Read other peoples sex chats

The malicious software he employed provided access to all files, photos, and videos on the infected computers.

And if they did, he would then threaten them further, notifying them that he knew they had told someone.

In at least one case, he posted nude photos of a victim on the Myspace account of a friend of the victim, which Mijangos had also hacked, after she refused to comply with his demands.

Read other peoples sex chats-24Read other peoples sex chats-13

But at the core of the crime always lies the intersection of cybersecurity and sexual coercion.

We tend think of cybersecurity as a problem for governments, major corporations, and—at an individual level—for people with credit card numbers or identities to steal.

The average teenage or young-adult Internet user, however, is the very softest of cybersecurity targets.

We searched dockets and news stories for criminal cases in which one person used a computer network to extort another into producing pornography or engaging in sexual activity.

We found nearly 80 such cases involving, by conservative estimates, more than 3,000 victims. Prosecutors colloquially call this sort of crime “sextortion.” And while not all cases are as sophisticated as this one, a great many sextortion cases have taken place―in federal courts, in state courts, and internationally―over a relatively short span of time.

Leave a Reply