The computer has been used to commit crimes, right from its inception. More recently, the city of Chicago has had to contend with the reality of cyber extortion. The state has certain duties and liabilities which include investigation and prosecutorial powers. The essential ingredients of the crime are that the offender gets the victim to do or not do certain things in order to avoid being harmed. The internet is then the conduit through which they make the threats, agree the illegal contracts and collect on them. Hackers have found the computer to be perfect for blackmail and ransom notes. One of their favorite tricks is to obtain sensitive information from an organization and then threaten to publish it unless their demands are fully met.
The demands invariably include monetary compensation but the standards of the crime can still be met even if money does not exchange hands. At other times the hackers will plant malicious information or programs for which only they have the key. That means that unless the victim accepts their demands, they will let the program wreak havoc. That havoc might involve wiping out the entire database of company information. Hackers may even deny an organization access to its own files in order to ensure that they can comply with the extortion demands. The range of victims is startling including municipalities, hospitals, government agencies and even private individuals.
A Violation of Privacy and Property