fbpx

Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

sextortion

Sextortion Scammers Targeting the LGBTQ+ Community

People seeking companionship or romantic connections online are falling victim to internet predators. There has been a dramatic increase in recent reports claiming that LGBTQ+ individuals are being purposely targeted for malicious online sextortion crimes. These crimes have led to devastating and long-lasting repercussions for victims and their families. As a result, the Federal Trade Commission (FTC) issued a warning in response to complaints about dating sites geared towards LGBTQ+ community members being infiltrated by sextortion perpetrators.[1] To help ensure your family has the tools to safely navigate the online world, check out our Screen Safety Essentials Course.

What is Sextortion?

The term sextortion (sexual-extortion) falls under the broader category of sexual exploitation. In many cases, sextortion is a form of blackmail that involves the act of extorting things like money and sexual favors through means of manipulation and coercion. For example, a perpetrator may threaten to reveal or expose personal and sensitive information about the victim to others unless they agree to the perpetrator’s demands.

How are people being victimized?

Despite advancements in societal attitudes towards LGBTQ+ community rights, the world can sadly still be a hostile place. That’s why dating apps geared toward members of the LGBTQ+ community, like Grindr, Feeld, and Her, have become popular.

These sites were designed to provide a safe space for both openly queer and closeted people to meet and make connections with each other without fear of harassment or exposure. Unfortunately, recent reports have indicated that an increasing number of apps and websites marketed toward members of the LGBTQ+ community are being infiltrated by sextortion predators.

Blackmail

A typical sextortion scam begins with a perpetrator creating a fictitious account on a dating app or social media networking site using a fake identity and photos. The perpetrator poses as a potential partner or someone looking to make a connection online and attempts to establish contact with another person under the guise of starting a romantic relationship. This is a process referred to as catfishing.

The perpetrator cultivates the relationship with their target to gain their victim’s trust and make them feel comfortable. The process can last for days, weeks, or even months. After establishing rapport, the perp will send explicit messages, photos, and videos and ask for some in return. Once the target shares their personal images and information, the scammer threatens to release it to the victim’s friends, family, or co-workers, or post it online unless the victim does what they say.

The primary motivations behind these types of romance scams can be financial and sexual. Sextortion predators use various manipulation tactics to not only extort money from victims but also to access sexually explicit photographs and messages, for their own sexual gratification. Recent reports have revealed that minors using the app, despite there being minimum age of use requirements, were targeted specifically by pedophiles hoping to elicit child pornography. In both cases, similar methods of exploitation are used.[2]

The FBI has stated that most victims report that initial interactions with perpetrators are mutual and unsuspicious. However, after a brief period, the extortionist will attempt to transition the interaction away from the app and onto private messaging forums. Without exposing their true identities, these online predators will go to great lengths to convince targets that they are legitimate users of the app.

Scammers often use stolen or fake photographs and may even hire a video model to convince their victims that they are interacting with an authentic person. It is very common for perpetrators to befriend victims on social media to access a list of the victim’s followers which typically include family members, friends, and co-workers.[2]

Why are LGBTQ+ apps being targeted?

Experts suggest that individuals using these dating apps are being specifically targeted by predators for a few different reasons. Given the nature of the apps, which are primarily used to foster romantic connections, online predators have a much greater opportunity to collect private and sexually explicit information from their targets. Additionally, since these apps have been designed for LGBTQ+ community members, predators assume that their targets have an even greater incentive to keep quiet about their victimization and comply with demands.

Because these apps are marketed as a safe space, people who are not openly queer rely on them to make connections with others without fear of exposure. As the thought of public shaming and the potential outing of their sexual orientation or gender identity is so profound, these individuals are more easily subject to victimization.

The Fallout

According to the FBI, the number of these cases has been steadily increasing. Experts speculate that the onset of the COVID-19 pandemic and the emergence of hookup-culture has escalated this trend. As the dating world transitioned largely onto virtual platforms, sextortion predators took advantage of this change.

Last year, the federal agency reportedly received over 16,000 sextortion complaints with financial losses totaling over $8 million.[2] In reality, the repercussions of these crimes extend beyond financial ruin. Sadly, the effects of being targeted and exposed by sextortion predators were overwhelmingly devastating for some victims who felt driven to take their own lives.[1] As a result of the seriousness of these crimes, law enforcement officials have significantly increased their efforts to capture and charge perpetrators.

