As a cybersecurity company, we regularly encounter various terms describing the non-consensual sharing or threat of sharing nudes. Revenge porn and sextortion are some of the most common. However, all these terms fall under the broader category of NCII abuse. This form of abuse can take the form of online blackmail, extortion, or cyber harassment. So, what is NCII abuse? Continue reading to learn about what NCII abuse is and how to respond if you are a victim.
Understanding Image-Based Abuse and How It Impacts Victims
When it comes to answering the question, “What is NCII abuse?” we first need to define the acronym. Standing for non-consensual intimate images, the term refers to the distribution of explicit media without consent from the subject. The content in question is typically acquired through a consensual exchange, stolen from the victim, or even digitally manufactured.
The latter technique has become a growing issue in recent years with the development of AI and deepfake technology. Regardless of how perpetrators obtain the content, crimes involving NCII are becoming more commonplace worldwide.
The Revenge Porn Hotline has seen an exponential rise in reported cases of NCII. In 2023, they received 18,426 total reports, a 106% increase from the prior year. This is nearly 10,000 more reports than they received from 2015 to 2020.
What Is NCII vs. Revenge Porn vs Sextortion?
As an umbrella term covering cybercrime forms involving intimate media, NCII abuse can come in a variety of forms. Understanding what is NCII abuse and the difference between these methods can prevent you from becoming a victim.
- Revenge Porn. Unauthorized disclosure of explicit content with the intent to cause distress to the depicted individual. This is typically done by a current or former romantic partner.
- Sextortion. The use of social engineering tactics to obtain intimate images as leverage to financially extort an individual.
- Deepfake Scams. Digitally created intimate media using the victim’s likeness. Deepfake content is also used by perpetrators to initiate the exchange of intimate content.
- Hacked or Stolen Content. Gaining unauthorized access to the sensitive content of victims. Perpetrators may use the content for online blackmail or image-based sexual abuse.
- Sexploitation. Similar to sextortion, the goal in sexploitation is to coerce the victim into providing more intimate media or sexual favors.
Understanding Different Forms of NCII Abuse
NCII encompasses any image-based sexual abuse. While revenge porn and sextortion fall under NCII abuse, they are not interchangeable terms.
Revenge porn is intended to cause reputation damage, emotional distress, or to gain control over the victim. Nudes are often leaked by a disgruntled partner or personal connection.
On the other hand, sextortion is intimate image abuse with the intent to profit financially. Criminals may create the content for sextortion with or without the consent of all participants. Some ways this content is created without permission include deepfakes and webcam hacking. Revenge porn leaks may also provide sextortionist with media they can use as leverage.
How Does NCII Abuse Happen?
While non-consensual intimate image abuse can happen in a variety of ways, there are some consistent tactics that can tip off a potential threat. Recognizing these warning signs can make the difference in whether or not you fall victim.
Social Engineering on Digital Platforms
Many scammers create false personas that are carefully crafted to lure in their targets. Using information available on your profile, they are able to assume the role of a prospective peer who shares your interests before asking for explicit content.
Even in private conversations, it is incredibly dangerous to exchange intimate media online. Once you relinquish this content to anybody, even someone you know, its potential reach is no longer within your control.
Hacking and Phishing
A cybercriminal may reach out to you with some sort of offer, threat, or misleading identity attempting to get you to click a link containing malware. These links can give the hacker access to your device, including intimate photos that are stored on it.
If you use weak passwords or reuse the same one for multiple accounts, hackers may be able to gain access to your accounts through brute force and access your data this way.
Public Wi-Fi & Data Breaches
Sometimes the security vulnerability is the fault of a service provider. This is the case when a scammer gains access to your information through public internet services or data breaches.
Insecure networks and websites can leave you at risk of being targeted in a cybercrime. This often occurs at hotels where numerous people are using the same Wi-Fi network. You can learn more by reading our article discussing the safety of hotel Wi-Fi.
Platforms Where NCII Abuse Occurs
The most common outlets for distributing NCII are social media platforms and adult content websites. In a 2024 study, The European Journal of Criminology took a random sample of 200 NCII cases. Of the cases where the source of images was clear, 52% of them started on social media. Along with this, 78% of them started on either Facebook or Instagram.
Meta platforms have policies in place that prohibit NCII distribution as well as automated systems that detect activity patterns of accounts who participate in such activities. However, this isn’t the case across all platforms.
What Should You Do If You’re a Victim of NCII Abuse?
If someone is leveraging your nude images to attack or extort you, you need to take action quickly. NCII abuse is a very serious situation, but remaining calm and taking the following steps can allow you to regain control and get your nudes off the internet.
