Sextortion: A New Wave of Extortion

Sextortion
🕒 4 min read.

Sextortion is a form of exploitation where an individual coerces another person into providing sexual images, videos, or performing sexual acts through the threat of revealing compromising material or personal information. This can involve blackmail, threats of humiliation, or extortion tactics aimed at obtaining sexual content from the victim. Sextortion often occurs online, where perpetrators may use social media, messaging apps, or email to target and manipulate their victims. The psychological impact of sextortion can be severe, causing emotional distress, trauma, and in some cases, leading to further exploitation or victimization. It is considered a serious form of cybercrime and is punishable by law in many jurisdictions.

A typical example of sextortion involves an individual threatening to distribute intimate or sexually explicit images or videos of another person unless they comply with certain demands. For instance, a perpetrator might demand money, further compromising material, or other favors from the victim in exchange for not sharing the sensitive content with others or posting it online. This form of coercion often exploits victims’ fear of public humiliation, social stigma, or professional repercussions associated with the release of such private material.

Global sextortion instances reported to the US National Center for Missing & Exploited Children (NCMEC) increased to 26,718 in 2023 from 10,731 in 2022—a more than twofold increase. The report states that teenage boys have been the most frequently targeted victims in these recent incidents. As a result, The National Crime Agency issued an alert to hundreds of thousands of education professionals. Additionally, they gave parents and caregivers the following guidance in the event that their child reports becoming the target of an internet scam, intimidation, or blackmail attempt:

  • Don’t pay, do stop contact and block: you may be tempted to pay, but there is no guarantee that this will stop the threats. As the offender’s motive is to get money, once you have shown you can pay, they will likely ask for more and blackmail may continue. If you have paid, don’t panic but don’t pay anything more. Help your child to stop all communication with the offender and block them on any accounts that they have been contacted on.
  • Avoid deleting anything: try not to delete anything that could be used as evidence such as messages, images, telephone numbers, and bank account details.
  • Report to the police or CEOP: call 101 or 999 if there is an immediate risk of harm to your child. Or you can use the CEOP Safety Centre to report any online blackmail attempts.




Spotting the signs of sextortion can be challenging, but there are some common indicators to watch out for:

  1. Coercive Requests: Victims may receive unsolicited requests for sexually explicit photos or videos, followed by threats to share or distribute the material if they refuse to comply.
  2. Threats and Intimidation: Perpetrators often use threats of harm, embarrassment, or social consequences to manipulate victims into providing compromising images or videos.
  3. Emotional Distress: Victims may exhibit signs of emotional distress, such as anxiety, depression, or withdrawal, especially if they are being threatened or blackmailed.
  4. Increased Secrecy: Victims may become unusually secretive about their online activities or exhibit changes in behavior, such as avoiding social interactions or spending excessive amounts of time online.
  5. Financial Transactions: Perpetrators may demand money or other financial favors from victims in exchange for not sharing or distributing the compromising material.
  6. Manipulative Behavior: Perpetrators may engage in grooming behavior, such as flattery or promises of affection, to establish trust and manipulate victims into complying with their demands.
  7. Changes in Online Behavior: Victims may exhibit changes in their online behavior, such as deleting social media accounts, avoiding certain websites or platforms, or changing privacy settings frequently.
  8. Unwanted Contact: Victims may receive repeated, unwanted contact from the perpetrator, including harassing messages, threats, or demands for further compromising material.
  9. Fear of Exposure: Victims may express fear or anxiety about the potential consequences of the compromising material being shared or distributed, such as damage to their reputation, relationships, or career.
  10. Seeking Help: Victims may confide in friends, family members, or professionals about their experiences or express concerns about being blackmailed or threatened online.

It’s important to remember that these signs may vary depending on the individual circumstances, and not all victims will exhibit the same behaviors. If you suspect that someone is being targeted or victimized by sextortion, it’s crucial to offer support and assistance while encouraging them to seek help from law enforcement or other relevant authorities.

How to mitigate the risk of sextortion.

In some cases, images or content shared online can be removed to mitigate the risk of sextortion. However, the process of removing content from the internet can vary depending on factors such as the platform hosting the content, the jurisdiction, and the specific circumstances of the situation. Here are some steps that individuals can take to attempt to remove compromising images or videos:

  1. Contact the Platform: Many social media platforms and websites have mechanisms in place for reporting and removing inappropriate or harmful content. Users can typically report content that violates the platform’s community guidelines or terms of service, including images or videos that were shared without consent. This may involve submitting a formal complaint or request to the platform’s support team.
  2. Seek Legal Assistance: In some cases, individuals may need to seek legal assistance to have compromising content removed from the internet. This could involve contacting a lawyer or legal organization specializing in online privacy and reputation management to explore options for legal recourse, such as sending cease and desist letters or filing takedown requests under relevant laws.
  3. Use Image Removal Services: There are also online services and companies that specialize in removing unwanted content from the internet. These services may offer assistance with identifying and removing compromising images or videos, often for a fee. It’s important to research and choose a reputable service provider with experience in handling sensitive online content.
  4. Consider Privacy Settings: Individuals can also take proactive steps to protect their privacy online and minimize the risk of sextortion. This may include adjusting privacy settings on social media accounts, limiting the visibility of personal information and content, and being cautious about sharing sensitive images or videos online.
  5. Document Evidence: It’s important for individuals who are targeted by sextortion to document evidence of the harassment or threats, including screenshots of messages or communications from the perpetrator. This information may be useful for law enforcement or legal authorities if further action is needed to address the situation.

While these steps may help individuals mitigate the impact of sextortion and remove compromising content from the internet, it’s important to note that the process can be complex and may not always be successful. In cases of serious threats or harassment, individuals should seek support from law enforcement or other relevant authorities to ensure their safety and well-being.



0 Comments

Leave a reply

Terms | Privacy | Cookie | Scam Alert ©2024 Lexdot. All Rights Reserved

Hello.

Need help? Get in touch. Although we are not available at the moment, we will respond as soon as possible.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account