Abuser says that he/she has access to my personal information, has video of me pleasing myself, and will send it to my contacts, etc. Below are extract from e-mail.
–ó–¥—Ä–∞–≤—Å—Ç–≤—É–π—Ç–µ! –ö–∞–∫ –≤—ã –º–æ–≥–ª–∏ –∑–∞–º–µ—Ç–∏—Ç—å, —è –æ—Ç–ø—Ä–∞–≤–∏–ª –≤–∞–º —ç—Ç–æ —ç–ª–µ–∫—Ç—Ä–æ–Ω–Ω–æ–µ –ø–∏—Å—å–º–æ –∏–∑ –≤–∞—à–µ–≥–æ –ø–æ—á—Ç–æ–≤–æ–≥–æ –∞–∫–∫–∞—É–Ω—Ç–∞. –≠—Ç–æ –æ–∑–Ω–∞—á–∞–µ—Ç, —á—Ç–æ —É –º–µ–Ω—è –µ—Å—Ç—å –ø–æ–ª–Ω—ã–π –¥–æ—Å—Ç—É–ø –∫ –≤–∞—à–µ–º—É —É—Å—Ç—Ä–æ–π—Å—Ç–≤—É. –Ø –Ω–∞–±–ª—é–¥–∞—é –∑–∞ –≤–∞–º–∏ —É–∂–µ –Ω–µ—Å–∫–æ–ª—å–∫–æ –º–µ—Å—è—Ü–µ–≤. –î–µ–ª–æ –≤ —Ç–æ–º, —á—Ç–æ –≤—ã –±—ã–ª–∏ –∑–∞—Ä–∞–∂–µ–Ω—ã –≤—Ä–µ–¥–æ–Ω–æ—Å–Ω—ã–º –ü–û —á–µ—Ä–µ–∑ —Å–∞–π—Ç –¥–ª—è –≤–∑—Ä–æ—Å–ª—ã—Ö, –∫–æ—Ç–æ—Ä—ã–π –≤—ã –ø–æ—Å–µ—Ç–∏–ª–∏. –ï—Å–ª–∏ –≤—ã –Ω–µ –∑–Ω–∞–∫–æ–º—ã —Å —ç—Ç–∏–º, —è –æ–±—ä—è—Å–Ω—é. –¢—Ä–æ—è–Ω—Å–∫–∏–π –≤–∏—Ä—É—Å –¥–∞–µ—Ç –º–Ω–µ –ø–æ–ª–Ω—ã–π –¥–æ—Å—Ç—É–ø –∏ –∫–æ–Ω—Ç—Ä–æ–ª—å –Ω–∞–¥ –∫–æ–º–ø—å—é—Ç–µ—Ä–æ–º –∏–ª–∏ –ª—é–±—ã–º –¥—Ä—É–≥–∏–º —É—Å—Ç—Ä–æ–π—Å—Ç–≤–æ–º. –≠—Ç–æ –æ–∑–Ω–∞—á–∞–µ—Ç, —á—Ç–æ —è –º–æ–≥—É –≤–∏–¥–µ—Ç—å –≤—Å–µ –Ω–∞ –≤–∞—à–µ–º —ç–∫—Ä–∞–Ω–µ, –≤–∫–ª—é—á–∏—Ç—å –∫–∞–º–µ—Ä—É –∏ –º–∏–∫—Ä–æ—Ñ–æ–Ω, –Ω–æ –≤—ã –Ω–µ –∑–Ω–∞–µ—Ç–µ –æ–± —ç—Ç–æ–º. –£ –º–µ–Ω—è —Ç–∞–∫–∂–µ –µ—Å—Ç—å –¥–æ—Å—Ç—É–ø –∫–æ –≤—Å–µ–º –≤–∞—à–∏–º –∫–æ–Ω—Ç–∞–∫—Ç–∞–º, –¥–∞–Ω–Ω—ã–º –ø–æ —Å–æ—Ü–∏–∞–ª—å–Ω—ã–º —Å–µ—Ç—è–º –∏ –≤—Å–µ–π –≤–∞—à–µ–π –ø–µ—Ä–µ–ø–∏—Å–∫–µ.