Sextortion in the Philippines: How to Report, Preserve Evidence, and Stop the Spread

Sextortion in the Philippines: How to Report, Preserve Evidence, and Stop the Spread

This guide is for general information only and isn’t a substitute for advice from a Philippine lawyer or law-enforcement officer.


Quick help—what to do right now

  1. Stop engaging. Don’t negotiate, don’t pay, and don’t threaten back.
  2. Preserve everything. Screenshot and screen-record chats, profiles, video thumbnails, payment requests, and URLs. Don’t delete messages.
  3. Secure your accounts. Change passwords, enable two-factor authentication, and check login history across your social, email, and e-wallets (e.g., GCash, Maya).
  4. Report it. File a report with PNP Anti-Cybercrime Group (ACG) or NBI Cybercrime Division, and to the platform (Facebook, Instagram, TikTok, X, etc.).
  5. Stop the spread. Use the platform’s “non-consensual intimate image” (NCII) reporting tools and global hash-matching takedown services (e.g., StopNCII.org; for minors, NCMEC CyberTipline).
  6. If a child is involved: Treat it as online sexual abuse/exploitation of children (OSAEC). Report to PNP/NBI and notify DSWD or school officials. Do not share the material with anyone (even for proof).
  7. If you already paid: Keep receipts and reference numbers. Immediately request a recall/chargeback from your bank or e-wallet support and include your police/NBI case number once you have it.

What counts as sextortion?

Sextortion is when someone threatens to publish or share intimate images, videos, or chats unless you pay money, send more sexual content, or perform sexual acts. It often happens after social-media befriending, flirting, or video calls (sometimes with deepfake or recorded content), then escalates into timed threats and mass-send intimidation (“I’ll send this to your family list”).

Sextortion can target adults or children. If the victim is under 18, it is treated as OSAEC/child sexual abuse material—a separate, more serious set of crimes with mandatory reporting and wider duties on platforms and service providers.


Legal toolkit (Philippine context)

Several laws may apply, often in combination:

  • Cybercrime Prevention Act (RA 10175).

    • Covers crimes committed through computer systems.
    • Increases penalties by one degree for Revised Penal Code (RPC) crimes (e.g., grave threats, coercion, estafa, libel) when done through ICT.
    • Provides extraterritorial application in defined scenarios (e.g., when an act uses a computer system in the Philippines or causes harm to persons here).
    • Authorizes preservation of electronic evidence and cooperation through the DOJ Office of Cybercrime.
  • Anti-Photo and Video Voyeurism Act (RA 9995).

    • Penalizes taking, copying, selling, or distributing images/videos of a person’s private parts or sexual acts without consent, including online posting and sharing.
    • Applies even if the sexual act originally occurred with consent; distribution without consent is criminal.
  • Gender-Based Sexual Harassment (Safe Spaces Act, RA 11313).

    • Penalizes gender-based online sexual harassment, including sending lewd remarks, threats to publish intimate content, and similar behavior in cyberspace.
    • Schools, workplaces, and online platforms have duties to adopt policies and act on complaints.
  • Violence Against Women and their Children (RA 9262).

    • If the perpetrator is a spouse, ex-partner, dating partner, or has a common child with the victim (woman/child), threats to expose intimate material may be psychological violence.
    • Victims can seek Barangay/Temporary/Protection Orders.
  • OSAEC / Anti-Child Sexual Abuse or Exploitation Materials Act (RA 11930) and Anti-Child Pornography Act (RA 9775).

    • For victims under 18, mere possession, production, distribution, livestreaming, grooming, or solicitation are serious offenses.
    • Imposes duties on internet intermediaries and electronic service providers to prevent, detect, preserve, and report such content.
  • Other relevant RPC offenses:

    • Grave threats / light threats, grave coercions, unjust vexation, libel, estafa, robbery/extortion by intimidation—often in relation to RA 10175 if done online.
  • Data Privacy Act (RA 10173).

    • Non-consensual processing of intimate personal data can be actionable; the National Privacy Commission (NPC) can receive complaints and order corrective action (e.g., deletion, breach notifications).
  • Anti-Wiretapping Act (RA 4200).

    • Do not secretly record voice calls without consent or court authorization. (Chats, emails, and screenshots of on-screen content are generally okay to preserve; ask counsel if unsure.)
  • Rules on Electronic Evidence (A.M. No. 01-7-01-SC).

    • Recognize electronic documents, logs, and printouts; emphasize authenticity, integrity, and reliability in how you collect and present them.

Where and how to report

1) Law enforcement

  • PNP Anti-Cybercrime Group (ACG) – for criminal complaints, forensic assistance, and coordination with platforms.
  • NBI Cybercrime Division – similar mandate; you can report to either agency.

Bring (or be ready to submit electronically):

  • Valid ID.
  • Complaint-Affidavit (see template below).
  • Evidence bundle (see “Preserving evidence”): screenshots, screen recordings, URLs, account handles, phone numbers, email addresses, payment instructions, e-wallet references, transaction receipts, and your narrative timeline.
  • If the victim is a minor, say so explicitly so it’s tagged as OSAEC.

