How to Report Online Sexual Exploitation and Blackmail of a Minor in the Philippines

How to Report Online Sexual Exploitation and Blackmail (“Sextortion”) of a Minor in the Philippines

This guide is written for parents, guardians, teachers, social workers, and any concerned person in the Philippines who needs to act—now—to protect a child. It’s practical, Philippine-specific, and designed so you can follow it step-by-step. It is legal information, not legal advice; if you can, consult a lawyer or child-protection professional alongside these steps.


1) What counts as online sexual exploitation and “sextortion”?

Under Philippine law, a child (anyone under 18) is never at fault for their sexual exploitation. Key categories:

  • Online Sexual Abuse or Exploitation of Children (OSAEC) and Child Sexual Abuse or Exploitation Materials (CSAEM) — covers grooming, solicitation, livestreamed abuse, production, possession, distribution, and any form of sexual exploitation of a child using the internet or digital devices.

  • Sextortion — blackmail demanding money, more images/acts, or other favors by threatening to share a child’s intimate images or chats. This can involve grave threats, extortion, and cybercrime qualifying circumstances.

  • Related offenses that often overlap:

    • Anti-Child Pornography (creation/possession/distribution of child sexual materials).
    • Cybercrime (when committed via computer systems or the internet; penalties are generally higher).
    • Photo/Video Voyeurism and Non-consensual sharing of intimate images (NCII).
    • Gender-Based Online Sexual Harassment (e.g., sending lewd content, stalking, doxxing; applies regardless of gender).
    • Child abuse/exploitation under special protection laws.
    • VAWC (Violence Against Women and Their Children) if the perpetrator is an intimate partner/family member of a girl child (or a mother/guardian acting for the child).

Important: A child is treated as a victim even if they sent images themselves. Do not threaten or blame the child. The priority is protection and removal from harm.


2) First 30 minutes: immediate actions

  1. Ensure safety. If there’s an immediate threat (meet-ups, ongoing livestream, threats to harm the child), call 911 or go to the nearest police station and ask for the Women and Children Protection Desk (WCPD) or Anti-Cybercrime officer.
  2. Do not pay the blackmailer. Payment almost always leads to more demands.
  3. Limit contact with the perpetrator, but first preserve evidence (see next section). After you’ve saved proof, stop replying.
  4. Stabilize the child. Move them to a calm space, ensure they are not alone, and avoid repeated questioning. Let a trained social worker/forensic interviewer handle detailed interviewing.

3) Preserve digital evidence (legally and safely)

Your goal: keep original evidence intact while collecting copies for investigators.

  • Do not delete messages, files, or accounts. If platforms take content down after you report, that’s fine; your preservation still matters.

  • Capture the full context:

    • Screenshots that include the entire screen, date/time, URL, and username/handle.
    • Export chats (e.g., “Export chat with media” on messaging apps).
    • Save files exactly as received. Don’t rename originals; make a working copy if needed.
    • Record identifiers: user IDs, profile links, phone numbers, email addresses, wallet IDs (GCash/Maya), transaction refs, IPs if visible, and any group names.
    • Document a timeline: who, what, when, where (including time zone).
  • Keep devices untouched when possible (phones, laptops, storage). Store them powered off, in airplane mode, or isolated. Don’t “factory reset” or run “cleaners.”

  • Chain of custody: When surrendering a device to police/NBI, ask for a Property/Evidence Receipt listing the device make, model, serial/IMEI, and hashes if already imaged.

  • Do not forward or share abusive images/videos to anyone except law enforcement, prosecutors, or platforms’ official reporting tools. Sharing elsewhere can be a crime even if your intent is to report.


4) Where and how to report in the Philippines

You can use all relevant channels below in parallel.

A) Law enforcement (primary)

  • PNP Anti-Cybercrime Group (ACG) — go to the nearest police station and request referral to ACG or WCPD; many stations can intake cybercrime complaints.
  • NBI Cybercrime Division — accepts walk-in complaints and can coordinate digital forensics and international requests.

Bring/submit:

  • A sworn statement/complaint-affidavit (you can draft using the checklist below; officers will help formalize it).
  • Proof of identity of the reporting adult (and of the child, if available).
  • Evidence set (screenshots, exports, devices) and your timeline.

