{"id":49821,"date":"2023-03-08T14:30:08","date_gmt":"2023-03-08T14:30:08","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/"},"modified":"2023-03-08T14:31:03","modified_gmt":"2023-03-08T14:31:03","slug":"fighting-back-against-the-sextortion-epidemic","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/","title":{"rendered":"Fighting Back Against the Sextortion Epidemic"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p>Digital Forensics Company is battling to guard and educate the general public a few quickly rising pattern in cybercrime dubbed sextortion, the place on-line predators goal teenagers and younger adults with threats to reveal delicate private photographs.<\/p>\n<p>The extortionists disguise their id on social media platforms, claiming to have a revealing image or video that they&#8217;ll share until the sufferer sends extra pictures, pays cash, or performs lewd acts. These assaults declare the lives of many teenagers and trigger immense nervousness, despair, and monetary loss to 1000&#8217;s.<\/p>\n<p>Monetary sextortion is on the rise, famous the U.S. Division of Homeland Safety\u2019s <a href=\"https:\/\/www.ice.gov\/features\/sextortion\" target=\"_blank\" rel=\"noopener\">webpage on sextortion<\/a> which shares rising considerations by the Nationwide Middle for Lacking and Exploited Youngsters (NCMEC) concerning the risks to children victimized by such cyberattacks. A current evaluation by that company disclosed that as many as 79% of predators search cash somewhat than further sexual imagery.<\/p>\n<p>What makes the sort of cyberattack completely different from different extortion crimes is its connection to hacking, famous Digital Forensics\u2019 Public Relations Supervisor and former Digital Investigator Kenneth Kuglin. The perpetrator has already gained entry to sexual materials both supplied by or stolen from the sufferer.<\/p>\n<p>\u201cConventional sextortion happens when a sufferer is threatened or blackmailed into offering extra sexual imagery. The predator threatens to share the nude or sexual pictures with the general public,\u201d he instructed TechNewsWorld. A much more frequent sort these days is monetary sextortion. A predator calls for cash or present playing cards in alternate for maintaining the sexual content material non-public.<\/p>\n<h3>Sextortion Extra Frequent Than You\u2019d Suppose<\/h3>\n<p>Kuglin balked on the stereotypical use of the phrase \u201cassaults\u201d when related to sextortion. That phrase will not be the most effective one to explain the strategies that criminals use.<\/p>\n<p>\u201cFairly than picturing a hacker who is ready to entry your cloud and acquire entry to personal photographs, the overwhelming majority of sextortion circumstances contain social engineering,\u201d he countered. \u201cThe perpetrator manipulates victims into sending the photographs voluntarily, by strategies of catfishing, posing as somebody the sufferer wish to be intimate with, after which afterward revealing their intentions to blackmail.\u201d<\/p>\n<p><center><br \/>\n                    <!--ps: 55 crid: 10820:a-nice_q422i_970c-1s cc: s_c:10822,10820,10742,10726 px:0--><\/p>\n<div class=\"cls-1678285806\">\n<div class=\"wa-ad-display-wrap wa-ads-55\" style=\"display: inline-block;\" data-adposition=\"55\" data-adname=\"TNW-STORY-1\" data-crid=\"10820\">\n<p>ADVERTISEMENT<\/p>\n<p><a href=\"\" onclick=\"ENN_ad_wo(10820,'16782858068208','58cf78631e'); return false; \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.ectnews.com\/wp-content\/uploads\/sites\/6\/2023\/01\/nice-scn-q422i-970x250-1.jpg\" width=\"970\" height=\"250\" border=\"0\" alt=\"Build smart self service fast with NICE Enlighten XO\"\/><\/a> <\/div>\n<\/p><\/div>\n<p> <!--\/ps: 55 crid: 10820:a-nice_q422i_970c-1s cc: --><\/center><\/p>\n<p>Regulation enforcement companies are seeing an rising surge within the prevalence of sextortion for the reason that 2020 international pandemic. Based on the FBI, greater than 7,000 reviews of sextortion occurred in 2022.<\/p>\n<p><a href=\"https:\/\/www.thorn.org\" target=\"_blank\" rel=\"noopener\">Thorn<\/a>, a corporation targeted on preventing little one sexual abuse, carried out a survey in 2017 that exposed 33% of sextortion victims within the research had not instructed anybody as a consequence of disgrace or embarrassment.