Cyber Blackmail between Threats and Protection
Corresponding Author(s) : Mohamed Hassan Mekkawi
Journal of Law and Emerging Technologies,
Vol. 2 No. 2 (2022)
Abstract
This research paper discusses the threats and the legal protection of the Cyber Blackmail in both the Egyptian and American Legislations. The growth of the Internet has led to the overlap between blackmail and Cybercrime where Cyber Blackmail is increasing, in light of the growing number of social media users, and the acceleration witnessed in the number of various conservation programs. With the phenomenon widely increasing in the Egyptian society in recent times, the researcher, after comparing the Egyptian legislation to the American legislation, seeks to identify the potential threats by analyzing the articles in the Egyptian legislation and identifying the needs to address and provide legal protection for this phenomenon.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- Convention on Cybercrime, Budapest, 23.XI.2001
- Anti-Cyber and Information Technology Crimes Law No. 175 of 2018
- The Egyptian constitution 2014 amended in 2019
- The Egyptian Criminal Procedural law no. 150 of 1950
- The Egyptian Penal Code no 58 of 1937
- The Egyptian Telecommunications Regulatory Law No. 10 of 2003
- D.C. Code 22-3252
- HOBBS ACT 18 U.S.C. § 1951
- Kansas Statutes Stat § 21-5428 (2014)
- Missouri Statutes 2005 § 566.200
- New York Statute SECTION 155.05
- North Carolina Code § 14‑118
- Ohio Code § 2905.12
- Oklahoma Statutes § 21-1488 (2014) DOI: https://doi.org/10.1007/s40278-014-8817-0
- Rhode Island General Laws § 11-42-2 (2012)
- South Carolina Code § 16-17-640 (2012)
- Wyoming Statutes Stat § 6-2-402 (1997)
- Washington D.C. § 22–3252
- Aaron Minc and Alexandra Arko, How to Permanently Remove Content From Revenge Porn Websites, MINC, 2021.
- Abir Amin, Falsifying the awareness of young people between globalization and new agitators. Egypt: The Egyptian General Book Authority, 2006.
- Agnes Talalaev, Everything You Need To Know About Password Management, Patchstack, 2021.
- Ahmed Awad Belal, Rule of Exclusion of Evidence Obtained by Illicit Methods in Comparative Criminal Procedures - Third Edition, Dar El Nahda El-Arabyia, 2013.
- Aju D, Anil Kumar Kakelli and Kishore Rajendiran, A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends, Confluence of AI, Machine, and Deep Learning in Cyber Forensics, premiere reference resource, 2021.
- Bridget Small, Scam emails demand Bitcoin, threaten blackmail, Federal Trade Commission, Consumer Advice, 2020.
- Carlos Kölbl, Historical Consciousness in Youth. Theoretical and Exemplary Empirical Analyses, University of Bayreuth Germany, Increasing political consciousness among young people in Berlin, European commission, 2001
- CCRI’s, Nonconsensual Pornography (NCP) Research Results, 2013
- Cisco Talos, Ransomware: Past, Present, and Future, 2016. DOI: https://doi.org/10.1002/wilm.10487
- Daniel S. Harawa, Social Media Thought crimes. Pace Law Review, 2014.
- Dant Coenen, Freedom of Speech and the Criminal Law. Boston University Law Review, 2017.
- David Wall, What is cybercrimes, Journal article, 2004. DOI: https://doi.org/10.1080/09627250408553239
- Dhanya Thakkar, Preventing Digital Extortion Mitigate ransomware, DDoS, and other cyber-extortion attacks Packt Publishing, UK, 2017.
- Digital Blackmail as an emerging, Public-Private analytic change program, 2016.
- Dincan Riley, Adrienne Bailon, nude pics extortion plot, INQUISITR, 2019.
- Dorrian Horsey, I’m Being Blackmailed: How to Deal with Blackmail on the Internet, MINC, 2022.
- Europol, Internet Organized Crime Threat Assessment, 2019. DOI: https://doi.org/10.1016/S1361-3723(19)30114-9
- Eman El-Gendy, Cyber blackmail. A crime that needs more than one law, Al-Wafd Newspaper, January 5, 2022.
