The rise of ‘sextortion’ on social media and how to protect youth

February 3, 2023

One of the most significant online safety risks for children and teenagers today is sextortion.  One of the most significant online safety risks for children and teenagers today is sextortion.

“Sextortion,” a portmanteau of sexual and extortion, refers to a crime in which one party makes online threats to release sexually explicit images or videos to coerce and blackmail young people.

The motivations for sextortion have changed over time. Once, it was primarily leveraged as a means of online sexual exploitation or to escalate sexual activity. However, the most recent reports from the FBI have seen an increase in financial sextortion, in which explicit content is used as blackmail for the predator to demand money. 


A January 2024 press release from the FBI Sacramento Office reported that the agency observed a 20% increase in financially motivated sextortion between October 2022 and March 2023. 


Furthermore, the Internet Crime Complaint Center — a division of the FBI — estimates that they received over 18,000 sextortion-related complaints nationally, resulting in losses of more than $13 million in 2021. 

In 2020, the Federal Bureau of Investigation issued a PSA to alert the public to a noticeable increase in sextortion crimes amidst quarantine mandates during COVID-19. 

Furthermore, the Internet Crime Complaint Center — a division of the FBI — estimates that they received over 18,000 sextortion-related complaints nationally, resulting in losses of more than $13 million in 2021. 

Numerous other statistics illustrate the disturbing trend of sextortion and its impact on youth: 

  • Approximately 5% of students reported that they had been the victim of sextortion; 3% of students admitted to threatening others who shared sensitive images with them in confidence 

  • On average, 1 out of 4 victims were 13 or younger when threatened

  • Almost half of extorters follow through on their threats if the victim does not comply

  • Roughly 1 out of 3 victims reported that threats lasted three months or longer

  • Half of sextortion victims are threatened several times per day, with 1 in 4 receiving between 10 and 19 threats per day 

Source: Thorn

How does sextortion work?

Online sextortion schemes are executed in a myriad of ways. In some instances, an adult will masquerade as a young man or woman to deceive and lure youth into sending inappropriate images and videos. Once the perpetrator receives explicit photos, they follow up with additional demands and threaten to disseminate content to friends and family if the victim doesn’t comply.  

Roberta Liggett O'Malley conducted a qualitative analysis of 130 sextortion cases involving minors and was able to identify five phases that typically mark the grooming process. With this knowledge in mind, family members, educators, and even the victim's friends can help protect children from online sextortion. 

Preparation

Before even making contact with their potential victims, sextortion perpetrators craft a multi-layered deception of falsified identities. These measures can include collecting photos to “catfish” with, creating fake social media accounts, using a VPN to hide their location, and obtaining alternative phone numbers through apps. 

These individuals typically study their target communities to inform their efforts, focusing on interpersonal signals like language styles and key topics to appear more authentic to others within the group. 

Entry

Once they’ve established a new identity, predators attempt to entrench themselves in a youth-centric platform or community by impersonating someone of the same age with the same interests. 

Predators find their victims throughout a variety of platforms where young teens frequent, including: 

  • Gaming platforms

  • Social media platforms

  • Instant messaging platforms and apps (WhatApp, Kik, Telegram, etc)

While sextortion can affect anyone, regardless of age or gender, teenage boys are particularly vulnerable due to their presence on gaming platforms.  Last year, the FBI launched its "It's Not a Game Campaign" to spread awareness about the uptick in sextortion cases originating from gaming sites. 

For example, an individual targeting young men might create an account on a messaging platform targeted to gamers, join servers they believe will bear fruit, and begin messaging individuals after “befriending” the larger group. 

After identifying someone that they deem vulnerable, predators may attempt to collect personal data on the minor by researching public social media profiles. They’ll scour posts for information that might clue them in on insecurities or interests that could serve as an entry point for initial contact.

Procuring initial images and information

After initial entry, individuals will then begin the more targeted grooming process, which usually starts with asking for seemingly innocuous photos or conversations. The victims are subjected to a gradual emotional build up intended to lower the minor’s defenses through flirtation, friendship, and a sense of mutual vulnerability. 