<\/p>\n<p>\u201cDigital Forensics noticed a large surge in circumstances associated to sextortion since 2020. Our digital analyst group reported that not less than 70% of the circumstances they dealt with have been sextortion associated in 2022,\u201d provided Kuglin.<\/p>\n<h3>Efficient Modus Operandi<\/h3>\n<p>Cybercriminals usually function on-line by varied social media platforms, relationship apps, and messaging companies to focus on weak people, similar to youngsters or younger adults, he defined.<\/p>\n<p>\u201cFairly often, we see a sample whereby these criminals contact a sufferer on one platform, then ask them to maneuver to a second and even third that makes use of encrypted messaging, which makes it harder to trace their crimes,\u201d stated Kuglin.<\/p>\n<p>Whereas sextortionists can function independently, they typically work inside an organized group or community that oversees their actions. These organizations are situated in several elements of the world, making it difficult for legislation enforcement companies to trace them down and convey them to justice.<\/p>\n<p>\u201cThe employers of those sextortion empires present their workers with assets similar to a laptop computer and media to make use of to create false profiles, and in return, will take a reduce of the earnings that the workers purchase by sextortion,\u201d he noticed.<\/p>\n<h3>Expert Con Artists<\/h3>\n<p>Sextortionists use varied techniques to focus on their victims and acquire sexually specific pictures or movies. The strategies are significantly efficient in entrapping unaware children.<\/p>\n<p>One tactic is to publish private adverts on platforms similar to Craigslist or Reddit, the place they fake to hunt intimacy to coerce victims to reply. An analogous ploy entails creating pretend profiles on on-line relationship websites similar to Tinder or Ashley Madison.<\/p>\n<p>One other methodology employed by intercourse cybercriminals is to achieve out on to potential victims on social media similar to Instagram, Fb, or Snapchat with pretend profiles designed to match a goal\u2019s erotic pursuits.<\/p>\n<p>With focused potential victims in sight, sextortionists ship unsolicited nude or specific content material to their targets through non-public messaging. In sure situations, the criminals could instantly threaten a goal\u2019s mates or household in an try to realize sexual materials with none prior rapport with the potential sufferer.<\/p>\n<p>\u201cPornographic content material is related to diminished grey matter within the prefrontal cortex in comparison with baseline, and this tactic is meant to lower the decision-making means of a goal,\u201d famous Kuglin.<\/p>\n<h3>Leveraging the Consequence<\/h3>\n<p>The purpose is to amass sexually specific materials from a sufferer. Then the perp makes use of it as leverage to coerce the sufferer into offering extra specific materials or complying with monetary calls for.<\/p>\n<p>Threatening to share the photographs with the sufferer\u2019s family and friends or posting it publicly on-line is a standard menace. Sextortionists typically create web sites devoted to shaming a sufferer.<\/p>\n<p><center><br \/>\n                    <!--ps: 55 crid: 10822:a-nice_q422i_970t-1s cc: s_c:10822,10820,10742,10726 px:0--><\/p>\n<div class=\"cls-1678285806\">\n<div class=\"wa-ad-display-wrap wa-ads-55\" style=\"display: inline-block;\" data-adposition=\"55\" data-adname=\"TNW-STORY-1\" data-crid=\"10822\">\n<p>ADVERTISEMENT<\/p>\n<p><a href=\"\" onclick=\"ENN_ad_wo(10822,'16782858064915','8a593fcf62'); return false; \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/www.ectnews.com\/wp-content\/uploads\/sites\/6\/2023\/01\/nice-scn-q422i-970x250-1.jpg\" width=\"970\" height=\"250\" border=\"0\" alt=\"Build smart self service fast with NICE Enlighten XO\"\/><\/a> <\/div>\n<\/p><\/div>\n<p> <!--\/ps: 55 crid: 10822:a-nice_q422i_970t-1s cc: --><\/center><\/p>\n<p>With a view to improve the strain on the sufferer, sextortionists typically ship screenshots of the sufferer\u2019s mates record or different private info to reveal their entry to the sufferer\u2019s social community.<\/p>\n<p>\u201cThis may be an extremely distressing expertise, because it not solely exposes their intimate materials but additionally places their popularity and private relationships in danger,\u201d stated Kuglin.<\/p>\n<h3>Native Regulation Enforcement Typically Unwell-Ready<\/h3>\n<p>An unlucky actuality of the present predicament is that the majority native police precincts and municipalities have little coaching or gear to correctly monitor or have interaction with suspects in blackmail reviews, contemplating the well timed nature of such circumstances, famous Kuglin.