Online blackmail and sextortion—the act of threatening to release private, sensitive, or sexual images and videos to coerce a victim into providing money, additional sexual content, or other favors—is a severe criminal offense in the Philippines. The Philippine legal system provides a robust framework of special penal laws and traditional criminal statutes to address these digital crimes.
I. Primary Legislative Framework
The prosecution of sextortion typically involves a combination of the Cybercrime Prevention Act and the Anti-Photo and Video Voyeurism Act.
1. RA 10175: Cybercrime Prevention Act of 2012
This is the foundational law for all ICT-related crimes. While "sextortion" is not a single defined term in the act, the conduct is prosecuted through several provisions:
- Section 4(c)(4) Cyber Libel: If the perpetrator threatens to dishonor the victim by publishing private content.
- Section 6: This is a crucial "aggravating" provision. It stipulates that all crimes defined in the Revised Penal Code (RPC), if committed through or with the use of information and communications technologies, shall be penalized with a penalty one degree higher than that provided by the RPC.
- Computer-Related Identity Theft: Often used if the blackmailer creates fake accounts using the victim’s photos to facilitate the extortion.
2. RA 9995: Anti-Photo and Video Voyeurism Act of 2009
This law specifically penalizes the act of recording or broadcasting "private" images or videos of a person’s genitalia or sexual acts without consent, even if the person originally consented to the recording but not the distribution.
- Prohibited Acts: Capturing, copying, or transmitting these images/videos.
- Penalty: Imprisonment ranging from 3 to 7 years and a fine of up to PHP 500,000.
3. RA 11313: The Safe Spaces Act (Bawal Bastos Law)
This law covers Gender-Based Online Sexual Harassment. It penalizes online conduct including:
- Unwanted sexual misogynistic, transphobic, homophobic, and sexist remarks.
- Uploading or sharing of any forms of media that contain photos, voice, or video with sexual content without consent.
- Stalking and cyberstalking.
II. Criminal Liabilities under the Revised Penal Code (RPC)
In relation to Section 6 of RA 10175, the following traditional crimes are frequently applied to sextortion cases:
| Offense | Legal Basis (RPC) | Description in Sextortion Context |
|---|---|---|
| Robbery/Extortion | Article 294 | When the perpetrator gains property or money through intimidation or violence (including digital threats). |
| Grave Threats | Article 282 | Threatening the victim with a wrong amounting to a crime (e.g., threatening to kill or harm if images are not sent). |
| Grave Coercion | Article 286 | Preventing a person from doing something not prohibited by law, or compelling them to do something against their will. |
III. Protection for Women and Children
If the victim is a woman or a child, additional special laws provide higher levels of protection and specific remedies:
- RA 9262 (Anti-Violence Against Women and Their Children Act): If the blackmailer is a current or former partner, the act of sextortion is considered "Psychological Violence" and "Economic Abuse." Victims can apply for Protection Orders (BPO, TPO, or PPO) to prevent the offender from contacting or approaching them.
- RA 7610 (Special Protection of Children Against Abuse): If the victim is under 18, the crime falls under child abuse and potentially child pornography (RA 9775), carrying significantly heavier penalties, including reclusion temporal to reclusion perpetua.
IV. Procedural Remedies and Actions
Victims of online blackmail have several avenues for legal recourse:
1. Filing a Criminal Complaint
The victim must file a Complaint-Affidavit before the Office of the City Prosecutor or through specialized units:
- PNP-ACG: Philippine National Police - Anti-Cybercrime Group.
- NBI-CCD: National Bureau of Investigation - Cybercrime Division.
2. Cybercrime Warrants
Under the Rule on Cybercrime Warrants (RCW), law enforcement can apply for:
- Warrant to Disclose Computer Data (WDCD): Requiring service providers (like Facebook or Google) to provide subscriber information.
- Warrant to Intercept Computer Data (WICD): To listen to or monitor communications in real-time.
- Warrant to Examine Computer Data (WECD): To search the devices seized from a suspect.
3. Civil Action for Damages
Under Article 33 of the Civil Code, a victim can file a separate civil action for defamation or physical injuries. They may seek Moral Damages for emotional distress and Exemplary Damages to set a public example.
V. Critical Steps for Evidence Preservation
For a legal case to succeed in the Philippines, the integrity of digital evidence is paramount. The "Chain of Custody" must be maintained.
- Do Not Delete: Avoid deleting the conversation or the profile of the extortionist immediately.
- Screenshots: Capture full-screen screenshots showing the URL/web address, the profile name, the date and time, and the specific threats.
- Preservation of Metadata: If possible, save the original files or messages without altering them, as these contain technical data (metadata) that can prove the origin of the message.
- Avoid Payment: Law enforcement strictly advises against paying, as this confirms the victim's fear and rarely results in the destruction of the compromising material.