How to File a Cybercrime Complaint (Philippine Legal Article)
Introduction
A growing form of cyber-enabled abuse involves a perpetrator luring a person into a video call (often via social media, dating apps, messaging platforms, or “random chat” sites), recording intimate content (nudity, sexual acts, or compromising moments), then threatening to leak it unless the victim pays money, sends more explicit material, or complies with further demands. This is commonly called sextortion—a blend of sexual exploitation and extortion—though Philippine law addresses it through multiple statutes (not always under a single label).
This article explains (1) how Philippine laws can apply, (2) what evidence to preserve, (3) where and how to file a complaint, and (4) what to expect after reporting—especially when the blackmailer is anonymous or overseas.
Note: This is general legal information in the Philippine context, not individualized legal advice.
1) What Counts as “Recorded Video Call Blackmail” (Sextortion)
Typical pattern
- Contact & grooming: The perpetrator builds rapport quickly, requests a video call, or pushes sexual conversation.
- Capture: The perpetrator records the call (sometimes with screen-recording software) or tricks the victim into showing explicit content.
- Threat: “Pay/send more or I’ll send this to your family/employer” or “I’ll post it publicly.”
- Escalation: Even if the victim pays, demands often continue (because the perpetrator now knows the victim is willing to comply).
Demands can be:
- Money (bank transfer, e-wallet, crypto, remittance)
- More explicit photos/videos or continued video calls
- Personal info (address, workplace)
- Control-based compliance (e.g., “do this or I’ll leak it”)
2) Key Philippine Laws That May Apply
Sextortion cases rarely rely on just one law. Investigators and prosecutors often combine Revised Penal Code (RPC) offenses with special laws, with higher penalties if committed through information and communications technology (ICT).
A. Revised Penal Code (as “cyber-enabled” via RA 10175)
Depending on the facts, prosecutors may consider:
1) Grave Threats / Light Threats (Threatening a crime or injury)
- If the blackmailer threatens to cause harm (including reputational harm), expose intimate content, or commit another wrongdoing unless the victim pays or complies, threat-related provisions may apply.
2) Robbery by intimidation / Attempted robbery (Extortion-like taking)
- When the demand is money or property through intimidation, the conduct can be treated as robbery by intimidation (or attempted, if not completed). In practice, “extortion” is frequently charged through intimidation-based offenses.
3) Coercion / Unjust Vexation
- When the perpetrator compels an act against the victim’s will (e.g., forcing more explicit content) or harasses in a way that seriously disturbs peace of mind.
4) Libel / Slander-type offenses (if defamatory publication occurs)
- If the perpetrator actually publishes accompanying defamatory statements (not just the video), additional charges may be explored.
B. Cybercrime Prevention Act of 2012 (RA 10175)
RA 10175 matters in two major ways:
1) “Penalty one degree higher” rule (Section 6)
- If an offense under the RPC is committed through ICT (online messaging, social media, email, etc.), the penalty is generally one degree higher than the base offense.
2) Cybercrime procedures
- RA 10175 provides tools for investigators and prosecutors to lawfully obtain or preserve electronic evidence (e.g., preservation requests/orders, production orders, and cybercrime warrants under specific categories).
C. Anti-Photo and Video Voyeurism Act (RA 9995)
RA 9995 can apply when:
- A private sexual act or intimate parts are recorded or captured under circumstances where the person has a reasonable expectation of privacy, and/or
- The content is shared, published, transmitted, or broadcast without consent.
Even if the victim voluntarily joined a video call, non-consensual recording and especially non-consensual distribution can still trigger liability depending on the circumstances and proof of consent for recording/sharing.
D. Data Privacy Act of 2012 (RA 10173)
If the perpetrator processes or discloses personal information (especially sensitive personal information—e.g., content reflecting sexual life, identity details, contact lists) without lawful basis, Data Privacy Act provisions may be invoked. This tends to be fact-sensitive and is often used alongside other charges.
E. Anti-Wiretapping Act (RA 4200) (Possible, fact-specific)
Recording the audio of private communication without consent may implicate RA 4200. Its application can be technical and depends on who recorded, whether consent existed, and how courts interpret the scenario. In many sextortion cases, investigators prioritize RA 9995 + RPC/RA 10175, but RA 4200 can be evaluated by counsel based on facts.
F. Special situations with stronger laws
1) If the victim is a minor:
- Anti-Child Pornography Act (RA 9775) and related protections may apply; penalties can be severe.
- Reporting should be urgent and handled with child-protection protocols.
2) If the perpetrator is a spouse/intimate partner (or there’s a dating relationship):
- VAWC (RA 9262) may apply (psychological violence, threats, harassment, and abuse using humiliation or intimidation). This can unlock protection orders and faster intervention.