Ask investigators to:

  • Issue or request data preservation with the platform/service provider.
  • Seek cybercrime warrants (to disclose subscriber data, search/seize/examine devices, intercept/collect traffic data) under Supreme Court rules.
  • Coordinate with DSWD/City Social Welfare and Development Office (CSWDO) for the child’s protection plan.

B) Department of Social Welfare and Development (DSWD) / CSWDO

  • For protective custody, psychosocial first aid, case management, and shelter when needed.
  • They can accompany the child to interviews and medical exams, and help navigate school and family safety plans.

C) Barangay (local government)

  • Make a blotter report to create a local paper trail and receive immediate assistance.
  • If the abuser is an intimate partner/family member of the (girl) child, ask about Barangay Protection Orders (BPOs) under VAWC. (Note: No mediation for child sexual exploitation—these are criminal matters.)

D) Prosecutor’s Office (DOJ – National/City/Provincial Prosecution Service)

  • You can also file a complaint-affidavit directly with the prosecutor. They may hold inquest proceedings for arrests without warrant or conduct preliminary investigation.

E) Platforms & international partners

  • Report in-app (Facebook/Instagram/TikTok/YouTube/Discord/etc.). Use the “sexual exploitation of minors” category if available.
  • Many platforms are legally required (in their home jurisdictions) to report to the NCMEC CyberTipline, which forwards leads to Philippine authorities. You may also file a CyberTip yourself if the platform is unresponsive.
  • After preserving evidence, request takedown through official channels.

If the suspect is overseas or anonymous, still report. Philippine authorities can use international cooperation (e.g., MLAT, INTERPOL) and platform disclosures.


5) What to expect after reporting

  1. Intake & safety planning

    • Assignment of an investigator; referral to DSWD/CSWDO; risk assessment and immediate protection measures.
  2. Forensic steps

    • Device imaging and analysis (you’ll usually get a receipt).
    • Cybercrime warrants to disclose subscriber/usage data and to search/examine accounts/devices.
    • Preservation letters to platforms/e-wallets and requests to banks/e-wallets to flag/hold suspicious funds (where legally possible).
  3. Child-friendly interviewing

    • Use of forensic interview protocols; presence of a support person/social worker; minimal repeat interviews; options for video-link or in-camera testimony under the Rule on Child Witnesses.
  4. Prosecution

    • Filing of charges under OSAEC/CSAEM, anti-child pornography, cybercrime, threats/extortion, voyeurism/NCII, VAWC (if applicable), and related laws.
    • Confidentiality: identities of child victims are protected; records and media reporting must avoid identifying details.
  5. Aftercare

    • Counseling, medical/psychological services, case management, and—when available—restitution or compensation as ordered by the court.

6) If the offender is a minor

  • Still report. The case will proceed under the Juvenile Justice and Welfare framework (diversion and rehabilitation).
  • Maintain confidentiality and avoid retaliation or public shaming.
  • Schools must apply anti-bullying and child protection policies and coordinate with authorities.

7) If money changed hands (ransom/extortion)

  • Keep all transaction records (receipts, reference numbers, wallet IDs, screenshots).
  • Notify your bank or e-wallet (e.g., GCash/Maya) fraud/dispute team immediately and get a case number.
  • Provide the case number to police/NBI so they can coordinate with AMLC and financial institutions for possible freezing/monitoring of suspect accounts.

8) Your rights (and the child’s) during the process

  • To protection and privacy (identity kept confidential; interviews in child-sensitive settings; accompaniment by a trusted adult and/or social worker).
  • To information about case progress and available services.
  • To refuse mediation/compromise for child sexual exploitation crimes.
  • To mental-health care, medical care, and safe shelter if needed.
  • To educational continuity (schools must help prevent bullying and keep the child safe).

9) Laws often used in these cases (plain-English map)

  • Republic Act (RA) 11930 – Anti-OSAEC and Anti-CSAEM Act (core OSAEC/CSAEM offenses; child is never penalized for self-generated content).
  • RA 9775 – Anti-Child Pornography Act (creation/possession/distribution of child sexual materials).
  • RA 10175 – Cybercrime Prevention Act (adds cyber qualifiers; provides for preservation, disclosure, and search/seizure of computer data).
  • RA 9995 – Anti-Photo and Video Voyeurism (and by practice, NCII scenarios).
  • RA 11313 – Safe Spaces Act (gender-based online sexual harassment).
  • RA 7610 – Special Protection of Children Against Abuse, Exploitation and Discrimination.
  • RA 9208 / RA 10364 – Anti-Trafficking in Persons (as amended).
  • Amendments to the Revised Penal Code (e.g., threats, extortion/coercion).
  • RA 11648 – Raised the age of sexual consent and strengthened protection of minors.
  • Data Privacy Act (RA 10173) – Protects personal data; allows processing/disclosure for law-enforcement/legal obligations.