2) Prosecutor’s Office

You can proceed via police/NBI first or directly to the City/Provincial Prosecutor with a Complaint-Affidavit and annexes. The prosecutor may issue subpoenas and conduct inquest/preliminary investigation.

3) Platform reporting

Use each platform’s NCII / sexual exploitation reporting pathways. Request content removal, account suspension, and preservation of logs/metadata for law enforcement.

4) For children (under 18)

In addition to PNP/NBI:

  • Notify DSWD (for child protection and psychosocial support).
  • Inform the school (if relevant) under duties imposed by the Safe Spaces Act and child-protection policies.
  • Consider filing a report with NCMEC CyberTipline (accepted globally and routed to authorities; do not upload the images yourself if you can avoid it—use the reporting flow).

Preserving evidence (step-by-step)

Goal: Capture content + context + source + timing while keeping integrity.

  1. Freeze the scene (but don’t tip off the offender).

    • Turn off “vanish”/disappearing modes if you control them.
    • Avoid deleting chats. Disable auto-delete in apps that support it.
  2. Take full-frame screenshots of:

    • Entire chat threads (include date/time stamps; scroll slowly and capture in sequence).
    • Profiles (username/handle, bio, user ID if shown), profile URLs, and any alternate accounts used.
    • Payment requests (QR codes, wallet names, reference numbers).
    • Threat messages (“I’ll send to your family… pay by 4pm”), including timestamps.
  3. Screen-record short clips (10–60 seconds) showing:

    • The offender’s profile → message thread → the threat → the payment details, in one continuous take.
    • If a video call was involved, record the call history log page rather than re-playing content that may violate other laws.
  4. Export chats when possible:

    • Messenger/Instagram: “Download Your Information.”
    • WhatsApp/Viber/Telegram: “Export chat” (include media if storage allows).
    • Keep the ZIP or JSON files unedited.
  5. Capture URLs and IDs.

    • Copy profile links, post URLs, message links, and any content IDs or report IDs given by the platform after you report.
  6. Save transaction records.

    • Bank/e-wallet screenshots and PDFs with reference numbers.
    • If you requested a recall/chargeback, save the ticket number.
  7. Create an evidence log (simple text file):

    • YYYY-MM-DD hh:mm — What happened, where (app), who (handle), what you captured (IMG_1234.png), and the URL.
    • This helps show sequence and supports chain of custody.
  8. Maintain integrity:

    • Keep the original device and files. Don’t edit crops (save edited copies separately).
    • If you can, generate file hashes (e.g., SHA-256) and include them in your log—helpful but not mandatory.
  9. Back up securely:

    • Store one copy offline (USB) and another in a locked cloud folder.
    • Share access only with investigators/lawyers.

Avoid:

  • Secretly recording voice calls (RA 4200 risk).
  • Forwarding or re-uploading intimate images (could be illegal distribution).
  • Sending images to friends “for advice.” Use descriptions instead.

Stopping the spread

  1. Use platform NCII tools.

    • Report under “Non-consensual intimate images” or “sexual exploitation.”
    • Request takedown and account suspension. Note the report/ticket number.
  2. Hash-matching takedowns:

    • StopNCII.org (for adults) creates a hash of your image and shares the hash with participating platforms to block matching uploads—the image itself isn’t uploaded.
    • For minors, use a child-safety reporting pathway (e.g., CyberTipline) and law enforcement. Do not circulate any image.
  3. Search-engine delisting:

    • File a right-to-remove request for search results displaying NCII or OSAEC. Keep the request IDs.
  4. Contact site hosts/admins:

    • Many forums or adult sites have abuse addresses. Send a short notice-and-takedown (template below) citing Philippine NCII/OSAEC laws and platform policies.
  5. Data Privacy complaint:

    • If a Philippine-based entity processes/hosts your intimate personal data without lawful basis, you can complain to the National Privacy Commission (NPC) seeking deletion and compliance orders.
  6. Civil remedies & protective orders:

    • If the offender is known (especially a current/ex-partner), consider Protection Orders under RA 9262 (for women/children).
    • Civil actions for damages and injunctions may complement criminal cases.

If the offender is overseas or anonymous

  • Still report. RA 10175 allows limited extraterritorial reach; PNP/NBI, through DOJ Office of Cybercrime, can request cooperation from foreign counterparts and platforms.
  • Provide platform IDs, URLs, payment trails, and any IP/location hints from your exports.
  • Even if identity remains unknown, platform takedowns and hash-blocking can still work.

Special considerations for children and families

  • Treat any incident involving a minor as OSAEC.
  • Do not view or share the material more than strictly necessary; never upload it.
  • Seek psychosocial support; schools are required to act under their child-protection policies and the Safe Spaces Act.
  • Parents/guardians should handle reporting, keep devices secure, and avoid victim-blaming.
  • If the offender is a teacher/coach/school staff, RA 11313 and child-protection rules impose additional duties on the institution.

