Skip to main content

Saprea > Blog > All Blogs > What is Sextortion?

Share this blog on:
10227:full

What is Sextortion?

Image
"Send me another pic—sexier this time. Or I'll send the one I already have to everyone you know."
Image
“For $500 dollars, you can make this all go away.”
Image
 “You don’t want this passed around the school, do you?” 
Image
“Maybe you should’ve been more careful with the pics you sent before dumping me.”
Image
“If you tell the police, they’ll arrest you for sending me child porn.” 

The Definition of Sextortion

Sextortion is a form of child sexual abuse involving the threat to release sexually explicit material of the victim unless certain demands are met. Most commonly, the perpetrator threatens to share sexual images of the victim (real or fake) with the purpose of obtaining money, additional sexually explicit content, sexual contact with the victim, or other demands. While intimate images are the most well-known type of blackmail, extortionists can use other leverage against the victim, like the threat to share a screenshot of an intimate conversation, a video from the victim’s webcam, or private information about the victim’s sexuality. This last threat may factor into why LGBTQ+ youth are nearly three times as likely to be sextorted as their heterosexual peers.1

Sextortion is one of many forms of tech-facilitated sexual abuse that involves the nonconsensual obtaining and/or sharing of sexual images. Such distribution is committed with the intent to harm, humiliate, exploit, or gain profit. What separates sextortion from more public forms of tech-facilitated abuse, like image-based sexual abuse, sexual harassment, or revenge porn, is that sextortion centers around the threat of releasing images to gain control over the victim. This manipulation, along with the feelings of helplessness instilled in the victim, are the main drivers behind sextortion’s harms.

Sextortion Statistics

  • Recent studies estimate that 3–5% of U.S. teens have experienced sextortion.3,4
  • Reports of sextortion have more than doubled between 2019 and 2021, according to the FBI and the National Center for Missing and Exploited Children.5,6
  • In 2022, Homeland Security Investigations received over 3,000 sextortion tips, though the exact number of individual cases represented is unknown.7
  • Perpetrators often act quickly: 60% of victims are threatened within two weeks of first contact.8
  • 51% of teen victims never tell anyone, largely due to shame and fear.8
  • In about half of sextortion cases involving minors, the blackmailer follows through with the threat of releasing the sensitive content—posting it online and/or sharing it with the victims’ contacts.8
  • A study by Thorn, a nonprofit organization dedicated to protecting children from sexual abuse and exploitation, revealed that 16% of perpetrators told victims to harm themselves, while 10% demanded victims produce sexual content of siblings or friends.16

How Does Sextortion Work?

Researchers note that sextortion that places youth at risk generally falls into two main categories: when a victim is blackmailed by a stranger they met online, or when an individual is victimized by someone they already know.2,8

Blackmailed by a Stranger Met Online

Initial Contact

Many sextortion victims are targeted by someone they’ve met online.8 In these instances, the perpetrator will often befriend the youth on a social media app, live streaming or gaming platform, or other medium with a chat feature. During this initial contact, the perpetrator will likely use a false identity, pretending to be someone younger, attractive, and typically of the opposite sex to garner the youth’s interest and trust. In fact, this type of catfishing is used in 91% of sextortion cases involving perpetrators met online.9

While communicating with the youth, the perpetrator will use grooming methods such as flattery, compliments, flirtation, shared secrets, and signs of genuine interest in the youth’s life. They may even offer the youth gifts or bribes as they build up a rapport.7

Blackmail

The perpetrator will then ask the youth to send them a suggestive photo of themselves. This request may come after an expressed attraction to the youth, excessive flattery about the youth’s looks, or even a sexted image sent by the perpetrator. After the youth is pressured into sending a sexual photo, the perpetrator uses that photo as blackmail, threatening to share it online or with the youth’s contacts unless they meet a specific demand. Some perpetrators may demand more pictures or other forms of sexually explicit content. They may even demand sexual contact with the victim or coerce them into forms of illegal activity. Others may demand payment in what is termed as financial sextortion, a rising trend that is increasingly targeting young males.10 In recent years, even organized international crime operations have run call center-style sextortion schemes specifically designed to exploit teenage boys for money.15

What makes online blackmail especially nefarious is that 85% of perpetrators begin grooming almost immediately upon contact, with 60% threatening victims within just two weeks of initial interaction. Some minors report chatting less than one hour before being pressured to send explicit images.14 This rapid progression represents a fundamental difference from other sexual exploitation, where relationship-building can occur over months. The compressed timeline means teens have little opportunity to recognize warning signs before becoming trapped.

