{"id":10847,"date":"2025-05-02T13:22:01","date_gmt":"2025-05-02T13:22:01","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=10847"},"modified":"2025-08-29T21:01:39","modified_gmt":"2025-08-29T21:01:39","slug":"take-it-down-act-passes","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/","title":{"rendered":"USA Passes Take It Down Act: Fighting NCII at the Federal Level\u00a0"},"content":{"rendered":"<p style=\"text-align: right;\"><em>Reading time: <strong>4<\/strong> minutes<\/em><\/p>\n<p>On <a href=\"https:\/\/www.congress.gov\/crs_external_products\/LSB\/PDF\/LSB11314\/LSB11314.1.pdf\" target=\"_blank\" rel=\"noopener\">May 19<\/a>, President Trump signed the Tool to Address Known Exploitation by Immobilizing Technological Deepfakes on Websites and Networks (TAKE IT DOWN) Act into law. This came after the bill received unanimous approval in the senate and a resounding 409-2 vote in the house.<\/p>\n<p>The bill federally criminalizes the distribution of non-consensual nude images and requires online platforms to promptly remove the content. It would have significant impacts on\u00a0<a href=\"\/blog\/sextortion-online\/report-sextortion-online\/\">sextortion<\/a>,\u00a0<a href=\"\/blog\/harassment\/revenge-porn\/\">revenge porn<\/a>, and anyone threatening someone else with nudes.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Origins_of_the_TAKE_IT_DOWN_Act\"><\/span>Origins of the TAKE IT DOWN Act<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The TAKE IT DOWN Act was born from the painful experiences of 14-year-old Elliston Berry of Texas and 15-year-old Francesca Mani of New Jersey. In October 2023, both girls discovered that classmates had used <a href=\"https:\/\/time.com\/7277746\/ai-deepfakes-take-it-down-act-2025\/\" target=\"_blank\" rel=\"noopener\">AI software to create fake nude images<\/a> of them.\u00a0When they sought help from the threat, both school officials and social media platforms responded with indifference.<\/p>\n<p>Berry\u2019s mother, Anna, reached out to Senator Ted Cruz, who drafted the legislation and championed it through Congress. Democratic Senators Amy Klobuchar and Richard Blumenthal co-sponsored the bill, while Representatives Maria Salazar and Madeleine Dean led the House effort.<\/p>\n<p>Cruz praised the bill for what it would do for victims of\u00a0revenge porn\u00a0and\u00a0online sextortion.<\/p>\n<p>\u201cIt protects young girls and young women, and it\u2019s a huge bipartisan victory that we\u2019re winning tonight,\u201d Cruz said on <a href=\"https:\/\/www.instagram.com\/reel\/DJAly91xFHI\/\" target=\"_blank\" rel=\"noopener\">ABC News<\/a>.<\/p>\n<p>An earlier attempt to include the bill in a December bipartisan spending package failed after opposition from Elon Musk and Donald Trump.\u00a0During the Biden administration, the DEFIANCE Act, spearheaded by Democrats Dick Durbin and Alexandria Ocasio-Cortez, was considered the most viable deepfake legislation. However, momentum shifted when Cruz became chair of the Senate Commerce Committee.<\/p>\n<p>Melania Trump later backed the bill in her first public remarks since resuming the role of first lady. She hosted a <a href=\"https:\/\/www.cnn.com\/2025\/03\/03\/politics\/melania-trump-online-behavior-solo-event\/\" target=\"_blank\" rel=\"noopener\">roundtable discussion<\/a> with Berry, Mani, and other victims of\u00a0<a href=\"\/blog\/sextortion-online\/the-role-of-deepfakes-in-sextortion\/\">deepfake abuse<\/a>, sextortion, and\u00a0<a href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/revenge-porn\/\">revenge porn<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_Does_the_TAKE_IT_DOWN_Act_Do\"><\/span>What Does the TAKE IT DOWN Act Do?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The TAKE IT DOWN Act makes it a federal crime to \u201cknowingly publish\u201d\u00a0<a href=\"\/blog\/sextortion-online\/ncii-abuse\/\">Non-Consensual Intimate Images (NCII)<\/a>, including\u00a0<a href=\"\/blog\/sextortion-online\/the-role-of-deepfakes-in-sextortion\/\">AI-generated deepfakes<\/a>.\u00a0It also requires online platforms to remove such content within 48 hours of being notified by the victim. Platforms must maintain a clear, accessible process for reporting NCII and take action to remove any duplicate material.<\/p>\n<p>TAKE IT DOWN also criminalizes threatening publication for the purpose of \u201cintimidation, coercion, extortion, or to create mental distress.