Sextortion in the Philippines: How to Report and Stop Nude Photo Blackmail
This is a practical legal guide for the Philippines. It explains the crimes that typically cover “sextortion,” what evidence to preserve, where and how to report, and what remedies—criminal, civil, and protective—are available. It is general information, not legal advice; consult a lawyer for your specific case.
Quick take: what to do right now
- Stop engaging. Do not negotiate or pay. Paying almost always leads to more demands.
- Save everything. Screenshot chats (include usernames, timestamps, and URLs), save files, export chat logs, and photograph any bank transfers. Do not edit the files.
- Secure your accounts. Change passwords, enable 2-factor authentication, and log out other sessions on your email, social media, and messaging apps.
- Report to platforms. Use the in-app “intimate image without consent/private image” reporting flows; request takedown and account removal.
- Report to authorities. File with the PNP Anti-Cybercrime Group (ACG) or NBI Cybercrime Division. If a child is involved, also contact the PNP Women and Children Protection Center (WCPC) or the DSWD.
- Prepare a complaint-affidavit with your evidence (template below) and file with the Office of the City/Provincial Prosecutor.
What “sextortion” covers in Philippine law
“Sextortion” is not a single statute; it’s conduct typically charged under a combination of laws, depending on facts:
Core criminal statutes
Revised Penal Code (RPC):
- Grave threats (Art. 282) or light threats (Art. 283) when someone threatens to publish your intimate images to force you to pay money, send more images, or do acts against your will.
- Grave coercion (Art. 286) if the threat compels you to do something you’re not legally obliged to do.
Cybercrime Prevention Act of 2012 (RA 10175):
- Applies when threats, coercion, access, or identity misuse are committed through ICT (social media, messaging apps, email, etc.).
- Section 6 increases penalties by one degree for RPC crimes committed by, through, and with the use of ICT.
- May also cover computer-related identity theft, illegal access, or computer-related fraud, if present.
Anti-Photo and Video Voyeurism Act of 2009 (RA 9995):
- Punishes taking, copying, selling, distributing, publishing, or broadcasting images/videos of a person’s private parts or sexual act without consent, regardless of whether the images were initially consensually taken.
- Frequently used against “revenge porn” and the threatened release of nude images.
Violence Against Women and Their Children Act (RA 9262):
- If the offender is a current/former spouse/partner or someone with whom the victim has or had a dating/sexual relationship, electronic harassment and acts causing mental or emotional anguish can constitute VAWC. This enables Protection Orders (BPO/TPO/PPO) and criminal liability.
When the victim is a child (below 18)
Anti-OSAEC and Anti-CSAM Act (RA 11930) and Anti-Child Pornography Act (RA 9775):
- Criminalize creating, soliciting, possessing, selling, or distributing any sexualized image of a child, including “self-generated” images. The child is always treated as a victim.
Expanded Anti-Trafficking in Persons Act (RA 10364) and RA 7610 (child abuse):
- Often applied alongside RA 11930 where exploitation or commercial gain is involved.
Key point: If any child is involved, treat it as urgent; report immediately. Law enforcement can fast-track takedown and rescue protocols.
Data privacy and other laws (fact-dependent)
- Data Privacy Act (RA 10173): unauthorized processing/disclosure of personal data; complaints may be filed with the National Privacy Commission.
- Anti-Wiretapping Act (RA 4200): secret recording of private communications may be a separate offense (context-specific).
Elements commonly present in sextortion cases
- Threat to publish or send your intimate images/video to your family, friends, employer, or online.
- Demand for money, more sexual content, or other acts.
- Use of ICT (Facebook, Instagram, X, TikTok, WhatsApp, Telegram, Viber, dating apps, email).
- Additional acts such as hacking, impersonation, doxxing, or account takeover.
Penalties (high-level)
Penalties vary by charge and facts. In broad strokes:
- Threats/coercion under the RPC become one degree higher when committed through ICT (RA 10175 Sec. 6).
- RA 9995 imposes imprisonment and fines for non-consensual capture, copying, or distribution of intimate images.
- VAWC (RA 9262) includes imprisonment and fines, plus Protection Orders with swift enforcement.
- Child-related offenses (RA 11930/RA 9775/RA 10364/RA 7610) carry significantly higher penalties, mandatory reporting, and immediate protective measures.
Because exact penalties depend on charge selection and facts, ask counsel to map charges to penalty ranges in your case.
Jurisdiction and venue
- Philippine courts generally have jurisdiction when any element of the offense occurs in the Philippines, the victim or offender is in the Philippines, or the computer system used is here. Cross-border conduct can still be prosecuted if it touches Philippine territory or systems. Venue is typically any place where an element occurred or where the complainant resides for certain cyber offenses.
