Jump to content

Extortion

From Wikipedia, the free encyclopedia
Lootand Extortion.Statues atTrago Mills,poking fun at theInland Revenue.

Extortionis the practice of obtaining benefit (e.g., money or goods) throughcoercion.In most jurisdictions it is likely to constitute acriminal offence;the bulk of this article deals with such cases.Robberyis the simplest and most common form of extortion, although making unfounded threats in order to obtain an unfair business advantage is also a form of extortion.

Extortion is sometimes called the "protection racket"because the racketeers often phrase their demands as payment for" protection "from (real or hypothetical) threats from unspecified other parties; though often, and almost always, such" protection "is simply abstinence of harm from the same party, and such is implied in the" protection "offer. Extortion is commonly practiced byorganized crime.In some jurisdictions, actually obtaining the benefit is not required to commit the offense, and making athreatofviolencewhich refers to a requirement of a payment of money or property to halt future violence is sufficient to commit the offense.[1]Exaction refers not only to extortion or the demanding and obtaining of something through force,[2][better source needed]but additionally, in its formal definition, means the infliction of something such aspain and sufferingor making somebody endure something unpleasant.[3][better source needed]

The termextortionis often used metaphorically to refer tousuryor toprice-gouging,though neither is legally considered extortion. It is also often used loosely to refer to everyday situations where one person feels indebted against their will, to another, in order to receive an essential service or avoid legal consequences. Neither extortion nor blackmail requires a threat of a criminal act, such as violence, merely a threat used to elicit actions, money, or property from the object of the extortion. Such threats include the filing of reports (true or not) of criminal behavior to the police, revelation of damaging facts (such as pictures of the object of the extortion in a compromising position), etc.[1]

In lawextortioncan refer topolitical corruption,such asselling one's officeorinfluence peddling,[4]but in general vocabulary the word usually first brings to mind blackmail or protection rackets. The logical connection between the corruption sense of the word and the other senses is that to demand bribes in one's official capacity is blackmail or racketeering in essence (that is, "you need access to this resource, the government restricts access to it through my office, and I will charge you unfairly and unlawfully for such access" ).[5]Extortion is also known asshakedown,and occasionallyexaction.

United States[edit]

Extortion is distinguished fromrobbery.In robbery, whether armed or not, the offender takes property from the victim by the immediate use of force or fear that force will be immediately used. Extortion, which is not limited to the taking of property, involves the verbal or writteninstillationof fear that something will happen to the victim if they do not comply with the extortionist's will. Another key distinction is that extortion always involves a verbal or written threat,[1]whereas robbery may not. InUnited Statesfederal law, extortion can be committed with or without the use of force and with or without the use of a weapon. Violation of many state extortion statutes constitutes "racketeering activity" under Section 1961 of the federal Racketeering Influenced and Corrupt Organizations Act, 18 USC

Inblackmail,which always involves extortion, the extortionist threatens to reveal information about a victim or their family members that is potentially embarrassing, socially damaging, or incriminating unless a demand for money, property, or services is met.[6]

In theUnited States,extortion may also be committed as afederal crimeacross a computer system, phone, by mail, or in using any instrument ofinterstate commerce.Extortion requires that the individual sent the message willingly and knowingly as elements of the crime. The message only has to be sent (but does not have to reach the intended recipient) to commit the crime of extortion.

United Kingdom[edit]

England and Wales[edit]

InEngland and Walesextorting property and money bycoercionis the offence ofblackmailwhich covers any "unwarranted demand with menaces" including physical threats. See section 21 of theTheft Act 1968plus sections 29 and 30 of theLarceny Act 1916.A group of people may also be committingconspiracy.

Scotland[edit]

Extortion is a common law crime in Scotland of using threat of harm to demand money, property or some advantage from another person. It does not matter whether the demand itself is legitimate (such as for money owed) as the crime can still be committed when illegitimate threats of harm are used.[7][8]

Cyber extortion[edit]

Cyber extortionis when an individual or group uses the internet as a mean of demanding some sort of material gain.[vague][9]The group or individual usually sends a company a threatening email stating that they have received confidential information about their company and will exploit a security leak or launch an attack that will harm the company's network. The message sent through the email usually demands money in exchange for the prevention of the attack.[10][11]

Cases[edit]

In March 2008, Anthony Digati was arrested on federal charges of extortion through interstate communication. Digati put $50,000 into a variable life insurance policy byNew York Life Insurance Companyand wanted a return of $198,303.88. When the firm did not comply, he threatened to send out six millionspam emails.He registered a domain in February 2008 that contained New York Life's name in the URL to display false public statements about the company and increased his demand to $3 million.[12]According to prosecutors, Digati's intent was not to inform or educate but he wanted to "damage the reputation of New York Life and cost the company millions of dollars in revenue,".[13]New York Life contacted theFederal Bureau of Investigationand Digati was apprehended.

On February 15, 2011, Spanish police apprehended a man who attempted to blackmailNintendoover customer information he had stolen. The man stole personal information about 4,000 users and emailed Nintendo Ibérica, Nintendo's Spanish division, and accused the company of data negligence. He threatened the company that he would make the information public and complain to the Spanish Data Agency if his demands were not met. After Nintendo ignored his demands, he published some of the information on an Internet forum. Nintendo notified authorities and the man was arrested inMálaga.No information has been revealed as to what the man demanded from Nintendo.[14]

On February 7, 2019,Jeffrey P. Bezos,owner ofAmazonandThe Washington Postand currently one of theworld's wealthiest people,accused theNational Enquirerand its parent companyAmerican Media, Inc., of attempting to extort him by threatening to reveal nude pictures of him unless he publicly stated that he "[has] no knowledge or basis for suggesting that AMI's coverage was politically motivated or influenced by political forces." This threat was in response to Bezos investigating the tabloid for publishing details about his relationship withLauren Sanchez,which led to Bezos and his wife Mackenzie announcing their divorce[15]on January 9 of that year. Bezos refused and posted the threat onMedium.[16]

On October 21, 2020, the news sources reported that roughly 40,000 patient records had been stolen from theFinnishprivate health care providerVastaamo.[17][18][19]The extorters demanded 40bitcoinsroughly 450,000 euros at thetimeor the stolen patient data would be published. The extorters published 100 patient records a day on aTor message boardto add pressure for their demands. The leaked patient records contained patients' full names, home addresses, social security numbers, and the therapists' and doctors' notes from each session.[18]After the extortion of the company failed, the extorters sent victims an email demanding they pay either 200euros within 24hours or 500euros in 48hours in order to avoid publishing their sensitive personal data.[20]The company's security practices were found to be inadequate: the sensitive data was not encrypted[21]and apparently the systemroot passwordwas very weak.[22]The patient records were first accessed by intruders in November 2018, while the security flaws continued to exist until March 2019. The president of Finland described the cyber attack as "relentlessly cruel."[19]

Similar crimes[edit]

  • Badger game:The victim or "mark"—for example, such as a married person—is tricked into a compromising position to make them vulnerable toblackmail.
  • Clip joint:A clip joint or fleshpot is an establishment, usually a strip club or entertainment bar, typically one claiming to offer adult entertainment or bottle service, in which customers are tricked into paying money and receive poor goods or services, or none, in return. An example of this is portrayed in the comedy filmPorky's.
  • Coercion:the practice of compelling a person or manipulating them to behave in an involuntary way (whether through action or inaction) by use of threats, intimidation, trickery, or some other form of pressure or force. These are used as leverage, to force the victim to act in the desired way.
  • Confidence trick(also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle, bamboozle or finesse): an attempt todefrauda person or group by gaining theirconfidence.
  • Cryptovirology:a software scam in which apublic-key cryptographysystem crafts fake keys which encrypt the user's data, but cannot decrypt them unless the user pays for the real key.
  • Dognapping:The crime of taking adogfrom its owner, which usually occurs inpurebred dogs,the profit from which can run up to thousands of dollars.
  • Loan sharking:A loan shark is a person or body that offers unsecured loans at high interest rates to individuals, often backed by blackmail or threats of violence.
  • Price gouging:a pejorative term for a seller pricing much higher than is considered reasonable or fair. In precise, legal usage, it is the name of a felony that applies in some of the United States only during civil emergencies.
  • Racket:A service that is fraudulently offered to solve a problem, such as for a problem that does not actually exist, will not be affected, or would not otherwise exist.
  • Sextortion:Forcing individuals to send sexual images or perform sexual services.
  • Terrorism:most simply, policy intended to intimidate or cause terror. It is more commonly understood as an act which is intended to create fear (terror), is perpetrated for an ideological goal (as opposed to a materialistic goal or a lone attack), and deliberately target or disregard the safety ofnon-combatants.Some definitions also include acts of unlawful violence or unconventional warfare, but at present, theinternational communityhas been unable to formulate a universally agreed, legally binding, criminal law definition of terrorism.
  • Tiger kidnapping:the taking of an innocenthostageto make a loved one or associate of the victim do something, e.g. a child is taken hostage to force the shopkeeper to open the safe; the term originates from the prior observation of the victim, like a tiger does with its prey.Ransomsare often used alongside these.

