What makes sextortion — the use of intimate images or videos that have been captured to then extort compliance from a victim — different from any other crime is the threat to release. A perpetrator could say, ‘I have these images of you and will publish them unless you…’ to get more images or even in exchange for money.”
But in many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.
“Sextortion is the use of intimate images or videos that have been captured to then extort compliance from a victim,” said Roberta Liggett O’Malley, MSU criminal justice doctoral student and co-author of the study. “What makes it different from any other crime is the threat to release. A perpetrator could say, ‘I have these images of you and will publish them unless you…’ to get more images or even in exchange for money.”
In many cases of sextortion, perpetrators don’t actually possess the images or videos they’re using as leverage. Instead, offenders manipulate victim behavior by tapping into the fear of not knowing whether the threat is real.
MSU says that the research — published in Journal of Interpersonal Violence — suggests the current focus on dissemination of images online may overshadow the issue of threat-based harassment online, like sextortion. While most U.S. states have laws against revenge porn, the study makes a case for increasing awareness and changing legislation to include other forms of internet-based sexual abuse crimes.
“Much of the fear comes from the belief that hackers can do anything involving technology, from the ability to see someone’s web browser history to hacking into a webcam or Nest device,” said Karen Holt, assistant professor of criminal justice and co-author. “That’s why sextortion is so effective — it creates a huge amount of uncertainty and fear that victims end up complying versus saying, ‘I think you’re bluffing, and if I ignore you, then I’m fine.’”
Liggett O’Malley and Holt said men are less likely to report these crimes to police out of embarrassment or shame, but also don’t experience the longevity of harassment experienced by minors.
“The victims are overwhelmingly minors and females, but if the objective is to get money, they’re almost always targeting men,” Liggett O’Malley said. “These two groups of people experience a similar crime in very different ways.”
Analysis of 152 cyber sextortion offenders uncovered four distinct types: minor-focused, targeting victims under 18 years of age; cybercrime, targeting victims using computer-based tactics like hacking; intimately violent, targeting former or current romantic partners; and transnational, targeting strangers strictly for financial reasons.
Holt explained that the four themes reflect different motivations for what offenders want from their victims. A survey of 1,631 cyber sextortion victims found 46% were minors, making crimes against minors a focus for law enforcement and in research literature.
“The disproportionate focus on minor victims has led to new laws that protect minors from adult sexual solicitation online, but there are few legal protections for adult male and female victims,” Liggett O’Malley said.
Researchers are starting to see sextortion being used by a lot of other perpetrators. Within a domestic violence context, partners may share images consensually, only to have those images later used as leverage in the relationship. In other instances, transnational organizations employ scams in which individuals pretend to be a man or women on the internet, engaging in webcam sessions with victims and immediately threatening to release a recording unless money is provided.
Awareness and reporting of sextortion crimes, while acting responsibly online, are key in protecting adults and children.
“As digital citizens, we have to start advocating for more accountability on behalf of platforms to take these images down, or to report harassment,” Holt said. “A lot of offline crimes have an online component, and oftentimes law enforcement and our behavior don’t catch up. We need to think about our own personal safety, both offline and online.”
Researchers like Liggett O’Malley and Holt also advocate for federal laws to address the legal loopholes of sextortion.
“We can’t only be focused on revenge porn,” Liggett O’Malley said. “We need to stop and think about all the ways in which images are used against people and to think about the way we construct these laws to ensure there are pathways for prosecution and arrest.”
Source: Homeland Security Newswire