Misplaced Pages

Extortion: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 14:14, 3 March 2014 editTutelary (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers17,196 editsm Similar crimes: Switched order to make it alphabetical← Previous edit Latest revision as of 11:09, 15 December 2024 edit undoAlbaniavision (talk | contribs)13 editsNo edit summary 
(263 intermediate revisions by more than 100 users not shown)
Line 1: Line 1:
{{Short description|Criminal offense of obtaining benefit through coercion}}
{{Redirect|Exact|the exact sciences|Exact science}}
{{Redirect|Extort|the album by KMFDM|XTORT}} {{Redirect|Extort|the album by KMFDM|XTORT}}
{{Other uses}}
{{Globalize|article|Eng|date=August 2019}}
{{Criminal law}}
] and Extortion''. Statues at ], poking fun at the ].]]
'''Extortion''' is the practice of obtaining benefit (e.g., money or goods) through ]. In most jurisdictions it is likely to constitute a ]; the bulk of this article deals with such cases. ] is the simplest and most common form of extortion, although making unfounded threats in order to obtain an unfair business advantage is also a form of extortion.{{cn|date=December 2024}}


'''Extortion''' is the crime of obtaining money or some other thing of value by the abuse of one's office or authority. Refraining from doing harm is sometimes ] called ]. Extortion is commonly practiced by ] ]. The actual obtainment of money or property is not required to commit the offense. Making a ] of ] which refers to a requirement of a payment of money or property to halt future violence is sufficient to commit the offense. Exaction refers not only to extortion or the unlawful demanding and obtaining of something through force,<ref>{{cite web|url=http://www.thefreedictionary.com/exaction|title=Exaction - definition of exaction by the Free Online Dictionary, Thesaurus and Encyclopedia|publisher=Thefreedictionary.com|accessdate=2012-06-05}}</ref> but additionally, in its formal definition, means the infliction of something such as ] or making somebody endure something unpleasant.<ref>{{cite encyclopedia|title=Exact definition - Dictionary - MSN Encarta<!--Bot-generated title-->|url=http://encarta.msn.com/dictionary_1861609570/exact.html|work=Encarta Dictionary|archiveurl=http://www.webcitation.org/5kwc1Rfdf|archivedate=2009-10-31|deadurl=yes}}</ref>


Extortion is sometimes called the "]" because the racketeers often phrase their demands as payment for "protection" from (real or hypothetical) threats from unspecified other parties; though often, and almost always, such "protection" is simply abstinence of harm from the same party, and such is implied in the "protection" offer. Extortion is commonly practiced by ]. In some jurisdictions, actually obtaining the benefit is not required to commit the offense, and making a ] of ] which refers to a requirement of a payment of money or property to halt future violence is sufficient to commit the offense.<ref name=":0">{{cite journal |last1=Lindgren |first1=James |title=Unraveling the Paradox of Blackmail |journal=Columbia Law Review |date=April 1984 |volume=84 |issue=3 |pages=670–717|doi=10.2307/1122502 |jstor=1122502 }}</ref> Exaction refers not only to extortion or the demanding and obtaining of something through force,<ref>{{cite web|url=http://www.thefreedictionary.com/exaction|title=Exaction - definition of exaction by the Free Online Dictionary, Thesaurus and Encyclopedia|publisher=Thefreedictionary.com|access-date=2012-06-05}}</ref>{{Better source needed|date=August 2019}} but additionally, in its formal definition, means the infliction of something such as ] or making somebody endure something unpleasant.<ref>{{cite encyclopedia|title=Exact definition - Dictionary - MSN Encarta |url=http://encarta.msn.com/dictionary_1861609570/exact.html |encyclopedia=Encarta Dictionary |archive-url=https://web.archive.org/web/20091201023124/http://encarta.msn.com/dictionary_1861609570/exact.html |archive-date=2009-12-01 |url-status=dead }}</ref>{{Better source needed|date=August 2019}}
Extortion is distinguished from ]. In robbery, whether armed or not, the offender takes property from the victim by the immediate use of force or fear that force will be immediately used (as in the classic line, "Your money or your life.") Extortion, which is not limited to the taking of property, involves the verbal or written ''instillation'' of fear that something will happen to the victim if he or she does not comply with the extortionist's will. Another key distinction is that extortion always involves a verbal or written threat, whereas robbery does not. In ] federal law, extortion can be committed with or without the use of force and with or without the use of a weapon.


The term ''extortion'' is often used metaphorically to refer to ] or to ], though neither is legally considered extortion. It is also often used loosely to refer to everyday situations where one person feels indebted against their will, to another, in order to receive an essential service or avoid legal consequences. Neither extortion nor blackmail requires a threat of a criminal act, such as violence, merely a threat used to elicit actions, money, or property from the object of the extortion. Such threats include the filing of reports (true or not) of criminal behavior to the police, revelation of damaging facts (such as pictures of the object of the extortion in a compromising position), etc.<ref name=":0" /> {{cn|date=December 2024}}
In ], which always involves extortion, the extortionist threatens to reveal information about a victim or his family members that is potentially embarrassing, socially damaging, or incriminating unless a demand for money, property, or services is met.


