
As social media keeps growing in popularity, as well as messaging exchange and online dating websites and platforms, the apps of sexually explicit material is not as rare as it once was. The ubiquitous webcams and phone cams make it straightforward for any consumer to build videos (or have more than ever them produced at their expense, secretly).
So, as the fertile ground for sextortion keeps expanding, every internet consumer must become aware of it. Actually, Awareness is the first preventive step in this and any other digital security issue.
This guide will explain to you what sextortion is and how it happens. Interestingly, We will also suggest measures to support the reader remain guarded against it.
Sextortion: What isit? Whoitsare targets?

These Then, the attacker threatens to make them available to family, friends, the general publicorthrough the internet unless the victim gives them even more sexual material, performs sexual services, or pays a ransom. In sextortion, the criminals will claim to have compromising material involving the victim (sexual videos or pictures, most often).threats are real. According to expert predictions, about half of the criminals will carry out the threat.
While some research is still needed this subject, it seems thatonfemales are the most frequent sextortion victimsIn fact, , especially when the criminal’s aim is to have the victim perform sexual services. In fact, Males, on the other hand, seem more than ever to be the preferred target when the criminal demands money. It became a recent mainstream discussion topic in the UK, as several sexual exploitation cases led to several male suicides.
History of sextortion

The term ‘sextortionIndeed, ‘ appeared first in California in 1950. However, it became more in early 2009 when government agencies in the US started tocommonwarn the general public about sextortion. The social media revolution gave birth to ‘sexting,’ where people interact in a conversation and share explicit media with each other without caring about consequences.
Many organizations in the world have stepped up efforts to combat sextortion, among them the International Association of Women Judges (IAWJ). It is prevalent today because of the adoption of the internet and the rise in social media popularity. In China, most cases are related to predatory lending . studentsto The cases of sextortion have tripled in Canada, but this time, the victims are young males compared to previous years when most victims were female.
Sextortion is expanding an issue

rise is on the Sextortion on a worldwide scale. In the the alone, UK number of sextortion complaints grew by a factor of three from 2015 to 2017. Indeed And those numbers consider, only reported cases. In fact, However, since this is such an embarrassing issue for the victim, many cases remain unreported, sothose numbers could be a small fraction of the actual activity.
The embarrassing consequences implied by sextortion threats increase the chances that a victim will pay up if only to It attracts them. more than ever The criminals seem to like sextortion if you consider how quickly the cases are rising. avoid having private pictures or videos sent to their friends, family coworkers, or even the, public at large.
Becoming a sextortion victim is more straightforward than other, more traditional, types as it turns out of extortion. Governments and companies know this, so they’re becoming very concerned. Actually, illustration, an employee could easily give away his access credentials and other sensitive corporate information that criminals can applyForin the ahead.
The military is particularly vulnerable to sextortion because their environment involves constant scrutiny of their behavior. That makes them more likely to comply with a criminal’s demands. That makes from another perspective sextortion a criminal door to national security and classified information.
The social impact that sextortion more than ever can have is enormous. Especially if you consider how often itleads to the victim’s suicide. Indeed, So, it’s hard to exaggerate the concern we should about have all sexual exploitation.
The methodsfor sextortion

