Sextortion

Definition

Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.

Related Terms

Blackmail, Extortion, Coercion, NCII (Nonconsensual Intimate Imagery – as the material used for threats).

Background

Sextortion involves an individual or group threatening to share private, intimate images or videos, or other sensitive or embarrassing information about a victim, unless the victim complies with certain demands. These demands commonly include money, further sexually explicit images/videos/audio, or forcing the victim to perform specific actions. The threat leverages the potential for severe shame, reputational damage, or harm if the private material is exposed. Attackers might initially obtain material through deceptive means (e.g., catfishing, hacking) or from a consensual exchange that they later exploit.

Volunteer moderators may become aware of sextortion through direct, distressed reports from victims within their community, or if they observe behaviour that strongly indicates an account is being coerced or is trying to warn others about a perpetrator. Dealing with sextortion requires extreme sensitivity, focusing on victim safety and support.

The activity often begins on social media, then is moved to a separate chat application or platform.

Why We Care

Dealing with sextortion is of critical importance because it is a serious crime and a severe form of abuse that can have devastating psychological, emotional, and financial impacts on victims. It involves profound breaches of trust, privacy, and autonomy. Allowing sextortion to occur or go unaddressed creates an incredibly unsafe environment, terrifies victims into silence, and can embolden perpetrators.

Communities have a responsibility to protect their members from such predatory behaviour and to provide a safe avenue for reporting and support. A robust response is essential to victim safety and maintaining any semblance of trust.

Spotting Sextortion: What to Look For

Identification of sextortion usually relies on reports from victims or individuals who have knowledge of a victim’s situation. Observable signs within public community spaces might be indirect.

Account Traits (Perpetrator): The perpetrating account might be anonymous, use a fake profile, or be an account previously known to the victim (even an ex-partner). They operate by making threats, often in private messages.

Content Characteristics (Evidence from Victim Reports): Victims might report receiving messages containing threats to release their intimate images/videos or other compromising data. These messages will detail the perpetrator’s demands (money, more images, specific actions). Sometimes, a perpetrator might release a small portion of the material to show they are serious.

Posting Patterns (Victim or indirect signs): A victim might suddenly delete their profile, post uncharacteristic messages that seem fearful or coerced, or subtly try to seek help. Public posts directly outing a sextortion attempt by a victim are rare due to fear but are possible. More likely, reports will come via private channels.

Behaviour (Perpetrator): The perpetrator’s behaviour is characterised by coercion, threats, and demands, leveraging the victim’s fear of exposure. They aim to control and exploit the victim.

Key Questions for Assessment (Primarily based on victim reports):

  • “Is there an immediate risk to the victim’s safety or well-being?”
  • “Is an account reporting that they are being threatened with the exposure of private/intimate material if they do not meet certain demands?”
  • “What are the demands being made (e.g., money, more images, actions)?”
  • “Does the victim have evidence of these threats (e.g., screenshots of messages)?”

Before You Act: Common Pitfalls & Nuances

Handling sextortion cases requires utmost care, prioritising the victim’s safety and wishes.

Victim’s Safety First: All actions must be guided by what is safest and most supportive for the victim. Do not pressure them to take actions they are not comfortable with.

Confidentiality: Reports of sextortion must be handled with strict confidentiality to protect the victim from further harm or exposure.

Do Not Engage the Perpetrator (Generally): Moderators should generally not directly engage with or admonish the alleged perpetrator, as this can escalate risks for the victim. Focus on supporting the victim and removing any shared material.

Evidence is Key (for further action): While immediate support is paramount, if the victim wishes to report to law enforcement, evidence is crucial.

Common Gotchas:

  • Dismissing a report or not taking it seriously enough.
  • Inadvertently revealing the victim’s report to the perpetrator.
  • Giving advice that could put the victim at greater risk (e.g., advising them to simply pay the blackmailer, which often leads to more demands).
  • Not being aware of appropriate support organisations to refer victims to.

Key Point: Sextortion is a crime and a severe form of abuse based on coercion and threat using private/intimate material. Your primary role is to support the victim, remove any of the material if it appears on your platform, and direct them to specialist help.

Managing Suspected Sextortion: Key Steps

(For sextortion involving minors, see CSEA)

When sextortion is reported by a victim or suspected:

  • Believe and Reassure the Victim: Take the report seriously. Reassure the victim that they are not to blame and that you will help in any way you can within your role. Emphasise confidentiality.
  • Prioritise Victim’s Wishes and Safety: Ask the victim what they would like to do and what would make them feel safer. Do not pressure them.
  • Advise Non-Compliance with Demands (Generally): Specialist organisations usually advise victims not to pay or give in to demands, as this often encourages perpetrators. Instead, focus on blocking the perpetrator and preserving evidence.
  • Remove Any Exposed Material Immediately: If any of the victim’s private material has been posted on your community, remove it instantly.
  • Preserve Evidence (with Victim’s Consent): Encourage the victim to save all communications, threats, and any shared images from the perpetrator. If they are comfortable sharing this with you / your Service Administrator for the purpose of banning the perpetrator from your platform or for their own reporting to authorities, handle it with extreme care and confidentiality.
  • Ban the Perpetrator’s Account(s): Once confirmed through credible victim report and/or evidence, permanently ban any accounts used by the perpetrator from your community.
  • Direct to Specialist Support Organisations: This is crucial. Provide the victim with contact details for national or local organisations that specialise in supporting victims of sextortion and image-based abuse (e.g., Revenge Porn Helpline, NCMEC, local police cybercrime units, helplines for victims of sexual violence).
  • Discuss with Designated Team Members (if applicable): Share information only with designated, trusted moderators or your Service Administrator, maintaining strict confidentiality.
  • Advise on Blocking and Security: Advise the victim on how to block the perpetrator on your platform and others, and to review their account security settings (strong passwords, multi-factor authentication).

Resources for Victims

Example Community Guidance

  • Strike System: “Sextortion is a severe criminal offence and bypasses any strike system. Perpetrators will be banned immediately.”
  • General Prohibition: “Threatening to share an individual’s private, intimate images or information to extort money, further images, or any other action is strictly prohibited and illegal.”
  • Strict Enforcement: “Any account found to be engaging in sextortion will be immediately and permanently banned. We will support victims by removing any non-consensually shared material under our control and will provide information on reporting to law enforcement and specialist support organisations. We treat such matters with the utmost seriousness and confidentiality.”

IFTAS
IFTAS
@about.iftas.org@about.iftas.org

Nonprofit trust and safety support for volunteer social web content moderators

47 posts
291 followers

IFTAS is a non-profit organisation committed to advocating for independent, sovereign technology, empowering and supporting the people who keep decentralised social platforms safe, fair, and inclusive..