TFGBV Taxonomy
Abuse Type:

Sexual extortion

Last Updated 8/4/25
Definition: Extortion that either uses the release of intimate data as the threat and/or that extorts sexual favors from the target.
Perpetrators:
Stranger Personal connection Formal group
Perpetrator Intents:
Sexual gratification Financial gain Compliance
Target:
Private individual
Impact Types:
Economic harm Sexual harm Psychological & emotional harm
Synonyms:
Sextortion, Sexual blackmail, Intimate image extortion
Skill Required:Medium

Perpetrators obtain intimate images or data through deception, hacking, or previous consensual sharing, then threaten exposure unless victims comply with demands for money, sexual content, or other actions. This abuse type therefore has overlap with intimate image abuse and doxxing.

Relationship-based sextortion often involves current or former partners leveraging previously shared intimate content.

The ways in which sexual extortion manifests within the context of human trafficking can be broken down into these areas:

  1. Forced criminality
  2. Coercive control
  3. Commodified sexual abuse/violence

Financial sextortion typically involves strangers using fake profiles (sometimes involving online impersonation) to manipulate victims into sharing images, then demanding payment.

Perpetrators frequently use formulaic scripts and operate across multiple platforms, moving victims from public spaces to private messaging.

Common perpetrator intents

Thorn's 2017 sextortion research found that "threats overwhelmingly involved demands for explicit imagery," with "86% of victims threatened by online offenders and 62% from offline offenders" receiving such demands (Thorn, 2017). When the primary motivation is sexual rather than financial, perpetrators often exhibit different behavioral patterns, including longer grooming periods and more persistent contact attempts.

The Canadian Centre for Child Protection's analysis of financial sextortion found that perpetrators in "Com" networks may also be motivated by status, misogyny, or "an obsession with extreme or violent material" (Canadian Centre for Child Protection, 2022).

Cultural variation

Financial sextortion shows geographic concentration, with 47% of reports linked to Nigeria or Côte d'Ivoire, suggesting organized criminal networks (Thorn, 2024).

What kind of material can be used for sexual extortion and reporting patterns vary significantly across cultures due to different levels of shame, family honor concepts, and trust in authorities.

Skill required

Medium - Requires social engineering skills, ability to create convincing fake profiles, and knowledge of platform vulnerabilities, but doesn't require advanced technical expertise.

References

  • Canadian Centre for Child Protection (C3P). (2022, November). Resources & Research: An Analysis of Financial Sextortion Victim Posts Published on r/Sextortion. https://protectchildren.ca/en/resources-research/an-analysis-of-financial-sextortion-victim-posts-published-on-sextortion/
  • FBI National Press Office. (2022, December 19). FBI and Partners Issue National Public Safety Alert on Financial Sextortion Schemes. Federal Bureau of Investigation. https://www.fbi.gov/news/press-releases/fbi-and-partners-issue-national-public-safety-alert-on-financial-sextortion-schemes
  • Thorn. (2017). Sextortion: Summary findings from a 2017 survey of 2,097 survivors. https://www.thorn.org/wp-content/uploads/2019/12/Sextortion_Wave2Report_121919.pdf
  • Thorn and National Center for Missing and Exploited Children (NCMEC). (2024). Trends in Financial Sextortion An investigation of sextortion reports in NCMEC CyberTipline data. https://info.thorn.org/hubfs/Research/Thorn_TrendsInFinancialSextortion_June2024.pdf

AI Risks and Opportunities

Risks

AI-generated deepfakes (i.e. /deceptive synthetic media/) lower barriers to creating convincing intimate imagery without victim participation.

Opportunities

AI pattern recognition could help platforms identify sextortion attempts through behavioral analysis and communication patterns typical of these schemes.

Prevalence

  • 13.7 % of women in Türkiye have been threatened that their personal information will be revealed without consent (UN Women, 2023a).
  • Over 7,000 reports of financial sextortion against minors was reported to US authorities in one year, with over 3,000 confirmed victims, and more than a dozen suicides. (FBI, 2022).
  • 812 sextortion reports were made to the NCMEC each week on average during the last year of data analyzed (Aug 2022-Aug 2023). 556 of those reports per week were financial or likely financial,implying a conservative estimate of at least 28,000 financial sextortion cases per year (Thorn, 2024).
  • Between 3.5% and 5% of people experience sextortion before reaching adulthood (Thorn, 2024).

Mitigation Strategies

Transparent feedback and reporting
Enhanced Feedback Mechanisms for Reporting and Transparency.
Prioritized reporting
Prioritize reports of TFGBV over reports of less time-sensitive harms.
Rate limits on low trust accounts
Rate Limits on Interactions from New or Unverified Accounts.
Know your customer (KYC)
Require proof of identity for functions with a higher potential for abuse.
Safety onboarding & awareness training
New user onboarding and ongoing awareness raising.
Is something missing, or could it be better?
About This SiteGet InvolvedContactCopyrightPrivacy
Loading...