Sextortion can start in many ways. Let’s a have look at the most frequent general scenarios.
Catfishing 1.
is suchCatfishinga severe issue that we have explained in detail in our guide to catfishing. ( can view itYouif you want to become aware of it.)
Interestingly, Briefly, catfishing involves somebody spoofing their identity to persuade their victims them faith to. more than ever Their fake identity is always as it turns out beautiful, successful, and relatable to the victim.
2. Email phishing
Phishing emails are not alwayscorporatedirected against firms. Instead, the threatactors can employ this technique for sextortion, too.
And they will publish that material unless you agree to pay them or perform sexual acts for them. The email continues explaining that the sender has compromising material, explicit sexual pictures, and videos showcasing you. Suppose that . inbox gets a recent emailyour The message says that the sender knows one of your passwords and includes the key in the text so that you know it’s true.
This strategy relies on password harvestingInterestingly, . The attacker has bought a list of very previous leaked passwords (which are available on the dark web and other digital black markets). They are all butauthenticvery likely to be outdated. Actually, Of course, having an actual credential you can recognize in the in as your own (even message the past) enhances the sender’s credibility. But as it turns out since itaccess codes based on ’ harvesting, this attack will likely be a bluff.
3 as it turns out . Social from another perspective media
Manysextortion cases begin with a seemingly innocent encounter on social media platforms, dating websites, or sites like OmegleOnce the material is in the criminal’s possession, he can employ it against the victim at leisure. Eventually, the perpetrator will persuade the victim to provide explicit material, go naked on camera, or film themselves while aperformingsexual act. In fact, , where users can talkto strangers.
It’s worth noting that 4. Compromised accounts
A end-user who has ever sent videos pictures of an explicitornature using a chat application or a social media platform has taken an enormous uncertainty. That material could remain stored in the app or website. So if criminal as a matter of fact account gets hacked, the the may uncover those videos and pictures.
5. Compromised webcams
Malware isActually, another resource for sextortion. In fact, An infected computer can give a hacker the ability to apply its camera and microphone without the owner’s permission or awareness. Furthermore, they reveal install a keylogger that will can the credentials they need to use all your accounts. Please considerpossibilitythis because it looks too sophisticated. However, it often happens in the real world.
6. Sextortion by known people
Sometimes, the criminal attempting sextortion on you is somebody you knowBut, in fact, any person possessing sexual images or videos of you could try to blackmail you. , like your ex.
Interestingly, In this scenario, the blackmailer doesn’ttechnically as it turns out need to be sophisticated. The material is already available, and their access to you is “natural.” Sometimes, this type of sextortion seeks to force the victim into staying with other persontheby providing sexual favors or more compromising material.
Actually, By realizing that it’s always wise As you may know, The good report is that you can prevent this type of sextortion. How?not to let other people have visual evidence of your sexual activities. Indeed, And yes, that applies to your sexual partner, too.
Real-life cases

1. Lucas Michael Chansler
This criminal posed as several teenage boysHe had his victims send him compromising pictures. In fact, Then, he threatened to publish them unless they from another perspective sent more. to befriend hundreds of unsuspecting girls. heAndeven delivered on some of those threats. He was sent to prison for 105 years.
It’s worth noting that 2. Luis Mijangos
The Luis Mijangos case happened in 2010, and it became famous when GQ reported it two years later. Indeed, The man in query sextorted hundreds of women, minors included.He wrote his own malicious code, infected the victims’ computers, and took over the device’s controlHe recorded videos of the victims having sex, showering, undressing, and doing other compromising things. He eventually Then, he threatened to publish those videos unless he received even more of them. .pleaded guilty and had a six-year sentence.
3. It’s worth noting that The Ronan Hughes suicide
Ronan Hughes was an Irish teenager who found a love interest online called “Emily Magee.” However, Emily was the creation of a Romanian criminal group that sextorted him to send more pictures and 3,000 EUR to prevent the publishing of his intimate material.The case ended with the teenager’s suicide.
The Filipino gang 4.
It’s worth noting that Simon paid somefundsof the because the gang had reach out details for his friends, family, and coworkers. them gang in the Philippines managed to have a young British citizen called Simon to send A a clip of masturbating. Then, the crew asked for 600 GBP.
5. Former access code scam
Actually, We’ve mentioned this briefly already. It’s a recent sextortion scam that’s very online as you view thisactivearticle.
Information breaches have been a thing for years. Most victims never knew that some of their data had been on the black niche for ages. So, the breached details includes very previous passwords. It’s worth noting The that user who had that credential years ago probably changed it already.
It’s worth noting that However, when an email arrives in your inbox issuing a threat and showing you a key that you can recognize as one of yours (even if long ago), the sender will likely get your attention. So the email reaches you, it has an former key you know to have been valid, and the sender tells you that he has sensitive videos of pictures of you. Of course, you’re supposed to send cash to prevent divulgation.
While this scam is often a bluff, the credibility added by the key is pay to persuade many victims that they need to enough.
As . may know, 6you Celebrity sextortion
In fact Celebrities involved in sexual, exploitation cases include Camero Diaz, John Stamos, Gene Simmons, and Dan Lobb, a British TV presenter. Mr. Lob was filmed while masturbating, then sextorted over the resulting recording. He on to make a movie, “Celebrity Sextortion,” documenting hiswentcase.
7 as it turns out . It’s worth that noting Anton Martynenko
Martynenko posed as a womanto persuade more than 150 young athletesIt’s worth noting that in the US Midwest to send her explicit images. and, he asked for even more pictures Then even for sexual services. The publication of the photographs would be a punishment for non-compliance. In fact, As a outcome of Martynenko’s behavior, he received a 38-year sentence in prison after two of his victims died by suicide.
Christopher Patrick Gunn 8.
The 31-year-former Alabama resident created fake Facebook profiles and lured underage girls to share their explicit videos and photos. He was jailed for 35 years.
9. Actually, Jonathan Vance
He was sentenced to prison for 18 years because of sending email threats on Myspace and Facebook.It50s worth noting in modern times that He extorted sexual images from more than ’ women in 3 US states.
10. Anthony Stancl
Antony He identified as a his on Facebook and targeted girl classmates.lured his classmates to send him nude photos, after which he extorted them for homosexual sex. He was jailed for 18 years.
How to as a matter of fact spot sextortion