- FBI Releases the Internet Crime Complaint Center, Internet Crime Report, Including COVID-19 Scam Statistics, 2020.
- FindLaw Team, State Revenge Porn Laws, 2022.
- Gjalt-Jorn Y Peters, Robert A C Ruiter and Gerjo Kok, Threatening communication: A qualitative study of fear appeal effectiveness beliefs among intervention developers, policymakers, politicians, scientists, and advertising professionals. International Journal of Psychology, 2014. DOI: https://doi.org/10.1002/ijop.12000
- Guy Adams, John Travolta ends $25m extortion case linked to death of his son, INDEPENDENT, 2009.
- Hiba Abdul Mohsin Abdul Kareem, The Social Risks of Electronic Extortion, Palarch’s Journal of Archaeology of Egypt/Egyptology, 2021.
- Ioana Vasiu and Lucian Vasiu, Forms and Consequences of the Cyber Threats and Extortion Phenomenon, European Journal of Sustainable Development, 2020. DOI: https://doi.org/10.14207/ejsd.2020.v9n4p295
- Internet Crime Report 2020.
- Interpol, African Cyber threat assessment report, October 2021.
- Ivana Vojinovic, More Than 70 Cybercrime Statistics - A $6 Trillion Problem, DataProt, 2022.
- James Lyne, 30,000 Web Sites Hacked A Day. How Do You Host Yours?, Forbes, 2013.
- Jilian Peterson and James Densley, Cyber Violence: What Do We Know and Where Do We Go From Here?. Aggression and Violent Behavior, 2017. DOI: https://doi.org/10.1016/j.avb.2017.01.012
- Kelly Bissell and Ryan Lasalle, Ninth Annual Cost of Cybercrime Study, Accenture, 2019.
- Kyung-Shick Choi, Tim Scott and Daniel LeClair, Ransomware against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory. International Journal of Forensic Science & Pathology, 2016.
- Maggie Miller, FBI sees spike in cybercrime reports during coronavirus pandemic, The Hill, 2020.
- Maskun Maskun, Hasbi Assidiq and Armelia Safira, Cyber Attack -The Burden of International Crime Proof: Obstacles and Challenges Conference: The 2nd International Conference of Law, Government and Social Justice (ICOLGAS) 2021. DOI: https://doi.org/10.2991/assehr.k.201209.269
- Michael Heller, Gathering cybercrime evidence can be difficult, TechTarget.
- Michelle Caruso, CNN STAFF, Pair gets four years in Stamos extortion case, 2010.
- Mitchell N. Berman, The Evidentiary Theory of Blackmail: Taking Motives Seriously. University of Chicago Law Review, 1998. DOI: https://doi.org/10.2307/1600300
- Mohamed El-Guindy, Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism. Journal of Law and Emerging Technologies, 1(1), 2021. DOI: https://doi.org/10.54873/jolets.v1i1.32
- Mohamed El-Guindy, Cybercrime in the Middle East. ISSA Journal, 6(6), 2008.
- Mohamed Al-Shanawi, The new fraud crimes. Egypt: Law Books Press, 2008.
- Nasser Al-Shehri, Information Security, Perfect Awareness and Impervious Protection, first edition, Riyadh: Obeikan Library for Publishing and Distribution, 2013.
- Oonagh McPhillips, Cybercrime: Current Threats and Responses A review of the research literature Co‐Authors Sheelagh Brady & Caitríona Heinl, SAR Consultancy & EXEDEC, 2020.
- Rebecca Louise Shaw, A Study of emotional vulnerability and reactions to stress, A thesis submitted to the University of Manchester for the degree of Doctor in Clinical Psychology (ClinPsyD) in the Faculty of Medical and Human Sciences, 2014.
- Robert W. Taylor, Eric J. Fritsch and John Liederbach,. Digital crime and digital terrorism. Boston: Pearson, 2015.
- Samir Thakkar, Ransomware - Exploring the Electronic form of Extortion, research gate, 2015.
- Suliman Al-Ghadian, Yahya Khatatbeh and Ezzeddin Al-Nuaimi, Forms of crimes of cyber blackmailing and their motives and their psychological implications from the point of view of teachers, numbers of committee and psychological counselors, Journal of security research vol 27, issue 69, 2018.
