For the first time in the history of the world, the global connectivity of the Internet means that you don’t have to be in the same country as someone to sexually menace that person.
In it, we look at the methods used by perpetrators and the prosecutorial tools authorities have used to bring offenders to justice.
We hope that by highlighting the scale and scope of the problem, and the brutality of these cases for the many victims they affect, to spur a close look at both state and federal laws under which these cases get prosecuted.
Teenagers and young adults don’t use strong passwords or two-step verification, as a general rule. They sometimes record pornographic or semi-pornographic images or videos of themselves.
And they share material with other teenagers whose cyberdefense practices are even laxer than their own.
The malicious software he employed provided access to all files, photos, and videos on the infected computers.