How to Report Online Sextortion of a Minor in the Philippines

How to Report Online Sextortion of a Minor in the Philippines

A practical, Philippine-specific legal guide for parents, guardians, educators, social workers, and first responders.

Important: This is general information, not legal advice. If a child is in immediate danger, go to the nearest police station or call your local emergency number right away.


1) What “online sextortion” means under Philippine law

  • Plain meaning: Someone uses threats (e.g., to publish intimate images, doxx, or harm) to force a child to send more sexual images/video, money, or to perform sexual acts online.

  • Why it’s always a crime with a minor: In the Philippines, any sexualized image or sexual exploitation of a child is unlawful—consent is not a defense. Laws that typically apply include:

    • RA 11930 (Anti-Online Sexual Abuse or Exploitation of Children and Anti-Child Sexual Abuse or Exploitation Materials Act) — covers online sexual abuse/exploitation (OSAEC) and child sexual abuse/exploitation materials (CSAEM); criminalizes production, distribution, possession, procurement, and facilitation—including coercion, grooming, and live-streamed abuse.
    • RA 9775 (Anti-Child Pornography Act) — earlier framework against child sexual abuse materials; still relevant and reinforced by RA 11930.
    • RA 10175 (Cybercrime Prevention Act) — tools for digital evidence, data preservation, cybercrime jurisdiction; can combine with Revised Penal Code provisions on threats, extortion, robbery with intimidation, coercion, etc.
    • RA 7610 (Special Protection of Children Against Abuse, Exploitation and Discrimination Act) — general child abuse/exploitation.
    • RA 9208/10364/11862 (Anti-Trafficking in Persons and expansions) — applies when a child is recruited, obtained, or harbored for sexual exploitation, including online.
    • RA 9995 (Anti-Photo and Video Voyeurism Act) — if images are captured/posted or threatened to be posted without consent.
    • RA 10173 (Data Privacy Act) — separate administrative route for unlawful processing/disclosure of a minor’s personal data (not a substitute for criminal reporting).
  • Jurisdiction & cross-border: Philippine law can reach online offenses involving Filipino children even when offenders are abroad (e.g., under RA 10175’s extraterritorial reach and through mutual legal assistance). Local law enforcement coordinates with foreign counterparts for platform data and takedowns.


2) Immediate steps if a child is being sextorted

Do these now (in order):

  1. Stop responding to the extorter. Do not send more images or money. Paying rarely stops the threats and can escalate demands.

  2. Preserve evidence before anything is deleted:

    • Take full-screen screenshots of chats (include date/time, usernames/handles, platform, and URLs).
    • Export chats (many apps let you “export chat” with media).
    • Save original files (photos, videos, voice notes) and metadata if possible; don’t edit/rename.
    • Keep payment records (receipts, bank/e-wallet/crypto transaction hashes).
    • Note the device details (phone/computer model, OS version) and your accounts’ exact usernames.
  3. Secure the child:

    • Ensure they’re with a trusted adult.
    • Disable location sharing and tighten privacy settings.
    • Do not delete accounts yet—law enforcement may need live access to evidence.
  4. Report quickly (details in Section 3) and ask for a data preservation request to the platform/service.

  5. Tell the platform (in-app reporting) that the account is exploiting a child and threatening to publish sexual content of a minor—this flags the highest-priority safety queue.

  6. Engage support: school guidance office (Anti-Bullying Act), LGU social worker/DSWD, or a Child Protection Unit for trauma-informed care.

Do not:

  • Engage in “sting” operations or confront the suspect yourself.
  • Share the images to seek help (that can be illegal possession/distribution).
  • Rely on “cleanup” apps that overwrite files (you may destroy evidence).

3) Where and how to file a criminal report

You can report to any of the following (you may use more than one):

  • PNP Women and Children Protection Desk (WCPD) at the nearest police station — fastest for urgent physical help.
  • PNP Anti-Cybercrime Group (ACG) — for specialized cybercrime handling.
  • NBI Cybercrime Division — accepts walk-ins and formal complaints for cyber-enabled offenses.
  • Department of Justice (Office of Cybercrime / National Prosecution Service) — for prosecution support, cybercrime warrants, and mutual legal assistance.

Tip: If you start at a local station, ask that your case be endorsed to WCPD and ACG/NBI Cybercrime for digital forensics and platform/legal process.

