This is a visual explainer based on the Wikipedia article on Extortion. Read the full source article here. (opens in new tab)

The Coercive Calculus

An academic exploration into the mechanisms, manifestations, and legal ramifications of obtaining benefit through duress.

Understand Extortion ๐Ÿ‘‡ Explore Cyber Threats ๐Ÿ’ป

Dive in with Flashcard Learning!


When you are ready...
๐ŸŽฎ Play the Wiki2Web Clarity Challenge Game๐ŸŽฎ

Defining Extortion

Coercion for Gain

Extortion is fundamentally the act of acquiring a benefit, such as money or goods, through the application of coercion. This practice is almost universally recognized as a criminal offense across most legal jurisdictions. While often associated with overt threats, it encompasses a broader spectrum of coercive tactics aimed at compelling an individual to act against their will.

Extortion vs. Robbery

A critical distinction in criminal law lies between extortion and robbery. Robbery involves the immediate use of force or the threat of immediate force to seize property from a victim. In contrast, extortion, which is not limited to property, involves the instillation of fear that future harm will befall the victim if they do not comply with the perpetrator's demands. A key differentiator is that extortion invariably involves a verbal or written threat, whereas robbery may not always include such explicit communication.

The "Protection Racket"

Extortion is frequently termed a "protection racket," particularly when organized crime is involved. In this scenario, demands are often framed as payments for "protection" against real or hypothetical threats from unspecified third parties. However, the implicit understanding, and often the reality, is that this "protection" merely signifies the perpetrator's abstinence from inflicting harm themselves. This insidious form of coercion leverages fear to establish a continuous revenue stream.

Broader Interpretations

The term "exaction" is sometimes used synonymously with extortion, denoting the demanding and obtaining of something through force. Beyond material gain, exaction can also refer to the infliction of pain and suffering or forcing someone to endure an unpleasant experience. Metaphorically, "extortion" can be used to describe usury or price-gouging, though these are not legally classified as extortion. It also colloquially refers to situations where an individual feels unwillingly indebted for an essential service or to avoid legal repercussions.

Legal Frameworks

United States Law

In the United States, extortion is a distinct criminal offense, differentiated from robbery by the nature of the threat. It can be perpetrated with or without physical force or a weapon. Under federal law, extortion can be committed across various communication channels, including computer systems, phones, or mail, utilizing any instrument of interstate commerce. The crime is complete once the message is willingly and knowingly sent, irrespective of whether it reaches the intended recipient.

  • Federal Scope: Extortion can be a federal crime if it involves interstate communication or commerce.
  • Racketeering: Violations of many state extortion statutes are considered "racketeering activity" under the federal Racketeering Influenced and Corrupt Organizations Act (RICO), 18 USC.
  • Blackmail: In the US, blackmail is a specific form of extortion where the perpetrator threatens to reveal embarrassing, socially damaging, or incriminating information about the victim or their family unless a demand for money, property, or services is met.

United Kingdom Law

The legal landscape for extortion in the United Kingdom varies between its constituent nations, with distinct provisions in England and Wales compared to Scotland.

England and Wales

In England and Wales, the act of extorting property and money through coercion is primarily addressed under the offense of blackmail. This is defined as any "unwarranted demand with menaces," which explicitly includes physical threats. Relevant statutes include Section 21 of the Theft Act 1968, as well as Sections 29 and 30 of the Larceny Act 1916. Furthermore, a group of individuals engaging in such activities may also be charged with conspiracy.

Scotland

In Scotland, extortion is recognized as a common law crime. It involves using the threat of harm to demand money, property, or some other advantage from another person. A crucial aspect of Scottish law is that the legitimacy of the demand itself (e.g., for money genuinely owed) does not negate the crime if illegitimate threats of harm are employed to enforce that demand.

Cyber Extortion

The Digital Threat Landscape

Cyber extortion refers to instances where individuals or groups leverage the internet and digital technologies to demand material gain. This often manifests through threatening emails sent to companies, asserting possession of confidential information, or threatening to exploit security vulnerabilities or launch disruptive network attacks. The core demand is typically financial compensation in exchange for preventing these threatened actions.