Courts also follow the Rule on Examination of a Child Witness and the Rules on Cybercrime Warrants (e.g., Warrant to Disclose Computer Data, Warrant to Search, Seize and Examine Computer Data, and preservation orders).


10) School and workplace duties (mandated reporting)

  • Teachers, school officials, guidance counselors, health workers, social workers, and similar professionals generally have duties to report suspected child abuse/exploitation to authorities and to activate internal Child Protection Policy procedures.
  • Good-faith reporters are protected; failure to report can lead to administrative or legal consequences.

11) Practical do’s and don’ts

Do:

  • Act immediately; preserve evidence before accounts disappear.
  • Keep a case log (dates, actions taken, reference numbers, officer names).
  • Ask investigators for preservation and takedown coordination with platforms.
  • Secure all the child’s accounts: change passwords, enable 2-factor authentication, review linked devices, and check for spyware.

Don’t:

  • Don’t threaten the perpetrator or engage in “sting” operations on your own.
  • Don’t circulate evidence to friends, groups, or social media.
  • Don’t agree to private settlements or mediation.
  • Don’t shame or punish the child; prioritize care and support.

12) Reporting checklist (print/bring this)

  • Timeline of events with dates/times (and time zone)
  • Victim details (name, age, relationship of reporter to child)
  • Suspect details (usernames, profile links, phone/email, wallet IDs, known associates)
  • Platforms/services involved (apps, URLs, group names)
  • Evidence list (screenshots, chat exports, files, device identifiers)
  • Financial records (bank/e-wallet receipts, reference numbers)
  • Immediate risks (suicidal ideation, threats to meet, doxxing)
  • Reliefs sought: preservation, disclosure, takedown, arrest, protection orders, counseling/shelter

13) Sample complaint-affidavit outline (you can draft; police/prosecutor will format)

  1. Affiant’s identity and capacity (parent/guardian/teacher/concerned citizen).
  2. Child’s identity (state that the child is a minor; use initials when sharing drafts outside official channels).
  3. Statement of facts (chronological, specific quotes from chats, descriptions of images/acts without redistributing them).
  4. Indicators of exploitation/blackmail (demands, threats, payment requests, grooming).
  5. Evidence summary (what you preserved and where it is stored; attach printouts or storage media for official filing).
  6. Legal characterization (acts constituting OSAEC/CSAEM, cybercrime, threats/extortion, voyeurism/NCII, etc.—prosecutor will refine).
  7. Prayer/relief (request for preservation orders, disclosure warrants, search/seizure, arrest, protection measures, takedown).
  8. Verification/Jurat (sworn before officer authorized to administer oaths).

14) Aftercare and prevention

  • Arrange counseling and, if advised, a medical exam by accredited providers.
  • Work with the school on a safety and anti-bullying plan.
  • Review digital hygiene with the child (privacy settings, friend lists, device security, reporting tools).
  • Rebuild routine and support networks; avoid retraumatizing conversation loops.

15) Quick answers to common worries

  • “The child sent images—are they in trouble?” No. The child is the victim. Philippine law focuses on the offender and those who possessed/distributed/solicited the content.

  • “Police want the phone—will we ever get it back?” Devices may be retained for forensic imaging/exam. You should receive a receipt; ask about a bit-for-bit image so personal data can be returned faster.

  • “Can I post about the abuser online to warn others?” Don’t. It risks identifying the child, can compromise the case, and may expose you to liability. Work through law enforcement and official channels.

  • “Offender is abroad/anonymous.” Still report. Cyber warrants, platform disclosures, and international cooperation are routine in these cases.


16) Final notes

  • Move fast on preservation and law-enforcement intake.
  • Keep the child’s well-being central.
  • Use multiple channels (police/NBI + DSWD + platform reporting) and document everything.
  • If you can, involve a lawyer or an experienced child-protection NGO for added support.

If you want, I can turn this into a printable 1-page checklist and a fill-in-the-blank complaint-affidavit template you can use right away.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.