Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Organised scam operations train people to exploit you
The romance scam or sextortion you're experiencing may be run by an organised operation that recruits, trains, and manages dozens of scammers. The person messaging you may themselves be a victim of trafficking, following a script provided by criminal operators.
What You Might Notice
The scam feels professional and well-rehearsed
Multiple stages, consistent messaging, coordinated pressure — this is an operation, not one person.
They shift from emotional to financial requests in a predictable pattern
The 'pig butchering' model follows a documented sequence: build trust → introduce investment opportunity → extract funds.
What You Can Do
Report to ReportCyber (cyber.gov.au)
Australian Cyber Security Centre's reporting mechanism for cybercrime.
Report to your bank immediately if money has been sent
Some transactions can be reversed if reported quickly.
Don't blame yourself
These operations are designed by professionals specifically to exploit human trust. Being targeted is not a reflection of your intelligence.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Being recruited into organised fraud/scam operations (often through false job advertisements) and trained in romance fraud, sextortion, and social engineering techniques at scale. Recruited individuals are often themselves trafficked and exploited. The 'Nigerian Prince' industrial pipeline — from recruitment to training to operation. Some operators are coerced, others are willing participants.
Mitigations for this technique are under development. If you have suggestions on how to improve this content, please submit a pattern.
Detection Indicators
ID
Detection Indicator
SAFE-D-0001
Anomalous Battery Consumption Device battery depletes faster than baseline due to continuous background data transmission.
SAFE-D-0002
Unexplained Data Usage Increased mobile data consumption without corresponding user activity. Monitor per-app data usage for unknown processes.
SAFE-D-0003
Device Temperature Anomalies Device runs hot during idle periods indicating background process activity.
SAFE-D-0004
Information Leakage Indicators Adversary demonstrates knowledge of private communications, locations, or activities accessible only through device monitoring.
SAFE-D-0005
Unknown Applications or Profiles Presence of unrecognised apps, device administrator privileges, or configuration profiles.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.