In law ''extortion'' can refer to ], such as ] or ],<ref>{{Cite web|title=Extortion|url=https://www.investopedia.com/terms/e/extortion.asp|access-date=2021-12-05|website=Investopedia|language=en}}</ref> but in general vocabulary the word usually first brings to mind blackmail or protection rackets. The logical connection between the corruption sense of the word and the other senses is that to demand bribes in one's official capacity is blackmail or racketeering in essence (that is, "you need access to this resource, the government restricts access to it through my office, and I will charge you unfairly and unlawfully for such access").<ref>{{Cite web|title=Extortion - Essential Elements and the Broader Reach of RICO|url=https://www.stimmel-law.com/en/articles/extortion-essential-elements-and-broader-reach-rico|website=Stimmel Law}}</ref> Extortion is also known as '''shakedown''', and occasionally '''exaction.'''
The term ''extortion'' is often used euphemistically to refer to ] or to ], though neither is legally considered extortion. It is also often used loosely to refer to everyday situations where one person feels indebted against their will, to another, in order to receive an essential service or avoid legal consequences.

Neither extortion nor blackmail require a threat of a criminal act, such as violence, merely a threat used to elicit actions, money, or property from the object of the extortion. Such threats include the filing of reports (true or not) of criminal behavior to the police, revelation of damaging facts (such as pictures of the object of the extortion in a compromising position), etc.


==United States== ==United States==
Extortion is distinguished from ]. In robbery, whether armed or not, the offender takes property from the victim by the immediate use of force or fear that force will be immediately used. Extortion, which is not limited to the taking of property, involves the verbal or written ''instillation'' of fear that something will happen to the victim if they do not comply with the extortionist's will. Another key distinction is that extortion always involves a verbal or written threat,<ref name=":0" /> whereas robbery may not. In ] federal law, extortion can be committed with or without the use of force and with or without the use of a weapon. Violation of many state extortion statutes constitutes "racketeering activity" under Section 1961 of the federal Racketeering Influenced and Corrupt Organizations Act, 18 USC
In the ], extortion may also be committed as a ] across a computer system, phone, by mail or in using any instrument of ]. Extortion requires that the individual sent the message willingly and knowingly as elements of the crime. The message only has to be sent (but does not have to reach the intended recipient) to commit the crime of extortion.

In ], which always involves extortion, the extortionist threatens to reveal information about a victim or their family members that is potentially embarrassing, socially damaging, or incriminating unless a demand for money, property, or services is met.<ref>{{cite journal |last1=Posner |first1=Richard A. |title=Blackmail, Privacy, and Freedom of Contract |journal=University of Pennsylvania Law Review |date=1992 |volume=141 |issue=5 |pages=1817–1847|doi=10.2307/3312575 |jstor=3312575 |url=https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1088&context=law_and_economics }}</ref>

In the ], extortion may also be committed as a ] across a computer system, phone, by mail, or in using any instrument of ]. Extortion requires that the individual sent the message willingly and knowingly as elements of the crime. The message only has to be sent (but does not have to reach the intended recipient) to commit the crime of extortion.

==United Kingdom==
===England and Wales===
In ] extorting property and money by ] is the offence of ] which covers any "unwarranted demand with menaces" including physical threats. See section 21 of the ] plus sections 29 and 30 of the ]. A group of people may also be committing ].

===Scotland===
Extortion is a common law crime in Scotland of using threat of harm to demand money, property or some advantage from another person. It does not matter whether the demand itself is legitimate (such as for money owed) as the crime can still be committed when illegitimate threats of harm are used.<ref>{{cite book |title=The Scottish Beat Officer's Companion |date=29 June 2010 |publisher=Jane's Police Review |isbn=978-07106-2928-9 |page=85 |edition=6th}}</ref><ref>{{cite book |title=Jury Manual |date=9 November 2018 |publisher=Judicial Institute for Scotland |location=Parliament House, Edinburgh |page=46.1 |edition=2018 |url=http://www.scotland-judiciary.org.uk/60/0/Judicial-Institute-Publications |access-date=25 January 2019 |archive-date=30 January 2020 |archive-url=https://web.archive.org/web/20200130043115/http://www.scotland-judiciary.org.uk/60/0/Judicial-Institute-Publications |url-status=dead }}</ref>

