- Journal Archives
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
Cassidy Wolf, the current Miss Teen USA, recently came forward claiming to be the victim of the latest and highest profile “sextortion” attempt to hit the media. Sextortion is a form of exploitation that employs non-physical coercion to extort sexual acts and favors from the victim. In Ms. Wolf’s case, the attacker used specific software to take control of her computer, viewed her through its built-in webcam, took explicit pictures of her, and downloaded files from her computer. The extortionist then threatened to release the stolen photos onto the internet unless Ms. Wolf met his demands. Instead of complying, she went to the authorities. While no arrest has been made, the FBI predicts that the attacker has victimized at least a dozen people.
Remote Administration Tools (the “RAT”) is a piece of software that allows a remote person to fully control a computer over the internet. This includes downloading files, turning on the microphone, and activating the webcam (often without activating the light that signals it is recording). The software been around for long enough that a community of RAT operators has developed, with many members detailing their exploits in posts and even photos. Several years ago, the country was astounded to hear the story of Luis Mijangos, a paraplegic middle-age man who had extorted sexually explicit photos and videos from literally hundreds of different women.
Over the past few years, it has become clear that the invasion of privacy is growing. As recently as January 2013, a man was arrested for exploiting over 350 women. In 2012, someone claiming to be Justin Bieber extorted pictures from hundreds of preteen girls before being caught. Another sextortion plot involved a group of professional poker players. The danger is pervasive: boys are targeted as well as girls, and perpetrators are sometimes as familiar as a family friend.
The danger of invasive privacy violations has become common and universal to all sexes and ages. Many people now place stickers over their webcams unless they are in use, and some disable their microphone software as well. While constant antivirus updates and internet “street” knowledge (such as not opening suspect files) can help, they are not a foolproof solution. Ms. Wolf has set a wonderful example by confronting the attacker and not bowing to the pressure of embarrassment. Victims who choose to fight will find ready assistance from the FBI and should remember that their attackers can face real punishment.
Recent Blog Posts
- Is Streaming Speech?
- Does Tweaking Your Car’s Software Constitute Fair Use?
- Controlling the Uncontrollable: UK Taking the Driver’s Seat in Driverless Car Technology
- Obama’s Cybersecurity Executive Order: Private Sector Must Help Police the “Wild West”
- Qualcomm Settlement May Reconfigure the Smartphone Market in China
- Who Rightfully Owns the Village People’s YMCA?
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution