Cyber blackmail crimes are threatening someone to publish their private information or photos, in order to obtain compensation from the victim, whether this compensation is material or non-material. This type of blackmail may include a threat to harm the victim’s reputation, job, or personal relationships
Forms of cyber blackmail:
Sexual blackmail: This is the most common form, where the victim is threatened with publishing intimate photos or videos of him, Financial blackmail: In which the victim is threatened with losing his money or property if he does not pay a ransom, Professional blackmail: In which the victim is threatened with losing his job or preventing his promotion, Social blackmail: In which the victim is threatened with tarnishing his reputation among his friends and family
Reasons for the spread of cyber blackmail:
Easy access to the Internet: The Internet gives everyone the opportunity to communicate and connect, but this also makes it an easy way to commit cybercrimes, False privacy: Some believe that what is published on the Internet remains confidential, but the truth is that any content can spread very quickly, Non-deterrent penalties: In some countries, there are not enough deterrent penalties for perpetrators of cyber-extortion.
Consequences of cyber-extortion:
Psychological damage: Cyber-extortion causes significant psychological damage to the victim, such as depression, anxiety and fear, Social damage: Blackmail may destroy the victim’s social and professional relationships, Financial damage: The victim may lose his money and property as a result of blackmail
Reporting cyber-extortion
Police: It is the official body responsible for investigating cyber-crimes. Submit a detailed report that includes all the details related to the blackmail, such as:
- Date and time of the incident, the identity of the blackmailer if known
- Evidence in your possession (messages, photos, videos) Any other information that may help in arresting the perpetrator
- Public Prosecution: After receiving the report, the police refer it to the Public Prosecution, which undertakes the investigation and takes the necessary legal measures
When the electronic blackmail case reaches the Public Prosecution, the victim has taken a courageous step to protect himself and his community, the Public Prosecution plays a crucial role in investigating these crimes and bringing the perpetrators to justice,
What are the procedures of the Public Prosecution in electronic blackmail cases?
Registering the report: The prosecution registers the report submitted by the victim, and documents all the details related to the crime, including the identity of the complainant and the defendant, if known, the date and time of the crime, available evidence such as messages, photos, videos, and login logs, and any other details relevant to the case.
Initial investigation: The prosecution conducts an initial investigation to collect more evidence, which may include: Summoning the victim to hear his/her statements Requesting technical reports to analyze electronic evidence Summoning witnesses if any Requesting permission to investigate: The prosecution may ask the police to issue an investigation permit to collect more evidence, such as searching electronic devices or tracking communications Referring the case to court: After completing the investigation, the prosecution refers the case to the competent court to try the accused.
Information and Technology Crimes Combating Police
The Information and Technology Crimes Combating Police is a specialized unit within the Egyptian police forces, tasked with investigating crimes committed using technology, such as electronic blackmail: threatening individuals with publishing personal information or photos in exchange for a ransom, electronic fraud: defrauding individuals to obtain their personal information or Their money, Account hacking: hacking personal or corporate accounts to obtain confidential information, Spreading rumors and fake news: spreading false information with the aim of harming the reputation of individuals or institutions, Cyber espionage: spying on individuals or institutions to obtain sensitive information
Cyber police is a common term used to refer to the Information and Technology Crimes Unit, a specialized unit within the police forces tasked with investigating crimes committed using technology, this unit plays a vital role in protecting individuals and companies from the growing threats in the online world
Why do you need a cyber police?
As reliance on the Internet in our daily lives has increased, the risks of being exposed to cybercrime have increased with it. The Internet Police works to protect you from these risks by arresting criminals: The Internet Police investigates cybercrimes and brings perpetrators to justice, recovering lost money and property: In some cases, the Internet Police can help you recover money or property that you lost as a result of a cybercrime, protecting your reputation: The Internet Police helps protect your reputation from being tarnished by the spread of rumors and false news
Telephone Police
Telephone Police differs from the Internet Police, which combats information and technology crimes, which include many crimes, while the matter differs with regard to practicing the crime via phone calls and text messages, in which case the telephone investigations are specialized, only, while when it comes to personal email and social communication, the Information Crimes Police is specialized
How do you report social media crimes?
Documenting evidence by saving messages, as it requires saving all offensive or threatening messages and comments, in addition to screenshots: Take screenshots of everything that proves the crime, Save videos: If there are any offensive videos, save them
Who can I contact to report? The Internet police are the official body responsible for investigating cybercrimes, as well as the Public Prosecution, which investigates serious crimes. As for social media platforms, most social media platforms provide tools to report violations