==Cyber extortion==
'''Cyber extortion''' is when an individual or group uses the internet as a mean of demanding some sort of material gain.{{vague|date=August 2019}} <ref>{{Cite journal|last=Sulkowski|first=Adam J.|title=Cyber-Extortion: Duties and Liabilities Related to the Elephant in the Server Room|url=https://www.researchgate.net/publication/228243486|journal=SSRN Electronic Journal|volume=2007|pages=101–144}}</ref> The group or individual usually sends a company a threatening email stating that they have received confidential information about their company and will exploit a security leak or launch an attack that will harm the company's network. The message sent through the email usually demands money in exchange for the prevention of the attack.<ref>{{Cite web |url=http://www.webreference.com/internet/security/ |title=Computer Security Ethics and Privacy |access-date=2016-06-29 |archive-url=https://web.archive.org/web/20111011203948/http://www.webreference.com/internet/security/ |archive-date=2011-10-11 |url-status=dead }}</ref><ref>{{cite web |url=http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ |title=Brand.com's Mike Zammuto Discusses Meetup.com Extortion |publisher=Dailyglobe.com |date=2014-03-05 |access-date=2014-03-10 |url-status=dead |archive-url=https://web.archive.org/web/20140412021812/http://dailyglobe.com/61817/brand-coms-mike-zammuto-discusses-meetup-com-extortion/ |archive-date=2014-04-12 }}</ref>

===Cases===
In March 2008, Anthony Digati was arrested on federal charges of extortion through interstate communication. Digati put $50,000 into a variable life insurance policy by ] and wanted a return of $198,303.88. When the firm did not comply, he threatened to send out six million ]s. He registered a domain in February 2008 that contained New York Life's name in the URL to display false public statements about the company and increased his demand to $3 million.<ref>{{cite web|url=http://www.patrickpretty.com/2010/04/22/alleged-cyber-extortionist-indicted-feds-say-anthony-digati-tried-to-chill-defame-business-on-internet-to-extract-200000-in-bizarre-social-networking-plot/ |title=Alleged Cyber-Extortionist Indicted: Feds Say Anthony Digati Tried To Chill, Defame Business On Internet To Extract $200,000 In Bizarre Social-Networking Plot |publisher=Patrickpretty.com |date=2010-04-22 |access-date=2014-03-10}}</ref> According to prosecutors, Digati's intent was not to inform or educate but he wanted to "damage the reputation of New York Life and cost the company millions of dollars in revenue,".<ref>{{cite web |url=http://www.nydailynews.com/money/2010/03/08/2010-03-08_anthony_digati_arrested_for_allegedly_threatening_new_york_life_with_email_spam_.html |title=Anthony Digati arrested for allegedly threatening New York Life with email spam attack |publisher=NY Daily News |date=2010-03-08 |first1=Alison |last1=Gendar |access-date=2014-03-10 |archive-date=2011-06-29 |archive-url=https://web.archive.org/web/20110629064915/http://www.nydailynews.com/money/2010/03/08/2010-03-08_anthony_digati_arrested_for_allegedly_threatening_new_york_life_with_email_spam_.html |url-status=dead }}</ref> New York Life contacted the ] and Digati was apprehended.

On February 15, 2011, Spanish police apprehended a man who attempted to blackmail ] over customer information he had stolen. The man stole personal information about 4,000 users and emailed Nintendo Ibérica, Nintendo's Spanish division, and accused the company of data negligence. He threatened the company that he would make the information public and complain to the Spanish Data Agency if his demands were not met. After Nintendo ignored his demands, he published some of the information on an Internet forum. Nintendo notified authorities and the man was arrested in ]. No information has been revealed as to what the man demanded from Nintendo.<ref>{{cite web |last=Woollacott |first=Emma |url=http://www.tgdaily.com/business-and-law-features/54123-police-arrest-man-over-nintendo-extortion |title=Police arrest man over Nintendo extortion |publisher=TG Daily |date=2011-02-15 |access-date=2014-03-10 |archive-date=2017-02-01 |archive-url=https://web.archive.org/web/20170201131755/http://www.tgdaily.com/business-and-law-features/54123-police-arrest-man-over-nintendo-extortion |url-status=dead }}</ref>

On February 7, 2019, ], owner of ] and '']'' and currently one of the ], accused the '']'' and its parent company ]., of attempting to extort him by threatening to reveal nude pictures of him unless he publicly stated that he " no knowledge or basis for suggesting that AMI's coverage was politically motivated or influenced by political forces." This threat was in response to Bezos investigating the tabloid for publishing details about his relationship with ], which led to Bezos and his wife Mackenzie announcing their divorce<ref>{{cite news|last=Bezos |first=Jeffrey |url=https://www.washingtonpost.com/arts-entertainment/2019/01/09/jeff-bezos-announces-divorce-mackenzie-bezos-after-years-together/ |title=Jeff Bezos announces divorce from MacKenzie Bezos after 25 years together |newspaper=The Washington Post |date=2019-01-09 }}</ref> on January 9 of that year. Bezos refused and posted the threat on ].<ref>{{cite web|url=https://medium.com/@jeffreypbezos/no-thank-you-mr-pecker-146e3922310f |last=Bezos |first=Jeffrey |title=No thank you, Mr. Pecker |publisher=Medium |date=2019-02-07 |access-date=2019-02-08}}</ref>

