Source-backed response routes

Current escalation routes for impersonation, scams, and image abuse

This directory turns changing platform policies and public reporting paths into one maintained reference layer. The same registry now feeds TraxinteL case operations, evidence-pack exports, and this public resource page.

Verified on

2026-04-05

Active routes

7

Platforms covered

7

This page is operational guidance, not legal advice. Preserve the strongest evidence before filing, keep copies of every confirmation number you receive, and expect each service to apply its own eligibility rules.

Incident type

Impersonation

InstagramLast verified 2026-04-05

Instagram impersonation report

Use Instagram's impersonation route when an account is pretending to be you or someone you represent.

Use when

Best for the impersonated person or an authorized representative with access to the copied profile details.

Follow-up path

Record the submitted profile URL and check for a response or account status change within 48 to 72 hours.

Evidence to collect first

  • Impersonating account URL or username
  • Screenshots of the copied profile or posts
  • Government ID or representative authorization when requested by the form

Source: Instagram Help Center. Policies and forms can change, so verify the route again before submitting a live case.

FacebookLast verified 2026-04-05

Facebook profile or page impersonation report

Use Facebook's impersonation workflow when a profile or page is pretending to be you, someone you know, or a public figure.

Use when

Useful even if the affected person does not have a Facebook account, as long as the impersonating profile or page can be linked.

Follow-up path

Track the report date, then document whether the account, page, or Messenger thread changes after the first report.

Evidence to collect first

  • Profile or page URL for the impersonating account
  • Screenshots showing copied name, photo, or brand elements
  • Optional account-access or identity proof if Facebook requests it

Source: Facebook Help Center. Policies and forms can change, so verify the route again before submitting a live case.

XLast verified 2026-04-05

X misleading identity or impersonation report

Use X's impersonation route when an account poses as a person, group, or organization in a confusing or deceptive way.

Use when

Can be filed by the affected person, an authorized representative, or a bystander flagging identity misuse.

Follow-up path

Capture the reported handle, note whether you filed as the affected party or a bystander, and check for suspension or profile edits.

Evidence to collect first

  • Account handle or profile URL
  • Screenshots of the deceptive profile or posts
  • Proof that you are the person or brand being represented when filing directly

Source: X Help Center. Policies and forms can change, so verify the route again before submitting a live case.

TikTokLast verified 2026-04-05

TikTok impersonation report

Use TikTok's impersonation route when an account is pretending to be you, a celebrity, or another identifiable person.

Use when

Works for self-reporting and some representative or celebrity-reporting flows, with different form paths by region.

Follow-up path

Log whether you submitted from the app, browser, or web form and set a follow-up reminder if the account remains live.

Evidence to collect first

  • TikTok profile URL or username
  • Screenshots of copied identity elements
  • Valid identification if the online form asks you to verify the impersonated person

Source: TikTok Help Center. Policies and forms can change, so verify the route again before submitting a live case.

Incident type

Romance scam verification

FTC / ReportFraudLast verified 2026-04-05

FTC romance scam reporting handoff

Use the FTC handoff when a romance scam has moved into money, gift cards, cryptocurrency, or other fraud indicators.

Use when

Best for U.S.-connected losses, attempted fraud, or evidence packages being escalated to payment providers and family reviewers.

Follow-up path

Report to the app or site where contact started, then keep the FTC confirmation details with any bank or payment-dispute records.

Evidence to collect first

  • Screenshots of chats, dating profiles, or social messages
  • Payment receipts, transaction IDs, or crypto wallet details if money was sent
  • Known usernames, phone numbers, email addresses, and platform links

Source: FTC Consumer Advice. Policies and forms can change, so verify the route again before submitting a live case.

Incident type

Deepfake or leaked image

StopNCIILast verified 2026-04-05

StopNCII hash-based removal workflow

Use StopNCII when an adult victim still has the intimate image or video on their device and needs hash-based removal across participating platforms.

Use when

Intended for adult victims who were at least 18 when the image or video was created and who still possess the file locally.

Follow-up path

Store the case number and PIN, monitor participating-platform matches, and pair the route with separate reporting for sites outside the network.

Evidence to collect first

  • The original image or video still available on the victim's device
  • Basic case details to create the submission and retain the case number and PIN
  • Screenshots or URLs showing where the content appeared, when available

Source: StopNCII FAQ. Policies and forms can change, so verify the route again before submitting a live case.

NCMEC Take It DownLast verified 2026-04-05

Take It Down for youth sexual-image abuse

Use Take It Down when the person depicted was under 18 when the explicit image or video was created or shared.

Use when

Available worldwide for cases involving explicit content created when the depicted person was under 18, even if they are over 18 now.

Follow-up path

Retain any case details from the service, then document separate outreach for platforms or law-enforcement contacts outside the participating network.

Evidence to collect first

  • The original image or video available on the device so a hash can be created
  • Confirmation that the depicted person was under 18 when the content was made
  • Any platform URLs, screenshots, or usernames tied to the spread of the content

Source: Take It Down FAQ. Policies and forms can change, so verify the route again before submitting a live case.

Need case continuity

Preserve the evidence first, then route the case

If the evidence is still moving, start with capture or triage before filing anything externally. That keeps the timestamps, screenshots, and next-step logic tied to one case.