{"id":1511,"date":"2022-02-04T17:33:56","date_gmt":"2022-02-05T00:33:56","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=1511"},"modified":"2022-02-04T17:34:00","modified_gmt":"2022-02-05T00:34:00","slug":"how-sextortion-impacts-us","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/04\/how-sextortion-impacts-us\/","title":{"rendered":"How Sextortion Impacts Us"},"content":{"rendered":"\n<p class=\"has-normal-font-size\">It is evident to say that our generations have constantly been evolving as our technology has developed. With the advanced technology improvement, people are more likely to be exposed to various digital crime compared to the past. One of the well-known digital crimes is blackmailing, leading to cause severe consequences.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" data-src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/08\/06042756\/BM.png\" alt=\"\" width=\"640\" height=\"480\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/480;\" \/><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/www.kaspersky.com\/blog\/beware_sextortion\/5796\/\">https:\/\/www.kaspersky.com\/blog\/beware_sextortion\/5796\/<\/a><\/p>\n\n\n\n<p class=\"has-huge-font-size\"><strong>What is Blackmailing?<\/strong><\/p>\n\n\n\n<p class=\"has-normal-font-size\">Blackmail is an act of threatening to reveal or publicize true or false information about a person or people until the demands are met<sup>[2]<\/sup>. A blackmailer will threaten to publish an explicit private image online unless their demands are met<sup>[1]<\/sup>. They usually demand goods such as money, and anyone can be targeted.<\/p>\n\n\n\n<p class=\"has-huge-font-size\"><strong>Why is Sextortion a Problem?<\/strong><\/p>\n\n\n\n<p class=\"has-normal-font-size\">Sextortion is an emerging type of blackmail\/extortion that frequently happens on online. It appears to be a severe worldwide problem since overall internet usage has increased during the pandemic. Being exposed to the internet has a much greater chance for people to enter unidentified websites. Once clicking these types of websites, the devices will be hacked, possibly leaking one&#8217;s private information to those who take advantage of others&#8217; precious personal data.<\/p>\n\n\n\n<p class=\"has-normal-font-size\">Many cases of sextortion happen on a dating website<sup>[1]<\/sup>. A scammer attempts to gain the victim&#8217;s trust first. As they earn the victim&#8217;s trust, they ask for explicit photos or videos. With the pictures or videos received, they threaten victims in order to achieve what they want (mostly money)<sup>[1]<\/sup>.<\/p>\n\n\n\n<p class=\"has-normal-font-size\">Another method of obtaining victim&#8217;s personal information is hacking victim&#8217;s webcam and recording any explicit videos of them<sup>[3]<\/sup>. This is done by hacking into security systems and gaining access to the victim&#8217;s  webcam\/devices. This is a serious problem because even though our devices\/webcam have been hacked, we would not realize that we had been hacked, and it would be too late when being aware of it and trying to fix the problem.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"512\" height=\"340\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/sextortionca.jpg\" alt=\"\" class=\"wp-image-1514 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/sextortionca.jpg 512w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/sextortionca-300x199.jpg 300w\" data-sizes=\"(max-width: 512px) 100vw, 512px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 512px; --smush-placeholder-aspect-ratio: 512\/340;\" \/><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/phys.org\/news\/2016-05-sextortion-cyber-crime-common.html\">https:\/\/phys.org\/news\/2016-05-sextortion-cyber-crime-common.html<\/a><\/p>\n\n\n\n<p class=\"has-huge-font-size\"><strong>Who are at risks?<\/strong><\/p>\n\n\n\n<p class=\"has-normal-font-size\">Anyone can be a victim of sextortion. A survey has been conducted with 2,006 participants. Of male respondents, 4.5% have experienced sextortion since the pandemic started, while women respondents are 2.3%<sup>[1]<\/sup>. Furthermore, the age groups have been said that more than 5% of respondents ages 18 to 29 have been victims of sextortion, while 4% are aged 30 to 40 years. Lastly, 3% are aged 41 to 64 years<sup>[1]<\/sup>.