On October 21, 2020, the news sources reported that roughly 40,000 patient records had been stolen from the ] private health care provider ].<ref>{{Cite web|title=Psychotherapy centre's database hacked, patient info held ransom|url=https://yle.fi/uutiset/osasto/news/psychotherapy_centres_database_hacked_patient_info_held_ransom/11605460|access-date=2020-10-24|website=Yle Uutiset|date=21 October 2020|language=en}}</ref><ref name=":1">{{Cite web|title=Extortionist publishes more sensitive data on psychotherapy centres' patients|url=https://yle.fi/uutiset/osasto/news/extortionist_publishes_more_sensitive_data_on_psychotherapy_centres_patients/11608960|access-date=2020-10-24|website=Yle Uutiset|date=22 October 2020|language=en}}</ref><ref name=":2">{{Cite web|last=Sipilä|first=Jarkko|title=Therapy patients in Finland blackmailed after data breach|url=https://www.cnn.com/2020/10/27/tech/finland-therapy-patients-blackmailed-data-breach-intl/index.html|access-date=2020-10-27|website=CNN|date=27 October 2020 }}</ref> The extorters demanded 40{{nbs}}{{nowrap|bitcoins{{tsp}}{{mdash}}{{tsp}}}}roughly 450,000 euros at the {{nowrap|time{{tsp}}{{mdash}}{{tsp}}}}or the stolen patient data would be published. The extorters published 100 patient records a day on a ] to add pressure for their demands. The leaked patient records contained patients' full names, home addresses, social security numbers, and the therapists' and doctors' notes from each session.<ref name=":1" /> After the extortion of the company failed, the extorters sent victims an email demanding they pay either 200{{nbs}}euros within 24{{nbs}}hours or 500{{nbs}}euros in 48{{nbs}}hours in order to avoid publishing their sensitive personal data.<ref>{{Cite web|title=Psychotherapy centre data breach victims receive extortion emails|url=https://yle.fi/uutiset/osasto/news/psychotherapy_centre_data_breach_victims_receive_extortion_emails/11612230|access-date=2020-10-24|website=Yle Uutiset|date=24 October 2020|language=en}}</ref> The company's security practices were found to be inadequate: the sensitive data was not encrypted<ref>{{Cite web|date=2020-10-22|title=Tietoturva {{!}} Terapiapotilaisiin kohdistunut tietomurto on voinut vaarantaa tuhansien ihmisten tietosuojan, kyseessä on täysin "poikkeuksellinen tapahtuma"|url=https://www.hs.fi/kotimaa/art-2000006687766.html|access-date=2020-10-24|website=Helsingin Sanomat|language=fi}}</ref> and apparently the system ] was very weak.<ref>{{Cite web|date=2020-10-21|title=Kiristäjä julkaisi suomalaisten arkaluontoisia terapiakeskusteluja – vaatii 450 000:ta euroa tai jatkoa seuraa|url=https://www.is.fi/digitoday/tietoturva/art-2000006676604.html|access-date=2020-10-24|website=Ilta-Sanomat|language=fi}}</ref> The patient records were first accessed by intruders in November 2018, while the security flaws continued to exist until March 2019. The president of Finland described the cyber attack as "relentlessly cruel."<ref name=":2" />