Common Modus Operandi

Cyber extortionists frequently employ tactics designed to maximize pressure and exploit vulnerabilities. These can include:

  • Data Breaches: Stealing sensitive data and threatening its public release.
  • Ransomware: Encrypting a victim's data and demanding payment for the decryption key.
  • DDoS Attacks: Threatening to launch Distributed Denial of Service attacks to disrupt online services.
  • Reputational Damage: Threatening to publish damaging information or false statements.

The anonymity afforded by the internet can embolden perpetrators, making these crimes particularly challenging to combat.

Notable Incidents

The New York Life Case (2008)

Anthony Digati was arrested on federal charges for cyber extortion. After investing $50,000 in a New York Life Insurance Company policy and seeking an inflated return of $198,303.88, he escalated his demands to $3 million when the firm refused. Digati threatened to send six million spam emails and registered a domain to publish false public statements damaging the company's reputation. The Federal Bureau of Investigation intervened, leading to his apprehension.

Nintendo Data Breach (2011)

Spanish police arrested an individual who attempted to blackmail Nintendo's Spanish division, Nintendo Ibรฉrica. The perpetrator had stolen personal information belonging to approximately 4,000 users and accused the company of data negligence. He threatened to publicize this information and report Nintendo to the Spanish Data Agency if his demands were not met. Upon Nintendo's refusal, he released some data on an internet forum, leading to his arrest in Mรกlaga.

The Jeff Bezos Incident (2019)

Jeffrey P. Bezos, founder of Amazon and owner of The Washington Post, publicly accused American Media, Inc. (AMI), parent company of the National Enquirer, of attempted extortion. AMI allegedly threatened to publish intimate photographs of Bezos unless he publicly affirmed that their prior coverage of his relationship was not politically motivated. Bezos refused to comply, instead publishing the threatening communications on Medium, highlighting the nature of the attempted coercion.

Vastaamo Patient Data Leak (2020)

In a "relentlessly cruel" cyberattack, approximately 40,000 patient records were stolen from Vastaamo, a Finnish private psychotherapy provider. The extorters initially demanded 40 bitcoins (around โ‚ฌ450,000 at the time) from the company, threatening to publish the sensitive data. When the company did not pay, the perpetrators directly emailed individual victims, demanding โ‚ฌ200 within 24 hours or โ‚ฌ500 within 48 hours to prevent the publication of their personal information, including full names, home addresses, social security numbers, and detailed therapy notes. Investigations revealed inadequate security, including unencrypted data and a weak root password, with initial access occurring in 2018.

Teacher's Corner

Edit and Print this course in the Wiki2Web Teacher Studio

Edit and Print Materials from this study in the wiki2web studio
Click here to open the "Extortion" Wiki2Web Studio curriculum kit

Use the free Wiki2web Studio to generate printable flashcards, worksheets, exams, and export your materials as a web page or an interactive game.

True or False?

Test Your Knowledge!

Gamer's Corner

Are you ready for the Wiki2Web Clarity Challenge?

Learn about extortion while playing the wiki2web Clarity Challenge game.
Unlock the mystery image and prove your knowledge by earning trophies. This simple game is addictively fun and is a great way to learn!

Play now

Explore More Topics

Discover other topics to study!

                                        

References

References

A full list of references for this article are available at the Extortion Wikipedia page

Feedback & Support

To report an issue with this page, or to find out ways to support the mission, please click here.

Disclaimer

Important Notice

This page was generated by an Artificial Intelligence and is intended for informational and educational purposes only. The content is based on a snapshot of publicly available data from Wikipedia and may not be entirely accurate, complete, or up-to-date.

This is not legal advice. The information provided on this website is not a substitute for professional legal consultation, advice, or representation. Always consult with a qualified legal professional for specific legal questions or concerns regarding extortion or any other criminal matter. Never disregard professional legal advice or delay in seeking it because of something you have read on this website.

The creators of this page are not responsible for any errors or omissions, or for any actions taken based on the information provided herein.