See also[edit]

References[edit]

  1. ^abcLindgren, James (April 1984). "Unraveling the Paradox of Blackmail".Columbia Law Review.84(3): 670–717.doi:10.2307/1122502.JSTOR1122502.
  2. ^"Exaction - definition of exaction by the Free Online Dictionary, Thesaurus and Encyclopedia".Thefreedictionary.Retrieved2012-06-05.
  3. ^"Exact definition - Dictionary - MSN Encarta".Encarta Dictionary.Archived fromthe originalon 2009-12-01.
  4. ^"Extortion".Investopedia.Retrieved2021-12-05.
  5. ^"Extortion - Essential Elements and the Broader Reach of RICO".Stimmel Law.
  6. ^Posner, Richard A. (1992)."Blackmail, Privacy, and Freedom of Contract".University of Pennsylvania Law Review.141(5): 1817–1847.doi:10.2307/3312575.JSTOR3312575.
  7. ^The Scottish Beat Officer's Companion(6th ed.). Jane's Police Review. 29 June 2010. p. 85.ISBN978-07106-2928-9.
  8. ^Jury Manual(2018 ed.). Parliament House, Edinburgh: Judicial Institute for Scotland. 9 November 2018. p. 46.1. Archived fromthe originalon 30 January 2020.Retrieved25 January2019.
  9. ^Sulkowski, Adam J."Cyber-Extortion: Duties and Liabilities Related to the Elephant in the Server Room".SSRN Electronic Journal.2007:101–144.
  10. ^"Computer Security Ethics and Privacy".Archived fromthe originalon 2011-10-11.Retrieved2016-06-29.
  11. ^"Brand 's Mike Zammuto Discusses Meetup Extortion".Dailyglobe. 2014-03-05. Archived fromthe originalon 2014-04-12.Retrieved2014-03-10.
  12. ^"Alleged Cyber-Extortionist Indicted: Feds Say Anthony Digati Tried To Chill, Defame Business On Internet To Extract $200,000 In Bizarre Social-Networking Plot".Patrickpretty. 2010-04-22.Retrieved2014-03-10.
  13. ^Gendar, Alison (2010-03-08)."Anthony Digati arrested for allegedly threatening New York Life with email spam attack".NY Daily News. Archived fromthe originalon 2011-06-29.Retrieved2014-03-10.
  14. ^Woollacott, Emma (2011-02-15)."Police arrest man over Nintendo extortion".TG Daily. Archived fromthe originalon 2017-02-01.Retrieved2014-03-10.
  15. ^Bezos, Jeffrey (2019-01-09)."Jeff Bezos announces divorce from MacKenzie Bezos after 25 years together".The Washington Post.
  16. ^Bezos, Jeffrey (2019-02-07)."No thank you, Mr. Pecker".Medium.Retrieved2019-02-08.
  17. ^"Psychotherapy centre's database hacked, patient info held ransom".Yle Uutiset.21 October 2020.Retrieved2020-10-24.
  18. ^ab"Extortionist publishes more sensitive data on psychotherapy centres' patients".Yle Uutiset.22 October 2020.Retrieved2020-10-24.
  19. ^abSipilä, Jarkko (27 October 2020)."Therapy patients in Finland blackmailed after data breach".CNN.Retrieved2020-10-27.
  20. ^"Psychotherapy centre data breach victims receive extortion emails".Yle Uutiset.24 October 2020.Retrieved2020-10-24.
  21. ^"Tietoturva | Terapiapotilaisiin kohdistunut tietomurto on voinut vaarantaa tuhansien ihmisten tietosuojan, kyseessä on täysin" poikkeuksellinen tapahtuma "".Helsingin Sanomat(in Finnish). 2020-10-22.Retrieved2020-10-24.
  22. ^"Kiristäjä julkaisi suomalaisten arkaluontoisia terapiakeskusteluja – vaatii 450 000:ta euroa tai jatkoa seuraa".Ilta-Sanomat(in Finnish). 2020-10-21.Retrieved2020-10-24.

External links[edit]