Blackmailed by Someone You Know

Initial Contact
While instances involving strangers encountered online have been the focus of the media’s rising interest in sextortion, research shows that in the majority of cases a minor is victimized by someone who is already a part of their life, most often a current or former romantic partner.3,8
Blackmail

Being sextorted by someone you know seems to coincide with teen dating victimization, specifically with threatening to share photos of a partner in order to control them, force them to return to a relationship, or force them to provide more photos post-breakup. Sextortion may also overlap with revenge porn, online sexual harassment, the distribution of sexually explicit materials involving children, and other forms of tech-facilitated sexual abuse. Although victims often knowingly provide sexual images that are later used against them, the degree of consent involved in such a decision may be up for debate, even within romantic pairings. One study showed that while most victims initially sent the images to the person they knew (75%), many felt pressured to do so (67%).8 This may be indicative of the complicated and controversial nature of sexting. While sexting remains common among adolescents as a form of social bonding, romantic expression, and sexual exploration, girls in particular have reported feeling pressured, manipulated, or coerced into sending images of themselves, as well as experiencing more negative consequences as a result.8 One of those consequences may be sextortion. Additionally, if sensitive content is eventually shared by the blackmailer, then the youth also becomes the victim of image-based sexual abuse (the non-consensual sharing of images).

What Are the Impacts of Sextortion?

Whether a sextortion threat is carried out or not, victims can be impacted in a number of harmful ways. Many victims experience feelings of helplessness, shame, fear, and a loss of control.11 Some have expressed feeling trapped, like there was no way out. Such feelings of dread, worry, and hopelessness have led to other harmful impacts, including high depression levels, panic attacks, difficulty eating, self-harm, suicidal thoughts, and—in a few high-profile cases—suicide.11,12 These risks can intensify in cases where the sextortionist continues to harass or stalk the victim, create a fake online profile about them, and/or encourage the victim to harm themselves.3,8 In instances where the child is sextorted by someone they met online, they are not only threatened with blackmail, but may also lose a relationship they had perceived as safe, supportive, or even loving.10

Shame

As with other forms of child sexual abuse, the shame that a victim can experience because of sextortion reduces the likelihood that they will reach out for help. In fact, only half of minors who are sextorted tell someone about their victimization. Most feel too embarrassed (80%) or dread that they’ll get in trouble (68%).8 Among victims who do open up to a parent, girls are significantly more likely to disclose (41.7%) than boys (28.6%).3

This shame is amplified by victim-blaming narratives around sexuality and by the lasting nature of online content. Victims describe feeling "dirty," "humiliated," and "awkward," with self-blame.17


Social Consequences

The social consequences ripple through victims' lives in measurable ways. Research documents that 46% of minor victims lose relationships with friends or family members following victimization, while 14% experience school-related problems severe enough to require changing schools. Social withdrawal and isolation occur as victims attempt to manage the threat of exposure, monitoring the internet obsessively for signs their images have been distributed.8


Survivor Voices

On their blog, Thorn shares first-hand accounts from sextortion survivors. Across these stories, common emotional threads emerge: the fear of exposure, deep shame, self-blame, the isolation of suffering in silence, and ultimately, the relief and empowerment that comes from speaking up and reaching out to someone trusted. The page also links to individual survivor stories, including that of Ashley Reynolds, who now works with the FBI and NCMEC to raise awareness, and the story of Ryan Last, shared by his mother Pauline to help other families recognize the warning signs before it's too late.

How to Stop Sextortion: Prevention Starts with Open Communication

Sextortion is a crime that attempts to isolate victims through feelings of shame, helplessness, and terror. Victims may not only fear getting in trouble by their parents and law enforcement, but also having their devices taken away, an outcome that can feel like punishment and lead to further isolation.17 One of the most important things a parent can do to reduce the risk of their child being sextorted is to foster open and continual communication.

Talking to Kids About Online Risks and Sextortion

Parent-child communication demonstrates the most robust protective effect. Multiple studies show that ongoing conversations about online risks help with better outcomes, and the quality of communication matters more than its frequency. Research from Pew found that 94% of parents discussed appropriate online sharing with teens, yet 70% of adolescents report hiding online behavior from parents.18 So, there is work for parents to do. Saprea recommends "30-second conversations" on specific scenarios rather than lengthy lectures, using questions like "What would you do if someone you met online asked you for pictures?"

Strict parental monitoring in a restrictive approach actually correlates with worse outcomes, potentially because they undermine adolescent autonomy-seeking and create incentives for secrecy.19 Parents ought to balance supervision with trust-building, recognizing that the goal is teaching good judgment rather than preventing exposure to any activity that has even a small risk of online blackmail.