<\/p>\n<p>Since most circumstances of sextortion originate exterior america, there&#8217;s typically little or no native police and authorities can do to assist victims.<\/p>\n<p>\u201cThat stated, it&#8217;s nonetheless vital to start out a path of documentation as reviews of sextortion might help future laws,\u201d urged Kuglin.<\/p>\n<p>Victims ought to file a report with native authorities and the <a href=\"https:\/\/www.ic3.gov\" target=\"_blank\" rel=\"noopener\">FBI\u2019s Internet Crime Complaint Center<\/a> (IC3). He endorsed that these steps would assist doc the gravity of this on-line epidemic.<\/p>\n<h3>Assist and Recommendation for Sextortion Victims<\/h3>\n<p>If a minor is concerned, contact the Nationwide Middle for Lacking &amp; Exploited Youngsters at 1-800-THE-LOST (1-800-843-5678). <a href=\"https:\/\/takeitdown.ncmec.org\" target=\"_blank\" rel=\"noopener\">Take It Down<\/a> is a free service provided by the\u00a0NCMEC that may assist to take away or cease the net sharing of sexually specific pictures or movies taken of victims earlier than they have been 18 years previous.<\/p>\n<p><iframe loading=\"lazy\" title=\"NCMEC Presents: Rewind\" width=\"720\" height=\"405\" data-lazy=\"true\" data-src=\"https:\/\/www.youtube.com\/embed\/pAaXbBzVdJE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<p>Above all, victims mustn&#8217;t adjust to the blackmailer\u2019s calls for, based on Kuglin. As soon as a sextortionist receives funds from a goal, their threats will at all times improve in quantity as they now have certainty of their affect over the sufferer.<\/p>\n<p>One other response technique is to achieve out to a detailed pal or member of the family to assist the sufferer address the emotional pressure of this expertise. He steered contacting his firm\u2019s <a href=\"https:\/\/www.digitalforensics.com\/resource-center\" target=\"_blank\" rel=\"noopener\">team of specialists<\/a> who&#8217;ve years of expertise in case decision with these kinds of criminals.<\/p>\n<p>\u201cWhen a sufferer involves us with a case of sextortion, the specialist assigned to a case will work shortly to evaluate the state of affairs and develop a plan of motion,\u201d he provided. This entails gathering proof, similar to chat logs or emails, and taking on correspondence with the prison by impersonating the shopper and gathering proof towards the prison.<\/p>\n<p>\u201cOur group additionally works with sure abroad legislation enforcement groups and different authorities to make sure that the perpetrator deletes our shoppers\u2019 materials,\u201d stated Kuglin.<\/p>\n<p>Digital Forensics handles the instant menace and continues monitoring shoppers\u2019 accounts to make sure they&#8217;re at all times protected if they want. The corporate informs and educates shoppers in order that it doesn&#8217;t occur once more.<\/p>\n<p>\u201cMost significantly, we give them an opportunity to speak about what occurred in a judgment-free place, which is big for many individuals,\u201d he famous.<\/p>\n<h3>How To Keep away from Sextortion<\/h3>\n<p>The simplest approach to keep away from sextortion is clear, quipped Kuglin. By no means share nude or intimate photographs on-line, <em>particularly<\/em> with strangers, and higher but, by no means.<\/p>\n<p>Acknowledge the pink flags and manipulation strategies that sextortionists could use to attempt to get you to violate this dedication. Kuglin recommends these on-line greatest practices:<\/p>\n<ul style=\"margin-right: 40px;\">\n<li><strong>Be cautious when interacting with strangers on-line:<\/strong> Keep away from sharing private info or specific materials, particularly with anybody you don\u2019t know and belief.<\/li>\n<li style=\"padding: 5px 0px;\"><strong>Use privateness settings on social media:<\/strong> Alter the privateness settings in your social media accounts to restrict who can see your posts and private info.<\/li>\n<li style=\"padding: 5px 0px;\"><strong>Don&#8217;t transfer conversations to different platforms:<\/strong> Keep away from shifting conversations to a extra non-public platform, as this could make it simpler for sextortionists to exert management and strain.<\/li>\n<li><strong>Report suspicious exercise:<\/strong> If somebody makes threats or calls for or behaves suspiciously, report it to the related authorities or the platform you&#8217;re utilizing.