- Sultan of Sleaze' arrested in Tom Cruise extortion plot, The Guardian Newspaper, 11 Jan 2008.
- Trend Micro and INTERPOL, Cybercrime in West Africa; Poised for an Underground Market, 2017.
- Wael Shater, The legal framework for the crime of electronic extortion in electronic games, AJSP, Arab Journal for Scientific Publishing ISSN: 2020.
References
Convention on Cybercrime, Budapest, 23.XI.2001
Anti-Cyber and Information Technology Crimes Law No. 175 of 2018
The Egyptian constitution 2014 amended in 2019
The Egyptian Criminal Procedural law no. 150 of 1950
The Egyptian Penal Code no 58 of 1937
The Egyptian Telecommunications Regulatory Law No. 10 of 2003
D.C. Code 22-3252
HOBBS ACT 18 U.S.C. § 1951
Kansas Statutes Stat § 21-5428 (2014)
Missouri Statutes 2005 § 566.200
New York Statute SECTION 155.05
North Carolina Code § 14‑118
Ohio Code § 2905.12
Oklahoma Statutes § 21-1488 (2014) DOI: https://doi.org/10.1007/s40278-014-8817-0
Rhode Island General Laws § 11-42-2 (2012)
South Carolina Code § 16-17-640 (2012)
Wyoming Statutes Stat § 6-2-402 (1997)
Washington D.C. § 22–3252
Aaron Minc and Alexandra Arko, How to Permanently Remove Content From Revenge Porn Websites, MINC, 2021.
Abir Amin, Falsifying the awareness of young people between globalization and new agitators. Egypt: The Egyptian General Book Authority, 2006.
Agnes Talalaev, Everything You Need To Know About Password Management, Patchstack, 2021.
Ahmed Awad Belal, Rule of Exclusion of Evidence Obtained by Illicit Methods in Comparative Criminal Procedures - Third Edition, Dar El Nahda El-Arabyia, 2013.
Aju D, Anil Kumar Kakelli and Kishore Rajendiran, A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends, Confluence of AI, Machine, and Deep Learning in Cyber Forensics, premiere reference resource, 2021.
Bridget Small, Scam emails demand Bitcoin, threaten blackmail, Federal Trade Commission, Consumer Advice, 2020.
Carlos Kölbl, Historical Consciousness in Youth. Theoretical and Exemplary Empirical Analyses, University of Bayreuth Germany, Increasing political consciousness among young people in Berlin, European commission, 2001
CCRI’s, Nonconsensual Pornography (NCP) Research Results, 2013
Cisco Talos, Ransomware: Past, Present, and Future, 2016. DOI: https://doi.org/10.1002/wilm.10487
Daniel S. Harawa, Social Media Thought crimes. Pace Law Review, 2014.
Dant Coenen, Freedom of Speech and the Criminal Law. Boston University Law Review, 2017.
David Wall, What is cybercrimes, Journal article, 2004. DOI: https://doi.org/10.1080/09627250408553239
Dhanya Thakkar, Preventing Digital Extortion Mitigate ransomware, DDoS, and other cyber-extortion attacks Packt Publishing, UK, 2017.
Digital Blackmail as an emerging, Public-Private analytic change program, 2016.
Dincan Riley, Adrienne Bailon, nude pics extortion plot, INQUISITR, 2019.
Dorrian Horsey, I’m Being Blackmailed: How to Deal with Blackmail on the Internet, MINC, 2022.
Europol, Internet Organized Crime Threat Assessment, 2019. DOI: https://doi.org/10.1016/S1361-3723(19)30114-9
Eman El-Gendy, Cyber blackmail. A crime that needs more than one law, Al-Wafd Newspaper, January 5, 2022.
FBI Releases the Internet Crime Complaint Center, Internet Crime Report, Including COVID-19 Scam Statistics, 2020.
FindLaw Team, State Revenge Porn Laws, 2022.