Eventually, the emotional manipulation ramps up to create a sense of loyalty that will make a request for explicit content feel “normal” within the context of the fake romantic relationship. Thus, the victim is more prone to falling victim and sending sexual imagery.

Another tactic is quid pro quo, coercing the victim through sending sexual media first or offering to purchase goods like online game credits.

Crime commission

When they've received the intimate imagery, the perpetrator shifts the dynamic, making demands for more intimate images, access to the minor's bank accounts, or, in real-life relationships, sexual acts.

Should initial threats not coerce the victim, predators may then begin threatening to hack social media accounts to impersonate the child and share explicit content publicly with friends and family members.

Sextortion can occur offline, too.

In fact, according to research from the Crimes Against Children Research Center at the University of New Hampshire, approximately 60% of victims surveyed stated that offline blackmail was the origin of their sextortion. In these cases, the victim may have known the individual who sexually exploited them. For example, a former romantic partner may have threatened to share a nude photo to manipulate and control their victim. 

Offline extortionists may also be anonymous. They can extort their victims with false claims about images or information they have. For instance, someone with information about where a student lives can convince their victim that they have more power to expose them than they actually do. This creates a ripple effect of control and demand. 

Exit

The exit phase initiates when the predator feels that they have exhausted the victim’s resources, whether that be emotionally or financially. In some cases, they will immediately cease all communication, leaving victims in fear of exposure indefinitely. 

Others may make one final threat, promising to delete the incriminating materials in exchange for silence. Unfortunately, even if they stop direct contact, perpetrators may retain the content for future blackmail  or share it with others.

The role of technology in sextortion 

Technology is at the crux of all sextortion efforts, whether they begin online or offline. Morally corrupt individuals use modern tech tools, apps, and platforms to find, stalk, communicate with, groom, and threaten victims. 

Recognizing signs of sextortion

School staff and parents must be able to recognize signs of sextortion among students. When schools and parents work together, they cast a much wider student safety net both offline and online, both in and outside of school. 

Victims of sextortion will likely exhibit clear signs of decline in mental health and wellbeing, such as: 

  • Becoming increasingly secretive with digital devices

  • Exhibiting possessive behavior over digital devices

  • Leaving the room to take calls or read messages and covering screens when someone walks in

  • Sudden and unexplained personality changes or mood swings 

  • Vaguely discussing new friendships and spending more time speaking to new friends

  • Decrease in grades and time spent on school activities 

Online signs of a potential sextortion case include: 

  • Spending more time on digital devices

  • Using encrypted messaging apps with greater frequency  

  • Suspicious search queries (i.e., "what to do when someone blackmails you")

Spot the signs with Monitor

Try Monitor in your district for 30 days at no cost. You'll learn which online safety categories are most prominent and we'll alert you to at-risk students who need timely intervention.

Get a Student Safety Audit


Using technology to identify at-risk students

Technology plays a central role in sextortion but can also be used to identify, combat, and prevent it. 

Online student monitoring software and parental apps are instrumental in identifying online signs of sextortion. Student safety has also become increasingly important in a tech-centric learning environment. Many schools now leverage digital monitoring and student threat detection solutions to ensure kids and teens are safe while they're online. 

Student safety monitoring uses artificial intelligence and human moderators to identify suspicious online behavior. For example, online student threat detection software for schools will flag a student who uses a search engine to find information about how to meet someone they met online. It achieves this by identifying suspicious online behavior that may offer insight into potentially harmful activity.

Outside of school, parental control apps allow guardians to recognize signs of trouble before they become serious. While features vary between platforms, parental apps like Qustodio (free for School Manager and Classwize customers) typically allow parents to block specific sites, monitor browsing history and screen time on school-issued and personal devices, set time limits, and track calls and messages. 

These features offer valuable data about how mobile devices are used. Parents can use this to glean insights into patterns of behavior. Furthermore, in the unfortunate circumstance where sextortion is identified, the parental app may offer crucial evidence that aids reports to authorities. 

The impact of sextortion among youth

Nearly half of all perpetrators carry out their threats when their demands are not met, representing actual harm to targeted victims. 

