{"id":12807,"date":"2025-12-03T16:05:18","date_gmt":"2025-12-03T16:05:18","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=12807"},"modified":"2025-12-03T15:54:19","modified_gmt":"2025-12-03T15:54:19","slug":"former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/","title":{"rendered":"Former Professor Claims Sextortion Scheme Led Him to Murder His Wife"},"content":{"rendered":"<p>A former Ohio State music professor is being charged with premeditated aggravated murder in connection with the stabbing of his wife. James Hill, a 76-year-old man from Upper Arlington, claimed a sextortion scam was the driving factor, telling police he \u201c<a href=\"https:\/\/www.10tv.com\/article\/news\/local\/upper-arlington-man-charged-wifes-death-after-alleged-threat\/530-69d540a3-db74-4ad7-935f-8b2d21538165\" target=\"_blank\" rel=\"noopener\">could only think of one way out<\/a>.\u201d<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Sextortion_Escalated_to_Murder\"><\/span>How Sextortion Escalated to Murder<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>According to <a href=\"https:\/\/www.10tv.com\/article\/news\/local\/court-documents-detail-events-leading-to-attempted-murder-suicide-upper-arlington-home\/530-37a02902-4c27-4059-b58f-d51f4ca54afd\" target=\"_blank\" rel=\"noopener\">court documents<\/a>, Hill told police that he met a woman on an online dating platform. Shortly after, he exchanged nude photos with her.\u00a0 On November 9, Hill claims he received a threatening message from the woman. She claimed she would release his explicit photos if he didn\u2019t pay her $15,000 in Apple Pay cards.<\/p>\n<p>It was at this point, Hill told police, that he felt he had only one option to put an end to the scheme. In addition to killing his wife, he had planned to take the lives of himself and their dog. He began giving his wife a massage before stabbing her in the chest.<\/p>\n<p>Hill then attempted to stab \u2014 and struck \u2014 their dog before it ran away. Afterward, he deleted pictures and documents from his computer and made a brief call to the police. He went on to unlock his front door before stabbing himself in the chest.<\/p>\n<p>Hill was taken to the hospital to be treated for his self-inflicted injuries. He now faces a potential life sentence if he is convicted. No further information is currently available in regard to the identity of the perpetrator or if any investigation is underway.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_Are_Ohios_Laws_on_Sextortion\"><\/span>What Are Ohio\u2019s Laws on Sextortion?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In early 2024, Gov. Mike DeWine signed <a href=\"https:\/\/ohiohouse.gov\/members\/brian-lorenz\/news\/bradens-law-approved-by-governor-126048\" target=\"_blank\" rel=\"noopener\">House Bill 531<\/a>, also known as \u201cBraden\u2019s Law,\u201d which criminalized sexual extortion, or sextortion. The offense applies to anyone who threatens to release, exhibit, or distribute private images of another in pursuit of financial gain.<\/p>\n<p>\u201cThe importance of Braden\u2019s Law cannot be overstated,\u201d said attorney Jeromy Simonovic. \u201cIt helps protect our community from this heinous crime by holding accountable anyone who threatens to release, display, or distribute private images of another for financial gain.\u201d<\/p>\n<p>The bill generally makes sextortion a third-degree felony. If the victim is a minor, elderly, or disabled, the penalty is increased to a first-degree felony. It pulls its definition of \u201celderly\u201d from <a href=\"https:\/\/codes.ohio.gov\/ohio-revised-code\/section-2913.01\" target=\"_blank\" rel=\"noopener\">Ohio Revised Code section 2913.01<\/a>, which states an elderly person is someone 65 or older. This means Hill would have been protected under the law.<\/p>\n<p>The surge in sextortion and the tragedies that have followed serve as a reminder of just how impactful this crime can be. Sextortionists rely on psychological manipulation, and this is evident in the ways that some targeted individuals respond.<\/p>\n<p>\u201cThis demonstrates a powerful reminder that those targeted by online blackmail are often frightened, isolated, and desperate for any solution,\u201d Simonovic added. \u201cThis is why DFC approaches these situations delicately, relaying information to clients as would a doctor \u2014 not the patient \u2014 offering steady, compassionate guidance and direct support to help clients make informed decisions.\u201d<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Sextortion_Victims_Need_Guidance_and_Solutions\"><\/span>Sextortion Victims Need Guidance and Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While there is no causal connection to suggest that sextortion will turn victims into violent criminals, this case highlights the fact that these schemes intentionally cloud your better judgment.<\/p>\n<p>\u201cWhile the accused may be using the alleged scheme as pretext for his unfathomable actions, this tragedy also illustrates the growing scourge of sextortion,\u201d Simonovic said. \u201cIt can inflict an overwhelming psychological burden, even on individuals who otherwise seem stable or have no history of violent tendencies.\u201d<\/p>\n<p>Sextortion may make it seem like your world is falling apart, but all hope is not lost \u2014 and you do have a path to recovery. The perpetrator wants you to act irrationally. Their whole ploy relies on you making a hasty decision out of fear, shame, and isolation.