English subtitles for clip: File:Sextortionagent interview.ogg
Jump to navigation
Jump to search
<!--This uses the official transcript of "[http://www.fbi.gov/news/stories/2012/february/sextortion_021012/special-agent_021012 Special Agent Nickolas Savage Discusses ‘Sextortion’]." ([http://www.webcitation.org/6Ea7keg5V Archive]) which has removed the [[:en:filler (linguistics)|filler]] and grammatical errors--> 1 00:00:00,000 --> 00:00:04,400 Sextortion is what is commonly referred to 2 00:00:04,600 --> 00:00:07,400 as individuals who are being victimized 3 00:00:07,600 --> 00:00:09,400 they’re being extorted; 4 00:00:09,600 --> 00:00:12,400 it’s what we commonly refer to as extortion, only 5 00:00:012,600 --> 00:00:18,400 the end-gain for the individuals who are doing the extortion is 6 00:00:18,600 --> 00:00:23,400 something that’s related to some sexual activity. Whether it be 7 00:00:023,600 --> 00:00:26,400 pictures or videos or, 8 00:00:26,600 --> 00:00:29,400 but it is generally something that is associated with sex. 9 00:00:29,600 --> 00:00:33,400 So I’m blackmailing you for something sexual in nature. 10 00:00:33,600 --> 00:00:37,400 Kids tend to be less cautious 11 00:00:37,600 --> 00:00:40,400 and more trusting of individuals online. 12 00:00:40,600 --> 00:00:44,400 They associate many people online as people much like themselves, 13 00:00:044,600 --> 00:00:47,400 of around the same age. So 14 00:00:47,600 --> 00:00:49,900 they're not very fearful of potential dangers. 15 00:00:50,100 --> 00:00:53,400 A lot of times you have individuals who will befriend children. 16 00:00:53,600 --> 00:00:56,400 They think they are chatting with other children. 17 00:00:56,600 --> 00:01:01,400 And oftentimes children are tricked into sending pictures of themselves 18 00:01:01,600 --> 00:01:05,400 to somebody else that they believe are maybe similar in age. 19 00:01:05,600 --> 00:01:09,400 And once these individuals have these pictures, well they want more pictures. 20 00:01:09,600 --> 00:01:14,400 That is what they’re using in furtherance of their criminal activity. 21 00:01:14,600 --> 00:01:17,400 Once they have these pictures, they are then able to say to 22 00:01:17,600 --> 00:01:20,400 the victim or to the child, 23 00:01:20,600 --> 00:01:24,400 “I want more,” or, “I want you to do x, y, and z. 24 00:01:24,600 --> 00:01:28,400 And if you don’t I’m going to take these photographs and I’m going to 25 00:01:28,600 --> 00:01:32,400 send them to other people in the school. I’ll send them to your family.” 26 00:01:32,600 --> 00:01:36,400 And oftentimes, the children are embarrassed, 27 00:01:36,600 --> 00:01:42,400 especially thinking as though they have somehow contributed to their victimization. 28 00:01:42,600 --> 00:01:46,400 So fearing that they will get in trouble if they report it, 29 00:01:46,600 --> 00:01:51,400 they will continue with the victimization and send the individuals what they’re requesting. 30 00:01:51,600 --> 00:01:55,400 What often happens is, the victimization never stops. 31 00:01:55,600 --> 00:02:01,400 We saw situations where the individuals responsible for this criminal activity 32 00:02:01,600 --> 00:02:07,400 actually created websites and actually sent hyperlinks to friends 33 00:02:07,600 --> 00:02:11,400 and to family members, again showing a certain level of 34 00:02:11,600 --> 00:02:14,400 a sense of dominance over the victim to say, 35 00:02:14,600 --> 00:02:19,400 “This is what I have over you, and if you don’t continue to do what I say, 36 00:02:19,600 --> 00:02:22,400 these are the things that I can do.” 37 00:02:22,600 --> 00:02:27,400 They are masters at exploiting the vulnerable. 38 00:02:27,600 --> 00:02:30,400 They would trick people into opening an attachment. 39 00:02:30,600 --> 00:02:34,400 One of the ways they would often do it was they would send a picture of a girl. 40 00:02:34,600 --> 00:02:37,400 And she was wearing a bra and panties. And 41 00:02:37,600 --> 00:02:40,400 she had her hair over her face and you couldn’t see what she looked like. 42 00:02:40,600 --> 00:02:43,400 And they would say something along the lines of, 43 00:02:43,600 --> 00:02:47,400 “I saw this picture of you on a website. If it’s not you, just disregard.” 