communication with the person making demands
Block them on every platform. Do not respond to threats. They are counting on your fear.
If you're concerned about immediate safety, contact police.
Do not pay or send more content
Paying or complying does not make it stop. It proves the leverage works and demands will escalate.
Report to the eSafety Commissioner
The eSafety Commissioner can issue takedown notices to platforms and help with image removal. esafety.gov.au
Talk to your child with compassion, not anger
They are the victim. Their biggest fear is your reaction. Respond with support and they'll let you help.
What they need to hear: 'This is not your fault. I'm not angry. We will sort this out together.'
Report to police and ACCCE for child victims
This is a crime. accce.gov.au/report for child exploitation. Police for all victims.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
The pattern where initial sextortion of a minor transitions into ongoing control and exploitation. The first coerced image becomes permanent leverage for escalating demands — more images, sexual acts, money, or compliance. The perpetrator uses shame and fear of parental discovery as ongoing leverage. This is the intersection of grooming and sextortion responsible for a significant number of teen male suicides.
Mitigations for this technique are under development. If you have suggestions on how to improve this content, please submit a pattern.
Detection Indicators
ID
Detection Indicator
SAFE-D-0001
Anomalous Battery Consumption Device battery depletes faster than baseline due to continuous background data transmission.
SAFE-D-0002
Unexplained Data Usage Increased mobile data consumption without corresponding user activity. Monitor per-app data usage for unknown processes.
SAFE-D-0003
Device Temperature Anomalies Device runs hot during idle periods indicating background process activity.
SAFE-D-0004
Information Leakage Indicators Adversary demonstrates knowledge of private communications, locations, or activities accessible only through device monitoring.
SAFE-D-0005
Unknown Applications or Profiles Presence of unrecognised apps, device administrator privileges, or configuration profiles.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.