Gjalt-Jorn Y Peters, Robert A C Ruiter and Gerjo Kok, Threatening communication: A qualitative study of fear appeal effectiveness beliefs among intervention developers, policymakers, politicians, scientists, and advertising professionals. International Journal of Psychology, 2014. DOI: https://doi.org/10.1002/ijop.12000
Guy Adams, John Travolta ends $25m extortion case linked to death of his son, INDEPENDENT, 2009.
Hiba Abdul Mohsin Abdul Kareem, The Social Risks of Electronic Extortion, Palarch’s Journal of Archaeology of Egypt/Egyptology, 2021.
Ioana Vasiu and Lucian Vasiu, Forms and Consequences of the Cyber Threats and Extortion Phenomenon, European Journal of Sustainable Development, 2020. DOI: https://doi.org/10.14207/ejsd.2020.v9n4p295
Internet Crime Report 2020.
Interpol, African Cyber threat assessment report, October 2021.
Ivana Vojinovic, More Than 70 Cybercrime Statistics - A $6 Trillion Problem, DataProt, 2022.
James Lyne, 30,000 Web Sites Hacked A Day. How Do You Host Yours?, Forbes, 2013.
Jilian Peterson and James Densley, Cyber Violence: What Do We Know and Where Do We Go From Here?. Aggression and Violent Behavior, 2017. DOI: https://doi.org/10.1016/j.avb.2017.01.012
Kelly Bissell and Ryan Lasalle, Ninth Annual Cost of Cybercrime Study, Accenture, 2019.
Kyung-Shick Choi, Tim Scott and Daniel LeClair, Ransomware against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory. International Journal of Forensic Science & Pathology, 2016.
Maggie Miller, FBI sees spike in cybercrime reports during coronavirus pandemic, The Hill, 2020.
Maskun Maskun, Hasbi Assidiq and Armelia Safira, Cyber Attack -The Burden of International Crime Proof: Obstacles and Challenges Conference: The 2nd International Conference of Law, Government and Social Justice (ICOLGAS) 2021. DOI: https://doi.org/10.2991/assehr.k.201209.269
Michael Heller, Gathering cybercrime evidence can be difficult, TechTarget.
Michelle Caruso, CNN STAFF, Pair gets four years in Stamos extortion case, 2010.
Mitchell N. Berman, The Evidentiary Theory of Blackmail: Taking Motives Seriously. University of Chicago Law Review, 1998. DOI: https://doi.org/10.2307/1600300
Mohamed El-Guindy, Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism. Journal of Law and Emerging Technologies, 1(1), 2021. DOI: https://doi.org/10.54873/jolets.v1i1.32
Mohamed El-Guindy, Cybercrime in the Middle East. ISSA Journal, 6(6), 2008.
Mohamed Al-Shanawi, The new fraud crimes. Egypt: Law Books Press, 2008.
Nasser Al-Shehri, Information Security, Perfect Awareness and Impervious Protection, first edition, Riyadh: Obeikan Library for Publishing and Distribution, 2013.
Oonagh McPhillips, Cybercrime: Current Threats and Responses A review of the research literature Co‐Authors Sheelagh Brady & Caitríona Heinl, SAR Consultancy & EXEDEC, 2020.
Rebecca Louise Shaw, A Study of emotional vulnerability and reactions to stress, A thesis submitted to the University of Manchester for the degree of Doctor in Clinical Psychology (ClinPsyD) in the Faculty of Medical and Human Sciences, 2014.
Robert W. Taylor, Eric J. Fritsch and John Liederbach,. Digital crime and digital terrorism. Boston: Pearson, 2015.
Samir Thakkar, Ransomware - Exploring the Electronic form of Extortion, research gate, 2015.
Suliman Al-Ghadian, Yahya Khatatbeh and Ezzeddin Al-Nuaimi, Forms of crimes of cyber blackmailing and their motives and their psychological implications from the point of view of teachers, numbers of committee and psychological counselors, Journal of security research vol 27, issue 69, 2018.
Sultan of Sleaze' arrested in Tom Cruise extortion plot, The Guardian Newspaper, 11 Jan 2008.
Trend Micro and INTERPOL, Cybercrime in West Africa; Poised for an Underground Market, 2017.
Wael Shater, The legal framework for the crime of electronic extortion in electronic games, AJSP, Arab Journal for Scientific Publishing ISSN: 2020.