Sextortion—a form of cyber-blackmail where a perpetrator threatens to release sensitive or intimate images/videos unless a victim provides money, sexual favors, or more content—is a specialized crime under Philippine law. It combines elements of traditional extortion with modern digital violations, carrying severe penalties including long-term imprisonment.
I. The Legal Framework
In the Philippines, sextortion is prosecuted using a combination of specialized cyber-legislation and the Revised Penal Code.
1. Anti-Photo and Video Voyeurism Act of 2009 (R.A. 9995)
This is the primary statute used when intimate media is involved. It prohibits the recording, reproduction, or distribution of sexual photos/videos without written consent.
- Key Provision: It applies even if the original recording was consensual (e.g., sent during a relationship). The crime occurs the moment the material is shared or used as a threat without consent.
- Penalty: 3 to 7 years of imprisonment and fines ranging from ₱100,000 to ₱500,000.
2. Cybercrime Prevention Act of 2012 (R.A. 10175)
This law acts as an "enhancer." Under Section 6, any crime defined in the Revised Penal Code (such as Grave Threats or Extortion) carries a penalty one degree higher if committed via Information and Communications Technology (ICT).
- Computer-related Identity Theft: Often, perpetrators use fake accounts or hacked profiles, which is a separate offense under this Act.
3. Safe Spaces Act (R.A. 11313)
Known as the "Bawal Bastos" Law, this covers Gender-Based Online Sexual Harassment. It penalizes the uploading or sharing of any media with sexual content without consent, as well as cyberstalking and unwanted sexual remarks.
4. The Revised Penal Code (RPC)
- Article 282 (Grave Threats): Threatening a person with a wrong (releasing a video) to extort money.
- Article 294 (Robbery/Extortion): If the victim pays the perpetrator, the act is legally classified as robbery through intimidation.
II. Immediate Response Protocol
If you are a victim of online blackmail, your actions in the first few hours are critical for both your safety and the success of a future legal case.
- Cease All Communication: Do not negotiate. Blackmailers rarely stop after the first payment; they typically categorize paying victims as "reliable income" and increase their demands.
- Do Not Pay: Payments provide the perpetrator with financial resources and confirm that their leverage is effective.
- Preserve Digital Evidence: Do not delete the chat or block the user immediately until you have secured the following:
- Full-screen screenshots: Capture the perpetrator’s profile, the exact threat, and the time/date.
- Profile Links (URLs): Copy the link to their Facebook, Instagram, or Telegram profile. Usernames can change; URLs are more permanent.
- Transaction Records: If money was already sent, save receipts from GCash, Maya, or bank transfers.
- Secure Your Accounts: Change passwords and enable Two-Factor Authentication (2FA) on all social media and email accounts.
III. Reporting Procedures and Agencies
In the Philippines, two primary agencies handle these complaints. You may choose either depending on your location and the complexity of the case.
1. PNP Anti-Cybercrime Group (PNP-ACG)
Best for immediate local assistance and "entrapment" operations if the suspect is local.
- Headquarters: Camp Crame, Quezon City.
- Regional Units: Most provinces have a Regional Anti-Cybercrime Unit (RACU).
- Process: You will be interviewed by an investigator and asked to execute a Sworn Statement (Salaysay).
2. NBI Cybercrime Division (NBI-CCD)
Preferred for complex cases, international suspects, or cases requiring deep forensic intelligence.
- Office: NBI Building, Taft Avenue, Manila.
- Process: Submit a formal complaint letter and evidence. The NBI coordinates with international agencies like INTERPOL if the perpetrator is abroad.
| Step | Action | Description |
|---|---|---|
| 1 | Initial Blotter | Incident is logged at the PNP-ACG or NBI desk. |
| 2 | Technical Examination | Forensic officers verify the authenticity of screenshots and digital logs. |
| 3 | Case Filing | A Complaint-Affidavit is filed with the Prosecutor’s Office. |
| 4 | Cyber-Warrants | Law enforcement applies for a Warrant to Disclose Computer Data (WDCD) to identify the suspect via their ISP or platform. |
IV. Victim Protection and Remedies
Philippine law provides specific protections to prevent "re-victimization" during the legal process.
- Anonymity: Under the Data Privacy Act (R.A. 10173) and court protocols, the identity of victims in sexual crime cases is kept confidential in public records.
- Take-Down Requests: Law enforcement can coordinate with the Department of Information and Communications Technology (DICT) and platforms (Meta, Google, X) to "hash" and remove non-consensual intimate imagery (NCII).
- Protection Orders: If the blackmailer is an ex-partner, you can apply for a Protection Order under R.A. 9262 (Anti-VAWC), which legally bars them from contacting or approaching you.
V. Contact Directory
| Agency | Hotline / Phone | Email / Online |
|---|---|---|
| PNP-ACG | (02) 8723-0401 loc 7491 | acg@pnp.gov.ph |
| NBI-CCD | (02) 8523-8231 | ccd@nbi.gov.ph |
| DOJ Office of Cybercrime | (02) 8523-8482 | cybercrime@doj.gov.ph |
| Inter-Agency Hotline | 1343 | (Action against Human Trafficking/Online Abuse) |
Legal Note: In the Philippines, the preservation of the "Chain of Custody" for digital evidence is vital. Avoid "cleaning" your phone or deleting messages before a forensic officer has reviewed them, as this may lead to the evidence being ruled inadmissible in court.