Where and how to report
1) Police and investigative agencies
- PNP Anti-Cybercrime Group (ACG): for cyber-enabled crimes, including sextortion. You may go to the nearest police station for a blotter and referral, or directly to an ACG office.
- NBI Cybercrime Division: accepts walk-ins and complaints with supporting evidence.
- If a child is involved: PNP WCPC, NBI Anti-Human Trafficking, and DSWD should be engaged immediately.
What to bring
- Government ID.
- Complaint-affidavit (see template below) and Annexes: screenshots, chat exports, URLs, usernames/handles, email headers, transaction receipts, bank/e-wallet details, courier receipts, and a brief timeline.
- If you paid: proof of transfer, account numbers, reference codes.
2) Prosecutor’s Office
- File your complaint-affidavit and annexes at the Office of the City/Provincial Prosecutor. The case undergoes inquest (if the suspect is under arrest) or preliminary investigation (if not). You’ll be asked to subscribe and swear to your affidavit.
3) Platforms and service providers
- Use the “intimate image/non-consensual nude” reporting category where available.
- Request content removal, account suspension, and hash-based blocking to prevent re-uploads.
- Preserve your report tickets/acknowledgments and any takedown confirmations for your annexes.
4) Banks and e-wallets
- If you paid or funds moved, immediately file a fraud/incident report with your bank or e-wallet (e.g., GCash, Maya) to attempt holds or traces and to generate official reference numbers for law enforcement.
5) National Privacy Commission (NPC)
- If your personal data was misused or disclosed without consent, you may lodge a complaint or request assistance; keep this parallel to your criminal case.
Evidence: what to keep and how to keep it
Capture the context
- Screenshots that show full handles/URLs, dates, and times. On web, include the address bar.
- Export complete chat threads (most apps allow exporting conversations).
- Save original files (images/videos) and do not alter them.
Corroborate identity
- Profile links, usernames, phone numbers, email addresses, IP/location hints (if any), and cross-platform handles.
Follow the money
- Transaction receipts, deposit slips, e-wallet reference numbers, courier receipts, and bank SMS/email alerts.
Maintain chain of custody
- Put everything in a dated folder.
- Keep a simple timeline of events: date/time, action, evidence filename.
- Back up to at least two locations (e.g., external drive + cloud).
Protective measures (especially for intimate partners)
- Barangay Protection Order (BPO) under RA 9262 is available when the offender is a spouse/partner/ex. It can be issued ex parte, typically within 24 hours, prohibiting contact, harassment, and threats.
- Temporary/Permanent Protection Orders (TPO/PPO) from the court can expand protection, restrict electronic contact, and order other relief.
- Violations of Protection Orders carry separate penalties—report them immediately.
Step-by-step game plan (first 24–48 hours)
Hour 0–2
- Stop responding; block if safe to do so.
- Photograph your device screens (as a backup to screenshots).
- Change passwords; enable 2FA; revoke unknown sessions and app permissions.
Hour 2–6
- Export full chat threads; download media in original quality.
- Report profiles and posts to the platforms; keep report IDs.
- If payment occurred, call your bank/e-wallet; note reference numbers.
Hour 6–24
- Draft your complaint-affidavit (template below).
- Visit the PNP-ACG/NBI Cybercrime office or your nearest police station for blotter/referral.
- If a child is involved or the suspect is an intimate partner, contact WCPC/DSWD and/or seek a BPO.
Day 2 onward
- File with the Prosecutor’s Office; attend preliminary investigation.
- Consider a civil action for damages and/or injunction (see below).
- Keep monitoring platforms for reposts; report re-uploads promptly.
Filing the criminal case: common charge combinations
- Grave threats (RPC) in relation to RA 10175 Sec. 6 + RA 9995 (if images were captured/copied/distributed without consent).
- Grave coercion (RPC) in relation to RA 10175 Sec. 6 (if compelled acts are the focus).
- Identity theft/illegal access (RA 10175) if accounts were hacked or impersonated.
- VAWC (RA 9262) if the offender is or was your intimate partner.
- If a child is involved: charges under RA 11930/RA 9775 (and often RA 10364/RA 7610).
Prosecutors may stack charges where facts support them. Your complaint-affidavit should lay out specific acts, dates, platforms used, threats made, and demands.
Civil remedies (can be parallel to criminal action)
- Damages under the Civil Code (Arts. 19, 20, 21, 26) for abuse of rights, acts contrary to morals, invasion of privacy, and injury to reputation, including moral, actual, nominal, and exemplary damages.
