Deepfake Body Scams & Sextortion: Protecting Your Privacy and Agency
Table of Contents
What Are Deepfake Body Scams?
Deepfakes use AI to swap faces or bodies in images and videos to create convincing but fake content.
Scammers may threaten to share the manipulated material unless you pay, share more content, or comply with demands.
Refer to overviewGraphic for a high‑level summary.
Common Scam Variants
- • Non‑consensual AI nudity: your face pasted onto explicit bodies.
- • Voice deepfakes: mimicking your voice to create fake recordings.
- • Threat videos: edited clips taken out of context to imply wrongdoing.
Warning Signs & Red Flags
Unsolicited explicit media claiming to feature you.
High‑pressure tactics: immediate payment demands or blackmail.
Strange links or attachments that request personal information.
Preventive Digital Hygiene
- • Enable two‑factor authentication on all accounts.
- • Review and minimize app permissions for camera and microphone.
- • Use privacy filters and watermark your images to deter misuse.
Secure Sharing Practices
Limit sharing private content to trusted circles and use ephemeral messaging apps.
Avoid sending images without understanding how they can be stored or forwarded.
Refer to safePracticesGraphic for tailored advice.
How to Report & Seek Legal Recourse
Document all threats and preserve evidence: screenshots, messages, timestamps.
Report to platform support (social media, messaging app) under harassment policies.
File a complaint with your local cyber‑crime unit or police, and seek legal aid.
Managing Emotional Impact
- • Acknowledge the violation of trust and allow yourself to feel anger or fear.
- • Practice grounding exercises and breathing to stay present.
- • Reach out to counselors or peer support groups.
Connecting with Support Communities
Join online forums and NGOs specializing in digital rights and abuse prevention.
Share experiences anonymously to learn coping strategies and best practices.
Refer to resourcesDirectoryGraphic for a curated list of support networks.
Next Steps
- • Enable two‑factor authentication on all your devices today.
- • Document any incidents or threats using your phone’s secure notes.
- • Report any abuse to platform and cyber‑crime units following reportingWorkflowGraphic.
- • Reach out to one trusted friend or counselor and share safePracticesGraphic.