\u201d<\/p>\n<p>Individuals who share NCII depicting adults can face fines, restitution, asset forfeiture, and up to two years in prison.\u00a0If the victim is a minor under 18yrs old, the maximum sentence increases to three years.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Crimes_Does_This_Law_Combat\"><\/span>What Crimes Does This Law Combat?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The TAKE IT DOWN Act applies to any\u00a0<a href=\"\/blog\/sextortion-online\/ncii-abuse\/\">crime involving NCII<\/a>. This includes sharing or threatening to share sexually explicit images or videos of a person without their consent. NCII encompasses nonconsensual recordings, misused content originally captured with consent, and \u201cdigital forgeries\u201d like AI-generated deepfakes.<\/p>\n<p>The TAKE IT DOWN Act not only criminalizes the publication of NCII but also targets digital extortion and harassment. This makes it illegal to leverage the release of nudes, a tactic often used to coerce individuals online.<\/p>\n<p><strong>The TAKE IT DOWN Act addresses the following crimes:\u00a0<\/strong><\/p>\n<ul>\n<li><strong>Sextortion.<\/strong>\u00a0Online blackmail that involves intimate images. It often begins with a scammer using a fake profile to gain trust. They then coerce the target to send nudes, which they turn around as leverage.\u00a0<a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/report-sextortion-online\/\">Sextortion<\/a>\u00a0has been tied to multiple cases that lead to a tragic end for their victims.<\/li>\n<li><strong>Revenge Porn.<\/strong>\u00a0The nonconsensual distribution of sexually explicit media of someone with the intent to humiliate, punish, or seek revenge. Unlike sextortion,\u00a0revenge porn\u00a0is typically done by a former partner.<\/li>\n<li><strong>Sexploitation.<\/strong>\u00a0The exploitation of individuals, often through the creation, distribution, or manipulation of sexual content, to exert power and control. While\u00a0<a href=\"\/blog\/sextortion-online\/financial-sextortion-how-to-protect-yourself-and-where-to-turn-for-help\/\">financial sextortion<\/a>\u00a0has seen a meteoric rise post covid, cases of\u00a0<a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/sextortion-vs-sexploitation\/\">sexploitation<\/a>\u00a0continue to emerge.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"When_Will_the_TAKE_IT_DOWN_Act_Go_into_Effect\"><\/span>When Will the TAKE IT DOWN Act Go into Effect?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The TAKE IT DOWN Act\u2019s criminal prohibitions went into effect immediately. The removal requirements for covered platforms will take effect one year after enactment on May 19, 2026.<\/p>\n<p>Platforms that fail to comply face repercussions from the Federal Trade Commission under Section 5 of the FTC Act.\u00a0Notably, the bill expands the FTC\u2019s authority to include nonprofit organizations, a rare move in federal regulation.<\/p>\n<p>To protect good-faith efforts, the bill shields platforms from liability when they remove content based on reasonable evidence. This includes content that is later found to be lawful.\u00a0There\u2019s also a severability clause, allowing the rest of the law to stand if any part is ruled unconstitutional.<\/p>\n<p>Sunny Gandhi hopes TAKE IT DOWN is just the beginning to protecting victims who have been\u00a0<a href=\"\/blog\/online-blackmail\/what-to-do-if-someone-is-blackmailing-you-with-nudes\/\">threatened with nudes<\/a>. He is the vice president of political affairs at Encode, an AI-focused advocacy group that backed the bill. He\u2019s calling on Congress to build on this momentum by advancing broader protections for children online. Recent hearings by the House Energy and Commerce Committee suggest growing interest in taking further action.<\/p>\n<p>\u201cThere\u2019s a giant movement in Congress and at the state level around kids\u2019 safety that is only picking up momentum,\u201d Gandhi told <a href=\"https:\/\/time.com\/7277746\/ai-deepfakes-take-it-down-act-2025\/\" target=\"_blank\" rel=\"noopener\">Time Magazine<\/a>.\u00a0\u201cPeople don\u2019t want this to be the next big harm that we wait 5 or 10 years before we do something about it.