Professional Documents
Culture Documents
Case Study
About Sextortion
In Partial Fulfillment
of the Requirements for the Degree
Bachelor of Science in Information Technology
BSIT – 3O
Members:
Boctoy, Gabriel Jr. B.
Dayola, Richard R.
Gusto, John Rencel S.
Irinco, Princes Joana B.
Mendoza, Bianca Lou C.
Solis, John Patrick N.
Villar, Jhoncel L.
December, 2021
Synopsis/Executive Summary
as a word, itself, but it is counted as a prosecutorial slang. This crime is basically a sex
photos throughout the internet and the internet can be a very scary platform at time
despite its powerful impact towards the aspect of communication. It can also be done in a
way where a criminal invades a private safe of a person and demand a sexual activity
while in a presence or in front of a camera. These are a few examples of how these
Teenagers or young adult users of the internet are the general victims of these
heinous act because of the fact that almost all of them are not computer illiterate enough
the heighten their cybersecurity which makes them the targets of these offenders. As the
internet is such a vast network, they meet someone which in time will turn in an intimate
relationship and end in them “sexting” one another and that’s where the nightmares start.
The combination of lax cybersecurity and sending of pornographic material makes it the
The main problem about crimes that uses the digital age efficiently is that people
nowadays rely too much on the standard security that they get and don’t use the chance to
upgrade their cybersecurity. Multiple warnings have been said, distributed, and
broadcasted in a lot of countries. Being responsible should be one of the utmost things
someone should be aware of especially if you’re entering the world of internet where not
Findings
the victim. Sextortion refers to the broad category of sexual exploitation in which abuse
effective consent, and includes, without limitation, causing or attempting to cause the
incapacitation of another person in order to gain a sexual advantage over such other
transmitting identifiable images of private sexual activity and/or the intimate parts.
any age takes advantage of a power imbalance to force or entice a child into engaging in
sexual activity in return for something received by the child and/or those perpetrating or
facilitating the abuse. As with other forms of child sexual abuse, the presence of
perceived consent does not undermine the abusive nature of the act.
substantially true or false information about a person or people unless certain demands
are met. It is often damaging information, and it may be revealed to family members or
person do something or for other reasons, such as revenge or humiliation. Persons who
completed the online survey are referred to as “respondents” and those who threatened
them as “perpetrators.” The respondents in our sample were primarily female (83%) and
teenagers (ages 18 and 19); about 40% were in their early 20s. The sextortion episodes
they reported were diverse, but incidents broadly fell into two groups:
b) A perpetrator who met a respondent online used a sexual image obtained from the
images of a sexual nature without consent, usually for the purpose of procuring additional
images, sexual acts, money, or something else. Despite increased public interest in this
behavior, it has yet to be empirically examined among adolescents. The current study fills
representative sample of 5,568 U.S. middle and high school students. Approximately 5%
of students reported that they had been the victim of sextortion, while about 3% admitted
to threatening others who had shared an image with them in confidence. Males and
nonheterosexual youth were more likely to be targeted, and males were more likely to
target others. Moreover, youth who threatened others with sextortion were more likely to
have been victims themselves. Implications for future research, as well as the preventive
Discussion
Problem
Teenagers and young adults do not utilize strong passwords or two-step verification.
Solution 1 Solution 2
Always set your 2FA (Two Factor Change your passwords once in awhile, and put
accounts if applicable.
trying to
access your
Backup email helps you
account.
recover your account.
Problem
They share information with others who have even laxer cyber security measures
than they do.
Solution 1 Solution 2
Do not share your personal Do not send sexual photos to anyone, even to
information to someone you don’t your lover. Learn to value yourself.
know personally.
cybercriminals online.
try to steal
your identity,
banking
information,
or other
personal
information.
number of sextortion cases have been filed in federal courts, state courts, and worldwide.
Each involves an assailant who enters the residences of a huge number of victims,
sometimes in massive numbers, and demands that they provide sexual activity. Sextortion
cases typically involve what are effectively online, distant sexual assaults that occur over
affects governments, large organizations, and individuals with credit card numbers or
identities to steal. The average adolescent or young-adult Internet user, on the other hand,
is the most vulnerable of cybersecurity targets. In general, teenagers and young adults do
not utilize strong passwords or two-step verification. They frequently "sext" each other.
