HOME

TheInfoList



OR:

Extortion is the practice of obtaining benefit (e.g., money or goods) through
coercion Coercion involves compelling a party to act in an involuntary manner through the use of threats, including threats to use force against that party. It involves a set of forceful actions which violate the free will of an individual in order to i ...
. In most jurisdictions it is likely to constitute a
criminal offence In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in Ca ...
.
Robbery Robbery is the crime of taking or attempting to take anything of value by force, threat of force, or use of fear. According to common law, robbery is defined as taking the property of another, with the intent to permanently deprive the person o ...
is the simplest and most common form of extortion, although making unfounded threats in order to obtain an unfair business advantage is also a form of extortion. Extortion is sometimes called the "
protection racket A protection racket is a type of racket and a scheme of organized crime perpetrated by a potentially hazardous organized crime group that generally guarantees protection outside the sanction of the law to another entity or individual from vio ...
" because the racketeers often phrase their demands as payment for "protection" from (real or hypothetical) threats from unspecified other parties; though often, and almost always, such "protection" is simply abstinence of harm from the same party, and such is implied in the "protection" offer. Extortion is commonly practiced by
organized crime Organized crime is a category of transnational organized crime, transnational, national, or local group of centralized enterprises run to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a f ...
. In some jurisdictions, actually obtaining the benefit is not required to commit the offense, and making a
threat A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation f ...
of
violence Violence is characterized as the use of physical force by humans to cause harm to other living beings, or property, such as pain, injury, disablement, death, damage and destruction. The World Health Organization (WHO) defines violence a ...
which refers to a requirement of a payment of money or property to halt future violence is sufficient to commit the offense. Exaction refers not only to extortion or the demanding and obtaining of something through force, but additionally, in its formal definition, means the infliction of something such as
pain and suffering Pain and suffering is the legal term for the physical and emotional stress caused from an injury (see also pain and suffering). Some damages that might come under this category would be: aches, temporary and permanent limitations on activity, ...
or making somebody endure something unpleasant. The term ''extortion'' is often used metaphorically to refer to
usury Usury () is the practice of making loans that are seen as unfairly enriching the lender. The term may be used in a moral sense—condemning taking advantage of others' misfortunes—or in a legal sense, where an interest rate is charged in e ...
or to price-gouging, though neither is legally considered extortion. It is also often used loosely to refer to everyday situations where one person feels indebted against their will, to another, in order to receive an essential service or avoid legal consequences. Neither extortion nor blackmail requires a threat of a criminal act, such as violence, merely a threat used to elicit actions, money, or property from the object of the extortion. Such threats include the filing of reports (true or not) of criminal behavior to the police, revelation of damaging facts (such as pictures of the object of the extortion in a compromising position), etc. In law ''extortion'' can refer to
political corruption Political corruption is the use of powers by government officials or their network contacts for illegitimate private gain. Forms of corruption vary but can include bribery, lobbying, extortion, cronyism, nepotism, parochialism, patronage, influen ...
, such as selling one's office or
influence peddling Influence peddling, also called traffic of influence or trading in influence, is the practice of using one's influence in government or connections with authorities to obtain favours or preferential treatment for another, usually in return for ...
, but in general vocabulary the word usually first brings to mind blackmail or protection rackets. The logical connection between the corruption sense of the word and the other senses is that to demand bribes in one's official capacity is blackmail or racketeering in essence (that is, "you need access to this resource, the government restricts access to it through my office, and I will charge you unfairly and unlawfully for such access"). Extortion is also known as shakedown, and occasionally exaction.