\u201d<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_TAKE_IT_DOWN_Act_A_Positive_Step_Forward_to_Fighting_the_Extortion_Economy\"><\/span>The TAKE IT DOWN Act: A Positive Step Forward to Fighting the Extortion Economy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The TAKE IT DOWN Act marks a major turning point in the fight against online abuse. It strikes at the heart of the extortion economy and gives victims powerful new tools to hold perpetrators accountable. While many states have laws addressing NCII, this is the first federal legislation to criminalize its distribution. Furthermore, it\u2019s the first law to explicitly cover AI-generated content.<\/p>\n<p>Its passage sends a clear national message: the publication and spread of NCII, in any form, will no longer be tolerated.<\/p>\n<p>For organizations like Digital Forensics Corp., this law is a game-changer. It strengthens our mission to support victims of sextortion, revenge porn, and those threatened with nudes, empowering us to act more decisively than ever before.<\/p>\n<p>If you or someone you know is being targeted or\u00a0<a href=\"\/blog\/online-blackmail\/what-to-do-if-someone-is-blackmailing-you-with-nudes\/\">threatened with nudes<\/a>, don\u2019t stay silent. Reach out today to learn how to <a href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-report-revenge-porn\/\">report revenge porn<\/a>, protect your reputation, and reclaim control. We\u2019re here to help you bring justice to those who exploit others online.. We\u2019re here to help you reclaim control, protect your reputation, and bring justice to those who exploit others online.<\/p>\n","protected":false},"excerpt":{"rendered":"Reading time: 4 minutes On May 19, President Trump signed the Tool to Address Known Exploitation by Immobilizing&hellip;","protected":false},"author":131,"featured_media":12096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[767],"tags":[],"class_list":{"0":"post-10847","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sextortion-online","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>TAKE IT DOWN Act Explained: Simple 4-Minute Guide<\/title>\n<meta name=\"description\" content=\"Understand the TAKE IT DOWN Act in 4 minutes. Learn how it protects against revenge porn, sextortion, and AI deepfakes in plain terms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TAKE IT DOWN Act Explained: Simple 4-Minute Guide\" \/>\n<meta property=\"og:description\" content=\"Understand the TAKE IT DOWN Act in 4 minutes. Learn how it protects against revenge porn, sextortion, and AI deepfakes in plain terms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-02T13:22:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T21:01:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Take_It_Down_Act.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jack Gillespie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"TAKE IT DOWN Act Explained: Simple 4-Minute Guide\" \/>\n<meta name=\"twitter:description\" content=\"Understand the TAKE IT DOWN Act in 4 minutes. Learn how it protects against revenge porn, sextortion, and AI deepfakes in plain terms.\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Gillespie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/\"},\"author\":{\"name\":\"Jack Gillespie\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\"},\"headline\":\"USA Passes Take It Down Act: Fighting NCII at the Federal Level\u00a0\",\"datePublished\":\"2025-05-02T13:22:01+00:00\",\"dateModified\":\"2025-08-29T21:01:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/\"},\"wordCount\":1103,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Take_It_Down_Act.jpg\",\"articleSection\":[\"Resources for Victims of Internet Sextortion\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/\",\"name\":\"TAKE IT DOWN Act Explained: Simple 4-Minute Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Take_It_Down_Act.jpg\",\"datePublished\":\"2025-05-02T13:22:01+00:00\",\"dateModified\":\"2025-08-29T21:01:39+00:00\",\"description\":\"Understand the TAKE IT DOWN Act in 4 minutes. Learn how it protects against revenge porn, sextortion, and AI deepfakes in plain terms.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Take_It_Down_Act.