
Sometimes, after producing the requested content, sextortionists will threaten exposure as a way to demand even more explicit content. Meeting demands doesn’t always end the sextortion. Perpetrators can also apply a more aggressive approach: using force and threats to coerce or blackmail victims into creating sexually explicit images and video. Once comfortable, the victim can be manipulated into sending compromising content used for sexual extortion or even blackmailed for sex. They can pretend to be a romantic interest, use flattery, and offer money and other valuable items. Sextortionists will use various means to gain a victim’s trust. Often, these places are where sextortion occurs. How does sextortion happen?įrom gaming platforms and social media to dating and video chat apps, there are many places where we can exchange personal data with others. Young people are especially vulnerable to sextortion, because they’re generally less inhibited online, tending to share more and being more trustful of internet strangers.

The attacker steals the data - perhaps through spoofing or planting malware - then makes demands on the victim to get it back.

Sextortion also occurs when a victim is coerced into sending sexual content to retreive stolen private data.

Sextortion can even escalate to blackmail sex. Perpetrators then threaten to publish the content unless the victim sends more. They use fake accounts and other social engineering tricks to gain trust, then ask for compromising images or videos. Sextortionists often seek people who stream or post sexually explicit content of themselves.
