From some of the criminal cases we're investigating, evil people use trust and credibility to put a victim into a more vulnerable situation.
Coerce
This includes using tactics like:
» Initially offering something of value such as money or drugs in exchange for a sexual image
» Pretending to work for a modeling agency
» Developing a false rapport with the child
» Secretly recording explicit videos/ messages during chats
» Threatening to physically assault the child or his/her family
» Using multiple identities to contact the child
» Pretending to be younger and/or a member of the opposite sex » Hacking accounts to steal sexual images, or
» Threatening to commit suicide if no images are sent
Tactics
It is common for offenders to make initial contact with a victim on one platform, then ask them to move to a second or third platform, usually those with encrypted messaging systems in order to make tracking their crime more difficult.
Here's what personally identifiable information is -
Information like this can EASILY be taken advantage of by any kind of online predator to bring real danger into your real life.
What is PII? Examples, laws, and standards | CSO Online
Please be mindful of these things - and thank you for actually taking responsibility