What Are Deepfake Body Scams?

Deepfakes use AI to swap faces or bodies in images and videos to create convincing but fake content.

Scammers may threaten to share the manipulated material unless you pay, share more content, or comply with demands.

Refer to overviewGraphic for a high‑level summary.

Infographic overview of deepfake body scams and sextortion schemes.
Infographic overview of deepfake body scams and sextortion schemes.

Common Scam Variants

  • Non‑consensual AI nudity: your face pasted onto explicit bodies.
  • Voice deepfakes: mimicking your voice to create fake recordings.
  • Threat videos: edited clips taken out of context to imply wrongdoing.
Diagram illustrating common scam types: non‑consensual AI nudity, manipulated videos, extortion messages.
Diagram illustrating common scam types: non‑consensual AI nudity, manipulated videos, extortion messages.

Warning Signs & Red Flags

Unsolicited explicit media claiming to feature you.

High‑pressure tactics: immediate payment demands or blackmail.

Strange links or attachments that request personal information.

Checklist of red flags: unsolicited content, pressure to share private material, threats to publish.
Checklist of red flags: unsolicited content, pressure to share private material, threats to publish.

Preventive Digital Hygiene

  • Enable two‑factor authentication on all accounts.
  • Review and minimize app permissions for camera and microphone.
  • Use privacy filters and watermark your images to deter misuse.
Infographic of technical safety measures: two‑factor authentication, app permissions, privacy updates.
Infographic of technical safety measures: two‑factor authentication, app permissions, privacy updates.
Toolkit of safe sharing practices: watermarking, privacy filters, and limited‑audience controls.
Toolkit of safe sharing practices: watermarking, privacy filters, and limited‑audience controls.

Secure Sharing Practices

Limit sharing private content to trusted circles and use ephemeral messaging apps.

Avoid sending images without understanding how they can be stored or forwarded.

Refer to safePracticesGraphic for tailored advice.

Toolkit of safe sharing practices: watermarking, privacy filters, and limited‑audience controls.
Toolkit of safe sharing practices: watermarking, privacy filters, and limited‑audience controls.

How to Report & Seek Legal Recourse

Document all threats and preserve evidence: screenshots, messages, timestamps.

Report to platform support (social media, messaging app) under harassment policies.

File a complaint with your local cyber‑crime unit or police, and seek legal aid.

Flowchart outlining how to report deepfake abuse to platforms and authorities.
Flowchart outlining how to report deepfake abuse to platforms and authorities.
Directory graphic of legal aid services, cybercrime units, and online complaint portals.
Directory graphic of legal aid services, cybercrime units, and online complaint portals.

Managing Emotional Impact

  • Acknowledge the violation of trust and allow yourself to feel anger or fear.
  • Practice grounding exercises and breathing to stay present.
  • Reach out to counselors or peer support groups.
Diagram of coping strategies: peer support, counseling hotlines, self‑care rituals.
Diagram of coping strategies: peer support, counseling hotlines, self‑care rituals.

Connecting with Support Communities

Join online forums and NGOs specializing in digital rights and abuse prevention.

Share experiences anonymously to learn coping strategies and best practices.

Refer to resourcesDirectoryGraphic for a curated list of support networks.

Map of NGOs, online communities, and helplines specializing in digital abuse.
Map of NGOs, online communities, and helplines specializing in digital abuse.

Next Steps

  • Enable two‑factor authentication on all your devices today.
  • Document any incidents or threats using your phone’s secure notes.
  • Report any abuse to platform and cyber‑crime units following reportingWorkflowGraphic.
  • Reach out to one trusted friend or counselor and share safePracticesGraphic.
Checklist of immediate actions: secure accounts, document evidence, reach out for help.
Checklist of immediate actions: secure accounts, document evidence, reach out for help.