A practical legal guide for sextortion, “revenge porn,” and intimate-image abuse under Philippine law
1) Understand what’s happening (and why it’s illegal)
Threatening to publish your nude or sexual videos to force you to do something (send money, more content, meet up, continue a relationship, etc.) is typically sextortion—a form of coercion/extortion often committed online.
In the Philippines, several laws can apply depending on the facts:
Anti-Photo and Video Voyeurism Act (RA 9995) Covers recording, copying, selling, distributing, publishing, or showing intimate images/videos without consent, including sharing through chat groups, social media, or websites.
Cybercrime Prevention Act (RA 10175) If the threat, extortion, or distribution is done through computers/phones/internet, the conduct may be treated as a cybercrime or an offense committed through ICT, which can affect how it’s investigated and prosecuted.
Revised Penal Code offenses (depending on facts) Commonly invoked provisions include threats and other coercive acts, and in some cases robbery/extortion-related theories when money or property is demanded.
Violence Against Women and Their Children (VAWC) (RA 9262) If the offender is a current/former husband, boyfriend, partner, or someone you dated/had a sexual relationship with, many sextortion and image-based abuse scenarios can fall under VAWC (psychological violence, threats, harassment), with access to protection orders.
Special rules if a minor is involved If you are below 18, or the video depicts a minor, the case can implicate laws on child sexual abuse and exploitation, with much heavier consequences for the offender. This also changes urgency and reporting options.
Data Privacy Act (RA 10173) (sometimes) Sharing intimate content can also involve unlawful processing/disclosure of sensitive personal information, depending on circumstances.
You don’t need to perfectly “label” the crime. Your job is to protect yourself, preserve evidence, and report. Authorities and prosecutors decide exact charges.
2) First priority: safety and damage control (do this immediately)
A. If you fear physical harm or stalking
- Treat it as an emergency: call 911 or go to the nearest police station.
- Tell a trusted person where you are. Don’t meet the blackmailer alone.
B. Do not pay, do not send more content, do not “prove” anything
Blackmailers often escalate after payment or after receiving additional images. Paying rarely ends it; it often signals you’re willing to pay again.
C. Stop the leak at the source (if you can safely do so)
- Secure accounts: change passwords (email first), enable two-factor authentication, review login sessions, revoke suspicious devices/apps.
- Lock down social media: tighten privacy settings, restrict tagging, set message filters, hide friend lists, limit who can share/mention you.
- Check cloud backups and galleries: remove shared album links, disable automatic sharing, and review who has access to folders.
D. Tell a small “safety circle”
Pick 1–3 trusted people (friend, sibling, partner, colleague). You may need support to document evidence and to stay grounded. This also reduces the blackmailer’s power to isolate you.
3) Preserve evidence correctly (this can make or break the case)
Even if you’re panicking, aim to gather clean, usable proof.
What to capture
Screenshots of:
- The threat messages (include the username/number, date/time, and full conversation context).
- Any demand (money, meet-up, more content).
- Any proof they claim they have (thumbnails, file names, previews).
Screen recording (slowly scroll the chat so timestamps and profile info are visible).
Links/URLs to profiles, posts, channels, or drives where content is/will be shared.
Payment details if they demanded money (GCash numbers, bank accounts, crypto addresses, remittance details).
Caller ID / phone number and any usernames across platforms.
Device info: your phone model, OS version, and the app version (helpful for investigators).
Evidence handling tips
- Don’t edit screenshots. Keep originals.
- Back up evidence in two places (e.g., encrypted folder + external drive).
- If content is already posted, record the date/time, URL, and take screenshots showing the page and account identity.
- If you can, keep a written timeline: when contact started, what was exchanged, when threats began.
4) Consider sending one firm “stop and preserve” message (optional)
Only do this if it doesn’t increase danger.
A short message can help later to show lack of consent and clear notice:
“I do not consent to any recording, possession, or sharing of any intimate images or videos of me. Stop contacting me. Any attempt to share or threaten to share will be reported to law enforcement and will be used as evidence.”
Then stop engaging. Don’t argue. Don’t negotiate. Don’t insult (it can inflame or complicate).
5) Report it in the Philippines: where to go
You can report even if:
- you voluntarily sent the video originally, or
- you never met the person, or
- the offender is abroad.
Common reporting channels
- PNP Anti-Cybercrime Group (ACG) – for online threats, extortion, and image-based abuse.
- NBI Cybercrime Division – for cybercrime complaints and investigative support.
- Local police / Women and Children Protection Desk (WCPD) – especially if VAWC applies or you need immediate protection.