<\/p>\n<p>That last one is important because, as we can see in this case, sextortion is not something you should try to handle alone. Help is available, and recovery is possible if you take the right approach. Here\u2019s how our experts suggest you proceed:<\/p>\n<ul>\n<li><strong>Remain Calm. <\/strong>Like we said, the sextortionist is relying on you to respond in a state of panic. Take a deep breath and try to assess the situation rationally.<\/li>\n<li><strong>Do Not Pay. <\/strong>You may think the price is worth your privacy, but paying the perpetrator ultimately does nothing to protect your photos. In fact, it often leads victims to become bigger targets.<\/li>\n<li><strong>Gather Evidence. <\/strong>Document the platform, accounts, messages, timestamps, and any other relevant data. This will be useful for reporting the crime and taking legal action.<\/li>\n<li><strong>Report the Crime. <\/strong>You should notify the online platform where the sextortion took place, as well as law enforcement. <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-can-the-police-do-about-blackmail\/\">Begin with your local police<\/a> and notify your national agency, such as the FBI\u2019s <a href=\"\/blog\/extortion\/report-cybercrime-to-the-fbi\/\">Internet Crime Complaint Center (IC3)<\/a>.<\/li>\n<li><strong>Talk to Someone. <\/strong>It\u2019s critical that victims of sextortion take time to address the mental toll the crime takes. Speaking with friends, family, or professionals can help alleviate some of the stress and spread awareness around this growing crime.<\/li>\n<li><strong>Consider Cybersecurity Professionals.<\/strong> These experts can provide resources and technical knowledge you would not have access to alone. They can help you track down the identity and location of the perpetrator, enabling you to bring them to justice.<\/li>\n<\/ul>\n<p>If you ever fall victim to a <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/different-types-of-sextortion\/\">sextortion scheme<\/a>, remember that it is not your fault. You are not alone, and this happens to more people than you may think. In fact, reports of sextortion targeting minors increased by <a href=\"https:\/\/www.fbi.gov\/news\/press-releases\/sextortion-a-growing-threat-targeting-minors\" target=\"_blank\" rel=\"noopener\">20%<\/a> in 2023, followed by a <a href=\"https:\/\/www.iwf.org.uk\/news-media\/news\/exponential-increase-in-cruelty-as-sextortion-scams-hit-younger-victims\/\" target=\"_blank\" rel=\"noopener\">25%<\/a> increase in 2024. And these figures reflect only the cases that were reported.<\/p>\n<p>\u201cOur mission is to ensure that young people who face these threats receive compassionate guidance, protection, and a trusted advocate during an incredibly frightening time,\u201d Simonovic added. \u201cEach year, DFC dedicates numerous resources and assistance towards these efforts.\u201d<\/p>\n<p>This commitment to <a href=\"\/help-for-children\">protecting minor victims includes our pro bono sextortion service<\/a>. With a parent or guardian present, you can receive professional assistance that includes an expert consultation, resource navigation guidance, and digital footprint protection at no cost.<\/p>\n<p>\u201cJust like Braden was a minor, and recognizing that cybercriminals often prey on those who are least able to protect themselves, DFC remains deeply committed to its pro bono initiative dedicated to supporting minors,\u201d Simonovic said.<\/p>\n<p>There is never one way out, and you can find your path with the help of the team at Digital Forensics Corp. You can reach our <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/report-sextortion-online\/\">Sextortion Helpline<\/a>\u00a024\/7 for a free consultation with one of our specialists.<\/p>\n","protected":false},"excerpt":{"rendered":"A former Ohio State music professor is being charged with premeditated aggravated murder in connection with the stabbing&hellip;","protected":false},"author":131,"featured_media":12809,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[12],"tags":[],"class_list":{"0":"post-12807","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Sextortion Claim Behind Ohio Professor Murder Case<\/title>\n<meta name=\"description\" content=\"A closer look at how a reported sextortion threat led an Ohio professor to a fatal choice and what this case reveals about the rise of this crime\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sextortion Claim Behind Ohio Professor Murder Case\" \/>\n<meta property=\"og:description\" content=\"A closer look at how a reported sextortion threat led an Ohio professor to a fatal choice and what this case reveals about the rise of this crime\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-03T16:05:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/DFC-_News_Picture-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jack Gillespie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Sextortion Claim Behind Ohio Professor Murder Case\" \/>\n<meta name=\"twitter:description\" content=\"A closer look at how a reported sextortion threat led an Ohio professor to a fatal choice and what this case reveals about the rise of this crime\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Gillespie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/\"},\"author\":{\"name\":\"Jack