In an era where personal lives are digitized and stored in "the cloud," the vulnerability to digital leverage has reached an all-time high. In the Philippines, cyber extortion and its more intimate sibling, sextortion, have shifted from niche internet threats to mainstream criminal enterprises. Navigating the legal labyrinth to combat these crimes requires an understanding of several interlocking statutes.
1. Defining the Offenses
While "Cyber Extortion" and "Sextortion" are often used colloquially, the Philippine legal system categorizes them under specific criminal acts.
- Cyber Extortion: The act of using the internet or electronic means to demand money, property, or services through intimidation, threats of harming one’s reputation, or threats of deleting/disclosing sensitive data.
- Sextortion: A specialized form of cyber extortion where the perpetrator threatens to release sexually explicit images or videos of the victim unless their demands (usually money or further sexual acts) are met.
2. The Legal Framework: Key Statutes
The Philippines does not have a single "Sextortion Law." Instead, prosecutors utilize a "stacking" method of various laws to ensure the highest possible penalties.
A. Republic Act No. 10175: The Cybercrime Prevention Act of 2012
This is the foundational law. It addresses crimes committed through a computer system.
- Section 4(c)(4) Cyber Libel: Often used if the threat involves damaging a person's reputation online.
- Section 6: This is the "kicker." It provides that all crimes defined and penalized by the Revised Penal Code (RPC), if committed by, through, and with the use of information and communications technologies, shall be penalized a degree higher than those provided by the RPC.
B. Republic Act No. 9995: Anti-Photo and Video Voyeurism Act of 2009
This law is the primary weapon against sextortion. It prohibits:
- Recording a person’s intimate parts or sexual acts without consent.
- Distributing or exhibiting such recordings, regardless of whether the victim consented to the original recording.
- Even if you sent a "selfie" voluntarily, the recipient has no legal right to share it or use it for blackmail.
C. Republic Act No. 11313: The Safe Spaces Act (Bawal Bastos Law)
This law covers Gender-Based Online Sexual Harassment. It penalizes:
- Cyberstalking.
- Unwanted sexual misogynistic, transphobic, homophobic, and sexist remarks.
- Uploading or sharing any form of media that contains photos, voice, or video with sexual content without consent.
D. The Revised Penal Code (RPC)
The underlying crimes often fall under:
- Article 282 (Grave Threats): Threatening a person with a wrong amounting to a crime (e.g., "I will ruin your life").
- Article 286 (Grave Coercion): Preventing a person from doing something not prohibited by law, or compelling them to do something against their will, through violence or intimidation.
- Article 294 (Robbery with Violence or Intimidation): Extortion is legally a form of robbery in the Philippines.
3. Penalties at a Glance
| Offense | Basis | Potential Penalty |
|---|---|---|
| Cyber-Voyeurism | R.A. 9995 | 3 to 7 years imprisonment + Fine (₱100k - ₱500k) |
| Online Sexual Harassment | R.A. 11313 | Up to 6 years imprisonment + Fine (₱100k - ₱500k) |
| Cyber-Extortion | RPC + R.A. 10175 | One degree higher than standard Robbery/Coercion |
4. Evidentiary Requirements and Procedures
To successfully prosecute these crimes, the "chain of custody" of digital evidence is paramount.
Legal Tip: Do not delete the messages. While your first instinct might be to scrub the interaction from your life, those logs are the primary evidence needed for a conviction.
How to Secure Evidence:
- Screenshots: Capture everything—the threats, the profile of the perpetrator, the timestamp, and the specific demands.
- URL Preservation: Copy the direct link to the perpetrator’s profile or the post where the content was shared.
- Metadata: If files were sent, preserve the original files; they contain metadata that can help law enforcement track the source.
5. Taking Action: Where to File
Victims should not engage with the extortionist. Instead, they should approach specialized units:
- PNP Anti-Cybercrime Group (PNP-ACG): Located at Camp Crame, they handle the technical "tracing" of suspects.
- NBI Cybercrime Division (NBI-CCD): Highly effective for cross-border or complex digital forensic cases.
- Department of Justice (DOJ) Office of Cybercrime: For legal assistance and coordination.
Protection Orders
Under the Safe Spaces Act, victims can also seek protection orders to prevent the perpetrator from contacting them or coming within a certain distance, even if the harassment started online.
6. The "Consent" Myth
A common defense in sextortion cases is that the victim "voluntarily" sent the images. Under Philippine law—specifically R.A. 9995 and R.A. 11313—consent to take or send a photo is not consent to distribute or use it for blackmail. The moment the image is used to coerce or is shared with others, a crime has been committed, regardless of how the perpetrator obtained the file.