Sextortion and Blackmail on the Internet – act fast and shut it down
Andrew Toth/Getty Images

Sextortion and Blackmail on the Internet – act fast and shut it down

19-year-old Miss Teen USA, Cassidy Wolf, was sent an email attaching naked photos of her in her own bedroom and demanding she “perform” on video for the sender. The FBI were contacted and Jared Abrahams was tracked down and found to have hacked into her computer and installed a remote accessed tool to her webcam without her knowledge to obtain the photos. His computer showed he had done this to a dozen other women - and was sentenced to 18 months in jail.

James Casbolt attempted to extort over £2m from his ex-wife and her family using explicit images of her, some of which he had digitally manipulated. Not happy with that, he also harassed other women with threats of violence and online links to pages about serial killers. Now he is in jail for 12 years and probably wishes he had made some different life choices.

The above are recent examples of a growing trend emerging of sexual extortion. Otherwise known as sextortion. The proliferation of intimate selfies and the connection of media devices to the internet has offered attackers wide scope to find and then threaten victims.

How does it work?

In a number of ways. An attacker can install commercially available spyware on a victim’s computer or mobile device, turning on the camera and recording footage. Similarly, a victim can be tricked and inadvertently download malware through phishing, allowing an attacker access to all photo and video file content. It can happen through a computer or mobile device being stolen or lost – or even where recycled – which holds intimate content.

Another method we have seen is grooming of victims by sending them a friend request on Facebook from a fictional person “borrowing” an image of a young and attractive model. Once connected, the attacker establishes contact before quickly establishing a relationship and encouraging a move over to a webcam connection such as through Skype. This now offers an ability to capture the victim in video and audio. Once an intimate act has been recorded, the attacker then immediately follows up with a demand for money and a threat to upload images to the internet and, more particularly, show them to the victim’s network of contacts if payment is not made.

It isn’t just limited to intimate images. We see threats to publish text and email messages that were intended to remain private but which the sender now regrets sending.

Griffin Law’ sources tell us that sophisticated gangs are increasingly behind attacks seeking money but it is still the case that anybody with malicious intent can make threats to upload intimate or embarrassing data. We often find that their methods can indicate clues as to their whereabouts and identity.

What can be done to fight back?

First, report any attack to the Police as it should be investigated under a number of criminal offences including blackmail, extortion, theft of personal data and/or the new offence commonly called revenge porn.

Whilst you cannot expect immediate results from overworked and overwhelmed law enforcement agencies, you can take action for same day results through the civil courts. Griffin Law are experts in same day action including obtaining anonymised court proceedings and injunctions where the Court authorises us to serve the attacker and also the network host so that we can either prevent harm before it occurs or stop it in its tracks. We are also experienced at going after the attacker to both reveal their identity for criminal prosecution and for you to send them to prison for contempt of court and pursue a claim for compensation.

要查看或添加评论,请登录

Dan Sherlock的更多文章

社区洞察