- Prosecutor’s Office (DOJ/City/Provincial Prosecutor) – for filing the criminal complaint.
If you are a woman and the offender is a partner/ex-partner, VAWC (RA 9262) routes can be especially powerful because of protection orders (see below).
6) Protection Orders (huge in partner/ex-partner cases)
If the offender is a current/former intimate partner (including dating relationships), consider VAWC protection orders:
- Barangay Protection Order (BPO): faster, usually for immediate protection at the barangay level.
- Temporary Protection Order (TPO) / Permanent Protection Order (PPO): from the court, with broader restrictions.
These orders can prohibit the offender from contacting you, harassing you, coming near your home/work/school, and may include other protective measures. If violated, that’s an additional offense.
7) Platform takedowns (act quickly, but document first)
If the video is already uploaded or being circulated:
- Document first: screenshots, screen recording, URL, account identifiers, time/date.
- Report the content in-app for non-consensual intimate imagery.
- Ask friends to report (coordinated reporting can speed action).
- If it’s on a website, use the site’s abuse/report channel and keep copies of your submissions.
Even if a takedown happens, keep evidence of the original posting and your report confirmations.
8) What a legal case usually needs (so you can prepare)
You generally need to show:
- Your identity (you are the person depicted, or the target of the threats).
- Lack of consent to share/distribute (even if you consented to record or to send privately, you did not consent to publish).
- The offender’s acts: threats, demands, attempted posting, actual posting, or transmission.
- Connection to the offender (accounts, numbers, payment info, chat logs).
Common complications (and how they’re handled)
- Anonymous accounts: investigators can still pursue leads via platform data, device traces, payment channels, and other identifiers.
- Offender abroad: harder but not hopeless; report anyway because evidence preservation and local leads matter.
- You sent the content: still prosecutable if distribution/threats are without consent. Private sharing is not permission for public exposure.
9) Civil remedies (in addition to criminal)
Apart from criminal prosecution, victims sometimes pursue:
- Civil damages (for emotional distress, reputational harm, etc.).
- Injunction-type relief (court orders to stop harassment or further dissemination), depending on available remedies and posture of the case.
- Work/school administrative remedies if the offender is within an institution (HR/student discipline), especially where harassment policies exist.
A lawyer can advise on strategy: criminal only, civil only, or parallel actions.
10) If you are a minor (or the video involves a minor)
Treat it as urgent. Do not handle it alone.
- Tell a parent/guardian or a trusted adult immediately.
- Report to police/NBI promptly.
- Many jurisdictions and platforms fast-track child sexual exploitation reports.
- The offender’s penalties and investigative priority are typically much higher.
11) Trauma-informed advice (practical, not legal—but essential)
- It’s not your fault. The wrongdoing is the threat and non-consensual sharing, not your sexuality.
- Don’t doomscroll for reposts; assign a trusted friend to help monitor/report if needed.
- If you’re overwhelmed, consider counseling or crisis support through local services or trusted clinicians. Stress reactions (panic, insomnia, shame spirals) are common and treatable.
12) Quick action checklist (printable mindset)
Within the next hour
- Ensure physical safety; call 911 if needed
- Stop engaging; do not pay; do not send more
- Screenshot + screen-record threats/demands
- Secure email + enable 2FA; change passwords
- Tell a trusted person
Within 24 hours
- Compile timeline and evidence folder
- Report to PNP ACG / NBI Cybercrime
- If partner/ex-partner: consider VAWC + protection order
- If posted: document then request takedown
Within the week
- File complaint affidavit with prosecutor (with evidence)
- Explore legal representation and support services
- Set long-term account security and privacy controls
13) What not to do
- Don’t meet the blackmailer to “settle.”
- Don’t send IDs, selfies, or “verification” shots (often used for further extortion).
- Don’t publicly expose the blackmailer if it risks escalation or doxxing.
- Don’t destroy your device or delete your chats—those can be key evidence. If you must block, preserve evidence first.
14) When to get a lawyer immediately
- The offender is a partner/ex-partner and you want protection orders.
- The offender is demanding money or escalating to family/work contacts.
- The video is spreading to multiple platforms.
- You are a minor, or you suspect the offender is targeting minors.
- You fear physical harm or stalking.
If you want, paste (redacting names/links) the exact wording of the threat and the relationship to the offender (stranger vs ex/partner vs acquaintance), and I can map it to the most likely legal pathways (RA 9995, RA 10175, VAWC, threats/extortion) and a step-by-step filing plan that fits that scenario.