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Take_It_Down_Act.jpg\",\"width\":2560,\"height\":1120,\"caption\":\"Take It Down Act\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/take-it-down-act-passes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources for Victims of Internet Sextortion\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"USA Passes Take It Down Act: Fighting NCII at the Federal Level\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\",\"name\":\"Jack Gillespie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"caption\":\"Jack Gillespie\"},\"description\":\"Cybercrime Writer & Awareness Advocate \\\"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\\\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \\\"Sextortion Awareness for Children\\\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jack-gillespie-21aa85222\\\/\"],\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jack-gillespie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TAKE IT DOWN Act Explained: Simple 4-Minute Guide","description":"Understand the TAKE IT DOWN Act in 4 minutes. Learn how it protects against revenge porn, sextortion, and AI deepfakes in plain terms.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/","og_locale":"en_US","og_type":"article","og_title":"TAKE IT DOWN Act Explained: Simple 4-Minute Guide","og_description":"Understand the TAKE IT DOWN Act in 4 minutes. Learn how it protects against revenge porn, sextortion, and AI deepfakes in plain terms.","og_url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-05-02T13:22:01+00:00","article_modified_time":"2025-08-29T21:01:39+00:00","og_image":[{"width":2560,"height":1120,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Take_It_Down_Act.jpg","type":"image\/jpeg"}],"author":"Jack Gillespie","twitter_card":"summary_large_image","twitter_title":"TAKE IT DOWN Act Explained: Simple 4-Minute Guide","twitter_description":"Understand the TAKE IT DOWN Act in 4 minutes. Learn how it protects against revenge porn, sextortion, and AI deepfakes in plain terms.","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jack Gillespie","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/"},"author":{"name":"Jack Gillespie","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba"},"headline":"USA Passes Take It Down Act: Fighting NCII at the Federal Level\u00a0","datePublished":"2025-05-02T13:22:01+00:00","dateModified":"2025-08-29T21:01:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/"},"wordCount":1103,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Take_It_Down_Act.jpg","articleSection":["Resources for Victims of Internet Sextortion"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/","url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/","name":"TAKE IT DOWN Act Explained: Simple 4-Minute Guide","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Take_It_Down_Act.jpg","datePublished":"2025-05-02T13:22:01+00:00","dateModified":"2025-08-29T21:01:39+00:00","description":"Understand the TAKE IT DOWN Act in 4 minutes. Learn how it protects against revenge porn, sextortion, and AI deepfakes in plain terms.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Take_It_Down_Act.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/05\/Take_It_Down_Act.jpg","width":2560,"height":1120,"caption":"Take It Down Act"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/take-it-down-act-passes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources for Victims of Internet Sextortion","item":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/"},{"@type":"ListItem","position":3,"name":"USA Passes Take It Down Act: Fighting NCII at the Federal Level\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba","name":"Jack Gillespie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","caption":"Jack Gillespie"},"description":"Cybercrime Writer & Awareness Advocate \"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \"Sextortion Awareness for Children\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.","sameAs":["https:\/\/www.linkedin.com\/in\/jack-gillespie-21aa85222\/"],"url":"https:\/\/www.digitalforensics.com\/blog\/author\/jack-gillespie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=10847"}],"version-history":[{"count":7,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10847\/revisions"}],"predecessor-version":[{"id":14964,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/10847\/revisions\/14964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/12096"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=10847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=10847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=10847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}