Home      Login

Exploring Online Sextortion  

Author:  Roberta Liggett.

Source: Volume 21, Number 03, April/May 2020 , pp.33-36(4)

Sex Offender Law Report

next article > |return to table of contents


The integration of technology into sexual and gender-based violence has received increasing attention from law enforcement, politicians, and scholars. In particular, sextortion—or the threat to distribute intimate images or videos unless a victim satisfies a demand—has emerged as a prominent and growing threat to Internet users. In this article, Roberta Liggett presents preliminary results from her study of open source sextortion cases, and specifically how new technologies function as a tool for sexual extortion. Focus is placed on methods of obtainment (such as hacking and grooming), demands (such as contact and finances), and motivations (such as sexual gratification and control).

Keywords: Grooming; Child Pornography; Hacking; Sexting; Extortion

Affiliations:  1: Michigan State University.

Subscribers click here to open full text in PDF.
Non-subscribers click here to purchase this article. $22

next article > |return to table of contents