Hacked.com icon

hacked.com

Revenge Porn and Non-Consensual Intimate Images: What to Do

revenge porn written in stones

Severe non-consensual image cases show that delay and fragmented reporting increase long-term harm.

The effective approach is consistent across cases, protect safety, preserve evidence, remove at source, and secure compromised accounts.

Crisis-response priorities

  • If you are in immediate danger, prioritize physical safety and contact local authorities.
  • Preserve evidence before it disappears: URLs, screenshots, usernames, timestamps, and messages.
  • Do not negotiate with extortionists. Do not pay. Preserve evidence and report.
  • Report and request removal through the platform or host where the content is posted.
  • Reduce discovery by addressing search exposure and mirror copies.
  • Secure your accounts (email, social, phone number) to prevent escalation and impersonation.

Safety note: If someone is threatening to release images unless you pay or comply, treat it as extortion. Preserving evidence and escalating through official channels is usually safer than engaging.

Immediate safety and privacy triage

Before you focus on takedowns, stabilize the parts that attackers often exploit for pressure: your contact channels, your identity exposure, and your ability to ask for help.

  • Pick a trusted point person: one friend, partner, or family member who can help you track URLs and reports when you are overwhelmed.
  • Reduce doxxing exposure: hide or remove public phone numbers, addresses, and workplace details from profiles where you can.
  • Lock down contact channels: filter unknown callers and DMs, and avoid engaging with harassers directly.
  • Prepare a simple statement: if you need to tell a school or employer, keep it factual and minimal. You do not owe details.

This does not “solve” distribution, but it reduces the attacker’s leverage and buys you time to work the removal process.

Step 1: Preserve evidence in a way that is useful later

You may need evidence for platform safety teams, hosts, employers, schools, or law enforcement. Capture:

  • Exact URLs to the page and to the media file if visible.
  • Screenshots that show the account name, date, and context.
  • Messages, emails, or DMs used to threaten or coerce you.
  • Any payment requests or identifiers if extortion is involved.

If you can, keep a simple log (date, URL, action taken, outcome). It makes follow-ups faster and reduces the emotional cost of repeating the story.

Step 2: Remove the content where it is hosted

The most durable removal is source removal. If the content is on a social platform, use in-app reporting and safety forms. If it is on an independent website, you may need to report to the host or registrar.

Start with this escalation workflow: How to report a website for abusive behavior.

Where it appears Who can remove it What to send
Social platform post Platform safety team URL, screenshots, account name, context
Forum or community Moderators, then host Thread URL, evidence of policy violation
Standalone website Host, then registrar Exact page URLs, screenshots, description of abuse

Step 3: Reduce search exposure and stop re-posts

Even after removal, copies can persist or reappear. Reduce discovery by handling search results and by finding mirrors.

  • Search for unique identifiers (your name, usernames, phone number, image titles).
  • Build a list of URLs that contain the same content or the same personal data.
  • As each source is removed, update search exposure where eligible.

Search removal workflow: How to remove personal information from Google.

Step 4: Secure accounts to prevent escalation

Attackers often pivot: if they have access to your email or social accounts, they can impersonate you, message your contacts, and re-upload content. Secure the control plane:

  • Change your email password and enable two-factor authentication (2FA).
  • Change passwords on social accounts and sign out of other sessions.
  • Review account recovery methods and remove anything you do not control.
  • Check for unfamiliar devices and third-party apps connected to your accounts.

Baseline: How to protect your online information.

Do not: Send additional intimate images to “prove it is you” or to satisfy a threat. That is a common escalation tactic.

Step 5: Reduce harm in your own actions

When people are scared, they sometimes share the content with friends or send screenshots while asking for help. That can unintentionally increase distribution. A safer approach is sharing links and evidence privately with a trusted person, not circulating files.

Step 6: If extortion is involved, expect follow-up tactics

Extortionists often try to keep you engaged because engagement creates more chances to extract money or compliance. Common pressure patterns include countdown timers, threats to “send it to everyone”, and claims that payment will “delete” the files. The safest posture is to preserve evidence, report, and disengage.

If you have already responded, it is still worth stopping. Paying does not reliably end extortion, and it can increase the attacker’s confidence that you will pay again.

Step 7: Decide when to involve legal and professional support

Legal options and reporting processes vary by jurisdiction. If threats, stalking, workplace risk, or repeated re-posts are involved, consider speaking with a lawyer or a local victim support organization. If you are a minor, involve a trusted adult and report through the appropriate child safety channels.

Common questions

Should I contact the person who posted it?

Sometimes direct contact can escalate harassment or create more threats. When safety is uncertain, prefer official reporting paths and preserve evidence.

What if someone sends the content to my contacts?

This is a common leverage tactic. You cannot control every recipient, but you can reduce spread by asking close contacts not to forward anything and to report the sender. If impersonation is involved, secure accounts and warn contacts through a trusted channel.

Is this my fault?

No. Consent matters. The responsibility is on the person who shared private content without permission.

Non-consensual intimate image sharing is a control problem: someone is trying to use exposure to influence your behavior. The right response is to reduce their leverage, not to satisfy their demands.

Evidence preservation and source removal reduce distribution. Account security reduces escalation. Support resources reduce isolation. Those three tracks together are what end the incident.

Some parts are slow and frustrating. Mirrors reappear. Platforms respond inconsistently. That is why documentation matters. It creates a clean record you can reuse without re-living the details each time.

The goal is stability. When the content is removed at the source where possible, search exposure is reduced, and your accounts are secured, the incident stops growing. Once leverage is removed, your options expand.