top of page
cyber-g2274b526f_1920.jpg
cyber-g2274b526f_1920.jpg

Linkedin Blackmail

   A special form of threat crime is blackmail crime. Threats to certain values are considered as blackmail.

​ ​

   Social media tools or communication tools are used in the commission of many crimes. In particular, it is stated that your videos and images with sexual content obtained from chats over sharing and messaging platforms such as LinkedIn will be shared, and blackmail is committed in order to gain financial gain. Linkedin blackmail and threats have become a very common situation today.

Linkedin Blackmail
prevent them from learning about you

  1. Here's how other users see your frozen account:

  2. Profile Visibility: No one can see your profile, including your links, as long as it is frozen.

  3. Recommendations and Endorsements: Recommendations and endorsements you give to other users remain valid, but they are defined as "A LinkedIn member" until your account is reactivated.

  4. Messages: Your messages will remain intact, but other users will see you as "A LinkedIn member".

  5. Searches: When your account is frozen, your LinkedIn profile will not be displayed for searches made on the platform. This includes searches on other LinkedIn products such as Recruiter.

  6. Posts and comments: Your posts and comments will remain intact, but other users will see you as "A LinkedIn member". Your profile photo will be replaced with the default icon.

  7. Freezing the account

  8. You can click here or follow these steps to freeze your account:

  9. Click the  Me icon at the top of the LinkedIn homepage and select Settings & Privacy.

  10. Select Settings & Privacy from the drop-down menu.

  11. Select Account preferences.

  12. Select Account management.

  13. Next to Freeze account, click Change.

  14. Select the option that explains why you deactivated your account.

  15. Enter your password and click Freeze account to complete the freezing process.

security-gdf39b15c6_1920.jpg
Linkedin Blackmail Stages:

LinkedIn is one of the applications used by blackmail gangs.

The Linkedin app makes it easy to both get your image of the blackmail gang and access your friends list. By adding them from different LinkedIn accounts, they will allow you to see any message they want and they will try to catch your sensitive point. You should not show this person that you are afraid, and you should never say that you will send money.

Contacting the blackmailer on LinkedIn

   You should communicate as little as possible. You should never give hope by saying that you will send money to save time. You should close your social media accounts and any platform where they can collect information about you from outsiders or freeze your account.

   Under no circumstances should you send money. Remember that no matter how much money you send, it will always ask for money again, and when you don't, you will be back to where you started.

LinkedIn says it started sharing your images

   It is the last sentence of the person who blackmailed you through the LinkedIn application before starting the sharing. After this stage, he will start using the blackmail materials he has. He knows that he can get money from most victims to delete it after doing this. To prevent the spread of your videos, you should cut off your communication and get support from experts quickly.

What to do when blackmailed on LinkedIn?

hacking-ga98a409cb_1920.jpg

1

Strategy

The blackmail victim should cut off communication with the blackmailer and should not communicate no matter what the blackmailer does. Remember that you are not likely to find a middle ground with the blackmailer. The longer you stay in touch with you, the more he will grasp you and continue to abuse you.

2

Analiz & Değerlendirme

The analysis of the blackmailer or gang is the first step. Similarities with thousands of blackmail files are detected. The way the blackmailer will follow is determined and the data is evaluated. The road map to be followed is determined.

3

Technical support

After all data and evaluations are entered into the system, the stage of detection and blocking of shared and shared videos/images begins.

bottom of page