==Similar crimes== ==Similar crimes==
* ]: The victim or "]"—for example, such as a married person—is tricked into a compromising position to make him vulnerable to ]. * ]: The victim or "]"—for example, such as a married person—is tricked into a compromising position to make them vulnerable to ].
* ]: A clip joint or fleshpot is an establishment, usually a strip club or entertainment bar, typically one claiming to offer adult entertainment or bottle service, in which customers are tricked into paying money and receive poor goods or services, or none, in return. * ]: A clip joint or fleshpot is an establishment, usually a strip club or entertainment bar, typically one claiming to offer adult entertainment or bottle service, in which customers are tricked into paying money and receive poor goods or services, or none, in return. An example of this is portrayed in the comedy film ].
* ]: the practice of compelling a person or manipulating them to behave in an involuntary way (whether through action or inaction) by use of threats, intimidation, trickery, or some other form of pressure or force. These are used as leverage, to force the victim to act in the desired way. * ]: the practice of compelling a person or manipulating them to behave in an involuntary way (whether through action or inaction) by use of threats, intimidation, trickery, or some other form of pressure or force. These are used as leverage, to force the victim to act in the desired way.
* ] (also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle or bamboozle): an attempt to ] a person or group by gaining their ]. * ] (also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle, bamboozle or finesse): an attempt to ] a person or group by gaining their ].
* ]: a software scam in which a public key cryptography system crafts fake keys which encrypt the user's data, but cannot decrypt them unless the user pays for the real key. * ]: a software scam in which a ] system crafts fake keys which encrypt the user's data, but cannot decrypt them unless the user pays for the real key.
* ]: The crime of taking a ] from its owner, which usually occurs in ]s, the profit from which can run up to thousands of dollars.
* ]: The Danegeld ("Danish tax") was a tax raised to pay tribute to the Viking raiders to save a land from being ravaged. It was called the ''geld'' or ''gafol'' in eleventh-century sources; the term Danegeld did not appear until the early twelfth century.
* ]: The crime of taking a ] from its owner, which usually occurs in ]s, the profit from which can run up to thousands of dollars.
* ]: A loan shark is a person or body that offers unsecured loans at high interest rates to individuals, often backed by blackmail or threats of violence. * ]: A loan shark is a person or body that offers unsecured loans at high interest rates to individuals, often backed by blackmail or threats of violence.
* ]: Nuclear blackmail is a form of nuclear strategy in which an aggressor uses the threat of use of nuclear weapons to force an adversary to perform some action or make some concessions. It is a type of extortion, related to brinkmanship.
* ]: ransom offered instead of destroying a captured vessel, a form of extortion deemed acceptable under international law in the days of fighting sail.
* ]: a pejorative term for a seller pricing much higher than is considered reasonable or fair. In precise, legal usage, it is the name of a felony that applies in some of the United States only during civil emergencies. * ]: a pejorative term for a seller pricing much higher than is considered reasonable or fair. In precise, legal usage, it is the name of a felony that applies in some of the United States only during civil emergencies.
* ]: A service that is fraudulently offered to solve a problem, such as for a problem that does not actually exist, will not be affected, or would not otherwise exist. * ]: A service that is fraudulently offered to solve a problem, such as for a problem that does not actually exist, will not be affected, or would not otherwise exist.
* ]: Forcing individuals to send sexual images or perform sexual services * ]: Forcing individuals to send sexual images or perform sexual services.
* ]: most simply, policy intended to intimidate or cause terror. It is more commonly understood as an act which is intended to create fear (terror), is perpetrated for an ideological goal (as opposed to a materialistic goal or a lone attack), and deliberately target or disregard the safety of ]. Some definitions also include acts of unlawful violence or unconventional warfare, but at present, the ] has been unable to formulate a universally agreed, legally binding, criminal law definition of terrorism.
* ]: Tallage or talliage (from the French ''tailler'', a part cut out of the whole) may have signified at first any tax, but became in England and France a land use or land tenure tax. Later in England it was further limited to assessments by the crown upon cities, boroughs, and royal domains. In effect, tallage was a land tax.
* ]: most simply, policy intended to intimidate or cause terror. It is more commonly understood as an act which is intended to create fear (terror), is perpetrated for an ideological goal (as opposed to a materialistic goal or a lone attack), and deliberately targets (or disregards the safety of) non-combatants. Some definitions also include acts of unlawful violence or unconventional warfare, but at present, the ] has been unable to formulate a universally agreed, legally binding, criminal law definition of terrorism.
* ]: the taking of an innocent ] to make a loved one or associate of the victim do something, e.g. a child is taken hostage to force the shopkeeper to open the safe; the term originates from the prior observation of the victim, like a tiger does with its prey. ]s are often used alongside these. * ]: the taking of an innocent ] to make a loved one or associate of the victim do something, e.g. a child is taken hostage to force the shopkeeper to open the safe; the term originates from the prior observation of the victim, like a tiger does with its prey. ]s are often used alongside these.
* ]ing: widely used in England by private individuals and companies to extort money from motorists prior to October 2012, when the ] made the practice illegal.


==See also== ==See also==
<!-- Please respect alphabetical order -->
{{Div col}} {{Div col}}
* ]
* ] * ]
* ]
* ] * ]
** ] * ]
* ] * ]
* ] * ]
* ]
* ] * ]
* ] (GRECO) of the ] * ] (GRECO) of the ]
* ] * ]
* ]
* ] * ]
* ] * ]
* ] * ]
* ] * ]
* ] * ]
* ]
* ]
* ]
* ]
* ]
* ] * ]
* ] * ]

{{Div col end}} {{Div col end}}


==References== ==References==
<references /> <references responsive />


==External links== ==External links==
{{Wiktionary|extortion}} {{Wiktionary|extortion}}
{{commons category}} {{Commons category|Extortion}}
{{NIE Poster}}
* , a Canadian legal portal, contains an article describing the elements of the offence of extortion under ].


{{Corruption}}
{{Types of crime}} {{Types of crime}}
{{Authority control}}

] ]
] ]
Line 69: Line 99:
] ]
] ]
]

Latest revision as of 11:09, 15 December 2024

Criminal offense of obtaining benefit through coercion "Extort" redirects here. For the album by KMFDM, see XTORT. For other uses, see Extortion (disambiguation).
Globe icon.The examples and perspective in this article deal primarily with the English-speaking world and do not represent a worldwide view of the subject. You may improve this article, discuss the issue on the talk page, or create a new article, as appropriate. (August 2019) (Learn how and when to remove this message)
Criminal law
Elements
Scope of criminal liability
Severity of offense
Inchoate offenses
Offense against the person
Sexual offenses
Crimes against property
Crimes against justice
Crimes against the public
Crimes against animals
Crimes against the state
Defenses to liability
Other common-law areas
Portals
Loot and Extortion. Statues at Trago Mills, poking fun at the Inland Revenue.

