Connect with us

Hi, what are you looking for?

HEADLINES

Protecting yourself from the latest internet sex crime

In many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.

Photo by Victoria Heath from Unsplash.com

Researchers from Michigan State University released a study on “sextortion” – a lesser-known internet crime that poses a threat to adults and minors – that sheds light on the importance of protecting the public from online criminals.

“Sextortion is the use of intimate images or videos that have been captured to then extort compliance from a victim,” said Roberta Liggett O’Malley, MSU criminal justice doctoral student and co-author of the study. “What makes it different from any other crime is the threat to release. A perpetrator could say, ‘I have these images of you and will publish them unless you…’ to get more images or even in exchange for money.”

In many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.

The research — published in Journal of Interpersonal Violence — suggests the current focus on dissemination of images online may overshadow the issue of threat-based harassment online, like sextortion. While most U.S. states have laws against revenge porn, the study makes a case for increasing awareness and changing legislation to include other forms of internet-based sexual abuse crimes.

Advertisement. Scroll to continue reading.

“Much of the fear comes from the belief that hackers can do anything involving technology, from the ability to see someone’s web browser history to hacking into a webcam or Nest device,” said Karen Holt, assistant professor of criminal justice and co-author. “That’s why sextortion is so effective — it creates a huge amount of uncertainty and fear that victims end up complying versus saying, ‘I think you’re bluffing, and if I ignore you, then I’m fine.’”

Liggett O’Malley and Holt said men are less likely to report these crimes to police out of embarrassment or shame, but also don’t experience the longevity of harassment experienced by minors.

“The victims are overwhelmingly minors and females, but if the objective is to get money, they’re almost always targeting men,” Liggett O’Malley said. “These two groups of people experience a similar crime in very different ways.”

Analysis of 152 cyber sextortion offenders uncovered four distinct types: minor-focused, targeting victims under 18 years of age; cybercrime, targeting victims using computer-based tactics like hacking; intimately violent, targeting former or current romantic partners; and transnational, targeting strangers strictly for financial reasons.

Holt explained that the four themes reflect different motivations for what offenders want from their victims. A survey of 1,631 cyber sextortion victims found 46% were minors, making crimes against minors a focus for law enforcement and in research literature.

Advertisement. Scroll to continue reading.

“The disproportionate focus on minor victims has led to new laws that protect minors from adult sexual solicitation online, but there are few legal protections for adult male and female victims,” Liggett O’Malley said.

Researchers are starting to see sextortion being used by a lot of other perpetrators. Within a domestic violence context, partners may share images consensually, only to have those images later used as leverage in the relationship. In other instances, transnational organizations employ scams in which individuals pretend to be a man or women on the internet, engaging in webcam sessions with victims and immediately threatening to release a recording unless money is provided.

Awareness and reporting of sextortion crimes, while acting responsibly online, are key in protecting adults and children.

There are also non-criminal online sexual activities worth considering, such as how to have phone sex easily; your partner would love.  

In the end, said Hold, “as digital citizens, we have to start advocating for more accountability on behalf of platforms to take these images down, or to report harassment. “A lot of offline crimes have an online component, and oftentimes law enforcement and our behavior don’t catch up. We need to think about our own personal safety, both offline and online.”

Researchers like Liggett O’Malley and Holt also advocate for federal laws to address the legal loopholes of sextortion.

Advertisement. Scroll to continue reading.

“We can’t only be focused on revenge porn,” Liggett O’Malley said. “We need to stop and think about all the ways in which images are used against people and to think about the way we construct these laws to ensure there are pathways for prosecution and arrest.”

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

HEADLINES

As part of RCBC’s 2024 Cybersecurity literacy program, the webinar aims to help Filipinos level up their online banking safety by providing them with...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

White Papers

Exploiting this vulnerability, cybercriminals craft deceptively authentic phishing emails that align with current trends, exploiting human emotions to invoke urgency and trick recipients into...

Advertisement