117Why People Attack Each Other Online
out of fear of having their images and reputation ruined by public
disclosure of intimate photos and videos.
22
Other forms of cyberextortion threaten the victim’s reputation in
order to extort money. Some creative extortionists have threatened to
publicize the fact that the victim visited a controversial website, often
after luring or tricking the victim into visiting it. The allegations can
range from claims that the victim has some extreme fetish to a claim
that the victim visited sites that deal in child pornography. The truth
of the allegation is somewhat irrelevant, and the extortionist offers to
“help” the victim avoid disclosure of this private fact for a “modest” fee.
This type of scheme falls somewhere between a protection racket and
the classic offline “badger game,” in which a married man is tricked into
being photographed in what appears to be a compromising position
with a woman (who is usually the photographer’s co-conspirator).
Businesses have also been targeted in similar extortion schemes.
Some less-than-ethical “review” websites offer businesses the “oppor-
tunity” to “investigate” negative reviews against them for a less-than-
modest fee, often $5,000 or more. Businesses that pay up can have
their reputations cleared, but businesses that refuse to pay electronic
protection money will find that the negative reviews on these sites of-
ten become prominent in Google searches for the name of the busi-
ness. Some lawsuits have been filed, but allegations of unethical
practices continue.
An extortionist is a unique adversary in online reputation attacks.
Most extortionists do not care about the identity of their victims; they
simply want to find the easiest targets, extract as much as they can,
and move on. And most extortion attempts are one-off transactions;
if the attempt fails or becomes too difficult, most rational extortion-
ist simply move on to another victim. There are plenty of fish in the
sea for an extortionist. Thus, for most targets, it is possible to defeat
an attempt simply by becoming a difficult target. But some extor-
tionists think that they cannot back down because to do so would be
to show “weakness.” And other online reputation extortionists fear,
ironically enough, that if they let a target get away, they will get a rep-