The following article is one of the most difficult I’ve ever written. Beyond being exposed to a document that provides a blueprint for abusing others, I wrestled with the fear that publishing it could unintentionally amplify the harm. Ultimately, I felt a responsibility to bring it to light so that professionals, investigators, and platform moderators can better detect, track, and dismantle this form of organized abuse. The urgency of raising awareness outweighed the potential risks.
A 238-page sextortion manual has recently resurfaced on several Telegram channels affiliated with the extremist network known as 764. The guide was shared on Telegram groups associated with 764, where it has been reposted repeatedly. Although finalized and released in 2024, it continues to circulate actively. Unlike other guides distributed within 764 circles—which are often shorter or more ideological in nature—this manual is notably long and obsessively detail-oriented, offering a deeply troubling, methodical approach to instructing readers on how to exploit teenage victims online.
The guide primarily focuses on extortion through Snapchat, and its targeting strategy is particularly disturbing. It begins by defining sextortion and disturbingly frames it as a natural aspect of human behavior, driven by a desire for domination. In one section, the author even draws comparisons to historical slave societies to justify the abuse.
The author encourages readers to go after teenagers from the moment they begin using social media, claiming that younger victims are easier to manipulate and control. While it emphasizes victims aged 13 to 18, the manual explicitly recommends targeting children under 13 for their vulnerability and lack of digital literacy. In terms of geography, the guide advises focusing on users in the United Kingdom, United States, and Canada—regions where perpetrators have reportedly had prior success eliciting sexual images and money.
Although the tone often comes across as robotic or even AI-generated, it’s the guide’s chilling detachment and level of detail that stand out. The document is largely technical in nature, offering step-by-step instructions for executing sextortion schemes. Many sections are dedicated to identifying the ideal types of phones and apps to use in order to evade law enforcement detection. It also provides detailed message templates to send to potential victims and explains how to create and operate fake social media avatars—often portraying attractive males—to lure victims into sharing explicit content.
The guide is not just a how-to—it also functions as a business. The author promotes paid courses where users can learn and practice these techniques under their guidance. They offer pre-made avatars for sale and grant access to a website where the sexual content obtained through these manipulative tactics is advertised and sold.
The motivation behind the guide appears to be both ideological and financial. Abuse is framed not only as a means of personal enrichment, but also as a form of control, reinforcing patterns of dehumanization common in the 764 community. Within these circles, exploitation is not merely tolerated—it is encouraged, commodified, and celebrated.

