Last time, we discussed the phenomenon of sextortion and cyber-predation, dangerous crimes that have grown out of the age of social media and internet. How does one fall victim to these crimes, and how can we protect ourselves and our children?
How Cyber-Predators Find their Victims
Predators are individuals, generally part of a network, who monitor live internet web rooms. Once they identify someone they think is emotionally vulnerable, they begin to gather information about the teen; where they live, their peers, their family, and information about the school they attend. It begins through social media. The predator uses verbal coercion, starting with compliments and flattery once there is engagement with the victim. The predator may disguise himself as a member of the opposite gender to create a false sense of security and trust for the victim. Ironically, most sextortionists are not our typecast older males; they are typically 20-30–year-old men.
Initially, the capper may convince the victim to provide a suggestive photo, and once received, follows with various threats in an attempt to extort further and more revealing photos or activities. In other situations, victims may be told by the stranger that their address is known and that harm will come to the victim’s family if s/he doesn’t comply with certain demands, usually commencing with nude or intimate photos. The demands escalate with further threats and intimidation. Once the first set of photos or video is obtained, they are used to extort more from the victim. Photos are only the beginning. The demands escalate into the salacious and X-rated, including webcam viewing or recording of the victim in various degrees of sexual activity or touch either alone or with others.
Predators who Hack
Did you know? Your webcam can be hacked, leaving you unknowingly vulnerable to sextortionists. This can happen when the victim unwittingly “accepts” the installation of a program or application. Miss Teen USA 2013 wasn’t inviolable…..her computer was hacked into, the hacker used the webcam to take pictures of her as she undressed, and then she was threatened: the photos would be posted online unless she provided other nude photos, a video, or engage in Skype. The perpetrator was eventually identified as a former high school peer. As a precaution, I encourage you and your family to refrain from undressing in the same room as your webcam.
The Impact of Cyber Predators
The greatest tragedy in this new form of extortion and bullying is the impact on the victim, his/her family, and the community. Online predators use humiliation, shame, guilt, intimidation, threat of harm to loved ones, and threat of exposure on and off-line to get compliance. Possibly the most well-known case is that of Amanda Todd, the BC teen who committed suicide in October 2012 after being bullied not only by her victimizer but also by her peers. Amanda, however, was not simply a victim of cyberbullying. It is now understood that she was also a victim of sextortion, another factor contributing to her suicide. Amanda’s experience has shown us just how prevalent sextortion is and, fortunately, awareness is increasing amongst law enforcement, educators, and mental health professionals.
How to Protect Yourself and Your Children
Having conversations with your kids about cyberbullying and sextortion can be difficult and uncomfortable. But being aware of the risks and understanding how to reduce risks for you and your family is well worth any temporary moments of discomfort. Your EFAP counsellor can help.
Cyber Alerts for Parents & Kids Tip #2: Beware of “Sextortion” http://www.fbi.gov/news/stories/2012/february/sextortion_021012