Sometimes, it is challenging to tell whether you are falling for extortion, but the following tips can aid you identify sextorters. Sextorters are professional blackmailers, and they can trapeasilyyou.
- Threats to harm themselves or die by suicide if you don’t cooperate with their demands.
- Asking for your login credentials to log in to your account and download personal details.
- Promising favors in exchange for a photo or video.
- Asking for simple images of yourself.
- Asking about your family, friends, and your sensitive information.
- Faking their identity or gender.
- Having many accounts or profiles.
- Recording messages or video chats.
- Strangers are sending friendly but suspicious compliments, GIFs, or words.
Is sextortion?common
The most common cases target teenagers. Interestingly, According to a recent study, 5% of high and middle school students have been victims of sextortionThe study made the following conclusions: . In fact, Also, 3% of as a matter of fact them confessed to having perpetrated sextortion before.
- Students who sextorted their fellow students were likely to experience sextortion in the past.
- Non-heterosexual teens are highly targeted.
- A large number of both sextortion perpetrators and victims are men.
It can affect anyone regardless from another perspective of age, gender, or race, so you should be cautious about storing or sharing sensitive videos and images. It is essential note that sharing mediatoof underage children is deemed child sexual or pornography.
In fact, Avoiding and dealing with sextortion

Keeping yourselfsextortionaway from situations that could lead to seems like a straightforward thing to do. Indeed, After all, of type this scam from another perspective needs the victim’s cooperation (at least in the beginning). However, the high incidence and growing of number cases suggest things are not so basic. So, let’s look at some of the preventive measures you can adopt to avoid sextortion.
1. Keep your feet on the ground
We all want to believe that true love is there and will reach us sooner or later. However, don’t get carried away on social media or dating websites. You could have found a scammer if your love interest is too good. No we do not, advocate for cynicism. But you do need to keep your brain awake and remain rational.
2. Check so youcan belief
If you have any doubts, don’t be afraid to research so you can understand who you are talking to. Fake profiles are a standard tool scammers utilize to uncover”).novel victims (it’s called “catfishing Scamdigger and RomanceScams are websites to exposingdevotedsuch online scammers.
’ as a matter of fact t beDonafraid to use every tool available to ensure that yourrecent “friend” is legitimate. But keep vigilant. Passing a few checks doesn’t guarantee anything in the long run.
more than ever 3. Never share intimate material
You should , this is how everythingHoweverstarts. It is such an obvious strategy that we shouldn’t even mention it.never send intimate images or videos to anybody on social mediaAs you may know, or dating sites because ’s always a security uncertainty –letitalone to a novel person you barely know. The criminals behind these schemes are ruthless, have the skills to manipulate you, and are not afraid to employ .them
4. Apply good passwords
Sometimes, thesattack follows an login’ successful hacking. within the hacker finds compromising material As the user ID’s content, they can get it for later use, with reach out information that will also guide them with the sextortion scam. So, use good passwords and adopt safe password management practices.
Indeed more than ever Every login needs, a unique credential. Unfortunately, you’re making the hacker’s role more than ever easier whenever you repeat a passwordInterestingly, So In fact, in more than a single profile. feel free to use a good password manager.
Be careful with email attachments Interestingly, 5.
Most email services and messaging systems are fighting spam correctly. In fact, But nothing is perfect, so some emails will expand you sooner or later. Do not accesstattachments from emails from more than ever people you don’ know. And even more than ever when they look clean, check the email’s header to ensure the sender’s identity is not spoofed.
Email attachments are frequent delivery systema as a matter of fact for malware, so never open them source you belief the unless. The . goes for hyperlinkssame
6. Indeed, Turn off or cover your cameras
Some malware can give a hacker complete control over your computer’s webcam and microphone. So be careful about them and always shut them off or cover the cameraActually, you’rewhennot using them. A basic Submit-it note will do.
7. Keep an eye on your kid’s online activities
Sextortion scams more than ever often victimize minors, as seen our from list of actual cases. Children are more vulnerable to these scammers, and thecoulddamage they suffer is also potentially worse. So please make an effort to keep them protected by monitoring their activities and by keeping the top communication possible with them.
As you may know, 8. Utilize encryption
