Later in the day, to underscore his seriousness, the hacker followed up with another email threatening the victim: “You have six hours.” This victim knew her correspondent only as [email protected], but the attacker turned out to be a talented 32-year-old proficient in multiple computer languages.Located in Santa Ana, California, his name was Luis Mijangos.We searched dockets and news stories for criminal cases in which one person used a computer network to extort another into producing pornography or engaging in sexual activity.
Sextortion thus turns out to be quite easy to accomplish in a target-rich environment that often does not require more than malicious guile.
It is a great mistake, however, to confuse sextortion with consensual sexting or other online teenage flirtations. It is also a crime that, as we shall show, does not currently exist in either federal law or the laws of the states.
In at least one case, he posted nude photos of a victim on the Myspace account of a friend of the victim, which Mijangos had also hacked, after she refused to comply with his demands.
To make matters worse, Mijangos also used the computers he controlled to spread his malware further, propagating to the people in his victims’ address books instant messages that appeared to come from friends and thereby inducing new victims to download his malware.
Each involves an attacker who effectively invades the homes of sometimes large numbers of remote victims and demands the production of sexual activity from them.
Sextortion cases involve what are effectively online, remote sexual assaults, sometimes over great distances, sometimes even crossing international borders, and sometimes―as with Mijangos―involving a great many victims.When the victim opened the email, she found sexually explicit photos of herself attached and information that detailed where she worked.Following that were details of her personal life: her husband and her three kids. The demand made this hack different: This computer intrusion was not about money.More often, it involves manipulation and trickery on social media.But at the core of the crime always lies the intersection of cybersecurity and sexual coercion.The malware Mijangos wrote was sophisticated, and he told federal authorities that he designed it specifically to be undetectable to antivirus programs.