Connect with us

Hi, what are you looking for?


Protecting yourself from the latest internet sex crime

In many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.

Photo by NeONBRAND from

Researchers from Michigan State University released a study on “sextortion” – a lesser-known internet crime that poses a threat to adults and minors – that sheds light on the importance of protecting the public from online criminals.

“Sextortion is the use of intimate images or videos that have been captured to then extort compliance from a victim,” said Roberta Liggett O’Malley, MSU criminal justice doctoral student and co-author of the study. “What makes it different from any other crime is the threat to release. A perpetrator could say, ‘I have these images of you and will publish them unless you…’ to get more images or even in exchange for money.”

In many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.

The research – published in Journal of Interpersonal Violence – suggests the current focus on dissemination of images online may overshadow the issue of threat-based harassment online, like sextortion. Various countries now have laws against revenge porn, but the study makes a case for increasing awareness and changing legislation to include other forms of internet-based sexual abuse crimes.

“Much of the fear comes from the belief that hackers can do anything involving technology, from the ability to see someone’s web browser history to hacking into a webcam or Nest device,” said Karen Holt, assistant professor of criminal justice and co-author. “That’s why sextortion is so effective — it creates a huge amount of uncertainty and fear that victims end up complying versus saying, ‘I think you’re bluffing, and if I ignore you, then I’m fine.’”

Liggett O’Malley and Holt said men are less likely to report these crimes to police out of embarrassment or shame, but also don’t experience the longevity of harassment experienced by minors.

“The victims are overwhelmingly minors and females, but if the objective is to get money, they’re almost always targeting men,” Liggett O’Malley said. “These two groups of people experience a similar crime in very different ways.”

Analysis of 152 cyber sextortion offenders uncovered four distinct types: minor-focused, targeting victims under 18 years of age; cybercrime, targeting victims using computer-based tactics like hacking; intimately violent, targeting former or current romantic partners; and transnational, targeting strangers strictly for financial reasons.

Holt explained that the four themes reflect different motivations for what offenders want from their victims. A survey of 1,631 cyber sextortion victims found 46% were minors, making crimes against minors a focus for law enforcement and in research literature.

Advertisement. Scroll to continue reading.

“The disproportionate focus on minor victims has led to new laws that protect minors from adult sexual solicitation online, but there are few legal protections for adult male and female victims,” Liggett O’Malley said.

Researchers are starting to see sextortion being used by a lot of other perpetrators. Within a domestic violence context, partners may share images consensually, only to have those images later used as leverage in the relationship. In other instances, transnational organizations employ scams in which individuals pretend to be a man or women on the internet, engaging in webcam sessions with victims and immediately threatening to release a recording unless money is provided.

Awareness and reporting of sextortion crimes, while acting responsibly online, are key in protecting adults and children.

“As digital citizens, we have to start advocating for more accountability on behalf of platforms to take these images down, or to report harassment,” Holt said. “A lot of offline crimes have an online component, and oftentimes law enforcement and our behavior don’t catch up. We need to think about our own personal safety, both offline and online.”

Researchers like Liggett O’Malley and Holt also advocate for federal laws to address the legal loopholes of sextortion.

“We can’t only be focused on revenge porn,” Liggett O’Malley said. “We need to stop and think about all the ways in which images are used against people and to think about the way we construct these laws to ensure there are pathways for prosecution and arrest.”

Online abuses have been repeatedly tackled in the past.

In February 2020, for instance, a study found that in More than one-quarter (28.1 percent) of teens who had been in a romantic relationship at some point in the previous year said they had been the victim of at least one form of digital dating abuse.

LGBTQIA people are also among the victims of cyber-related abuses, including of sextortion.

In 2018, a study found that adolescents who identified as non-heterosexual were more than twice as likely to be the victim of sextortion. This finding is consistent with other forms of online abuse, including cyberbullying and electronic dating violence, which research has shown is more common among those who do not identify as heterosexual.

Advertisement. Scroll to continue reading.

Unfortunately, even members of the LGBTQIA community are perpetrators.


Like Us On Facebook


Lifestyle & Culture

Influencer marketing has become a powerful tool in the digital age, allowing brands to promote their products and services by leveraging the reach and...


Social media has supported an explosion of diversity in gender and sexuality during the 21st Century, but - it is worth noting - these...


While large language models can offer fast, on-demand support, they frequently fail to grasp the specific challenges that many members of the LGBTQ+ community...


This post will discuss the practical advantages of immutable backup, what it is, how it works, and why your company requires it.