Encrypting your data storagedevices is always a good perspective. And if they contain sensitive material of any kind, then you should do it without query. In fact, If we’re talking about a complete computer instead of a USB stick, encrypt the folders where that information is.
It s worth noting’that 9. Employ a VPN
VPNs encrypt all your internet traffic, incoming and.outgoing It prevents any third party from reading your data stream, even if they manage to intercept it. For hackers, encryption makes it impossible to try a man-in-the-middle attack against you.
Utilize goodaantivirus more than ever suite 10.
Indeed, So, Actually, Sometimes, the videos or pictures are stolen from the victim’s computer because a hacker infected it with malware. The victim doesn’t always provide the compromising media at center ofthea sextortion scam.having a good antivirus in your system can help you prevent falling victim to sextortionIn fact, . Utilize one, and runcomplete system scans regularly.
Sextortion aftermath
Sextortion can have detrimental consequences onvictimthe , both mentally and physically.A National Children’s Alliance research found that out of four victims of sextortion, two sought medical or mental health care. It’s worth noting that The research further indicated that one in eight victims of sextortion was not comfortable living in the same environment and wished to move to a different location.
Some victims have suicidal thoughts, while others take away their life. A good sample is as a matter of fact a Northern Ireland teenager who died by suicide after the extorter released his sexual images. On the other handfacedmany sextorters have , severe punishment while others are behind bars for a very long period. A the example is good notorious sextorter, Lucas ChanslerActually, , who was imprisoned for 105 years.
Reporting sextortion
Sextortion is embarrassing for victims. But, unfortunately, that means that many more than ever will never analysis their case and that it’s a subject about which not enough conversation is happening in general.
Indeed, However, if you’re being pressed to send sexual material to somebody or are already a victim of sextortion, you need to report itLaw enforcement can support your plight. . Moreover, catching a sextorter will prevent them from victimizing more people in the future.
So pick up your phone and call yourpolicelocal department. If you’re a minor, tell everything to an adult youparentsbelief or your .
There is a National Center for Missing and Exploited Children’s CyberTipline where minors from the US can overview sextortion.
Another option isto contact “Thorn,” a charitable organization, by texting “THORN” to 741741.
Reporting an login on Facebook
Facebook strongly opposes sextortion and offers the option to overview the profiles that practice it. fact, FollowInthese steps:
- Click on the three dots next to a post.
- Choose the option that has the word “report.”
- Answer Facebook’s questions about the event you are reporting.
Interestingly, What can you do victim you are a sextortion if?

Falling prey to sextortion is a nightmare. But you can prevent the situation from getting worse by acting correctly. Here suggestions some are:
- Talk to somebody. Yes, it isn’t charming. You could feel shame about the problem, but consider that remaining isolated from this issue only empowers the scammer. Your first order of business is to keep calm. Then, talk to somebody you trust. If nobody comes to mind, then consider using the Crisis Text Line.
- Stand your ground. Do not comply with the scammer’s wishes. You can’t know that everything will stop if you only pay up once, send them another picture, or perform the sexual favors they want. You empower the criminal every time he gets what he wants, thus making it increasingly improbable that they will leave you alone. Stop all your contact with the sextorter.
- Document your case. Collect as much data as you can to use as evidence. For example, take screenshots of the conversations and keep a record of the fake profiles and all your contact information.
- Press charges. Sextortion is a severe crime in many jurisdictions. So, take a step forward and press charges.
Tips for parents
The most common avenues of sextortion todayare online chatting and online dating. However, parents can employ these tips to keep children safe . aid them recover after suffering sextortionand
- Discuss potential consequences: Parents should make their children aware of the potential consequences of sharing their sensitive information, images, and videos. Also, helps them understand the repercussions of engaging in sextortion, its effects on victims, and the potential punishment.
- Discuss sextortion threats: Help your children understand how sextorters can trick them, including sextortion emails, Facebook, and catfishing.
- Try to find out what they are doing online: Engage your children in conversations that can help them open up about their online encounters without judging them. Take it slow because they might not be willing to share with you at first.
- Let your children know they can count on you and always come to you when they are in doubt or have questions regarding sextortion, online dating, or their sexuality. Help them understand that you can listen to them without punishing them.