Study sheds light on the importance of protecting people from cyber sextortion offenders

Researchers from Michigan State University released a study on "sextortion" - a lesser-known internet crime that poses a threat to adults and minors - that sheds light on the importance of protecting the public from online criminals.

Sextortion is the use of intimate images or videos that have been captured to then extort compliance from a victim. What makes it different from any other crime is the threat to release. A perpetrator could say, 'I have these images of you and will publish them unless you...' to get more images or even in exchange for money."

Roberta Liggett O'Malley, MSU criminal justice doctoral student and co-author of the study

In many cases of sextortion, perpetrators don't actually possess the images or videos they're using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.

The research -- published in Journal of Interpersonal Violence -- suggests the current focus on dissemination of images online may overshadow the issue of threat-based harassment online, like sextortion. While most U.S. states have laws against revenge porn, the study makes a case for increasing awareness and changing legislation to include other forms of internet-based sexual abuse crimes.

"Much of the fear comes from the belief that hackers can do anything involving technology, from the ability to see someone's web browser history to hacking into a webcam or Nest device," said Karen Holt, assistant professor of criminal justice and co-author. "That's why sextortion is so effective -- it creates a huge amount of uncertainty and fear that victims end up complying versus saying, 'I think you're bluffing, and if I ignore you, then I'm fine.'"

Liggett O'Malley and Holt said men are less likely to report these crimes to police out of embarrassment or shame, but also don't experience the longevity of harassment experienced by minors.

"The victims are overwhelmingly minors and females, but if the objective is to get money, they're almost always targeting men," Liggett O'Malley said. "These two groups of people experience a similar crime in very different ways."

Analysis of 152 cyber sextortion offenders uncovered four distinct types: minor-focused, targeting victims under 18 years of age; cybercrime, targeting victims using computer-based tactics like hacking; intimately violent, targeting former or current romantic partners; and transnational, targeting strangers strictly for financial reasons.

Holt explained that the four themes reflect different motivations for what offenders want from their victims. A survey of 1,631 cyber sextortion victims found 46% were minors, making crimes against minors a focus for law enforcement and in research literature.

"The disproportionate focus on minor victims has led to new laws that protect minors from adult sexual solicitation online, but there are few legal protections for adult male and female victims," Liggett O'Malley said.

Researchers are starting to see sextortion being used by a lot of other perpetrators. Within a domestic violence context, partners may share images consensually, only to have those images later used as leverage in the relationship. In other instances, transnational organizations employ scams in which individuals pretend to be a man or women on the internet, engaging in webcam sessions with victims and immediately threatening to release a recording unless money is provided.

Awareness and reporting of sextortion crimes, while acting responsibly online, are key in protecting adults and children.

"As digital citizens, we have to start advocating for more accountability on behalf of platforms to take these images down, or to report harassment," Holt said. "A lot of offline crimes have an online component, and oftentimes law enforcement and our behavior don't catch up. We need to think about our own personal safety, both offline and online."

Researchers like Liggett O'Malley and Holt also advocate for federal laws to address the legal loopholes of sextortion.

"We can't only be focused on revenge porn," Liggett O'Malley said. "We need to stop and think about all the ways in which images are used against people and to think about the way we construct these laws to ensure there are pathways for prosecution and arrest."

Source:
Journal reference:

O’Malley, R.L & Holt, K.M (2020) Cyber Sextortion: An Exploratory Analysis of Different Perpetrators Engaging in a Similar Crime. Journal of Interpersonal Violence. doi.org/10.1177/0886260520909186.

Comments

The opinions expressed here are the views of the writer and do not necessarily reflect the views and opinions of News Medical.
Post a new comment
Post

Sign in to keep reading

We're committed to providing free access to quality science. By registering and providing insight into your preferences you're joining a community of over 1m science interested individuals and help us to provide you with insightful content whilst keeping our service free.

or

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.

You might also like...
Why some people can’t lose weight even when they follow the rules