3) Common Legal Theories Prosecutors Use in Practice
A complaint may be framed in combinations like:
- Grave threats + (Section 6) RA 10175 (higher penalty due to ICT use)
- Robbery by intimidation/attempted robbery + RA 10175 Section 6 (if money demanded)
- RA 9995 (voyeurism) + threats/coercion (if recorded and threatened to distribute, or actually distributed)
- RA 9262 (VAWC) if there’s an intimate relationship context
- RA 9775 if the victim is a minor
You do not need to perfectly “label” the crime yourself. Your job is to present facts and evidence. Investigators and prosecutors determine final charges.
4) Evidence Preservation: What to Do Immediately (Before Filing)
A. Do these right away
- Stop engaging or minimize contact; do not negotiate more than needed to preserve evidence.
- Do not send more content. Each new item increases leverage.
- Do not pay if you can avoid it. Payment often leads to more demands (not less).
- Preserve everything in original form.
B. Preserve electronic evidence properly
Create a folder (cloud + offline backup) containing:
1) Identity and account details
- Profile URLs/usernames/handles
- Phone numbers, emails used
- Screenshots of profiles, bios, display names, photos
- Any “payment accounts” given (GCash number, bank account, crypto address)
2) Threats and demands
Full chat logs (screenshots + exported chats if the app allows)
Screenshots showing:
- the threat
- the demand amount
- the deadline
- threats to send to family/workplace
Include timestamps and message headers when possible
3) The recorded content (if you have it)
- If they sent you a clip as “proof,” save it.
- Do not edit the file. Keep the original.
4) Video call details
- Date/time of the call
- Platform used
- Any call logs showing the session occurred
5) Payment trail (if any)
- Receipts, transaction IDs, screenshots
- Names linked to bank/e-wallet accounts (if shown)
- Remittance reference numbers
6) Your witness/support evidence
- Names of people who received threats/leaks
- Screenshots if anything was sent to friends/family
C. Write a short timeline (very helpful)
Make a one-page timeline:
- When contact started
- When the video call happened
- When threats started
- What was demanded and when
- Whether any leak occurred
This becomes the backbone of your affidavit.
5) Where to File in the Philippines
You can start with law enforcement cyber units for technical handling and guidance, and/or file directly with the Prosecutor’s Office for criminal prosecution.
A. Primary reporting channels
1) PNP Anti-Cybercrime Group (PNP-ACG)
- Accepts complaints involving online threats, sextortion, account-based crimes, and evidence preservation.
2) NBI Cybercrime Division
- Handles cybercrime investigations and can assist with digital evidence and coordination.
3) DOJ Office of Cybercrime (DOJ-OOC)
- Focuses on cybercrime legal processes, cybercrime warrants, and coordination (often working with prosecutors and investigators).
B. Filing for prosecution
Office of the City Prosecutor / Provincial Prosecutor
- This is where your complaint-affidavit is filed for preliminary investigation (or inquest, in certain situations).
In many cases, victims first go to PNP-ACG or NBI to help organize evidence and identify the correct charges and venue, then proceed to the Prosecutor.
6) Step-by-Step: How to File a Cybercrime Complaint (Practical Guide)
Step 1: Prepare your evidence packet
Bring:
- Printed screenshots (arranged chronologically)
- Soft copies on a USB drive (if possible)
- Copies of videos/files (unaltered originals if available)
- Payment receipts (if any)
- A printed timeline
- A government-issued ID
Step 2: Draft a Complaint-Affidavit (sworn statement)
Your Complaint-Affidavit typically includes:
- Your personal details and contact info
- The suspect’s identifiers (even if unknown: usernames, links, numbers)
- A chronological narration of events
- The exact threats/demands (quote the messages)
- The harm/risk (fear, distress, reputational risk, workplace/family threats)
- A list of attached evidence (screenshots, files, receipts)
- A request for investigation and prosecution
If you need help drafting, law enforcement cyber units or a lawyer can assist. If you can’t afford private counsel, consider PAO (eligibility rules apply), IBP legal aid, or law school legal clinics.
Step 3: Execute the affidavit (swear to it)
You will sign it under oath before:
- A prosecutor’s office (if they administer oaths), or
- A notary public
Step 4: File with the appropriate office
Common routes:
- Route A (often easiest): PNP-ACG / NBI Cybercrime → they help evaluate, document, and refer/endorse → file at Prosecutor
- Route B: File directly at Prosecutor’s Office (with complete affidavit + attachments)
Step 5: Cooperate with investigative requests
You may be asked to:
- Provide device access for forensic extraction (ensure you receive documentation/acknowledgment)
- Clarify details in a supplemental affidavit
- Identify recipients if the perpetrator sent content to others
Step 6: Consider takedown/reporting actions (parallel track)
Separately from criminal filing:
- Report the account and content to the platform (social media/app).
- If content is posted publicly, report URLs promptly. This does not replace criminal action but can limit spread.
7) Venue and Jurisdiction Notes (Why Your Location Still Matters)
Even if the perpetrator is overseas, you can generally still file in the Philippines if:
- You are in the Philippines and received threats here, and/or
- The harm/effects are felt here, and/or
- The electronic communications were accessed here
Cyber-enabled crimes often allow broader consideration of where elements occurred. Your affidavit should state where you were physically located when you received the threats and where the harm is occurring (e.g., family/workplace in the Philippines).