United States

Extortion is distinguished from
robbery Robbery is the crime of taking or attempting to take anything of value by force, threat of force, or use of fear. According to common law, robbery is defined as taking the property of another, with the intent to permanently deprive the person o ...
. In robbery, whether armed or not, the offender takes property from the victim by the immediate use of force or fear that force will be immediately used. Extortion, which is not limited to the taking of property, involves the verbal or written ''instillation'' of fear that something will happen to the victim if they do not comply with the extortionist's will. Another key distinction is that extortion always involves a verbal or written threat, whereas robbery may not. In
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
federal law, extortion can be committed with or without the use of force and with or without the use of a weapon. Violation of many state extortion statutes constitutes "racketeering activity" under Section 1961 of the federal Racketeering Influenced and Corrupt Organizations Act, 18 USC In
blackmail Blackmail is a criminal act of coercion using a threat. As a criminal offense, blackmail is defined in various ways in common law jurisdictions. In the United States, blackmail is generally defined as a crime of information, involving a thr ...
, which always involves extortion, the extortionist threatens to reveal information about a victim or their family members that is potentially embarrassing, socially damaging, or incriminating unless a demand for money, property, or services is met. In the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
, extortion may also be committed as a
federal crime In the United States, a federal crime or federal offense is an act that is made illegal by U.S. federal legislation enacted by both the United States Senate and United States House of Representatives and signed into law by the president. Prose ...
across a computer system, phone, by mail, or in using any instrument of
interstate commerce The Commerce Clause describes an enumerated power listed in the United States Constitution ( Article I, Section 8, Clause 3). The clause states that the United States Congress shall have power "to regulate Commerce with foreign Nations, and amon ...
. Extortion requires that the individual sent the message willingly and knowingly as elements of the crime. The message only has to be sent (but does not have to reach the intended recipient) to commit the crime of extortion.


United Kingdom


England and Wales

In
England and Wales England and Wales () is one of the Law of the United Kingdom#Legal jurisdictions, three legal jurisdictions of the United Kingdom. It covers the constituent countries England and Wales and was formed by the Laws in Wales Acts 1535 and 1542. Th ...
extorting property and money by
coercion Coercion involves compelling a party to act in an involuntary manner through the use of threats, including threats to use force against that party. It involves a set of forceful actions which violate the free will of an individual in order to i ...
is the offence of
blackmail Blackmail is a criminal act of coercion using a threat. As a criminal offense, blackmail is defined in various ways in common law jurisdictions. In the United States, blackmail is generally defined as a crime of information, involving a thr ...
which covers any "unwarranted demand with menaces" including physical threats. See section 21 of the
Theft Act 1968 The Theft Act 1968 (c. 60) is an act of the Parliament of the United Kingdom. It creates a number of offences against property in England and Wales. On 15 January 2007 the Fraud Act 2006 came into force, redefining most of the offences of d ...
plus sections 29 and 30 of the
Larceny Act 1916 The Larceny Act 1916 ( 6 & 7 Geo. 5. c. 50) was an act of the Parliament of the United Kingdom. Its purpose was to consolidate and simplify the law relating to larceny triable on indictment and to kindred offences. The definition of larceny f ...
. A group of people may also be committing
conspiracy A conspiracy, also known as a plot, ploy, or scheme, is a secret plan or agreement between people (called conspirers or conspirators) for an unlawful or harmful purpose, such as murder, treason, or corruption, especially with a political motivat ...
.


Scotland

Extortion is a common law crime in Scotland of using threat of harm to demand money, property or some advantage from another person. It does not matter whether the demand itself is legitimate (such as for money owed) as the crime can still be committed when illegitimate threats of harm are used.


Cyber extortion

Cyber extortion is when an individual or group uses the internet as a mean of demanding some sort of material gain. The group or individual usually sends a company a threatening email stating that they have received confidential information about their company and will exploit a security leak or launch an attack that will harm the company's network. The message sent through the email usually demands money in exchange for the prevention of the attack.