Working with banks and e-wallets

  • File a dispute/chargeback/recall immediately with the reference number, date/time, recipient name/number, and your police/NBI case number once issued.
  • Keep call/chat logs with the financial provider as evidence.
  • If you used cash-in agents, photograph receipts and the agent’s details.

What not to do

  • Don’t pay. Payment nearly always invites further demands.
  • Don’t do vigilante “stings.” You may compromise evidence or commit offenses yourself.
  • Don’t mass-announce on social media. You could face defamation risks, tip off the offender, or spread the content.
  • Don’t delete the chat. Investigators need the original thread.

Mental health and support

Sextortion is traumatic. Consider confidential counseling, speak with a trusted friend or family member, and allow yourself to step back from apps for a while. If school or work is affected, ask for reasonable accommodations (e.g., deadline extensions, schedule changes). Documentation from law enforcement or a counselor can help.


Templates (copy, then customize)

A) Complaint-Affidavit (criminal)

REPUBLIC OF THE PHILIPPINES [City/Province] COMPLAINT-AFFIDAVIT

I, [Full Name], Filipino, of legal age, with address at [Address], after having been duly sworn, depose and state:

  1. I am the victim of sextortion committed by [Name/Unknown, a.k.a. @handle/URL] using [platform/app].
  2. On [date/time], the respondent threatened to publish my intimate images/videos unless I [paid ₱… / sent more images / performed acts].
  3. The threats and demands were made through [describe chat/call]. Screenshots and exports are attached as Annexes “A” to “__” with a timeline in Annex “T”.
  4. Payment instructions were [e-wallet/bank, account name/number, ref. nos.] (Annex “P”).
  5. I did/did not pay [amount]. If paid, proof is Annex “R”.
  6. I respectfully charge the respondent with violations of RA 10175 (Cybercrime) in relation to [grave threats / coercion / libel / estafa under the RPC], RA 9995 (Anti-Photo and Video Voyeurism), RA 11313 (Safe Spaces Act); and if a child is involved, RA 11930 / RA 9775 and related laws.
  7. I request issuance of subpoenas, preservation orders to the platform, and further investigation.

[Signature over printed name] Affiant

SUBSCRIBED AND SWORN to before me this [date] at [City].

B) Evidence Preservation / Takedown Notice (to platform/site/host)

Subject: Urgent NCII/OSAEC Notice and Takedown – [Your Name / Case Ref] I am requesting immediate removal and preservation of evidence regarding non-consensual intimate images / child sexual exploitation content at: • URLs: [paste full URLs] • Account/handle: [@handle / profile link] • Date/time first observed: [PHT] The content violates your policies and Philippine law (RA 9995, RA 11313; for minors, RA 11930/RA 9775). Please: (1) remove/disable access to the content; (2) preserve logs and metadata (including IPs and access records) for law enforcement; (3) confirm case/ticket ID. I have filed a report with [PNP-ACG/NBI] under case [number, if available]. [Your Name, contact, ID scan if requested by platform]

C) Data Privacy Complaint (NPC)

Subject: Unlawful Processing of Sensitive Personal Information (NCII) – [Your Name] I request NPC action against [entity/person, if covered] for processing and sharing my intimate personal data without consent or other lawful basis in violation of the Data Privacy Act (RA 10173). Facts: [short timeline] Harm: [threats, reputational harm, anxiety, etc.] Relief sought: Order to delete/disable access, notify third parties, and adopt safeguards; administrative penalties as appropriate. Attachments: Evidence bundle index, screenshots/exports, and platform ticket IDs.


Practical Q&A

Q: The person says they already sent my video to 50 friends. A: Often a bluff. Don’t panic or pay. Report urgently, use NCII tools/hash-blocking, and alert law enforcement. If any friend actually receives it, ask them not to forward, and to report and delete.

Q: Can I get in trouble if I send the police the images? A: Send screenshots of the threats and links. For child imagery, follow police guidance—do not distribute files further. Investigators have secure channels.

Q: The offender is a former partner who had consensual images. A: Distribution without consent is criminal under RA 9995, regardless of how the images were obtained.

Q: How fast can platforms remove content? A: It varies. Give exact URLs, account IDs, and select the NCII/OSAEC category to speed up review. Hash-blocking helps prevent re-uploads.


Prevention: tighten your digital footprint

  • Lock down privacy on socials; remove public friend lists and tagged-photo visibility.
  • Restrict video calls to trusted contacts; cover your webcam when not in use.
  • Use unique passwords and 2FA, especially for email (the recovery “master key”).
  • Teach minors to avoid moving conversations to private apps right away and to verify identities; normalize asking for help early.

Final notes

  • You do not have to handle this alone. Reporting early improves outcomes.
  • Keep your evidence log tidy; it greatly helps investigators and prosecutors.
  • If you’re unsure about any step (especially around recording calls or handling child material), pause and ask a lawyer or officer before proceeding.

If you want, tell me: (1) the app(s) involved, (2) what evidence you already saved, and (3) whether the victim is an adult or a minor. I can tailor a short action plan and refine the templates for your exact situation.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.