How to Protect Yourself

It is important to be aware of the potential dangers inherent online in order to prevent yourself and your loved ones from becoming victimized. Dr. Bennett believes that providing our kids and teens with the necessary knowledge and skills to navigate these pitfalls before they arise, is the key to avoiding digital injury. That is why we created the Social Media Readiness Course which is designed to empower families to promote safe and responsible practices while avoiding harmful outcomes online. The internet can be an exciting and helpful tool when we are equipped with the proper skills to use it.

T hanks to CSUCI interns, Mackenzie Morrow and Michael Watson for researching the targeting of LGBTQ+ community members in sextortion scams on popular dating apps and co-authoring this article.

 

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] Skiba, K. (2021). Sextortion plaguing LGBTQ+ dating apps. AARP. https://www.aarp.org/money/scams-fraud/info-2021/lgbtq-dating-apps.html

[2] Petkauskas, V. (2021). The shame game: how sextortion scammers prey on victims’ fear. Cybernews. https://cybernews.com/privacy/the-shame-game-how-sextortion-scammers-prey-on-victims-fears/

Photo Credits

Photo By Sharon McCutcheon (https://unsplash.com/photos/MW7ru0BdTFM)

Photo By Tima Miroshnichenko (https://www.pexels.com/photo/a-man-holding-a-letter-lightbox-6266500/)

Photo By Bruno Aguirre (https://unsplash.com/photos/xw_WBtNEqfg)

Hackers Can Access Your Computer’s Webcam Without Your Knowledge

Imagine finding out that a cybercriminal has been recording you in your bedroom for months and can do anything with that footage. Or what if you turn on your computer to find that you can’t access anything unless you pay a ransom to a hacker. What if a predator could view and speak to your child through a camera in their bedroom? You can help protect your family from becoming victims of cyber-attacks and ensure peace of mind by referring to our Screen Safety Toolkit, a resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems. This article will detail the risks and worst-case scenarios of webcam hacking as well as provide tips to help ensure your cybersecurity and safety.

How do cybercriminals hack webcams?

Hacking requires a specialized skillset that is increasingly accessible for the average tech user. In the sub-world of black hat computer hacking (hacking tech with bad intent), accessing private webcams is considered fairly easy. Further, there are several different methods utilized by black hat hackers to gain access to and take control over a computer’s web camera.

Spyware

One of the prominent methods employed by hackers to gain access to private computer webcams is through the use of spy software and remote administration tools (RATs). Webcam spyware is a type of computer application or program that allows the user to remotely take control over another user’s webcam. This enables the hacker to see whatever or whoever is in front of the computer’s web camera.

An alarming feature of this software is that it often allows the user to remotely turn the hacked computer on. Turning a computer off when it’s not being used is not enough to protect users from being spied on.

Spyware can be installed in webcam attachments and hard-wired webcams. The hacker can control audio and microphones, camera angles, zoom features, and focus. They can also record the footage so they can blackmail the victim later. Surprisingly, webcam spyware is freely available for download on the internet and can be installed on most operating systems.[1]

Internet Connection

Another common method of webcam hacking involves the use of web cameras that rely on remote access through WiFi. A common example of this type of web camera includes wireless security devices such as the popular Ring video doorbell.

Unfortunately, while these devices are intended to provide security for the user, they can also provide black hat hackers access to your home. If a camera is connected to a home WiFi router, it is vulnerable to hacking, especially if proper precautions aren’t taken to secure it. To avoid this, it is important to set secure network passwords for home WiFi routers. The default factory setting login information for routers can be accessed by anyone who is willing to look up the manufacturer’s startup support webpage. Failing to change your default router login can leave your wireless security cameras open to malicious hackers.[1]

Trojan Viruses

Perhaps the easiest way for cybercriminals to hack into your computer’s webcam is through the use of a Trojan computer virus. A Trojan virus is a type of malware deliberately designed to cause damage by infecting and subsequently taking control over your device. It is aptly named after the famous ancient Greek war story of the Trojan Horse because it is an attack disguised as a gift.