According to a report published by the National Children's Alliance, 1 out of 4 victims sought mental health or medical care after being extorted. Underage individuals may feel a loss of control over their lives, deep-rooted shame, anxiety, and depression, and eventually suffer from PTSD. The psychological impact is far-reaching; 1 in 8 victims reported having to relocate to begin living an everyday life again. 

In extreme cases, sextortion can result in suicide. In 2022, 17-year-old Ryan Last, a senior at Sobrato High School in California, took his own life after he could not continue paying money to an extortionist who pretended to be a young woman with a romantic interest. 

Lasts' mother, Pauline Stuart, opened up about her experience to warn other parents about the dangers of sexploitation. "To him, he wasn't smart because he fell for this scam," Stuart confided. "He believed in somebody, and that devastates me that he felt that he wasn't smart because somebody took advantage of him." 

Reducing risk of becoming sextortion victims

Identifying extortionists is complicated for many reasons. However, one of the most significant barriers to finding and prosecuting these criminals is that victims often feel ashamed of their actions. This could prevent them from confiding in someone and aiding law enforcement efforts to identify perpetrators.

Schools and parents should take preventative measures to ensure this doesn't happen to children and teens. Here are a few ways to reduce the risk of sextortion: 

  1. Apply proper parental control settings to games, apps, and social media platforms. This includes blocking the ability to contact or be contacted by unknown individuals. 

  2. Monitor personal device usage and pay attention to potential red flags. Pay particular attention to shifts in online behavior.

  3. Have transparent and open conversations. Discuss the dangers of talking to strangers online, sharing personal information, and sending explicit imagery.

  4. Teach children proper digital citizenship. Online programs like Community — Linewize’s online safety education program — leverage the expertise of psychologists and other professionals to educate parents on digital wellbeing and safety. 

  5. Ensure schools have efficient student safety monitoring systems. Parents still determining what student safety monitoring software schools use can reach out to their administration to find more information. 

  6. Create a safe haven for underage individuals. Youth should feel comfortable confiding in school counselors or parents. Children who are confident in available resources are more likely to open up about troublesome situations. 

What to do when child is a victim of sextortion

Two out of three sextortion victims speak out about their experience. Slightly more than half of people who open up about their experience speak to a friend or family member. One-fourth of victims report sextortion on the platform(s) where the threats are made, while only one-fifth report their encounters to law enforcement. 



If parents or school staff discover a child it’s a victim of sextortion, it's essential to let them know that it's not their fault. Remind them that they did the right thing by telling the truth and won't be penalized for their actions. 

Once this has been established, here are a few next steps you should take: 

  • Get a first-hand account of the entire situation from the child

  • Take screenshots of interaction between the child and the offender (inappropriate photos of underage children shouldn't be saved; be sure to report images to authorities)

  • Block all contact with the offender

  • Report the abuse to authorities, including local authorities, the National Center for Missing & Exploited Children and the Internet Crimes Against Children Task Force

  • Report the incident to the platform or app where the sextortion took place, as soon as possible

  • Provide the child with mental health counseling

  • Consider consulting with a lawyer 

Sextortion is an incredibly difficult and sensitive issue to deal with, especially when children and teens are involved. Educating yourself of how to recognize and react to sextortion will put you in a favorable position to prevent and respond to it most effectively. Know that resources are always available to you, your children, and your students. Child exploitation is a serious issue; help spread awareness to combat these harrowing sextortion statistics. 

 


Would you like some more information? Or a demo?
Get in touch
Subscribe to our newsletter

Recent posts

 
How to Recognize Grooming Online: A Guide for School Districts

Safeguarding today’s generation of young people means keeping one eye on their real-world behavior and the other on their online ...

 
How to Choose the Right K-12 Grant

As school budgets shrink and academic needs grow, grant funds are more critical now than ever. As you explore countless grants available ...

 
What Georgia Schools Need to Know About Bill 351: Protecting Georgia’s Children on Social Media Act

Georgia’s district IT leaders and administrators are preparing to meet the latest regulations in student online safety with the state's ...

 
The Use of AI Deepfakes in Cyberbullying

In 2023, we feared that generative AI would impact students’ academic honesty; in 2024, those fears have quickly escalated to their digital ...