Conversation Prompts for Parents

Teaching Healthy Relationships to Reduce Sextortion Risk

Saprea encourages parents to teach and model what healthy relationships look like—whether that relationship is first developed in person or online, and whether it is an acquaintance, friendship, or romance.4,13 As youth become more knowledgeable of what constitutes a healthy relationship—including authenticity, openness, communication, and a respect for boundaries—they’ll be more able to identify situations and interactions that may place them at risk. They’ll also be more equipped to maintain healthy boundaries, as well as deflect demands and resist pressures that seek to violate those boundaries. They’ll also be more able to navigate through abusive scenarios like sextortion by ceasing contact, seeking help, and recognizing that they are not at fault. Youth will seek out such support if they have already been assured that their parent is a safe and trusted person they can turn to, no matter the issue they’re facing. If the parent has a history of responding rather than reacting, and has maintained open lines of communication about all manner of sensitive or difficult topics, the child or teen will be less likely to isolate if they are targeted.

Teaching Teens About Healthy vs Unhealthy Online Relationships

Teaching Healthy Relationships to Reduce Sextortion Risk

Along with open communication and modeling healthy relationships, parents can also teach and model healthy boundaries with technology. They can educate their kids about digital citizenship and the risks that come with living in the digital era, including the risk of sextortion. Parents can advise their kids to be selective about what they share with others—online and offline—and to be aware that people can pretend to be anyone online. They can also set boundaries around screen time and internet use, monitor or spot check devices, be in the know about what apps and social media platforms their kids are using, and be aware of who their kids are communicating with.
Relevant Programs
NetSmartz, developed by the National Center for Missing & Exploited Children, is a widely used prevention program that reaches thousands of children through trained professionals. The program delivers age-appropriate educational content designed to promote safe online behavior, digital literacy, and risk recognition through structured curricula and interactive materials. Despite its broad dissemination, published evaluation data assessing its behavioral impact remain limited. Similarly, the FBI’s Stop Sextortion Campaign offers educational resources and conversation guides informed by law enforcement’s operational experience.
Common Online Platforms Where Sextortion Begins

Warning Signs

Parents can also be on the lookout for warning signs of sextortion and other forms of child sexual abuse, tech-facilitated or otherwise. The Internet Watch Foundation is a UK-based nonprofit dedicated to eliminating child sexual abuse imagery online. On their Help and Support page, they share that warning signs might include:

  • Withdrawing from normal routines like friends, sports, meals, hobbies, or family time.
  • A spike in anxiety, fear, or shame after being online, including crying, agitation, or seeming “on edge.”
  • Rapid mood changes or irritability, including lashing out when asked what’s wrong.
  • Unexplained requests for money, gift cards, cryptocurrency, or urgent “I need money now” messages.
  • Stealing money or trying to access family payment apps or cards.
  • Hinting that someone “has something” on them or saying they “messed up” but won’t explain.
  • Signs of depression or hopelessness, trouble sleeping or eating, or losing interest in things they usually enjoy.
  • Increased secrecy, deleting messages, creating new accounts, or suddenly changing usernames/passwords.

How Sextortion Typically Happens: Step-by-Step

Understanding how sextortion unfolds helps parents and young people recognize the warning signs early. There is often overlap between online grooming patterns and common sequences of sextortion. While every case may be different, research shows that sextortion schemes follow a pattern:

01
Making Contact
The perpetrator finds a young person on social media accounts, gaming platforms, or messaging apps. They often target teens with public profiles where they can see friend lists, interests, and personal information. In cases of financial sextortion, targeting teenage boys, some scammers create a fake online account pretending to be an attractive girl around the same age. For sexually motivated sextortion, perpetrators may pose as peers, modeling scouts, or even romantic interests. For girls and LGBTQ youth, perpetrators may mirror identities or communities they trust, posing as supportive friends, queer peers, activists, or influencers, to quickly build emotional safety and validation.
02
Building Trust Quickly
Unlike traditional grooming that takes weeks or months, modern sextortion schemes can move shockingly fast. Within the first conversation, the criminal works to establish a connection. They use information from the teen's public profile to seem relatable, commenting on shared interests, complimenting photos, or talking about mutual friends. In some cases, they exploit vulnerability around belonging, body image, by offering affirmation, romance, or “safe” spaces before steering the conversation toward private chats or image sharing. They may move from casual chat to more personal topics quickly, often within the same day or soon after.
03
Moving to Private Platforms
Those who seek to exploit youth often suggest moving the conversation away from the original platform. They might say the app is glitchy, they prefer a different messenger, or they want more privacy to talk. This serves multiple purposes: it takes the conversation to encrypted platforms where monitoring is harder, it separates the victim from their support network, and it creates a sense of secrecy and intimacy. Common destinations include private social media platforms, messaging, or video chat platforms.
04
Introducing Sexual Content
The conversation gradually becomes sexual, though this escalation can happen within hours. The scammer might start by discussing relationships, asking about past experiences, or making flirtatious comments. Then they normalize sharing explicit images by sending sexual content first—often pre-recorded videos of previous victims that they present as live content of themselves. They use the "I'll show you if you show me" approach, making it seem like a fair exchange between equals. Victims of sextortion often report feeling pressured, curious, or wanting to seem mature and not "prudish."
05
Requesting Explicit Images
Once the boundary is crossed, the criminal asks the teen to send nude photos or perform sexual acts on camera. They might start with requests that seem less serious—"just in your underwear" or "just one picture"—before escalating. They use flattery, pressure, guilt, or claims of romantic interest to get compliance. Many young people send these images voluntarily at first, not recognizing the danger. Research shows 75% of young victims willingly provided initial explicit images after being asked for them, but 67% also felt pressured to do so.8
06
The Threats Begin

