Webcams in peoples bedrooms and people caught having sex
As defined in the Mijangos court documents, sextortion is “a form of extortion and/or blackmail” wherein “the item or service requested/demanded is the performance of a sexual act.” The crime takes a number of different forms, and it gets prosecuted under a number of different statutes.Sometimes it involves hacking people’s computers to acquire images then used to extort more.The malware Mijangos wrote was sophisticated, and he told federal authorities that he designed it specifically to be undetectable to antivirus programs.He then, according to court documents, “used [those] intimate images or videos of female victims he stole or captured to ‘sextort’ those victims, threatening to post those images or videos on the Internet unless the victims provided more.” Mijangos’s threats were not idle.We searched dockets and news stories for criminal cases in which one person used a computer network to extort another into producing pornography or engaging in sexual activity.We found nearly 80 such cases involving, by conservative estimates, more than 3,000 victims. Prosecutors colloquially call this sort of crime “sextortion.” And while not all cases are as sophisticated as this one, a great many sextortion cases have taken place―in federal courts, in state courts, and internationally―over a relatively short span of time.This is the new playground.” But while the FBI has issued numerous warnings about sextortion, the government publishes no data on the subject.
And if they did, he would then threaten them further, notifying them that he knew they had told someone.For the first time in the history of the world, the global connectivity of the Internet means that you don’t have to be in the same country as someone to sexually menace that person.The problem of this new sex crime of the digital age, fueled by ubiquitous Internet connections and webcams, is almost entirely unstudied. Brock Nicholson, head of Homeland Security Investigations in Atlanta, Georgia, recently said of online sextoriton, “Predators used to stalk playgrounds.When the victim opened the email, she found sexually explicit photos of herself attached and information that detailed where she worked.Following that were details of her personal life: her husband and her three kids. The demand made this hack different: This computer intrusion was not about money.
More often, it involves manipulation and trickery on social media.