Cases

In March 2008, Anthony Digati was arrested on federal charges of extortion through interstate communication. Digati put $50,000 into a variable life insurance policy by
New York Life Insurance Company New York Life Insurance Company (NYLIC) is the third-largest life insurance company and the largest mutual insurance, mutual life insurance company in the United States, and is ranked #69 on the 2025 Fortune 500 list of the largest U.S. corporat ...
and wanted a return of $198,303.88. When the firm did not comply, he threatened to send out six million
spam email Email spam, also referred to as junk email, spam mail, or simply spam, refers to unsolicited messages sent in bulk via email. The term originates from a Monty Python sketch, where the name of a canned meat product, "Spam," is used repetitively, m ...
s. He registered a domain in February 2008 that contained New York Life's name in the URL to display false public statements about the company and increased his demand to $3 million. According to prosecutors, Digati's intent was not to inform or educate but he wanted to "damage the reputation of New York Life and cost the company millions of dollars in revenue,". New York Life contacted the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
and Digati was apprehended. On February 15, 2011, Spanish police apprehended a man who attempted to blackmail
Nintendo is a Japanese Multinational corporation, multinational video game company headquartered in Kyoto. It develops, publishes, and releases both video games and video game consoles. The history of Nintendo began when craftsman Fusajiro Yamauchi ...
over customer information he had stolen. The man stole personal information about 4,000 users and emailed Nintendo Ibérica, Nintendo's Spanish division, and accused the company of data negligence. He threatened the company that he would make the information public and complain to the Spanish Data Agency if his demands were not met. After Nintendo ignored his demands, he published some of the information on an Internet forum. Nintendo notified authorities and the man was arrested in
Málaga Málaga (; ) is a Municipalities in Spain, municipality of Spain, capital of the Province of Málaga, in the Autonomous communities of Spain, autonomous community of Andalusia. With a population of 591,637 in 2024, it is the second-most populo ...
. No information has been revealed as to what the man demanded from Nintendo. On February 7, 2019, Jeffrey P. Bezos, owner of
Amazon Amazon most often refers to: * Amazon River, in South America * Amazon rainforest, a rainforest covering most of the Amazon basin * Amazon (company), an American multinational technology company * Amazons, a tribe of female warriors in Greek myth ...
and ''
The Washington Post ''The Washington Post'', locally known as ''The'' ''Post'' and, informally, ''WaPo'' or ''WP'', is an American daily newspaper published in Washington, D.C., the national capital. It is the most widely circulated newspaper in the Washington m ...
'' and currently one of the world's wealthiest people, accused the ''
National Enquirer The ''National Enquirer'' is an American tabloid newspaper. Founded in 1926, the newspaper has undergone a number of changes over the years. The ''National Enquirer'' openly acknowledges that it pays Source (journalism), sources for tips (chec ...
'' and its parent company
American Media, Inc A360 Media, LLC (branded a360media), formerly American Media, Inc. (AMI), is an American publisher of magazines, supermarket tabloids, and books based in New York City. Originally affiliated with only the ''National Enquirer'', the media compa ...
., of attempting to extort him by threatening to reveal nude pictures of him unless he publicly stated that he " asno knowledge or basis for suggesting that AMI's coverage was politically motivated or influenced by political forces." This threat was in response to Bezos investigating the tabloid for publishing details about his relationship with Lauren Sanchez, which led to Bezos and his wife Mackenzie announcing their divorce on January 9 of that year. Bezos refused and posted the threat on
Medium Medium may refer to: Aircraft *Medium bomber, a class of warplane * Tecma Medium, a French hang glider design Arts, entertainment, and media Films * ''The Medium'' (1921 film), a German silent film * ''The Medium'' (1951 film), a film vers ...
. On October 21, 2020, the news sources reported that roughly 40,000 patient records had been stolen from the Finnish private health care provider Vastaamo. The extorters demanded 40roughly 450,000 euros at the or the stolen patient data would be published. The extorters published 100 patient records a day on a Tor message board to add pressure for their demands. The leaked patient records contained patients' full names, home addresses, social security numbers, and the therapists' and doctors' notes from each session. After the extortion of the company failed, the extorters sent victims an email demanding they pay either 200euros within 24hours or 500euros in 48hours in order to avoid publishing their sensitive personal data. The company's security practices were found to be inadequate: the sensitive data was not encrypted and apparently the system root password was very weak. The patient records were first accessed by intruders in November 2018, while the security flaws continued to exist until March 2019. The president of Finland described the cyber attack as "relentlessly cruel."