They occasionally take pictures or movies of themselves that are sexual or semi-
pornographic. They also share information with other kids who have even laxer
cybersecurity measures than they do. Sextortion thus appears to be rather simple to carry
out in a target-rich environment, requiring little more than nasty guile in many cases.
The offense can take a variety of forms, and it can be prosecuted under a variety
which are then used to extort further money. More often than not, it involves social media
manipulation and deceit. However, the combination of cybersecurity and sexual coercion
is always at the heart of the crime. For the first time in human history, the Internet's
worldwide interconnectedness means that you no longer need to be in the same nation as
someone to sexually threaten them. The problem of this new digital sex crime, spurred by
widespread Internet connections and webcams, is almost completely unstudied. The FBI
has issued multiple sextortion warnings, and law enforcement officials are well aware of
it.
Conclusion
Despite it being a topic for ages, it has little attention for it to be totally eradicated
in a sense where the whole issue would be resolved in only a matter of time. According to
surveys and studies, 5% of victims are students and 3% admitted in threatening those
victims. Believe it or not, males are the most common and typical targets and what’s
worse is that some of those who have been charged of this offense were once victims,
themselves. Another heartbreaking fact is that these victims do not have the confidence to
victims and manipulate them to the point where they would share their passwords in their
social media accounts. 75% of the victims admitted that they have indeed sent an explicit
image to someone else and the remaining 25% of the victims got their photos procured by
This is where cybersecurity should be one of the utmost priority when using the
internet. There is no harm in heightening and upgrading ones security sense it is for their
own good to avoid instances like sextortion to happen. Refraining from taking explicit
photos is advisable especially in this age where everything can be seen when using the
internet.
Recommendation
automatic caution when exchanging it with a person you talk to online. No matter
how trustworthy that person is, there are those that are desperate for attention and
- If you are in possession of a private material, never let anyone else see
and have it especially if it was only given to you and no one else. Even if that
3. And in case you encounter a perpetrator, Stop engaging with them immediately.
- Dodgy people should be avoided at all cost. Never try to initiate more
into the conversation. Never interact especially if you are already feeling
uncomfortable before the conversation even started. Trust your instinct at times
like that.
Implementation
This implementation contains the factors affecting sextortion, the processes, and
the results , including how to introduce potential solutions to prevent sextortion and how
to promote large scale use and sustainability. The intent is to understand what should be
done, by whom and by when of this implementation work in “real world” settings and to
of sextortion exists, the cases proceed under the laws. Sextortion, rather, is a form of
sexual exploitation, coercion, and violence, often but not always of children.We tend
people with identities to steal. Awareness and reporting of sextortion crimes, while acting
responsibly online, are key in protecting adults and children. We also have to start
advocating peoples especially the minors on how to prevent from being a victim of
sextortion. Congress should pass such a law, incorporating elements already present in
federal sexual abuse, extortion, child pornography, and abusive sexual contact law. It is
important to note that sextortion is not strictly speaking a sexual crime, it is about
exerting power over victims. Teens with a healthy sense of self-worth and a good support
DEPARTMENT OF INFORMATION TECHNOLOGY
QUEZON CITY UNIVERSITY 12
system are less likely to submit to extortion demands. We hope this study becomes a
powerful tool to raise public awareness about sextortion, and to support legislators,
References
Jurecic, Q. C. S. (2016, July 29). Sextortion: The problem and solutions. Brookings.
https://www.brookings.edu/blog/techtank/2016/05/11/sextortion-the-problem-and-
solutions/
Thomson Reuters Foundation. (2016, July 19). A Call to Action: Ending ‘Sextortion’
9251-abc07d588347
https://www.welivesecurity.com/2014/03/17/tips-for-protecting-against-sextortion/
Wolak, J. (2016, October 31). Sextortion: Findings from a survey of 1,631 victims.
Center.https://calio.dspacedirect.org/handle/11212/3037
The Scottish Government. (2018, August 8). Child sexual exploitation: definition and
sexual-exploitation-definition-practitioner-briefing-paper/
Patchin, J. W., & Hinduja, S. (2018, September 28). Sextortion Among Adolescents:
https://www.researchgate.net/publication/327966075_Sextortion_Among_Adolescen
ts_Results_From_a_National_Survey_of_US_Youth
Patchin, J. W. (2019, November 25). Sextortion: More Insight Into the Experiences
insight-into-the-experiences-of-youth