44 00:02:47,600 --> 00:02:51,400 Well, what a lot of these victims didn’t realize was there was a 45 00:02:51,600 --> 00:02:55,400 Trojan program embedded within the picture. 46 00:02:55,600 --> 00:02:58,400 All kids looked at the picture. Kids are just curious by nature. 47 00:02:58,600 --> 00:03:03,400 And not even realizing that something could be embedded in that picture they looked at it. 48 00:03:03,600 --> 00:03:07,400 Once Connolly [a sextortist] and Dickerson [another sextortionist] had access to their computer, 49 00:03:07,600 --> 00:03:09,400 what they would do is a couple things. 50 00:03:09,600 --> 00:03:12,400 A lot of times they would just sit back and watch. 51 00:03:12,600 --> 00:03:15,400 And they had the ability to turn on your webcam. 52 00:03:15,600 --> 00:03:19,400 So they would see these victims dressing and undressing and 53 00:03:19,600 --> 00:03:22,400 just doing various things. And they would tape that. 54 00:03:22,600 --> 00:03:26,400 And sometimes they would catch kids doing things or catch kids changing [clothes]. 55 00:03:26,600 --> 00:03:31,400 Sometimes they would show these videos or pictures in furtherance of the exploitation. 56 00:03:31,600 --> 00:03:36,400 Also, once they had this they had access to buddy lists, so they were able to say, 57 00:03:36,600 --> 00:03:41,400 “If you don’t take pictures of yourself, or you don’t take these movies of yourself, 58 00:03:41,600 --> 00:03:45,400 I see you have an e-mail address for your grandmother. 59 00:03:45,600 --> 00:03:48,400 Well, I’ll put this little show together for your grandmother, and 60 00:03:48,600 --> 00:03:51,400 I’m sure she wouldn’t, you know, be very proud of the way you act.” 61 00:03:51,600 --> 00:03:54,400 And a lot of these kids would do this. 62 00:03:54,600 --> 00:03:58,400 Today you have so many more malware 63 00:03:58,600 --> 00:04:02,400 there’s so much more malware out there, and so many more 64 00:04:02,600 --> 00:04:05,400 programs that allow people access to your computer, 65 00:04:05,600 --> 00:04:10,400 you can’t be too cautious any more. One of the things that, 66 00:04:10,600 --> 00:04:13,400 especially when talking to parents, is 66 00:04:13,600 --> 00:04:16,400 you need to have this open dialogue with your children. 67 00:04:16,600 --> 00:04:20,400 You have to talk to your kids about these things. 68 00:04:20,600 --> 00:04:23,400 You can’t be too careful. You really can’t trust… 69 00:04:23,600 --> 00:04:25,400 you’ve got to be careful with whom you’re communicating. 70 00:04:25,600 --> 00:04:29,400 Always be cautious: number-one. 71 00:04:29,600 --> 00:04:32,400 Number-two is: kids need to be able to talk to parents 72 00:04:32,600 --> 00:04:35,400 and parents need to be able to talk to kids. 73 00:04:35,600 --> 00:04:38,400 If you don’t know who something is from, don’t open it. 74 00:04:38,600 --> 00:04:43,400 Be cautious of certain attachments. 75 00:04:43,600 --> 00:04:47,400 And, in the end, 76 00:04:47,600 --> 00:04:50,400 if something were to happen, if you were victimized, 77 00:04:50,600 --> 00:04:55,400 tell somebody, tell your parents. Tell an adult. Tell a teacher. 78 00:04:55,600 --> 00:05:00,400 Even if you’re an adult and you’re victimized, don’t be afraid to call law enforcement. 79 00:05:00,600 --> 00:05:06,400 Dickerson had—he had like 230 gigabytes worth of material. 80 00:05:06,600 --> 00:05:09,400 And at the time that was huge. 81 00:05:09,600 --> 00:05:15,400 Connolly had close to a terabyte worth of material. 82 00:05:15,600 --> 00:05:21,400 And the thing was a lot of these kids are just some folder somewhere. 83 00:05:21,600 --> 00:05:24,400 It was a folder on a computer. 84 00:05:24,600 --> 00:05:30,400 No name. No screen name. Just pictures and videos in a folder. 85 00:05:30,600 --> 00:05:34,400 And part of what I feel my responsibility is is 86 00:05:34,600 --> 00:05:37,400 to talk to anybody who’s willing to listen 87 00:05:37,600 --> 00:05:41,400 because I know where’s so many more victims out here that are wondering, 88 00:05:41,600 --> 00:05:44,400 “I wonder what ever happened to those guys?” or, “Do I still need to be afraid?” 89 00:05:44,600 --> 00:05:47,400 If you know somebody or are in a similar situation, 90 00:05:47,600 --> 00:05:51,400 or if you’re a parent, talk to your children about this.