How to Report Sextortion and Cybercrime in the Philippines

In the Philippines, "sextortion"—a form of cyber-blackmail where an offender threatens to release sensitive or intimate images/videos unless a victim pays money or performs sexual acts—is treated as a grave criminal offense. Navigating the legal system requires a combination of immediate digital preservation and formal engagement with specialized law enforcement units.

1. The Legal Framework: What Laws Apply?

While "sextortion" is not a singular term in the Revised Penal Code, it is prosecuted through a "web of laws" that cover different aspects of the crime:

  • Republic Act No. 10175 (Cybercrime Prevention Act of 2012): The primary statute. It penalizes Computer-related Identity Theft and Computer-related Extortion. Under Section 6, crimes defined by the Revised Penal Code (like Robbery/Extortion) carry a penalty one degree higher if committed via ICT.
  • Republic Act No. 9995 (Anti-Photo and Video Voyeurism Act of 2009): Specifically targets the act of recording or distributing photos/videos of a person’s private areas or sexual acts without consent, even if the victim originally consented to the recording.
  • Republic Act No. 11313 (Safe Spaces Act or "Bawal Bastos" Law): Covers Gender-Based Online Sexual Harassment, including the sharing of media with sexual content to terrorize or intimidate a victim.
  • Revised Penal Code (Art. 294): Standard Extortion/Robbery with intimidation, often used in conjunction with cyber laws for higher sentencing.

2. Immediate Response: The "Golden Rules" of Evidence

Before heading to the authorities, victims must ensure the digital "paper trail" is intact.

  1. Do Not Comply/Pay: Compliance rarely stops the extortion; it marks the victim as a "reliable source of funds," often leading to higher demands.
  2. Preserve Evidence: Do not delete the conversation.
    • Screenshots: Capture the perpetrator’s profile URL (not just the display name), the specific threats, and any payment details provided (e.g., GCash/Maya numbers, bank accounts).
    • Metadata: Keep the original files or messages; they contain timestamps and IP logs that help investigators.
  3. Secure Accounts: Change passwords and set all social media to "Private." This prevents the attacker from scraping your "Friends List" to use as further leverage.

3. Where to File a Report

The Philippines has three primary agencies equipped with digital forensic capabilities.

Agency Best For... Contact Information
PNP Anti-Cybercrime Group (PNP-ACG) Immediate action and "walk-in" complaints. Camp Crame, Quezon City; Hotline: (02) 8723-0401 local 7491; Email: acg@pnp.gov.ph
NBI Cybercrime Division (NBI-CCD) Complex investigations or international suspects. Taft Avenue, Manila; Hotline: (02) 8523-8231 to 38; Email: ccd@nbi.gov.ph
DOJ Office of Cybercrime (DOJ-OOC) International legal cooperation (Mutual Legal Assistance). Padre Faura, Manila; Email: cybercrime@doj.gov.ph

4. The Formal Reporting Process

To initiate a criminal case, a victim must undergo a specific administrative process:

  1. Affidavit of Complaint: You will be required to execute a sworn statement (affidavit) detailing the "who, what, when, and where" of the crime. This must be notarized or sworn before a prosecutor/investigator.
  2. Technical Examination: PNP or NBI forensic experts will examine your device or the digital logs to verify the authenticity of the messages.
  3. Warrant to Disclose Computer Data (WDCD): If the suspect’s identity is hidden, the law enforcement agency may apply for a WDCD from the court to compel Internet Service Providers (ISPs) or platforms to release the perpetrator's subscriber information.
  4. Inquest or Preliminary Investigation: Once the suspect is identified and evidence is gathered, the case is filed with the Office of the City Prosecutor to determine "probable cause" for trial.

5. Privacy and Victim Protection

Victims are often hesitant to report for fear of public shame. However, Philippine law provides specific safeguards:

  • Confidentiality: Under the Safe Spaces Act and RA 9262 (if the perpetrator is a former partner), the identity of the victim and their family is protected from public disclosure.
  • Takendown Requests: The National Privacy Commission (NPC) and the Cybercrime Investigation and Coordinating Center (CICC) can coordinate with platforms like Meta, Google, and TikTok to remove Non-Consensual Intimate Imagery (NCII) quickly.

As of 2026, the Philippine government has also integrated AI/Deepfake detection into its forensic toolkit to address cases where intimate imagery may have been artificially generated to facilitate extortion.

Would you like me to draft a template for a Sworn Statement (Affidavit of Complaint) that you can use to organize your evidence for the authorities?

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.