The Douglas County Sheriff's Internet Crimes Against Children unit served a search warrant at Andersen's home in Larkspur on Thursday. Andersen was not arrested.
His attorney, Colin Bresee, released a statement to 9NEWS on Friday:
"A female fan in 2010 mailed Mr. Andersen multiple letters and included several photos in which she was scantily clad. Chris and this woman communicated with each other and in 2011, this woman, who represented herself as 21 years of age, flew to Colorado, showing her required identification. After leaving Colorado, she became upset at his lack of interest. In 2012, she threatened to retaliate if he did not provide financial remuneration."
On Thursday, investigators say they searched Andersen's home in connection with a tip they got from California in February.
According to the statement, someone purporting to be the woman's mother wrote in an email that "'i (sic) want him to pay for everything on her Amazon wish list, 5K for her bedding stuff and her victoria secret wish list."
"Professional athletes are routinely targeted by these types of individuals," the statement said. "The media has been speculating that he's a suspect and not a victim in a criminal investigation. Mr. Andersen has been fully cooperative with the authorities. The investigation is expected to take three weeks. We're confident it will show that Chris did not engage in any criminal conduct."
The Nuggets "indefinitely excused" Andersen from the team on Thursday and he did not play in Thursday night's playoff victory against the Los Angeles Lakers at the Pepsi Center.
The Douglas County Sheriff's Office says the investigation into Andrsen could take weeks.
Sheriff's spokesman Ron Hanavan on Friday declined to release details about what items were seized at Andersen's home.
Items generally collected during such investigations include computers, hard drives and thumb drives. They're sent to the multi-agency Rocky Mountain Regional Computer Forensics Laboratory in suburban Denver.
The lab has a backlog of computers awaiting analysis by investigators who retrieve information, find out where additional information may be stored on other servers, as well as determine who used the computer.
(KUSA-TV © 2012 Multimedia Holdings Corporation with The Associated Press)