What is Sextortion? Examples of Sextortion Cases: Sextortion is a criminal act that occurs when • In November, 2014, Lucas Michael Chansler, someone demands something of value, typically These tactics are typically conducted over the 30, of Jacksonville, Florida, was sentenced to 105 images of a sexual nature, sexual favors, or money, Internet or cellular networks using social networking years in prison for producing . from a person by either: sites (SNS), instant messaging, and e-mail. During a four-year period, Chansler is believed to • Threatening to release or distribute material the The diagram below illustrates a typical sextortion have sexually extorted approximately 350 victims in victim seeks to keep private. This material often process: 26 states, three Canadian provinces, and the United includes sexually explicit images, videos, e-mail, and Kingdom. text messages • In March, 2014, Jared James • Threatening to financially harm Abrahams, a computer science friends or relatives of the victim by Sextortion student, was sentenced to serve using information obtained from 18 months in federal prison after the victim’s computer unless they Victims are pleading guilty to three counts Extort compliant and of and one count of comply with demands Victim further requests • Victims are Long-term follow. unauthorized access of a computer. • Withholding something the targeted. physical and/or Perpetrator Abrahams targeted dozens of • Images are psychological victim needs or wants unless they demonstrates acquired. effects. victims around the globe, including comply with demands. This is control over Victims are not Miss Teen USA Cassidy Wolf. victim. usually perpetrated by someone in a Initiate compliant and Abrahams used malicious software position of power or authority, such Contact images are Victimization distributed. to disguise his identity in order as a government official, educator, or to capture nude photos or videos employer Potential of female victims through remote Bullying operation of their webcams without How Does Sextortion Happen? their . Sextortion can be facilitated in • Between 2005 and 2009, many ways by those seeking to exploit vulnerable Ivory Dickerson and Patrick Connolly victimized individuals sexually or for financial gain. They How is Sextortion Related to “” and more than 3,800 children through sextortion. Using typically begin by obtaining sensitive material Bullying? malware, Dickerson and Connolly were able to pertaining to their victims. Some of the methods assume control of the victims’ computers and then include: Sexting is the sending of sexually explicit images demanded the victims send sexually explicit images from one person to another using mobile devices. of themselves. Dickerson was sentenced to 110 years • Hacking or use of malware to assume control of Sexting is one way images come into the possession in prison while Connolly was sentenced to 30 years a victim’s computer, gaining access to the victim’s of a perpetrator who could use them to facilitate in prison. files, and/or control of the computer’s webcam and the sextortion. When sexually explicit images of a microphone student are distributed to their peers, those images • of personal electronic devices that contain often become the basis of intense bullying in a school How Can I Protect Against Sextortion? sensitive material environment. For Parents: • Social engineering -- leading the victim Supervise children’s computer or mobile device to believe the perpetrator can be trusted as the Who is at Risk and What is the Impact? usage. Devices like smartphones are more difficult perpetrator represents himself/herself as a business to manage due to their mobility and technical (i.e. modeling agency), friend, or even the victim’s Sextortion affects children across all demographics. capabilities. As teenagers’ brains are not yet fully boyfriend or girlfriend. This results in the victim Victims of sextortion withdraw from family developed, they often struggle with anticipating releasing sensitive material to the perpetrator members and can experience anxiety; psychological, physical and emotional trauma; bullying; increased consequences or impulse control. It’s important • Identity theft risk for suicide; and increased dropout rates. to discuss with your children appropriate uses for devices when they are given access to them. This through sextortion, report it to your parents and U.S. Department of Justice includes communicating with others online and encourage the victim to talk to their parents and Federal Bureau of Investigation sending photos. Parents may want to maintain their report it to the FBI. child’s online account access information with the • If you are receiving sextortion threats, don’t be child’s understanding that the parent can log in at afraid to talk to your parents or to call the FBI. any time. Communicate with your children. How do I Report a Suspected Incidence Have age-appropriate discussions with your child about the dangers associated with communicating of Sextortion? with unknown people online, sending photos, or engaging in other risky behavior online. In an Report sextortion to the FBI. effort to protect children from online predators, it’s It is important to report all instances to law important to educate them about sextortion and the enforcement. While in some cases the person motivations of those who extort children. Let your committing sextortion is also a teenager, it is more children know they can come to you without fear of likely that the perpetrator is an adult masquerading reprisal, and that you have a genuine interest in their as a teenager. Law enforcement can make that safety and online activities. Those exploited through determination and take steps to help minimize these crimes are victims, no matter what they did or further distribution of sensitive material. A parent’s how they responded to the threat. report may result in the rescue of dozens or even hundreds of other children. Layer security. To report suspected sextortion crimes or Employ basic technology security measures. Use SEXTORTION OF CHILDREN to get help from law enforcement, call your strong passwords and update software regularly. local FBI office or toll-free, at Never open attachments to e-mails unless you are IN THE UNITED STATES 1-800-CALL-FBI (225-5324). certain of the sender. Use a firewall, anti-malware A Fact Sheet for Parents and Children software, and consider use of encryption for your hard drive. Keep in mind that some malware attacks Resources: are targeted, meaning criminals may customize their • The National Center for Missing and Exploited tools so that more simplistic anti-malware programs Children (www.missingkids.com) do not detect them and victims are more apt to take • FBI Cyber Alerts for Parents and Kids: Be the bait. Do not assume technology alone will protect Prudent When Posting Images Online (http://www. you; you must also do your part to protect yourself. fbi.gov/news/stories/2011/december/cyber_122211/ For Children: cyber_122211) • Turn off your computer when you are not • FBI Cyber Alerts for Parents and Kids: Be using it. Aware of ‘Sextortion’ (http://www.fbi.gov/news/ stories/2012/february/sextortion_021012) • Cover webcams with a removable sticker or tape when you are not using them. • Don’t open attachments when you’re not July 2015 confident of the sender. • Never send compromising images of yourself to anyone, no matter who they are or who they say they are. • If someone you know is being victimized