Trojan viruses are so effective because people mistakenly infect their own devices with them by downloading software that they believe is safe. This typically occurs when visiting a website that invites you to download a seemingly innocent file that actually contains malware instead of Adobe flash reader. The malware then infects the device, allowing the creator of the virus to gain complete control and access to your webcam and private files without your knowledge.[1,2]

Worst-Case Scenarios

Cassidy Wolf, Miss Teen USA

One of the most famous cases detailing the devastation caused by webcam hacking involves former Miss Teen USA, Cassidy Wolf. In 2012, Cassidy Wolf opened an email that she had received from someone whom she did not know. She was horrified to discover an attachment within the email containing several nude photos of her that were taken in the privacy of her bedroom. The photos were taken via the webcam installed on her computer.

The hacker attempted to blackmail Wolf into engaging in sexual acts with him through her webcam. If she refused, he threatened to share the nude photos with her friends and family.

The hacker turned out to be one of Wolf’s former classmates, Jared James Abrahams, who had installed Blackshades malware onto her laptop. The FBI was able to identify Abrahams who had victimized up to 150 women in his sextortion scheme and was subsequently sentenced to 18 months in federal prison.[3]

This event coincided with an FBI crackdown that led to the arrests of over 100 cybercriminals who created and used Blackshades, an inexpensive and easily utilized remote access tool primarily designed to hack webcams to facilitate sextortion crime. Blackshades was available for a mere $40 and sadly, countless people were victimized by the cybercriminals who maliciously employed it. [3,4]

Ring Cameras

In 2019, a mother installed a Ring security camera in the bedroom of her 8-year-old daughter for extra security. In a disturbing exchange caught on video, the 8-year-old girl walked into her room hearing strange music playing from an unknown source. The music abruptly stopped, and a man’s voice was heard saying “hello there.” This strange man had live video access of the young girl and was able to verbally communicate with her, a feature deliberately programmed into the Ring security camera. The man repeatedly used racial slurs when speaking to the girl and over several minutes, tried to get her to do various things. There have been similar Ring camera hacking incidents in recent years.[5]

Steps to Protect Your Privacy and Boost Cybersecurity

Technology is a powerful tool and with the advent of virtual learning and Zoom conferences as a result of the COVID-19 pandemic, web cameras have become an essential part of our academic and professional lives. Cases of webcam hacking are obviously terrifying, but there are simple steps that you can take to protect yourself and your family from attacks by cybercriminals.

Use Software Updates

Keep up with computer and software update alerts. They often contain patches For Weak Spots (points of entry easily exploited by hackers).

Secure Your WiFi with Password Protection

Once you have installed your router, create a new secure password to deter cybercriminals from being able to easily hack your devices.

Avoid Suspicious Downloads

Hackers can access your devices by getting you to unknowingly install malware, like Trojan viruses, through random links and downloads. Never click on links from websites that require you to download a file or program in order to access their site. Also, avoid downloading attachments and opening links sent via email from people you do not know and trust.

Invest in Security Software

While there are free security software services available, investing in subscription software will provide better cybersecurity. Approach your cybersecurity with the same regard as you do for your home security. Good security software will help protect you by blocking malware that would potentially give hackers access to your devices.

Use Legitimate Tech Support

Be careful of who you allow access to your devices. When IT support is needed, only use trusted and reputable services. Avoid using freelance computer technicians. There have been instances where freelance technicians who were hired to fix devices have instead installed malware onto the client’s computers for nefarious purposes.

Install a Physical Webcam Cover

The most surefire way to ensure that cybercriminals are not spying on you through your device’s camera is to install a physical covering over the lens. When most web cameras are on, a light next to the lens turns on signaling that the camera is in use. However, hackers can disable this light, so relying on that alone is not enough to ensure your privacy. There are products available specifically designed as device camera coverings that attach to your devices right over the camera lens. The covering can be slid open when you want to use your camera and closed when you do not. You can also just simply cover your web camera lens with a post-it note or a piece of opaque tape.