8) What Happens After Filing (Process Overview)
A. Preliminary Investigation (most common)
- You file the complaint and evidence.
- The respondent may be required to submit a counter-affidavit (if identified/served).
- The prosecutor evaluates probable cause.
- If probable cause exists, an information is filed in court.
B. Evidence and cybercrime warrants
When investigators need to compel access to data (subscriber info, logs, stored content), they often rely on court-issued processes (depending on the data type and legal standards). This is why preserving evidence early—and identifying platforms/accounts—helps.
9) If You Paid Already: You Can Still File
Victims often pay once out of panic. That does not bar a complaint. If you paid:
- Preserve transaction records and IDs.
- Report to your bank/e-wallet provider immediately (they may have internal fraud procedures).
- Include the payment demand and proof in your affidavit; it supports intimidation/robbery-by-intimidation or related theories.
10) If the Blackmailer Shared the Video (Leak Scenario)
If distribution occurred, it strengthens potential liability under RA 9995 (and possibly libel/other offenses depending on accompanying statements). Do this:
- Collect URLs, screenshots, and any copies received by others.
- Ask recipients not to forward; request they preserve evidence and provide screenshots for the case.
- Report the content to the platform immediately for removal.
- Consider whether VAWC (RA 9262) applies if an intimate partner is involved; protection orders may help prevent further harassment.
11) Special Protection Tools (When Available)
A. Protection orders (common in VAWC cases)
If the perpetrator is a spouse, ex, partner, or someone in a dating/sexual relationship context, RA 9262 may allow applications for:
- Barangay Protection Order (BPO)
- Temporary Protection Order (TPO)
- Permanent Protection Order (PPO)
These can include stay-away provisions and orders addressing harassment/communication.
B. Workplace/school measures
If threats involve your workplace or school:
- Consider confidentially alerting HR/administration (only as needed), so they can respond if messages are sent.
12) A Simple Complaint-Affidavit Outline (Copy-Friendly Structure)
Title: Complaint-Affidavit for Online Blackmail/Threats Involving Recorded Video Call
Personal circumstances: name, age, address, and that you are executing the affidavit to file a complaint.
Respondent details: “John Doe” (unknown true identity), usernames, profile links, numbers, and other identifiers.
Narration of facts (chronological):
- How you met
- When/where the video call happened
- What was shown/recorded
- When threats started (quote key lines)
- Demands (amount, method, deadline)
- Any distribution or attempted distribution
Harm and fear: psychological distress, risk to family/job, reputational damage.
Evidence list: label annexes (Annex “A” screenshots, “B” profile, “C” payment receipts, “D” video file hash/filename if available, etc.).
Prayer: request investigation, identification of respondent, and prosecution under applicable laws.
Verification and oath: signature under oath before authorized officer/notary.
Tip: Label every screenshot printout with a small footer: date captured, device used, account name, and keep a matching digital copy.
13) Common Mistakes That Weaken Cases
- Deleting chats/account history before saving evidence
- Editing or trimming video files (keep originals intact)
- Sending more explicit content to “buy time”
- Paying repeatedly (without reporting)
- Posting about the blackmailer publicly in a way that complicates evidence handling
- Failing to note exact dates/times/platforms used
14) Prevention and Risk Reduction (If You’re Currently Being Targeted)
- Tighten privacy settings; restrict who can message/tag you.
- Warn close family/friends not to accept unknown friend requests or messages.
- If you fear imminent leak, prepare a calm disclosure script for trusted people (“I’m being threatened; don’t open or share anything; please screenshot and send it to me for evidence.”)
- Consider changing key passwords and enabling multi-factor authentication.
15) Quick FAQ
Should I tell the blackmailer I reported them? Usually no. Preserve evidence quietly and report through proper channels.
Will paying guarantee deletion? Commonly, no. Many perpetrators continue demanding more.
What if the perpetrator is overseas? You can still file. Cross-border enforcement is harder, but reporting supports takedowns, account tracing, and formal requests through lawful channels.
Can I file even if my face is visible? Yes. Visibility does not remove your rights or the criminality of threats/non-consensual distribution.
Bottom Line
In the Philippines, recorded video call blackmail is addressed through threat/intimidation/coercion offenses under the Revised Penal Code, often enhanced by RA 10175, and may also implicate RA 9995, RA 10173, and (in specific contexts) RA 9262 or RA 9775. Your strongest immediate moves are to preserve evidence, document a timeline, and file with PNP-ACG/NBI and the Prosecutor’s Office using a sworn complaint-affidavit.
If you want, paste (with identifying details redacted) a sample of the threat message and the platform used, and I’ll draft a clean, court-ready Complaint-Affidavit narrative and annex checklist you can bring to PNP-ACG/NBI/Prosecutor.