- Injunction/tRO to stop further publication and to compel deletion or cooperate with takedown.
- Independent civil action may proceed alongside the criminal case; ask counsel which forum is strategically best.
Platform takedowns: practical tips
- Use the platform’s non-consensual intimate image category (not generic “harassment”).
- Provide exact URLs, screenshots, and state that the image is non-consensual.
- Request hash-based blocking to prevent re-uploads.
- If duplicates appear, report each URL; platforms treat each link separately.
If the blackmailer is overseas
- Still report locally. Philippine authorities can coordinate through MLAT/Interpol channels.
- Keep time zone info, foreign phone numbers, and payment trails (Remittance/e-wallet IDs).
- Jurisdiction can attach if any element occurred in the Philippines or the device/platform used is here.
Special notes for minors and parents/guardians
- Do not threaten or shame the child; remove immediate access to the offender and get support (DSWD, child-friendly NGOs, healthcare).
- Never send additional images to “buy time.”
- Tell platforms it involves a minor—this triggers accelerated removal.
- Schools should be told only as needed to protect the child (not to discipline the victim).
Common traps to avoid
- Paying. It nearly always escalates.
- Sending “proof” or IDs. These become new leverage points.
- Deleting conversations before exporting. You may lose critical headers and timestamps.
- DIY “entrapment.” Leave operations to law enforcement.
Prevention and digital hygiene (victim-blaming is never the goal)
- Limit account discoverability (friends-only, restricted DMs).
- Use unique passwords + 2FA everywhere.
- Audit connected apps and revoke what you don’t recognize.
- Separate “public” and “private” identities (handles, emails).
- Assume screenshots exist. If you do share intimate content, use ephemeral settings with people you trust, but understand nothing online is fully ephemeral.
- Bank/e-wallet hygiene: disable auto-accept payments when possible; scrutinize new requests.
Simple complaint-affidavit template (for filing)
Republic of the Philippines [City/Province] Office of the City/Provincial Prosecutor
[Your Name], Filipino, of legal age, [civil status], with address at [address], after having been duly sworn, depose and state:
- I am filing this Criminal Complaint for [e.g., Grave Threats under Art. 282 of the RPC in relation to Sec. 6 of RA 10175; Violation of RA 9995; and other related offenses] against [Name/Username/“John Doe”].
- On [date] at around [time], using [platform/app], the respondent sent me messages demanding [money/sexual images/acts] and threatening to [publish/send] my intimate images to [family/friends/employer/public] if I did not comply.
- The threats were sent using ICT and included [exact quotes or summary] (Annex A, screenshots with timestamps and URLs).
- On [dates], respondent used accounts [handles/links] (Annex B, profile links) and attempted/obtained [payment/account access] (Annex C, receipts/headers).
- The images at issue were [taken with/without my consent; if with consent, not consented for distribution]. I did not authorize any copying, selling, or distribution.
- I suffered [anxiety, humiliation, etc.] and incurred [actual expenses, if any].
- I am executing this affidavit to support the filing of appropriate criminal charges and to request issuance of subpoenas and coordination with platforms for takedown and data preservation.
PRAYER: That respondent be prosecuted and penalized under the RPC, RA 10175, RA 9995 [and RA 9262/RA 11930/others, if applicable], and that subpoenas and preservation/takedown orders be issued.
[Signature over Printed Name] Complainant
SUBSCRIBED AND SWORN to before me this [date] at [city].
(Attach your timeline and label annexes clearly.)
Frequently asked questions
What if I already paid? Keep all proof of payment and report immediately. Demand letters and bank/e-wallet reports help investigators trace recipients.
What if the images were originally consensual? Distribution without consent can still be a crime (RA 9995). Consent to take is not consent to share.
They already posted the images. Is it too late? No. Document exact URLs and report for takedown; platforms often block re-uploads via hashing. You can still pursue criminal and civil remedies.
Can I get a court order to stop future posts? Yes. Injunctions/TROs are available in civil court; VAWC Protection Orders can also restrict electronic harassment and contact where applicable.
Do I have to reveal my identity publicly to file? Complaints typically identify the complainant, but prosecutors and courts can protect sensitive evidence and minors. Ask counsel about protective measures and in-camera proceedings.
Final notes
- You are not at fault. Sextortion is the offender’s crime.
- Save first, report fast, and use both criminal and civil tracks where helpful.
- For minors or intimate-partner situations, treat it as urgent and seek Protection Orders and social services early.
If you want, I can turn this into a printable checklist pack (evidence log, timeline sheet, and affidavit template you can fill in).