GKIS Screen Safety Toolkit

Our Screen Safety Toolkit is an invaluable resource for providing you and your family with enhanced cybersecurity. Researching digital safety tools can be an overwhelming process. But thankfully, we’ve done the work for you! If you have screen-loving kids or teens, sound parenting strategies are not enough for fostering online safety. You also need smart tech tools for filtering, monitoring, and management. The GKIS Screen Safety Toolkit is a family-tested, outcome-based resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems.

GKIS Cyber Security Supplement

Our Cybersecurity & Red Flags Supplement is comprised of three helpful tools in one service. You can protect your family from hacking, scamming, malware, and phishing with our cybersecurity and best practices checklist. Our GKIS online safety red flags for kids & teens provides parents with Dr. Bennett’s clinical teaching list that will help parents educate their kids about red flags to be aware of and alert them to the tricks that are often employed by online predators and other cybercriminals. Additionally, our GKIS online safety red flags for parents will provide parents with Dr. Bennett’s clinical expertise, which she’s developed over 25+ years as a clinical psychologist, in identifying behavioral red flags that may signal your child is suffering from digital injury.

Other helpful GKIS resources

You can find more valuable information regarding screen safety in Dr. Bennett’s parenting guide, Screen Time in the Mean Time. Additionally, you can check out this article How Cybercriminals Steal Sensitive Data to learn more about the potential risks to your cybersecurity so that you can be better equipped to protect yourself and your family.

Thanks to CSUCI intern, Mackenzie Morrow for researching the dangers of webcam hacking as well as cybersecurity measures to prevent it and co-authoring this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] Batt, S. (2020). How easy is it for someone to hack your webcam? Make Use Of. https://www.makeuseof.com/tag/how-easy-is-it-for-someone-to-hack-your-webcam/

[2] Johansen, A. (2020). What is a Trojan? Is it a virus or is it malware? Norton. https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html

[3] Daily Mail. (2014). More than 90 people arrested in ‘creepware’ hacker sting as victim Miss Teen USA describes ‘terror’ at being watched through her webcam for a year. Daily Mail. https://www.dailymail.co.uk/news/article-2638874/More-90-people-nabbed-creepware-hacker-sting-victim-Miss-Teen-USA-describes-terror-watched-webcam-YEAR.html

[4] Cooper, A. (2014). CNN Anderson 360 Cassidy Wolf Miss Teen USA. CNN. https://www.youtube.com/watch?v=sc3nG87OYW8

[5] Chiu, A. (2019). She installed a Ring camera in her children’s room for ‘peace of mind.’ A hacker accessed it and harassed her 8-year-old daughter. The Washington Post. https://www.washingtonpost.com/nation/2019/12/12/she-installed-ring-camera-her-childrens-room-peace-mind-hacker-accessed-it-harassed-her-year-old-daughter/

Photos Credited

Photo by Nikita Belokhonav (https://www.pexels.com/photo/anonymous-hacker-with-on-laptop-in-white-room-5829726/)

Photo by cottonbro (https://www.pexels.com/photo/people-woman-coffee-laptop-6964510/)

Photo by cottonbro (https://www.pexels.com/photo/laptop-with-cyber-security-text-on-the-screen-5483240/)

What You Need to Know About Online Catfishing

Not everything you read online is real, nor is everyone you meet. You have been catfished when you meet someone online who created a fake profile to deceive you. Catfishing varies in severity, from posting younger pictures of oneself to stealing another’s identity. Most commonly experienced in dating websites or social media, catfishing provokes more skepticism and fear when it comes to meeting people online.

It started on Tinder…

Being a victim of catfishing can happen to anyone. With more teens joining social media, they are exposed to not only same-age peers but also adults with bad intentions.

For example, my friend Sam had been online dating since her sophomore year of high school. She recently met a guy on Tinder and fell head over heels for him. Soon after meeting each other online, they texted every day. At first, she suggested they FaceTime, but he always came up with some excuse to text only. Sam didn’t think much of it and continued to text with him. When she suggested they meet in person, he ghosted her and then messaged her randomly, ignoring her suggestion. She ignored the red flags.

While talking to a friend about her concerns, her friend shared that she was having a similar experience with her online boyfriend. When they compared notes and photos, they realized it was the same guy using different names and accounts. Since then, Sam has had difficulty trusting anybody online.

Adults and kids can be victims.

The popular MTV show “Catfish: The TV Show,” gives the audience a deeper look into the world of catfishing. During each episode, the host helps a victim uncover the truth behind a catfishing incident. Each episode illustrates the complex reasons people create deceptive online identities to make up for deficits in their non-virtual lives, such as:

  • insecurity about their looks, so they steal someone else’s identity who is better looking – like wearing a virtual mask.
  • pretending to be a different gender, perhaps experimenting before coming out of the closet.
  • cyberstalking or seeking revenge.

It’s not just adults that are deceived by catfishing. In the Lifetime TV show, “I Catfished My Kid,” parents try to teach their teens a lesson about the dangers of talking to strangers online. In the pilot, two Ventura County teens were duped by an adult producer into thinking they were interacting with a peer. When he asked each victim to meet him in the park to watch his band practice, one of the teens complied. On the show, we see her walk to the park and then be confronted by her parents and the host of the show.

Dr. Bennett received production credit on this pilot and helped with the emotional support on set. She describes feeling uncomfortable with the plot of deceiving a teen. However, to the benefit of millions of viewers, the show is an opportunity to teach kids how easy it is to be catfished.

Why do we fall for it?

Dr. Bennett believes that texting and online dating are some of the worst things to ever happen to singles. Although they offer immediate access to possible friends and dates, she says it also exposes our psychological vulnerabilities to exploitive others.

For instance, Dr. B describes a phenomenon she’s seen in practice where the screen between us and our new partner allows us to confabulate a false truth, that our new dating partner is better than they actually are. Confabulation is the act of unconsciously creating imaginary facts to fill in for a loss of memory.

In other words, with their dream dating profile in mind, online daters sometimes start by identifying a partner that loosely fits their criteria. Because they are so hopeful, they unconsciously convince themselves that their date is their dream partner. A simple “I look forward to meeting you” text becomes a sign of affection, romance, and fidelity. They create a dream person in their heads before the date has even revealed their true selves.

Dr. Bennett also believes that online dating can trigger our hunting and gathering instincts. Too often, she sees people “keep an eye out” for a better partner, even when they are committed to their current one. By always looking for the next best thing, singles sabotage the relationship they’re in. The thrill of the chase and the novelty of a new person can overshadow real partnership.

She also notes that healthy daters find partners  and quickly move off dating sites, whereas predators stay. Dr. B theorizes that is the reason there are more creeps on dating sites than in the general population. Online dating can help you find love, but it can also open one up to exploitation, financial coercion, or online dating fraud. Although some dating sites verify users through other social media profiles and have safety tips, daters must beware.

If you visit websites, play video games, or are on social media, it may be helpful to you to know the red flags that. you may be being catfished.

Red flags that you are being catfished if the person:

  • is too good to be true

  • demands too much contact or acts possessive

  • is overly elaborative

  • attempts to pull you in with dramatic stories of victimhood or emotional distress

  • makes too many promises

  • is only available to talk during certain days and times

-gets too affectionate too fast

Thank you to GKIS intern, Nubia Bandek, for telling us all about catfishing. The hookup culture, which makes teens vulnerable to catfishing, is more prominent among teens than parents realize. Check out the GKIS article, Is Your Teen Hooking Up? for tips on how to have important conversations with your tweens and teens.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1.] Couch, D., Liamputtong, P., & Pitts, M. (2012). What are the real and perceived risks and dangers of online dating? Perspectives from online daters. Health, Risk & Society,14(7–8), 697–714.https://doi-org.summit.csuci.edu/10.1080/13698575.2012.720964

[2.] Menkin, J. A., Robles, T. F., Wiley, J. F., & Gonzaga, G. C. (2015). Online dating across the life span: Users’relationship goals. Psychology and Aging, 30(4), 987–993. https://doi-org.summit.csuci.edu/10.1037/a0039722.supp (Supplemental)

Photo Credits

Photo by by Tim Gouwon Unsplash

Photo by Victoria Heathon Unsplash

Photo by rawpixelon Unsplash

Photo by Erik Lucateroon Unsplash

Photo by John Noonanon Unsplash