Immediate Steps to Take if You Are a Victim
The worst time to ask yourself, ‘What is NCII abuse?’ is after you’ve already become a victim. Without the right knowledge, victims may respond in ways that unintentionally make the situation worse. Here are the best practices for responding if you’ve been targeted by NCII abuse.
- Do not engage with the perpetrator. You should have minimal communication with the cybercriminal while leaving the line open. Blocking the perpetrator is often detrimental to the investigation and can result in retaliation from the perpetrator.
- Document the evidence. Collect any accounts that have contacted you or posted your content and any threatening messages. You do not need to document your intimate photos as proof unless you are submitting them to a hash-based matching platform.
- Report to the platform. This can lead to your leaked nudes and the accounts that post them being removed, which can help protect you and others from future attacks. Online resources like StopNCII.org can help prevent reposts through hash-based matching.
How to Remove NCII Content Online
You do have options to fight back against NCII abuse. Understanding the resources at your disposal will increase your chances of removing the non-consensual posting and limiting the spread. The following methods will yield the best results:
- File a DMCA Takedown Request. Reports of posts containing NCII that are accompanied by a DMCA takedown notice have significantly better chances of being removed. A University of Michigan study found that Twitter took down the reported content filed with a DMCA Takedown Notice within 25 hours. In the same study, Twitter did not remove any reports filed through the platform.
- Work with Cybersecurity Firms. These organizations specialize in preventing and investigating cybercrimes, including those involving NCII. Teams of experts understand what is NCII and have the technical know-how required to uncover perpetrators. The investigations that the firm performs can even serve as evidence to support future legal action. They can also detect security issues that leave you susceptible and help you avoid future attacks.
- Contact Google for De-Indexing. In 2015, Google announced an update to their policies. The update allows users to submit requests to have links containing NCII content removed from search results. In recent years, Google has implemented hash-based matching that can prevent reuploading. The platform has also launched AI programs that can detect similar content in cases involving minors.
Can You Take Legal Action for NCII Abuse?
Victims of NCII abuse have legal rights to seek justice and get their nude images taken offline. Understanding the laws pertaining to NCII and the methods for pursuing legal action are important when taking action to resolve the matter.
What is NCII Abuse? The Legal Definition
In 2025, President Trump signed the ‘TAKE IT DOWN’ act into law. The bill federally prohibits the distribution of both legitimate and deepfake NCII. Every U.S. state also has laws in place that criminalize the distribution of this media without consent.
This makes sextortion now illegal at both the federal and state level. However, the laws have variance in verbiage and punishment. Learn more about what is NCII abuse legally and how it pertains to sextortion in our article on sextortion laws in the US.
Real-Life Case: A Texas Revenge Porn Story
In 2023, a Texas woman was awarded $1.2 billion dollars in damages after filing a revenge porn lawsuit against her former boyfriend, Marques Jackson. Jackson had leaked nudes she sent him on multiple social media platforms and adult content websites.
Additionally, he created a public Dropbox folder containing the content which he sent to her friends, family, and colleagues. Jackson identified the woman by providing her name, address, and images of her face.
Jackson also allegedly stalked the woman by gaining access to her phone and security cameras around her mother’s house. He threatened her with the nude images, detailing the potential damage from them becoming public.
The woman’s legal counsel had initially asked for $100 million in damages. However, the court far surpassed that total, which her lawyers hope will deter others from becoming future perpetrators.
How to File a Complaint or Lawsuit
If you are in a region where NCII abuse is a civil or criminal offense, you should take legal action. With any cybercrime, you should begin by filing a report with local police. Even if the crime is outside of their jurisdiction, this will be an important record for future legal proceedings.
Depending on the laws in your area, you may be able to sue the perpetrator for damages or pursue criminal charges against them. You can file DMCA takedown notices to encourage the removal of your leaked nudes.
You should consult an attorney before choosing which course of action to take. Their legal expertise can help you decide which path is optimal for your circumstance. They can also communicate on your behalf and connect you with emotional support.
How to Protect Yourself from NCII Abuse
Learning what is NCII abuse is the first step to reduce your risk of becoming a victim. Next, the best defense against non-consensual intimate image abuse is being proactive in your online operations. Employing the following preventative protections and sound decision making can enable you to avoid dangerous situations.
Strengthen Your Online Security
Increasing the privacy settings of your online accounts can prevent cybercriminals from reaching you. You should also consider the information that is available to be gathered through your social media posts. The following articles can help you secure your online presence.
- Protect your Facebook account from scammers
- Preventing Instagram blackmail scams
- Securing Your Snapchat Account
- Avoid oversharing on social media
Think Twice Before Sharing Intimate Content
Carefully consider what media you are sharing and who it is going to. As seen in the case above, even real-world romantic partners can become potential perpetrators. Without a doubt, you should never send intimate content to anyone online whose identity is ambiguous.
