security
BeforeDisaster.org
OSINT Assessment Tool Secure Connection

Red Flag Assessment

Identify your risk level with our free 5-step analysis designed by intelligence professionals.

Question 2 of 5
contact_mail

Communication Patterns

Scammers often use specific contact methods to bypass security filters and build false intimacy quickly. The initial point of contact is a critical data point in threat assessment.

info

Tip: Legitimate organizations rarely initiate contact via encrypted apps like Telegram or WhatsApp for official business.

How did the individual first contact you?

Select the option that best matches your situation.

lock 256-bit Encrypted Session
visibility_off 100% Anonymous & Confidential
verified_user Verified by Cyber-Sec Experts