Everything can change once the perpetrator has explicit images or videos. The person who seemed friendly and interested suddenly becomes threatening. They reveal their true intention: demanding money (often in cryptocurrency or gift cards), more sexual content, or other sexual favors. The threats are specific and terrifying: they'll send the sensitive material to everyone on the teen's friend list, post it publicly on social media accounts, send it to family members, or share it at school. They often screenshot the victim's contact list to prove they can follow through.

Not all sextortion involves immediate threats. Research shows perpetrators may continue emotional manipulation, using the established bond to keep victims compliant over time, a pattern consistent with grooming behaviors.21 This can trap teens in prolonged exploitation where demands escalate gradually. To learn more about recognizing grooming tactics, see Saprea's guide on what grooming looks like.

07
Escalating Demands and Fear
The demands don't stop with one payment or one image. Victims of sextortion describe a nightmare cycle where meeting one demand leads to another. If the teen sends money, the scammer demands more. If they send additional explicit images, the threats may continue. The fear becomes overwhelming. Young people monitor their social media constantly, terrified that their sensitive material will appear. They may withdraw from friends and family members, experience panic attacks, or struggle to focus on anything else. Research shows that a high fraction of victims face threats within two weeks of initial contact, and for many, the threats continue for months.
08
Following Through on Threats
In many cases, these threats are not empty. This might mean sending them to a few friends, posting them in public online spaces, or uploading them to websites. Thorn recently found that about 17% of victims were aware of their sextortionist fulfilling a threat.22 This distribution causes severe social consequences and deepens the trauma. However, in many criminal cases where victims stop responding and report to law enforcement agencies, the distribution doesn't happen or is limited because the criminal moves on to easier targets.

Dangers of the Timeline

What makes modern sextortion so dangerous is how fast this entire sequence occurs. What might have taken months in traditional grooming now happens in days or even hours. One report found that some teens chatted less than one hour before being pressured for explicit images.20 This compressed timeline means young people have almost no opportunity to step back, think clearly, or seek advice from caregivers before they're trapped.

What to Do if Your Child Discloses Sextortion

The initial response in the first hours following when a child or teen shares they have been abused or exploited can significantly impact long-term recovery. Studies consistently show that when disclosure is met with belief, validation, and immediate protective action, some outcomes improve. 24

Report It: If a minor is involved, file a report with the NCMEC CyberTipline. You can also report to local law enforcement.

Exhibit Compassion and Express Validation

The American Academy of Pediatrics' clinical report on trauma-informed care emphasizes that caregivers should "exhibit compassion and express validation" while "avoiding requiring detailed recounting of traumatic events during initial disclosure," as this can be re-traumatizing. Responses should help connect teens to resources while creating psychological and emotional safety through "listening in an active, nonjudgmental, attuned way."23

Helpful messages for parents to convey:

  • "You are not the one who is targeting someone. Even if this started on an app or site that you are too young to be on, we can work through this.
  • "Even if you might have felt okay about making some of the content, you are not the one who is in trouble."

Engage a Professional

Mental health support should begin immediately and continue long-term when needed. Given the risk of post-traumatic stress without intervention and higher rates of depression, anxiety, and suicidal ideation among victims of sextortion, connecting teens to trauma-specialized mental health professionals is essential. Parents should request crisis assessment if teens show signs of self-harm or suicidal thinking, using the National Crisis Hotline (988) for immediate support.