Extortion is the practice of obtaining benefit (e.g., money or goods) through coercion. In most jurisdictions it is likely to constitute a criminal offence; the bulk of this article deals with such cases. Robbery is the simplest and most common form of extortion, although making unfounded threats in order to obtain an unfair business advantage is also a form of extortion.


Extortion is sometimes called the "protection racket" because the racketeers often phrase their demands as payment for "protection" from (real or hypothetical) threats from unspecified other parties; though often, and almost always, such "protection" is simply abstinence of harm from the same party, and such is implied in the "protection" offer. Extortion is commonly practiced by organized crime. In some jurisdictions, actually obtaining the benefit is not required to commit the offense, and making a threat of violence which refers to a requirement of a payment of money or property to halt future violence is sufficient to commit the offense. Exaction refers not only to extortion or the demanding and obtaining of something through force, but additionally, in its formal definition, means the infliction of something such as pain and suffering or making somebody endure something unpleasant.

The term extortion is often used metaphorically to refer to usury or to price-gouging, though neither is legally considered extortion. It is also often used loosely to refer to everyday situations where one person feels indebted against their will, to another, in order to receive an essential service or avoid legal consequences. Neither extortion nor blackmail requires a threat of a criminal act, such as violence, merely a threat used to elicit actions, money, or property from the object of the extortion. Such threats include the filing of reports (true or not) of criminal behavior to the police, revelation of damaging facts (such as pictures of the object of the extortion in a compromising position), etc.

In law extortion can refer to political corruption, such as selling one's office or influence peddling, but in general vocabulary the word usually first brings to mind blackmail or protection rackets. The logical connection between the corruption sense of the word and the other senses is that to demand bribes in one's official capacity is blackmail or racketeering in essence (that is, "you need access to this resource, the government restricts access to it through my office, and I will charge you unfairly and unlawfully for such access"). Extortion is also known as shakedown, and occasionally exaction.

United States

Extortion is distinguished from robbery. In robbery, whether armed or not, the offender takes property from the victim by the immediate use of force or fear that force will be immediately used. Extortion, which is not limited to the taking of property, involves the verbal or written instillation of fear that something will happen to the victim if they do not comply with the extortionist's will. Another key distinction is that extortion always involves a verbal or written threat, whereas robbery may not. In United States federal law, extortion can be committed with or without the use of force and with or without the use of a weapon. Violation of many state extortion statutes constitutes "racketeering activity" under Section 1961 of the federal Racketeering Influenced and Corrupt Organizations Act, 18 USC

In blackmail, which always involves extortion, the extortionist threatens to reveal information about a victim or their family members that is potentially embarrassing, socially damaging, or incriminating unless a demand for money, property, or services is met.

In the United States, extortion may also be committed as a federal crime across a computer system, phone, by mail, or in using any instrument of interstate commerce. Extortion requires that the individual sent the message willingly and knowingly as elements of the crime. The message only has to be sent (but does not have to reach the intended recipient) to commit the crime of extortion.

United Kingdom

England and Wales

In England and Wales extorting property and money by coercion is the offence of blackmail which covers any "unwarranted demand with menaces" including physical threats. See section 21 of the Theft Act 1968 plus sections 29 and 30 of the Larceny Act 1916. A group of people may also be committing conspiracy.

Scotland

Extortion is a common law crime in Scotland of using threat of harm to demand money, property or some advantage from another person. It does not matter whether the demand itself is legitimate (such as for money owed) as the crime can still be committed when illegitimate threats of harm are used.

Cyber extortion

Cyber extortion is when an individual or group uses the internet as a mean of demanding some sort of material gain. The group or individual usually sends a company a threatening email stating that they have received confidential information about their company and will exploit a security leak or launch an attack that will harm the company's network. The message sent through the email usually demands money in exchange for the prevention of the attack.

Cases

In March 2008, Anthony Digati was arrested on federal charges of extortion through interstate communication. Digati put $50,000 into a variable life insurance policy by New York Life Insurance Company and wanted a return of $198,303.88. When the firm did not comply, he threatened to send out six million spam emails. He registered a domain in February 2008 that contained New York Life's name in the URL to display false public statements about the company and increased his demand to $3 million. According to prosecutors, Digati's intent was not to inform or educate but he wanted to "damage the reputation of New York Life and cost the company millions of dollars in revenue,". New York Life contacted the Federal Bureau of Investigation and Digati was apprehended.

On February 15, 2011, Spanish police apprehended a man who attempted to blackmail Nintendo over customer information he had stolen. The man stole personal information about 4,000 users and emailed Nintendo Ibérica, Nintendo's Spanish division, and accused the company of data negligence. He threatened the company that he would make the information public and complain to the Spanish Data Agency if his demands were not met. After Nintendo ignored his demands, he published some of the information on an Internet forum. Nintendo notified authorities and the man was arrested in Málaga. No information has been revealed as to what the man demanded from Nintendo.