Similar crimes

*
Badger game The badger game is an extortion scheme or confidence trick in which the victims are tricked into compromising positions in order to make them vulnerable to blackmail. Its name is derived from the practice of badger-baiting. Description In its ...
: The victim or "
mark Mark may refer to: In the Bible * Mark the Evangelist (5–68), traditionally ascribed author of the Gospel of Mark * Gospel of Mark, one of the four canonical gospels and one of the three synoptic gospels Currencies * Mark (currency), a currenc ...
"—for example, such as a married person—is tricked into a compromising position to make them vulnerable to
blackmail Blackmail is a criminal act of coercion using a threat. As a criminal offense, blackmail is defined in various ways in common law jurisdictions. In the United States, blackmail is generally defined as a crime of information, involving a thr ...
. * Clip joint: A clip joint or fleshpot is an establishment, usually a strip club or entertainment bar, typically one claiming to offer adult entertainment or bottle service, in which customers are tricked into paying money and receive poor goods or services, or none, in return. An example of this is portrayed in the comedy film '' Porky's''. *
Coercion Coercion involves compelling a party to act in an involuntary manner through the use of threats, including threats to use force against that party. It involves a set of forceful actions which violate the free will of an individual in order to i ...
: the practice of compelling a person or manipulating them to behave in an involuntary way (whether through action or inaction) by use of threats, intimidation, trickery, or some other form of pressure or force. These are used as leverage, to force the victim to act in the desired way. *
Confidence trick A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using a combination of the victim's credulity, naivety, compassion, vanity, confidence, irrespons ...
(also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle, bamboozle or finesse): an attempt to
defraud In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrato ...
a person or group by gaining their
confidence Confidence is the feeling of belief or trust that a person or thing is reliable. * * * Self-confidence is trust in oneself. Self-confidence involves a positive belief that one can generally accomplish what one wishes to do in the future. Sel ...
. *
Cryptovirology Cryptovirology refers to the study of cryptography use in malware, such as ransomware and asymmetric backdoors. Traditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, and security to users. ...
: a software scam in which a
public-key cryptography Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
system crafts fake keys which encrypt the user's data, but cannot decrypt them unless the user pays for the real key. * Dognapping: The crime of taking a
dog The dog (''Canis familiaris'' or ''Canis lupus familiaris'') is a domesticated descendant of the gray wolf. Also called the domestic dog, it was selectively bred from a population of wolves during the Late Pleistocene by hunter-gatherers. ...
from its owner, which usually occurs in
purebred dog A dog breed is a particular type of dog that was purposefully bred by humans to perform specific tasks, such as herding, hunting, and guarding. Dogs are the most variable mammal on Earth, with artificial selection producing upward of 360 global ...
s, the profit from which can run up to thousands of dollars. * Loan sharking: A loan shark is a person or body that offers unsecured loans at high interest rates to individuals, often backed by blackmail or threats of violence. *
Price gouging Price gouging is the practice of increasing the prices of goods, services, or commodities to a level much higher than is considered reasonable or fair by some. This commonly applies to price increases of basic necessities after natural disaste ...
: a pejorative term for a seller pricing much higher than is considered reasonable or fair. In precise, legal usage, it is the name of a felony that applies in some of the United States only during civil emergencies. * Racket: A service that is fraudulently offered to solve a problem, such as for a problem that does not actually exist, will not be affected, or would not otherwise exist. * Sextortion: Forcing individuals to send sexual images or perform sexual services. *
Terrorism Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
: most simply, policy intended to intimidate or cause terror. It is more commonly understood as an act which is intended to create fear (terror), is perpetrated for an ideological goal (as opposed to a materialistic goal or a lone attack), and deliberately target or disregard the safety of
non-combatants Non-combatant is a term of art in the law of war and international humanitarian law to refer to civilians who are not taking a direct part in hostilities. People such as combat medics and military chaplains, who are members of the belligerent arm ...
. Some definitions also include acts of unlawful violence or unconventional warfare, but at present, the
international community The international community is a term used in geopolitics and international relations to refer to a broad group of people and governments of the world. Usage Aside from its use as a general descriptor, the term is typically used to imply the ...
has been unable to formulate a universally agreed, legally binding, criminal law definition of terrorism. *
Tiger kidnapping A tiger kidnapping or tiger robbery involves two separate crimes. The first crime usually involves an abduction of a valuable person or thing. Instead of demanding money, the captors demand that a second crime be committed on their behalf. The s ...
: the taking of an innocent
hostage A hostage is a person seized by an abductor in order to compel another party, one which places a high value on the liberty, well-being and safety of the person seized—such as a relative, employer, law enforcement, or government—to act, o ...
to make a loved one or associate of the victim do something, e.g. a child is taken hostage to force the shopkeeper to open the safe; the term originates from the prior observation of the victim, like a tiger does with its prey.
Ransom Ransom refers to the practice of holding a prisoner or item to extort money or property to secure their release. It also refers to the sum of money paid by the other party to secure a captive's freedom. When ransom means "payment", the word ...
s are often used alongside these.


