Sextortion — being threatened with the release of intimate images unless you pay money or comply with demands — is one of the most devastating forms of online abuse. It can happen to anyone: someone you trusted shares images without consent, a hacker accesses your private photos, or a stranger tricks you into sharing compromising content.
If this is happening to you right now, take a breath. This guide will walk you through exactly what to do, step by step.
Step 1: Do Not Pay or Comply
This is the most important rule. Paying does not make it stop. In the vast majority of cases, paying leads to more demands, not fewer. Sextortionists who receive payment know you're willing to pay — and they come back for more.
Similarly, do not comply with demands for more images, personal information, or favors. Every piece of additional content you provide gives the perpetrator more leverage.
Step 2: Document Everything
Before blocking or reporting, capture evidence. Screenshot every message, threat, profile, and demand. Include timestamps, usernames, and URLs. Save these files somewhere secure — a separate folder on your computer or a cloud drive that the perpetrator cannot access.
This evidence is critical for law enforcement and platform reports. Without it, proving the crime becomes much harder.
Step 3: Report to Law Enforcement
Sextortion is a crime. In most jurisdictions it falls under extortion, blackmail, or specific image-based abuse laws. File a report with your local police and provide all the evidence you've collected.
For cross-border cases (which are common, as many sextortion rings operate internationally), also report to the FBI's Internet Crime Complaint Center (IC3) at ic3.gov, Europol if in the EU, or your national cybercrime reporting authority.
Step 4: Report to the Platform
Report the perpetrator's account on every platform they've contacted you through. Most major platforms have dedicated processes for sextortion and intimate image abuse, including fast-track removal of threatening content.
Meta (Facebook/Instagram): Use their dedicated intimate image removal tool. Google: Request removal of non-consensual intimate images from search results. Snap, TikTok, X: All have specific policies for this type of content.
Step 5: Check If Images Have Spread
One of the most anxiety-inducing questions victims face is: "Did they actually share my photos?" In many sextortion cases — particularly the financially motivated ones run by criminal networks — the images are never actually shared. The threat itself is the weapon.
But you need to know for certain. A face search can tell you whether your photos have appeared on websites you don't recognize. This gives you either peace of mind or actionable information about where to request takedowns.
Step 6: Get Content Removed
If images were shared, removal is possible. File DMCA takedown notices with hosting providers. Contact the Cyber Civil Rights Initiative for help with removal from major platforms. Use Google's removal request to de-index images from search results. In the EU, exercise your GDPR right to erasure.
Protevio generates timestamped evidence reports and pre-filled DMCA takedown letters specifically for this purpose. The faster you act, the fewer people see the content.
Step 7: Secure Your Accounts
After addressing the immediate threat, secure every online account. Change passwords on all accounts, especially email and cloud storage. Enable two-factor authentication everywhere. Check for unauthorized access to your cloud photo libraries (iCloud, Google Photos). Review which apps have access to your camera roll. Consider a dedicated email address for account recovery.
The Legal Landscape
Laws protecting victims of sextortion and non-consensual intimate images have expanded significantly. The EU's Digital Services Act requires platforms to remove intimate images within 24 hours. The UK's Online Safety Act criminalizes sharing intimate images without consent. Over 48 US states now have specific revenge porn laws. Australia's eSafety Commissioner can order platforms to remove content within hours.
These laws mean that even when platforms are initially slow to respond, victims have legal tools to compel removal.
Protecting Yourself Going Forward
Set up face monitoring. Automated alerts will notify you if your face appears on newly indexed sites — catching any future leaks early before they spread.
Be cautious with intimate content. If you choose to share intimate images with a partner, be aware that no app is perfectly secure. Consider keeping faces out of intimate photos as a precaution.
Know the warning signs. Sextortion often follows a pattern: a new online contact who escalates to intimate conversation quickly, requests for explicit content early in the relationship, and vague references to "consequences" if you don't comply.
Being a victim of sextortion says nothing about your judgment or character. These are sophisticated criminals who target thousands of people. What matters is how you respond — and this guide gives you the tools to fight back.
Check if your photos have spread
Run a face search to find out if intimate images appear anywhere online. Get evidence reports for takedown requests.
Search privately and securely →Resources: Cyber Civil Rights Initiative: 1-844-878-2274 | NCMEC Take It Down: takeitdown.ncmec.org | FBI IC3: ic3.gov | StopNCII.org (hash-based prevention)