On February 7, 2019, Jeffrey P. Bezos, owner of Amazon and The Washington Post and currently one of the world's wealthiest people, accused the National Enquirer and its parent company American Media, Inc., of attempting to extort him by threatening to reveal nude pictures of him unless he publicly stated that he " no knowledge or basis for suggesting that AMI's coverage was politically motivated or influenced by political forces." This threat was in response to Bezos investigating the tabloid for publishing details about his relationship with Lauren Sanchez, which led to Bezos and his wife Mackenzie announcing their divorce on January 9 of that year. Bezos refused and posted the threat on Medium.

On October 21, 2020, the news sources reported that roughly 40,000 patient records had been stolen from the Finnish private health care provider Vastaamo. The extorters demanded 40 bitcoins — roughly 450,000 euros at the time — or the stolen patient data would be published. The extorters published 100 patient records a day on a Tor message board to add pressure for their demands. The leaked patient records contained patients' full names, home addresses, social security numbers, and the therapists' and doctors' notes from each session. After the extortion of the company failed, the extorters sent victims an email demanding they pay either 200 euros within 24 hours or 500 euros in 48 hours in order to avoid publishing their sensitive personal data. The company's security practices were found to be inadequate: the sensitive data was not encrypted and apparently the system root password was very weak. The patient records were first accessed by intruders in November 2018, while the security flaws continued to exist until March 2019. The president of Finland described the cyber attack as "relentlessly cruel."

Similar crimes

  • Badger game: The victim or "mark"—for example, such as a married person—is tricked into a compromising position to make them vulnerable to blackmail.
  • Clip joint: A clip joint or fleshpot is an establishment, usually a strip club or entertainment bar, typically one claiming to offer adult entertainment or bottle service, in which customers are tricked into paying money and receive poor goods or services, or none, in return. An example of this is portrayed in the comedy film Porky's.
  • Coercion: the practice of compelling a person or manipulating them to behave in an involuntary way (whether through action or inaction) by use of threats, intimidation, trickery, or some other form of pressure or force. These are used as leverage, to force the victim to act in the desired way.
  • Confidence trick (also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle, bamboozle or finesse): an attempt to defraud a person or group by gaining their confidence.
  • Cryptovirology: a software scam in which a public-key cryptography system crafts fake keys which encrypt the user's data, but cannot decrypt them unless the user pays for the real key.
  • Dognapping: The crime of taking a dog from its owner, which usually occurs in purebred dogs, the profit from which can run up to thousands of dollars.
  • Loan sharking: A loan shark is a person or body that offers unsecured loans at high interest rates to individuals, often backed by blackmail or threats of violence.
  • Price gouging: a pejorative term for a seller pricing much higher than is considered reasonable or fair. In precise, legal usage, it is the name of a felony that applies in some of the United States only during civil emergencies.
  • Racket: A service that is fraudulently offered to solve a problem, such as for a problem that does not actually exist, will not be affected, or would not otherwise exist.
  • Sextortion: Forcing individuals to send sexual images or perform sexual services.
  • Terrorism: most simply, policy intended to intimidate or cause terror. It is more commonly understood as an act which is intended to create fear (terror), is perpetrated for an ideological goal (as opposed to a materialistic goal or a lone attack), and deliberately target or disregard the safety of non-combatants. Some definitions also include acts of unlawful violence or unconventional warfare, but at present, the international community has been unable to formulate a universally agreed, legally binding, criminal law definition of terrorism.
  • Tiger kidnapping: the taking of an innocent hostage to make a loved one or associate of the victim do something, e.g. a child is taken hostage to force the shopkeeper to open the safe; the term originates from the prior observation of the victim, like a tiger does with its prey. Ransoms are often used alongside these.