<\/li>\n<\/ul>\n<p>\u201cYou will need to notice that these are just some examples of the techniques that sextortionists could use. They&#8217;re continually evolving their strategies to remain forward of legislation enforcement and different authorities, making it essential for people to stay vigilant and cautious when interacting with individuals on-line, Kuglin concluded.<\/p>\n<\/p><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.technewsworld.com\/story\/waging-war-on-the-sextortion-epidemic-177981.html?rss=1\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Forensics Company is battling to guard and educate the general public a few quickly rising pattern in cybercrime dubbed sextortion, the place on-line predators&#8230;<\/p>\n","protected":false},"author":1,"featured_media":49822,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-49821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fighting Back Against the Sextortion Epidemic - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fighting Back Against the Sextortion Epidemic - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-08T14:30:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-08T14:31:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/sad-teen-smartphone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Fighting Back Against the Sextortion Epidemic\",\"datePublished\":\"2023-03-08T14:30:08+00:00\",\"dateModified\":\"2023-03-08T14:31:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/\"},\"wordCount\":1596,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/sad-teen-smartphone.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/\",\"name\":\"Fighting Back Against the Sextortion Epidemic - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/sad-teen-smartphone.jpg\",\"datePublished\":\"2023-03-08T14:30:08+00:00\",\"dateModified\":\"2023-03-08T14:31:03+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/sad-teen-smartphone.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/sad-teen-smartphone.jpg\",\"width\":1000,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/08\\\/fighting-back-against-the-sextortion-epidemic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fighting Back Against the Sextortion Epidemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fighting Back Against the Sextortion Epidemic - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/","og_locale":"en_US","og_type":"article","og_title":"Fighting Back Against the Sextortion Epidemic - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2023-03-08T14:30:08+00:00","article_modified_time":"2023-03-08T14:31:03+00:00","og_image":[{"width":1000,"height":520,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/sad-teen-smartphone.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Fighting Back Against the Sextortion Epidemic","datePublished":"2023-03-08T14:30:08+00:00","dateModified":"2023-03-08T14:31:03+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/"},"wordCount":1596,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/sad-teen-smartphone.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/","url":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/","name":"Fighting Back Against the Sextortion Epidemic - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/sad-teen-smartphone.jpg","datePublished":"2023-03-08T14:30:08+00:00","dateModified":"2023-03-08T14:31:03+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/sad-teen-smartphone.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/sad-teen-smartphone.jpg","width":1000,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/08\/fighting-back-against-the-sextortion-epidemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Fighting Back Against the Sextortion Epidemic"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/49821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=49821"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/49821\/revisions"}],"predecessor-version":[{"id":49823,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/49821\/revisions\/49823"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/49822"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=49821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=49821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=49821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}