Support Your Child

Protective factors that negate serious impacts include increased social support, family connection through regular meals and activities, emotional competence, and active coping strategies. Research shows that family dinners and contact moderate the association between cyberbullying and mental health outcomes, suggesting that maintaining normal family routines provides crucial stability. Building on teens' strengths—their interests, talents, and past successes—creates a foundation for resilience and counteracts the shame and powerlessness of victimization.

Summary

If you or your child has already been victimized by sextortion, it is important to:

  • Stop contact. Don’t reply, negotiate, or send anything else.
  • Save evidence. Screenshot messages, threats, usernames, profile links, and any payment requests.
  • Block and report. Block the account and report it on every platform involved.
  • Don’t pay. Avoid sending money, gift cards, or cryptocurrency. Paying usually leads to more demands.
  • Don’t take away their device as punishment. That can increase shame and isolation. Focus on safety steps instead.
  • Lead with support. Stay calm, reassure them they’re not to blame, and thank them for telling you.
  • Get extra help if needed. Consider a counselor or therapist, especially if your child is showing signs of anxiety, depression, or panic. If there’s any self-harm risk, call or text the National Crisis Hotline (988) right away.

Frequently Asked Questions About Sextortion

Sextortion can be frightening and overwhelming, especially when you’re trying to understand what’s happening and what to do next. This FAQ section is designed to give straightforward, practical answers to some of the most common questions people have about sextortion—how it starts, what threats really mean, how long it can last, and what steps you can take to stay safe. Whether you’re seeking information for yourself or someone you care about, these insights can help you navigate the situation with more clarity, confidence, and support.

Explore Additional Resources

Around the world, many organizations are dedicated to preventing child sexual abuse, raising awareness about critical topics like sextortion. The following resources highlight some of the impactful efforts being made through research, education, advocacy, and community engagement. Each organization contributes valuable tools and insights that complement Saprea’s mission to empower individuals and protect children from sexual abuse.

Federal Bureau of Investigation

In the United States, the Federal Bureau of Investigation (FBI) plays a major role in investigating and combating sextortion, especially when minors are involved or when the crime crosses state or national borders. They track and identify offenders, many of whom operate internationally, and work to dismantle organized sextortion networks. The FBI also provides resources, public warnings, and victim-support guidance to help families and individuals respond safely. Victims—or parents of victims—can report cases directly to the FBI through their local field office or the Internet Crime Complaint Center (IC3), which helps launch investigations and connect victims with appropriate support.

The National Center for Missing and Exploited Children

The National Center for Missing and Exploited Children (NCMEC) is a U.S.-based nonprofit organization dedicated to helping find missing children and preventing child sexual exploitation. NCMEC runs the CyberTipline, a central reporting system for internet-related child sexual abuse, working with law enforcement and tech companies. They also provide expertise and support to families, law enforcement, and social services through training, technical assistance, and publications and collect and analyze data on missing and exploited children to identify trends and develop preventive strategies. NCMEC’s NetSmartz program delivers age-appropriate educational content designed to promote safe online behavior, digital literacy, and risk recognition through structured curricula and interactive materials.

The Internet Watch Foundation

The Internet Watch Foundation is a UK-based nonprofit dedicated to eliminating child sexual abuse imagery online. They run an anonymous hotline where anyone can report suspected child sexual abuse images or videos, and their expert analysts assess those reports to help get the illegal content taken down. They build advanced tools—like hash lists (digital fingerprints) and URL blocking lists—to help internet companies detect, block, and remove harmful content. They also partner with law enforcement, governments, NGOs, and tech platforms globally to disrupt the spread of this exploitative material and prevent re-victimization of children.

The American Academy of Pediatrics

The American Academy of Pediatrics is the largest professional association of pediatricians in the U.S. Their mission is to promote the optimal physical, mental, and social health and well-being of all infants, children, adolescents, and young adults—this includes keeping children and teens safe from abuse. The AAP supports pediatricians through professional development, research, education, and advocacy. They also focus on equity and inclusion, aiming to serve diverse communities and address systemic health disparities.

Thorn

Thorn is a nonprofit organization dedicated to protecting children from sexual abuse and exploitation in the digital age. They build advanced technology—like machine-learning tools and hash-based detection systems—that help digital platforms identify and remove child sexual abuse material. Thorn also develops victim-identification tools used by hundreds of law enforcement agencies to find and rescue children more quickly. In addition, they conduct original research on emerging online threats (such as grooming, sextortion, and AI-generated abuse), and collaborate with tech companies, parents, and policy makers to create safer digital environments. Thorn’s blog includes accounts of individuals who were victimized by sextortion and how they responded.