Social media influencers, crypto traders, and gurus need to reconsider the information they share online.
Introduction—From Intelligence Lessons to the Digital Age
My grandfather, a high-ranking intelligence boss in communist Yugoslavia, drilled one rule into me from childhood: “Mario, sell less and buy more.” He wasn’t talking about money—he meant talking less and listening more.
That single phrase became my compass. And it saved my life more times than I can count while serving in the government sector.
Later, as I worked in diplomatic intelligence and military security intelligence service, the lesson became even more profound: the less you reveal, the safer you stay. In the realm of intelligence, information holds more significance than mere knowledge—it carries the potential to save lives.
One careless word, one slip of a location, or one misjudged detail could unravel an operation, destroy trust, and cost lives.
But today, you don’t need to be a spy to collect that kind of intelligence.
All you need is Instagram.
They don’t have to follow you in the shadows anymore—you lead them right to your front door.
Every luxury car you post, every tagged vacation, and every champagne toast is not “content.” It’s a breadcrumb.
Criminals no longer need wiretaps or surveillance vans. They have your reels, your stories, and your grid. Intelligence gathering has been crowdsourced.
What once took weeks of surveillance with teams of operatives now takes minutes on a smartphone with a Wi-Fi connection.
You think you’re gaining influence. However, you might be inadvertently sharing sensitive information.
Is that picture of the beach a snapshot? A timestamp.
Is the mansion in the background? The mansion in the background is a GPS coordinate.
Is that selfie featuring a Rolex watch and champagne?
That image serves as a digital version of a wanted poster.
And while you’re chasing likes, followers, and validation, someone else may already be planning a kidnapping.
In the digital age, countless individuals are willingly broadcasting their lives, providing criminals with data previously protected in military vaults.
Social media influencers, crypto traders, entrepreneurs, and even business coaches and consultants showcase not only their success but also their locations, routines, and wealth in real time. They trade discretion for validation.
But here’s the truth: every post is a potential piece of intelligence for criminals. Flaunting wealth online is not harmless—it places not just the influencer but also their families, staff, and even their clients in grave danger.
The Ancient Pattern—From Aristocrats to Influencers
History teaches us that flaunting wealth has always attracted predators. In 18th- and 19th-century Europe, aristocrats travelling with visible jewellery or carriages were prime targets for highwaymen.
In Latin America during the 1980s, wealthy business families became victims of express kidnappings—fast abductions designed to empty bank accounts in hours.
What has changed is scale and speed. Before, criminals needed spies, informants, or days of surveillance. Now, with social media, targets voluntarily provide this intelligence themselves, reaching millions within seconds.
The “digital aristocracy”—influencers, crypto millionaires, business coaches, self-proclaimed gurus, and media consultants—are simply the latest iteration of a timeless pattern: visible wealth creates opportunity for crime.
Their responsibility is twofold.
First, to protect themselves.
Second, to protect the confidentiality of their clients. Yet many in this sphere treat their client list as marketing collateral, publicly dropping names to prove their credibility.
Such practice not only jeopardizes trust but also exposes clients to unnecessary risk.
What should be safeguarded as sensitive data is instead broadcast to the world—providing criminals with yet another layer of exploitable intelligence.
The Growing Threat: Kidnapping and Ransom in the Digital Age
The 2022 Global Kidnap & Ransom Report by Control Risks confirms a stark reality: criminals increasingly rely on social media intelligence to identify and monitor targets (Control Risks, 2022).
Consider these real-world cases:
Chloe Ayling (2018)—the British model kidnapped in Milan, her online profiles giving criminals clues to her movements [Wikipedia†].
Kerim Satir (2020)—a Turkish crypto influencer robbed and held for ransom after flaunting luxury cars and cash online (The Guardian, 2020).
In 2025, police are investigating a series of abductions that target cryptocurrency millionaires, as attackers are explicitly exploiting the victims’ digital visibility (The Guardian, 2025).
The trend is clear: social media has blurred the line between public persona and personal security.
Crypto Traders: A New Class of Target
Cryptocurrency has introduced a new, highly attractive target group. Unlike traditional banking, stolen crypto cannot be frozen or traced back easily. All it takes is a password.
In Hong Kong, another trader suffered a similar fate, with criminals forcing him at knifepoint to drain his digital assets (South China Morning Post, 2020).
