BitDepthFeatured

Do you know who your child is talking to?

4 Mins read
  • A teenager committed suicide after being extorted for money in exchange for not releasing their intimate photos.
  • Meta removed around 63,000 Instagram accounts in Nigeria linked to financial sextortion scams.
  • Professionals believe over a hundred local children in the area have attempted or seriously considered suicide due to cyberextortion.

Above: Photo by zanuckcalilus/DepositPhotos

BitDepth 1538 for November 24, 2025

Early this year, Shiva Bissessar mourned the loss of someone he knew, a promising youth still in their formative teenage years.

The child took their own life rather than face the potential humiliation of having intimate personal photographs revealed on the open internet by an extortionist who had won their personal confidence.

So Bissessar investigated what was known about the incident. What he found stunned him.

“The victim was communicating with someone purporting to be their significant other.” Bissessar said.

“We had the device, and we messaged the person to ask them what’s this about? The person on the other end of that conversation continued to try to convince us that they were in a relationship, and compromising images might have been shared of the victim.”

“The perpetrator was acting out a role, saying their boss saw these images and was offended, but x amount of money will fix all that. They continued to try to extort value even after being told that the victim took their life. They sent images that were probably used to pressure the victim and threatened to release them. They were determined to extract value.”

“I talk about these things professionally, and here it was happening in front of me. The messages are something that need to be studied. We need to analyse the messages sent in some of these schemes because there are indicators of where the perpetrator is originating from. They issued a countdown demanding money. The countdown is apparently a West African cyberextortion technique.”

In July 2024, Meta issued a statement on financial extortion scams on its networks.

“We removed around 63,000 Instagram accounts in Nigeria that attempted to directly engage in financial sextortion scams,” Meta stated in a blog post.
“These included a smaller coordinated network of around 2,500 accounts that we were able to link to a group of around 20 individuals.”

“We removed around 7,200 assets, including 1,300 Facebook accounts, 200 Facebook Pages, and 5,700 Facebook Groups, also based in Nigeria that were providing tips for conducting scams. Their efforts included offering to sell scripts and guides to use when scamming people, and sharing links to collections of photos to use when populating fake accounts.”

Teenage children face two key threats while socialising on their smartphones and computing devices. Cyberbullying became pervasive during covid lockdowns, creating a new, anonymous aggressor.

Cyberbullies can be anyone with “bad mind.” They don’t have to be big, or strong, they can destroy with a single shared screenshot.

Cyberbullying is believed to have increased tenfold since lockdowns, but cyberextortion, internet-based sextortion targeting minors, is an external cyberattack.

How it works

Bissessar wrote in 2019 about “digital kidnapping,” the stealing or cloning of an existing child’s identity, then a way to tempt adults and then blackmail them .

The attack vector takes advantage of widespread “sharenting,” the details that parents offer up on social media about their underage children.

Bad actors seek teenagers who are digitally vulnerable because of inadequate security measures and offer potential for financial return through blackmail.
Teens probably won’t have cryptocurrency, but can use gift cards to make blackmail payments.

Shiva Bissessar

Key vulnerabilities

A conservative society that frowns on discussing sex with puberty age children, limits formal sex education, ostracises alternative lifestyles and fails to educate children about the potential consequences of sharing intimate images and geolocation information online creates fertile ground for cybercriminals.

Bissessar believes that the only effective response to this kind of cyberattack is to create an accepting environment to discuss personal mistakes. If a child does not believe they can speak with an adult and be heard meaningfully, the criminal wins.

In the case of the dead child whose messages he viewed, Bissessar believes that the child was convinced there was no other way out of the situation.

Emails and phone calls on the matter sent to the Education Ministry and the National Security Ministry’s TT Cybersecurity Incident Response Team were neither acknowledged nor answered.

Privately, professionals with insight into the matter locally believe that there have been more than a hundred incidents over the last 12 months in which children have either attempted or seriously considered suicide because of professional cyberextortion.

Employees of the Education Ministry’s Student Support Services Division are said to be struggling with this targeting of unprepared local teens.

AI enables a bad actor to convincingly alter their voice and live deepfake technology can create persuasive video.

Extortionists can also work from available images or video of a child to create deepfaked media that can be used to blackmail them.

The old internet joke, “On the web, nobody knows you are a dog,” has returned, biting viciously.

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Bissessar is clear about what needs to be done.

“When somebody reports an incident like this, they need to be comfortable about turning over a device with [private] messages between a victim and a perpetrator. It can’t just sit in a drawer in someone’s office. You want to know that the device will be handled properly.”

“That the incident will be escalated to social media companies to gain access to accounts to see if there’s a pattern where this victim was being targeted by a known threat actor.”

“It doesn’t seem that when these incidents take place and schools become aware of it that there’s a formal mechanism to report these incidents or formal tracking of them. They don’t seem to get rolled into statistics.”

“Every [cyberextortion] incident won’t end in suicide, but when bullying or extortion takes place, are we capturing that information? The school system is a good point to begin, because they seem to be aware of what’s happening.”

Reporting of cyberextortion is poor throughout the Caribbean and Latin America, though transparency.org reports that one in five people in the region has experienced sextortion.

There is no statistical breakout of the crime in its internet incarnation. TT has an opportunity here to identify the crime and provide insight into its prevalence in this country by tapping into reports made to the Education Ministry.

Anyone who needs help or thinks about harming themselves can call Lifeline (24-hour hotline) at 800-5588, 866- 5433 or 220-3636.
In case of an emergency (attempted suicide), call 990, 811 or 999.

Digital New Year’s resolutions

Digital New Year’s resolutions

Every computer and smartphone has a digital calendar system, which means that you have a live appointment book capable of giving you reminders.
Read More
WiPay announces new strategy for services, payments

WiPay announces new strategy for services, payments

Are there enough bread and butter customers who need new options for travel, phone service and loan services to make those add-on businesses worth the time of WiPay.
Read More
Old Mac, new OS

Old Mac, new OS

The best OS versions to target are Sonoma and Sequoia because these systems are still receiving minor security and improvement updates.
Read More
Regional cybersecurity faces fire

Regional cybersecurity faces fire

Boards that are being formed now accept that both cybersecurity and Ethics, Compliance and Governance are critical components of their scope of responsibilities.
Read More
Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
Digital New Year’s resolutions Digital New Year’s resolutions
WiPay announces new strategy for services, payments WiPay announces new strategy for services,...
Old Mac, new OS Old Mac, new OS
Regional cybersecurity faces fire Regional cybersecurity faces fire
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
Press Releases

Digicel Foundation to open five more Innovation Labs in schools this month

1 Mins read
““The Innovation Lab has revolutionised our teaching and learning. Our students are taking every opportunity to include tech in their daily activities.”
Press Releases

Costa Rica tops Samsung's Solve for Tomorrow, TT in top five

3 Mins read
TT’s team from Marabella North Secondary School presented its solar-powered flood early-warning system, “Doh Get Wet.”
BitDepthFeatured

Caribbean cryptocurrency concerns

3 Mins read
In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Share your perspective in the comments!x
()
x