Sextortion Using Nude Photos: How to Report to the NBI and Stop Blackmail (Philippines)

Sextortion Using Nude Photos in the Philippines: How to Report to the NBI and Stop the Blackmail

This guide is Philippine-specific. It gives you the immediate steps to protect yourself, explains the laws that apply, and shows exactly how to report to the National Bureau of Investigation (NBI). It’s general information, not a substitute for advice from a lawyer or law-enforcement officer.


TL;DR — Do this now

  1. Don’t pay. Paying almost always leads to more demands.
  2. Preserve evidence. Screenshot full screens (with URL, username, date/time), export chat logs, save links, bank/e-wallet receipts, phone numbers, and account handles. Keep original files.
  3. Limit engagement. One short message is fine (e.g., “What you’re doing is illegal. I have reported this to authorities. Do not contact me again.”). Then stop replying.
  4. Secure your accounts. Change passwords, enable 2FA, check recovery emails/phones, revoke suspicious app access.
  5. Report to NBI Cybercrime (step-by-step below). You can also report to the platform (Facebook/Instagram/TikTok/X, etc.) for takedown.
  6. If you already sent money, immediately file a dispute with your bank/e-wallet and include the NBI complaint reference when available.
  7. If the victim is a child (under 18), treat it as child sexual abuse/exploitation—report immediately. Possession and sharing of any sexual image of a minor is illegal, even by the minor themself.

What counts as “sextortion” here?

Sextortion is when someone threatens to share your nude/sexual photos or videos unless you pay money, send more images, or do something against your will. Whether the images were taken with or without your consent, the following acts are crimes under Philippine law:

  • Unauthorized sharing or threatened sharing of intimate images/video (“revenge porn”/voyeurism).
  • Threats and demands for money or favors (blackmail/extortion).
  • Online sexual harassment (persistent sexual threats, doxxing with sexual content).
  • If the victim is a minor: online sexual abuse/exploitation and child sexual abuse material (CSAM)—strictly prohibited.

The Philippine laws that usually apply

(You don’t need to know the citations to file a case, but they help you recognize your rights.)

  • Anti-Photo and Video Voyeurism Act (R.A. 9995). Prohibits taking, copying, sharing, or publishing nude/sexual images or videos without written consent of the person/s depicted—even if the images were originally taken with consent. It also penalizes anyone who “exhibits” or “distributes” such content and protects the victim’s identity from disclosure.

  • Cybercrime Prevention Act (R.A. 10175). Makes crimes committed through computers/phones/online platforms punishable as cyber offenses. Authorities can seek cybercrime warrants to disclose, preserve, search, seize, or intercept computer data. Fast reporting helps investigators issue data preservation orders (service providers must keep traffic/subscriber data for a limited time).

  • Revised Penal Code (RPC):

    • Grave threats/light threats (blackmail) for coercing payment or acts under threat of releasing your images.
    • Grave coercion if you’re forced to do something against your will (e.g., send more images, meet up).
  • Safe Spaces Act (R.A. 11313). Penalizes gender-based online sexual harassment: stalking, unwanted sexual messages, nonconsensual sharing of sexual content, and similar conduct via ICT.

  • Violence Against Women and Their Children (VAWC) Act (R.A. 9262). If the offender is a current/ex-partner and the victim is a woman (or her child), online threats and harassment can constitute psychological violence. This allows protection orders (Barangay/Temporary/ Permanent).

  • If the victim is a child (<18): data-preserve-html-node="true"

    • Anti-OSAEC/Anti-CSAM Act (R.A. 11930) and Anti-Child Pornography Act (R.A. 9775) strictly criminalize creating, possessing, or distributing sexual images of children. Consent is not a defense. Specialized procedures and protective measures apply.
  • Data Privacy Act (R.A. 10173). You may also assert privacy rights (e.g., request deletion/cessation of processing) against local entities that store or misuse your images, without prejudice to criminal cases.


How to report to the NBI (step-by-step)

You can file in person at any NBI office (ask for the Cybercrime Division) or online via the NBI’s e-complaint portal (if available to you). If you’re in immediate danger, call 911 or go to the nearest police station first.

1) Prepare your evidence package

Create a folder (digital + printed, if possible) containing:

  • Screenshots of chats, threats, profile pages, and posts. Capture the entire screen with timestamp, URL, and username/handle visible.
  • Original files: the actual photos/videos sent to you, the threats, exported chat logs (e.g., Facebook “Download your information,” WhatsApp chat export), audio notes.
  • Links to profiles, posts, groups, or cloud folders.
  • Identifiers of the offender: usernames, phone numbers, email addresses, e-wallet IDs, bank account names/numbers, device IMEI/serial if known.
  • Payment proof if money was sent: transaction IDs, receipts, screenshots.
  • Your statement: a timeline (when you met, when images were created/sent, when threats started, what was demanded, what you did). Keep it factual.

Tip: Don’t crop/annotate your only copy. Keep originals intact to preserve metadata. Make a separate “redacted” set for sharing with non-authorities.

2) Draft your Affidavit of Complaint

Bring a valid ID. The NBI can guide you through the affidavit. It should include:

  • Your identity and contact details (you can request confidentiality; R.A. 9995 discourages publishing a victim’s identity).
  • The offending acts and when/where they happened.
  • The platforms/systems used (apps, phone numbers, URLs).
  • Any money demanded or paid.
  • What laws you believe were violated (the NBI/prosecutor will finalize the legal characterization).

You’ll sign it under oath (either before a notary or the receiving officer authorized to administer oaths).

