Leveraging the Law, Exposing Incriminating Data and Other New Tactics in Cyber Extortion