The lengths to which some go to protect themselves illustrate the danger. One crypto family hid fragment of their digital wallet codes on four continents to deter kidnapping attempts (Gizmodo, 2025).
The message is clear: in crypto, unlike fiat banking, visibility equals vulnerability.
Criminal Modus Operandi—How Abductions Are Engineered
As an investigator, I am aware that criminals seldom act impulsively. The process of targeting an influencer or trader usually follows a calculated pattern:
Target Identification—Criminals use platforms like Instagram, TikTok, and X to spot individuals flaunting wealth. Algorithms themselves amplify such content, making discovery effortless.
Digital Profiling—Using OSINT tools, criminals harvest geotags, photos, family details, and daily routines. Each post serves as a crucial component in the puzzle.
Surveillance & Approach—Once enough intelligence is gathered, criminals shadow movements, waiting for moments of vulnerability—airport arrivals, hotel stays, or solo travel.
Abduction or Extortion—Victims may be abducted physically or targeted through “virtual kidnaps,” where criminals threaten family members using believable details (ICSR, 2019).
Exploitation: ransom is demanded in cash or cryptocurrency. Unlike traditional crime, crypto ransoms are instant and irreversible, making recovery nearly impossible.
This modus operandi is efficient, low-cost, and devastatingly effective—because the victims unknowingly supply the raw intelligence themselves.
The Psychological Toll on Victims and Their Families
Kidnapping is not just a financial crime—it is a psychological battlefield. Survivors often describe feeling betrayed by their own visibility.
Victims like Chloe Ayling have spoken of lasting trauma, fear of travel, and inability to trust strangers. Families of abducted crypto traders describe sleepless nights, fearing that every phone call could be a ransom demand.
Even when “virtual kidnaps” occur—with no physical abduction—the panic and anxiety inflicted on families can be severe enough to trigger immediate financial losses.
For criminals, fear is the weapon. For victims, the scars are lasting.
The Psychology of Oversharing – Why We Still Do It
Why do people keep exposing themselves despite such risks? The answer lies in the economics of visibility.
Validation Addiction—likes, shares, and comments create dopamine rewards.
Influencer Economy—Sponsorships reward extravagance; the more luxury displayed, the more followers gained.
False Security—many thinks, “It won’t happen to me,” until it does.
But influencers, gurus, and consultants fail to understand that algorithms do not distinguish between admirers and predators.
To criminals, every flexed luxury watch, client name-drop, or screenshot of crypto gains is an invitation.
Here are five things that influencers and traders must stop sharing
To reduce risk, here are five non-negotiable rules:
Stop Sharing Real-Time Locations – Never geotag posts while present. Share only after leaving (Forbes, 2019).
Stop Flaunting Wealth—Cash, jewellery, and luxury cars all act as “wanted posters” for criminals.
Stop Revealing Family and Client Details—Schools, relatives, or client names are ammunition for extortion and exploitation.
Stop Exposing Wallets and Balances—Screenshots of earnings are breadcrumbs for cyber and physical crime.
Please refrain from announcing travel plans, as posting itineraries can inadvertently share your schedule with others.
Best Practices—Staying Visible, Staying Safe
Influencers, traders, and consultants can remain visible without being vulnerable. Best practices include:
Restrict audience visibility with strong privacy settings.
Use two-factor authentication across all accounts.
Regularly audit and delete sensitive old posts.
Limit travel-related posting until after returning.
Educate family, staff, and clients not to reveal sensitive details online.
Work with security consultants if your profile is high-risk.
Establish crisis protocols—emergency contacts, safe words, and escape plans.
These measures are not paranoia—they are necessary resilience.
A Dramatic Wake-Up Call
Social media thrives on visibility, but predators thrive on the same.
Every post is a data point; every boast is a breadcrumb, leading a criminal to your door.
As I learned in investigations and human intelligence work, silence is strength. Today, silence online can mean survival.
For influencers, crypto traders, business coaches, and consultants: your silence is no longer about vanity. It is about responsibility.
This responsibility extends to your life, your family, and those who entrust you with their data and safety.
The price of ignoring this truth is not measured in lost followers, but in ransom paid, lives endangered, and futures destroyed.
The final question remains: will you continue to trade your safety for attention, or will you finally learn the lesson intelligence operatives have known for decades—less is more, and silence saves lives?