What to bring

  • Affidavit-Complaint (see template below) signed by the parent/guardian (or the minor with a guardian present).
  • Identity documents (yours and the child’s).
  • All preserved evidence (on a USB drive or secured cloud folder): screenshots, exported chats, files, payment proof, list of usernames/links.
  • Any medical/psychological report if applicable (Child Protection Unit can assist).

What will happen next (typical flow)

  1. Blotter and intake interview.
  2. Evidence review and forensic imaging of devices (they may ask you to surrender devices temporarily for bit-by-bit copies—ask for a receipt/chain-of-custody).
  3. Data preservation & takedown requests to platforms/payment providers under RA 10175 & RA 11930.
  4. If the suspect is identifiable and within reach, inquest may follow (warrantless arrest in flagrante). Otherwise, investigators build the case and seek cybercrime warrants (e.g., Warrant to Disclose/Intercept/Search, Seize, and Examine Computer Data under the Supreme Court’s cybercrime warrant rules).
  5. Filing with the prosecutor; preliminary investigation; filing of Information in court if probable cause is found.
  6. Protective measures for the child witness (closed-door testimony, live-link CCTV, support person) under the Rule on Examination of a Child Witness.

4) Evidence: what prosecutors and courts look for

  • Identity linkage: handles/usernames → subscriber data → IP logs → device attribution.
  • Coercion/extortion: explicit threats (“I’ll post if you don’t…”) and demands (money, more content, live acts).
  • Child status: proof of age (birth certificate/school ID/parent affidavit).
  • Sexual content/exploitation: any lascivious act or explicit content involving a minor — mere possession is a crime; distribution/production/facilitation are graver.
  • Digital integrity: original files where possible, hash values, and clean chain-of-custody from seizure/collection to court.
  • Financial trail: e-wallet/bank/crypto records linking suspect accounts.

Practical tips

  • Keep both screenshots and exported originals.
  • Record exact URLs, message IDs, post IDs, profile links, and timestamps (with time zone).
  • If a platform removes content, your early screenshots/export and the lawful preservation request help law enforcement obtain official records later.

5) Child protection, privacy, and media rules

  • Identity confidentiality: Publishing or sharing any sexualized image of a child is a crime; media and the public must not reveal a child victim’s identity.
  • School obligations: Under the Anti-Bullying Act, schools must investigate cyberbullying/harassment and protect the student; coordinate with law enforcement to avoid evidence loss.
  • Protective custody: DSWD/LGU social workers can arrange temporary shelter and counseling if needed.
  • Data Privacy: You may file a separate complaint with the National Privacy Commission for unlawful processing/disclosure of a minor’s personal data—this is in addition to criminal action.

6) Platform and payment-provider cooperation

  • Report in-app using the platform’s “report” tools; choose categories like sexual exploitation of minors or threats/extortion.
  • Most major platforms escalate child-safety reports and can disable access and preserve data for law enforcement.
  • Payment providers/financial intermediaries may freeze or flag accounts tied to OSAEC under compliance duties strengthened by RA 11930. Provide transaction references when you report.

7) Penalties (high level)

Exact penalties depend on the charge(s), but expect lengthy imprisonment and substantial fines, with heavier penalties when:

  • The victim is under 12, or
  • The offender is a parent/guardian/person in authority, acts in concert with others, or profits from the abuse, or
  • There is production/distribution or syndicated activity.

Courts also order confiscation of equipment, blocking of offending content, and reparations to the child. Civil damages may be pursued alongside the criminal case.


8) Cross-border offenders and unknown identities

  • Do not be discouraged if the offender is overseas or hiding behind throwaway accounts. Philippine agencies regularly obtain platform data via mutual legal assistance, 24/7 cybercrime points of contact, and Interpol channels.
  • Your early evidence preservation (Section 2) is what makes later data requests effective.

9) FAQs

Q: Should we pay to make the threats stop? A: No. Payments rarely stop extortion and may increase demands. Report immediately.

Q: The content is already posted. Can it be removed? A: Yes. Report to the platform as sexual exploitation of a child (highest priority). Law enforcement can also send formal takedown and preservation requests. Keep your screenshots and links.