Gillespie\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\"},\"headline\":\"Former Professor Claims Sextortion Scheme Led Him to Murder His Wife\",\"datePublished\":\"2025-12-03T16:05:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/\"},\"wordCount\":1078,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/DFC-_News_Picture-1.jpg\",\"articleSection\":[\"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/\",\"name\":\"Sextortion Claim Behind Ohio Professor Murder Case\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/DFC-_News_Picture-1.jpg\",\"datePublished\":\"2025-12-03T16:05:18+00:00\",\"description\":\"A closer look at how a reported sextortion threat led an Ohio professor to a fatal choice and what this case reveals about the rise of this crime\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/DFC-_News_Picture-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/DFC-_News_Picture-1.jpg\",\"width\":1280,\"height\":560,\"caption\":\"Sextortion Professor Ohio\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Former Professor Claims Sextortion Scheme Led Him to Murder His Wife\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\",\"name\":\"Jack Gillespie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"caption\":\"Jack Gillespie\"},\"description\":\"Cybercrime Writer & Awareness Advocate \\\"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\\\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \\\"Sextortion Awareness for Children\\\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jack-gillespie-21aa85222\\\/\"],\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jack-gillespie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sextortion Claim Behind Ohio Professor Murder Case","description":"A closer look at how a reported sextortion threat led an Ohio professor to a fatal choice and what this case reveals about the rise of this crime","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/","og_locale":"en_US","og_type":"article","og_title":"Sextortion Claim Behind Ohio Professor Murder Case","og_description":"A closer look at how a reported sextortion threat led an Ohio professor to a fatal choice and what this case reveals about the rise of this crime","og_url":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-12-03T16:05:18+00:00","og_image":[{"width":1280,"height":560,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/DFC-_News_Picture-1.jpg","type":"image\/jpeg"}],"author":"Jack Gillespie","twitter_card":"summary_large_image","twitter_title":"Sextortion Claim Behind Ohio Professor Murder Case","twitter_description":"A closer look at how a reported sextortion threat led an Ohio professor to a fatal choice and what this case reveals about the rise of this crime","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jack Gillespie","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/"},"author":{"name":"Jack Gillespie","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba"},"headline":"Former Professor Claims Sextortion Scheme Led Him to Murder His Wife","datePublished":"2025-12-03T16:05:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/"},"wordCount":1078,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/DFC-_News_Picture-1.jpg","articleSection":["News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/","url":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/","name":"Sextortion Claim Behind Ohio Professor Murder Case","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/DFC-_News_Picture-1.jpg","datePublished":"2025-12-03T16:05:18+00:00","description":"A closer look at how a reported sextortion threat led an Ohio professor to a fatal choice and what this case reveals about the rise of this crime","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/DFC-_News_Picture-1.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/DFC-_News_Picture-1.jpg","width":1280,"height":560,"caption":"Sextortion Professor Ohio"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/news\/former-professor-claims-sextortion-scheme-led-him-to-murder-his-wife\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"News &amp; Updates on Cybersecurity, Sextortion, Blackmail, and Online Scams","item":"https:\/\/www.digitalforensics.com\/blog\/news\/"},{"@type":"ListItem","position":3,"name":"Former Professor Claims Sextortion Scheme Led Him to Murder His Wife"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba","name":"Jack Gillespie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","caption":"Jack Gillespie"},"description":"Cybercrime Writer & Awareness Advocate \"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \"Sextortion Awareness for Children\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.","sameAs":["https:\/\/www.linkedin.com\/in\/jack-gillespie-21aa85222\/"],"url":"https:\/\/www.digitalforensics.com\/blog\/author\/jack-gillespie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/12807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=12807"}],"version-history":[{"count":4,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/12807\/revisions"}],"predecessor-version":[{"id":14725,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/12807\/revisions\/14725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/12809"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=12807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=12807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=12807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}