3) File with the NBI Cybercrime Division

  • Submit the affidavit and evidence (preferably on a USB/drive with a printed index).
  • Ask the receiving officer for your reference number and contact person.
  • If images are already posted online, request assistance with takedown coordination and a data preservation order so platforms keep logs and subscriber info.

4) What happens next

  • Case evaluation & forensics. Investigators review your materials, may image devices (with consent) and issue letters/subpoenas to platforms, telcos, banks, or e-wallets.
  • Preservation & disclosure. Authorities can seek orders/warrants to preserve and later disclose subscriber and traffic data linked to the offender accounts.
  • Operations. Depending on the case, they may conduct entrapment or coordinate with foreign counterparts (many sextortion groups are overseas).
  • Filing with the Prosecutor. The NBI submits a complaint for inquest (if there’s an arrest) or preliminary investigation. You’ll be notified of next steps.

You can also report to the PNP Anti-Cybercrime Group (ACG) and, for women/children cases, the WCPD (Women and Children Protection Desk). Parallel reports can help, but keep your case numbers organized.


How to stop the blackmail (practical playbook)

A) Control communication

  • Don’t negotiate or pay. It’s rarely the end.
  • One calm message (optional) asserting illegality and your intent to report is fine. Do not send more images or personal details.
  • Stop replying after you’ve captured the evidence. Block/mute across platforms.

B) Lock down your digital life

  • Change passwords everywhere (email first), enable 2FA (authenticator app preferred).
  • Check recovery options (email/phone) and remove unknown devices/sessions from account security pages.
  • Revoke app permissions you don’t recognize.
  • Scan devices for malware; update OS and apps.
  • Review privacy settings—limit who can DM you or view your friends list.

C) Takedown & reporting to platforms

  • Use the in-app report for non-consensual intimate imagery (NCII) or “sharing private images without consent.”
  • Submit the original image files if the platform’s NCII tool asks (this lets them match and block re-uploads using hashing).
  • If posts appear on public sites, file a removal request with the site host and search engines. Keep copies of all reports and responses.

D) If money is already sent

  • Immediately contact your bank/e-wallet to dispute or request reversal/chargeback, and freeze suspicious transfers where possible.
  • Provide your NBI complaint reference once issued.

E) Safety & support

  • Tell a trusted friend/family member.
  • If the offender mentions your school or employer, proactively inform the relevant office that you’re the victim of a crime and that authorities are involved.
  • Consider professional counseling; sextortion is traumatizing.

Special situations

  • Victim is a minor (under 18): Stop all sharing of the image (even to friends). Report immediately. Child sexual abuse/exploitation laws apply, with stronger penalties and specialized victim protection. Parents/guardians/teachers can file.

  • Offender is/was your partner (and you’re a woman or the child): You can pursue a VAWC case and seek Protection Orders (Barangay, Temporary, or Permanent) to stop contact, harassment, and further threats. This is in addition to cybercrime/vooyeurism charges.

  • Images taken without your knowledge (hidden cam/spy shots/upskirting): Squarely covered by R.A. 9995 and also the Safe Spaces Act (online harassment). Report the device/location details if known.

  • Offender is overseas / unknown identity: Still report. NBI can request preservation/disclosure from platforms and coordinate internationally. Your evidence and early report are crucial.

  • Offender is a minor: Cases proceed under the Juvenile Justice and Welfare Act; authorities will still act, but procedures and sanctions differ.


Frequently asked questions

Will the NBI keep my identity private? NBI follows victim-sensitive procedures. Laws like R.A. 9995 discourage disclosure of a victim’s identity. Ask the receiving officer about confidentiality in filings.

Do I need a lawyer? Not required to file with the NBI, but legal counsel is helpful—especially for pursuing civil damages or protection orders. If you can’t afford one, inquire with the Public Attorney’s Office (PAO) or local legal aid groups.

Is barangay mediation required? Criminal sextortion/cybercrime cases generally don’t go through barangay conciliation. File directly with law enforcement/prosecutors.

What if the images were consensual? Sharing or threatening to share them without your written consent is still a crime. Consent to take ≠ consent to distribute.

Can I post their threats publicly to “expose” them? Avoid posting; it can complicate evidence, risk defamation, and worsen the situation. Let authorities handle it.


Handy checklists

Evidence checklist

  • Full-screen screenshots with dates/times and URLs
  • Exported chat logs (Messenger/WhatsApp/Telegram/etc.)
  • Offender handles, phone numbers, emails
  • Links to posts/profiles/folders
  • Payment proofs (receipts, reference numbers)
  • Your timeline narrative
  • Copy of your valid ID

Security checklist

  • New passwords + 2FA
  • Remove unknown devices/sessions
  • Revoke shady app permissions
  • Update OS/apps and scan for malware
  • Tighten privacy settings on social media

Template: short message to the extorter (optional)

“I know what you are doing is illegal under Philippine law. I have preserved all evidence and reported this to law enforcement. Do not contact me again.”

(Then stop replying, block/mute after you’ve captured everything.)


Civil remedies (in addition to criminal cases)

  • Damages under the Civil Code (moral, exemplary, actual).
  • Injunctions to restrain further dissemination.
  • Writ of Habeas Data to compel deletion or stop processing of your images when appropriate.

Final notes

  • Speed matters. The sooner you report, the easier it is for authorities to issue preservation requests and obtain subscriber/traffic data from platforms and telcos.
  • Be kind to yourself. Sextortion is a crime. You are not to blame for a criminal’s acts.
  • If you want, I can help you structure your affidavit or turn your screenshots into an indexed evidence list ready for submission.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.