See also

*
Abusive power and control Controlling behavior in relationships are behaviors exhibited by an individual who seeks to gain and maintain control over another person. Abusers may utilize tactics such as intimidation or coercion, and may seek personal gain, personal gratific ...
*
Bid rigging Bid rigging is a fraudulent scheme in a procurement action which enables companies to submit non-competitive bids. It can be performed by corrupt officials, by firms in an orchestrated act of collusion, or by officials and firms acting together. ...
*
Blackmail Blackmail is a criminal act of coercion using a threat. As a criminal offense, blackmail is defined in various ways in common law jurisdictions. In the United States, blackmail is generally defined as a crime of information, involving a thr ...
*
Bribery Bribery is the corrupt solicitation, payment, or Offer and acceptance, acceptance of a private favor (a bribe) in exchange for official action. The purpose of a bribe is to influence the actions of the recipient, a person in charge of an official ...
* UK Bribery Act 2010 *
Conflict of interest A conflict of interest (COI) is a situation in which a person or organization is involved in multiple wikt:interest#Noun, interests, financial or otherwise, and serving one interest could involve working against another. Typically, this relates t ...
* Corruption in India * Financial abuse *
Foreign Corrupt Practices Act The Foreign Corrupt Practices Act of 1977 (FCPA) (, ''et seq.'') is a United States federal law that prohibits U.S. citizens and entities from Bribery, bribing foreign government officials to benefit their business interests. The FCPA is applic ...
*
Group of States Against Corruption The Group of States against Corruption (, GRECO) is the Council of Europe's anti-corruption monitoring body with its headquarters in Strasbourg (France). It was established in 1999 as an enlarged partial agreement by 17 Council of Europe member ...
(GRECO) of the
Council of Europe The Council of Europe (CoE; , CdE) is an international organisation with the goal of upholding human rights, democracy and the Law in Europe, rule of law in Europe. Founded in 1949, it is Europe's oldest intergovernmental organisation, represe ...
*
Influence peddling Influence peddling, also called traffic of influence or trading in influence, is the practice of using one's influence in government or connections with authorities to obtain favours or preferential treatment for another, usually in return for ...
* Kompromat * Money trail - Money loop *
Organized crime Organized crime is a category of transnational organized crime, transnational, national, or local group of centralized enterprises run to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a f ...
*
Pay to play Pay-to-play, sometimes pay-for-play or P2P, is a phrase used for a variety of situations in which money is exchanged for services or the privilege to engage in certain activities. The common denominator of all forms of pay-to-play is that one mu ...
*
Political corruption Political corruption is the use of powers by government officials or their network contacts for illegitimate private gain. Forms of corruption vary but can include bribery, lobbying, extortion, cronyism, nepotism, parochialism, patronage, influen ...
*
Principal–agent problem The principal–agent problem refers to the conflict in interests and priorities that arises when one person or entity (the " agent") takes actions on behalf of another person or entity (the " principal"). The problem worsens when there is a gr ...
*
Ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
*
Tariff A tariff or import tax is a duty (tax), duty imposed by a national Government, government, customs territory, or supranational union on imports of goods and is paid by the importer. Exceptionally, an export tax may be levied on exports of goods ...
* Taxation as slavery *
Taxation as theft The position that taxation is theft, and therefore immoral, is found in a number of political philosophies. Its popularization marks a significant departure from conservatism and classical liberalism, and has been considered radical by many ...
* Tax protester constitutional arguments * Throffer *
Transparency International Transparency International e.V. (TI) is a German registered association founded in 1993 by former employees of the World Bank. Based in Berlin, its nonprofit and non-governmental purpose is to take action to combat global corruption with civil s ...


References


External links

{{Authority control Crimes Illegal occupations Organized crime activity Property crimes Human rights abuses