Q: Can we delete the child’s account to “erase” everything? A: Not yet. Deleting may destroy key evidence. Secure the account, stop engagement, and let investigators guide you.

Q: The child “consented” to send images. A: For minors, consent is not a defense for sexual exploitation materials. Report it.

Q: What if the extorter is a classmate or someone the child knows? A: The same laws apply. Report to WCPD/ACG/NBI and inform the school for safety planning.


10) One-page reporting checklist

  • Child is safe with a trusted adult
  • Stop engagement; do not send money/images
  • Capture screenshots (chats, threats, profiles, URLs)
  • Export chats and save original files
  • Collect payment records (refs/receipts)
  • Note usernames/handles, links, timestamps
  • Bring IDs and prepare Affidavit-Complaint
  • Report to WCPD / PNP-ACG / NBI Cybercrime / DOJ
  • Report in-app to the platform (child sexual exploitation)
  • Ask investigators to send preservation/takedown requests
  • Connect with DSWD/CPU/school for support

11) Templates

A) Affidavit-Complaint (outline)

AFFIDAVIT-COMPLAINT I, [Name of Parent/Guardian], of legal age, Filipino, and a resident of [Address], after being duly sworn, depose and state:

  1. I am the [mother/father/legal guardian] of [Child’s Name], [age].
  2. On [date/time, with timezone], a person using the account [username/handle/link] on [platform] threatened to [state threats] unless my child [state demands: send more images, pay money, perform acts].
  3. Attached as Annexes “A” to “__” are true and correct copies of screenshots, exported chats, files, URLs, and payment records.
  4. I respectfully request the filing of appropriate criminal charges for violations of RA 11930, RA 9775, RA 10175, RA 7610, and other applicable laws, and the issuance of lawful data preservation/takedown requests.
  5. I am executing this affidavit to attest to the truth of the foregoing and to support criminal prosecution.

[Signature over printed name] [Date/Place] SUBSCRIBED AND SWORN to before me this [date], affiant exhibiting [ID].

B) Evidence Index (attach to complaint)

  • A-1: Screenshot – threat message (Platform, handle, URL, timestamp)
  • A-2: Exported chat – PDF/TXT (hash value if available)
  • A-3: Image/video file – original (filename, size, hash)
  • A-4: Payment receipt – transaction ID, amount, account number/wallet/tx hash
  • A-5: Device info – model, OS, app version
  • A-6: List of all known usernames, links, group names

C) Safety Plan for Schools (quick brief to guidance office)

  • Summary of incident (no images attached)
  • Measures requested: no-contact orders, schedule adjustments, supervised online classes if needed, bullying investigation, counseling referral
  • Law-enforcement case reference (if available) and contact point

12) Common legal issues & how to handle them

  • “Catfish” or clone accounts: Include links to all profiles used, plus any mirror uploads.
  • Anonymous/overseas offenders: Provide the earliest screenshots/exports; they help platforms trace IPs and device fingerprints even after accounts vanish.
  • Family member as offender: Law still applies; penalties are higher. Engage DSWD early for child safety.
  • Takedown timing vs. evidence: Get screenshots/exports first, then push for platform removal.
  • Civil remedies: You may pursue civil damages (moral/exemplary/actual) alongside the criminal case.
  • Data retention: Investigators can serve a data preservation order (typically up to six months, extendable) under RA 10175 to keep logs/records while warrants are processed.

13) Support for the child

  • Medical & psychosocial: Child Protection Units (e.g., in major government hospitals) provide medico-legal exams, trauma-informed counseling, and documentation.
  • Therapeutic approach: Avoid blame; reassure that the child is not at fault; limit retelling to trained professionals to prevent retraumatization.
  • Long-term: Consider school reintegration plans, online safety coaching, and ongoing counseling.

14) Key takeaways

  • With minors, every sexualized image is illegal—report it.
  • Preserve first, then takedown. Your documentation unlocks cross-border cooperation.
  • Use WCPD/PNP-ACG/NBI/DOJ channels and engage DSWD/CPU for protection and care.
  • Don’t pay, don’t delete, don’t go it alone.

If you’d like, tell me your situation (no names or images needed) and I can:

  • draft a custom Affidavit-Complaint using your facts,
  • help you build a clean evidence index, and
  • prepare a platform takedown request note that aligns with Philippine child-safety standards.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.