<\/p>\n\n\n\n<p><img decoding=\"async\" data-src=\"https:\/\/lh3.googleusercontent.com\/fT2VjCO6OehzvQv8KF7rMhSwReAkwNOZpMjQBf3MMRKKonhSXVmjL81kAdgnxiJW9J_sjxmGACxtddUc1h5kl9PNuCX2_APdHnDcp6qpJfisIlowQBTcwCy93l9_4_8fSutuUJt3\" width=\"624\" height=\"351\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 624px; --smush-placeholder-aspect-ratio: 624\/351;\"><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"https:\/\/914983.smushcdn.com\/2254390\/wp-content\/uploads\/2019\/07\/Deceptive-site-ahead-warning-1024x576.jpg?lossy=1&amp;strip=1&amp;webp=1\">https:\/\/914983.smushcdn.com\/2254390\/wp-content\/uploads\/2019\/07\/Deceptive-site-ahead-warning-1024&#215;576.jpg?lossy=1&amp;strip=1&amp;webp=1<\/a><\/p>\n\n\n\n<p class=\"has-huge-font-size\"><strong>Preventions\/Solutions?<\/strong><\/p>\n\n\n\n<p class=\"has-normal-font-size\">Since hackers are not generous, they will look for any victim, regardless of their age, gender, and status. Not even guaranteeing that children can be victims as they are exposed to social media from a young age. However, to both adults and children, being educated will help them not become the victims of this terrible crime.\u00a0<\/p>\n\n\n\n<ul class=\"has-normal-font-size wp-block-list\"><li>Do not send any form of sexual photo\/video<sup>[2]<\/sup><\/li><li>Do not enter unauthorized sites nor open suspicious emails<sup>[2]<\/sup><\/li><li>Do not share any personal information with others<sup>[2]<\/sup><\/li><li>Change your passwords every once in a while<\/li><li>Cover your webcam cameras<\/li><\/ul>\n\n\n\n<p class=\"has-normal-font-size\">If you have been chosen as a victim, what can you do?<\/p>\n\n\n\n<ul class=\"has-normal-font-size wp-block-list\"><li>Report to Cybertip.ca or contact police<sup>[4]<\/sup><\/li><li>Stop all communication<sup>[4]<\/sup><\/li><li>Record your evidences<sup>[4]<\/sup><\/li><li>Do not comply with the threat<sup>[4]<\/sup><\/li><\/ul>\n\n\n\n<p class=\"has-huge-font-size\"><strong>Reference<\/strong><\/p>\n\n\n\n<p>[1]:<a href=\"https:\/\/www.upi.com\/Health_News\/2022\/01\/31\/sextortion-online-blackmail-men-pandemic-study\/1201643641232\/\">https:\/\/www.upi.com\/Health_News\/2022\/01\/31\/sextortion-online-blackmail-men-pandemic-study\/1201643641232\/<\/a><\/p>\n\n\n\n<p>[2]:<a href=\"https:\/\/www.itperfection.com\/network-security\/blackmail-cybersecurity-security-extortionemail\/\">https:\/\/www.itperfection.com\/network-security\/blackmail-cybersecurity-security-extortionemail\/<\/a><\/p>\n\n\n\n<p>[3]:<a href=\"https:\/\/www.welivesecurity.com\/2020\/09\/18\/five-cybercriminals-extortion-schemes\/\">https:\/\/www.welivesecurity.com\/2020\/09\/18\/five-cybercriminals-extortion-schemes\/<\/a><\/p>\n\n\n\n<p>[4]:<a href=\"https:\/\/globalnews.ca\/news\/7777262\/sextortion-cybertip-youth-crime-teen-offenders-nudes-blackmail\/\">https:\/\/globalnews.ca\/news\/7777262\/sextortion-cybertip-youth-crime-teen-offenders-nudes-blackmail\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is evident to say that our generations have constantly been evolving as our technology has developed. With the advanced technology improvement, people are more likely to be exposed to various digital crime compared to the past. One of the well-known digital crimes is blackmailing, leading to cause severe consequences. https:\/\/www.kaspersky.com\/blog\/beware_sextortion\/5796\/ What is Blackmailing? Blackmail &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/04\/how-sextortion-impacts-us\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;How Sextortion Impacts Us&#8221;<\/span><\/a><\/p>\n","protected":false},"author":388,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1511","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Eric park","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/eric-park\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/388"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=1511"}],"version-history":[{"count":11,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1511\/revisions"}],"predecessor-version":[{"id":1533,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1511\/revisions\/1533"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=1511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=1511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=1511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}