See also

References

  1. ^ Lindgren, James (April 1984). "Unraveling the Paradox of Blackmail". Columbia Law Review. 84 (3): 670–717. doi:10.2307/1122502. JSTOR 1122502.
  2. "Exaction - definition of exaction by the Free Online Dictionary, Thesaurus and Encyclopedia". Thefreedictionary.com. Retrieved 2012-06-05.
  3. "Exact definition - Dictionary - MSN Encarta". Encarta Dictionary. Archived from the original on 2009-12-01.
  4. "Extortion". Investopedia. Retrieved 2021-12-05.
  5. "Extortion - Essential Elements and the Broader Reach of RICO". Stimmel Law.
  6. Posner, Richard A. (1992). "Blackmail, Privacy, and Freedom of Contract". University of Pennsylvania Law Review. 141 (5): 1817–1847. doi:10.2307/3312575. JSTOR 3312575.
  7. The Scottish Beat Officer's Companion (6th ed.). Jane's Police Review. 29 June 2010. p. 85. ISBN 978-07106-2928-9.
  8. Jury Manual (2018 ed.). Parliament House, Edinburgh: Judicial Institute for Scotland. 9 November 2018. p. 46.1. Archived from the original on 30 January 2020. Retrieved 25 January 2019.
  9. Sulkowski, Adam J. "Cyber-Extortion: Duties and Liabilities Related to the Elephant in the Server Room". SSRN Electronic Journal. 2007: 101–144.
  10. "Computer Security Ethics and Privacy". Archived from the original on 2011-10-11. Retrieved 2016-06-29.
  11. "Brand.com's Mike Zammuto Discusses Meetup.com Extortion". Dailyglobe.com. 2014-03-05. Archived from the original on 2014-04-12. Retrieved 2014-03-10.
  12. "Alleged Cyber-Extortionist Indicted: Feds Say Anthony Digati Tried To Chill, Defame Business On Internet To Extract $200,000 In Bizarre Social-Networking Plot". Patrickpretty.com. 2010-04-22. Retrieved 2014-03-10.
  13. Gendar, Alison (2010-03-08). "Anthony Digati arrested for allegedly threatening New York Life with email spam attack". NY Daily News. Archived from the original on 2011-06-29. Retrieved 2014-03-10.
  14. Woollacott, Emma (2011-02-15). "Police arrest man over Nintendo extortion". TG Daily. Archived from the original on 2017-02-01. Retrieved 2014-03-10.
  15. Bezos, Jeffrey (2019-01-09). "Jeff Bezos announces divorce from MacKenzie Bezos after 25 years together". The Washington Post.
  16. Bezos, Jeffrey (2019-02-07). "No thank you, Mr. Pecker". Medium. Retrieved 2019-02-08.
  17. "Psychotherapy centre's database hacked, patient info held ransom". Yle Uutiset. 21 October 2020. Retrieved 2020-10-24.
  18. ^ "Extortionist publishes more sensitive data on psychotherapy centres' patients". Yle Uutiset. 22 October 2020. Retrieved 2020-10-24.
  19. ^ Sipilä, Jarkko (27 October 2020). "Therapy patients in Finland blackmailed after data breach". CNN. Retrieved 2020-10-27.
  20. "Psychotherapy centre data breach victims receive extortion emails". Yle Uutiset. 24 October 2020. Retrieved 2020-10-24.
  21. "Tietoturva | Terapiapotilaisiin kohdistunut tietomurto on voinut vaarantaa tuhansien ihmisten tietosuojan, kyseessä on täysin "poikkeuksellinen tapahtuma"". Helsingin Sanomat (in Finnish). 2020-10-22. Retrieved 2020-10-24.
  22. "Kiristäjä julkaisi suomalaisten arkaluontoisia terapiakeskusteluja – vaatii 450 000:ta euroa tai jatkoa seuraa". Ilta-Sanomat (in Finnish). 2020-10-21. Retrieved 2020-10-24.

External links

Corruption
Corruption in different fields
Measures of corruption
Forms or aspects
of corruption
General
State
Elections
Institutions dealing
with corruption
International
National
Anti-corruption
Laws and
enforcement
International
instruments
and efforts
Protest
movements
Types of crime
Note: Crimes vary by jurisdiction. Not all types are listed here.
Classes Scales of Justice
Against the person
Against property
  • Arson
  • Arms trafficking
  • Blackmail
  • Bribery
  • Burglary
  • Cybercrime
  • Embezzlement
  • Extortion
  • False pretenses
  • Forgery
  • Fraud
  • Gambling
  • Intellectual property violation
  • Larceny
  • Looting
  • Payola
  • Pickpocketing
  • Possessing stolen property
  • Robbery
  • Smuggling
  • Tax evasion
  • Theft
  • Trespass to land
  • Vandalism
  • Mischief
  • Against the public
  • Apostasy
  • Begging
  • Corruption
  • Censorship violation
  • Dueling
  • Genocide
  • Hostage-taking
  • Insider trading
  • Smuggling
  • Illegal consumption (such as prohibition of drugs, alcohol, and smoking)
  • Miscegenation
  • Piracy
  • Regicide
  • Terrorism
  • Usurpation
  • War crimes
  • Against the state
  • Lèse-majesté
  • Treason
  • Espionage
  • Secession
  • Sedition
  • Subversion
  • Against justice
  • Compounding
  • Malfeasance in office
  • Miscarriage of justice
  • Misprision
  • Obstruction
  • Perjury
  • Perverting the course of justice
  • Against animals
  • Cruelty to animals
  • Poaching
  • Wildlife smuggling
  • Bestiality
  • Sexual offenses
  • Adultery
  • Bigamy
  • Child sexual abuse
  • Cybersex trafficking
  • Fornication
  • Homosexuality
  • Incest
  • Indecent exposure
  • Masturbation
  • Obscenity
  • Prostitution
  • Rape
  • Pederasty
  • Sex trafficking
  • Sexual assault
  • Sexual harassment
  • Sexual slavery
  • Voyeurism
  • Inchoate offenses
  • Attempt
  • Conspiracy
  • Incitement
  • Solicitation
  • WikiSource
  • Wikimedia Commons
  • Wikiquote
  • Wikinews
  • Categories: