When the victim opened the email, she found sexually explicit photos of herself attached and information that detailed where she worked.Following that were details of her personal life: her husband and her three kids. The demand made this hack different: This computer intrusion was not about money.
We hope that by highlighting the scale and scope of the problem, and the brutality of these cases for the many victims they affect, to spur a close look at both state and federal laws under which these cases get prosecuted.
More often, it involves manipulation and trickery on social media.
But at the core of the crime always lies the intersection of cybersecurity and sexual coercion.
The malicious software he employed provided access to all files, photos, and videos on the infected computers.
And if they did, he would then threaten them further, notifying them that he knew they had told someone.