What is a CyberTip (NCMEC) and what information does it typically contain?

Checked on January 23, 2026
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

A CyberTip is a report submitted to the National Center for Missing & Exploited Children’s (NCMEC) CyberTipline — the United States’ centralized clearinghouse for alleged online child sexual exploitation — and it typically contains identifying details about the reporter and the alleged incident plus digital evidence such as URLs, files, account identifiers, IP addresses, timestamps, and any contextual notes the reporter provides [1] [2] [3]. Electronic service providers (ESPs) make the majority of these reports by law when they encounter apparent child sexual abuse material (CSAM), and NCMEC analysts review, label, and refer reports to law enforcement while also using them to inform removal and prevention efforts [3] [4] [5].

1. What a CyberTip is and who files them

The CyberTipline is a centralized reporting system run by NCMEC that accepts reports from the public and, critically, from electronic service providers — the latter are legally required under 18 U.S.C. §2258A to submit reports of “apparent child pornography” when they become aware of it — and those submissions make up the bulk of the volume sent to NCMEC [1] [6] [4]. While anyone can submit a tip through the public portal, corporate platforms like social networks, email providers, and hosting services commonly automate or manually file reports when content or user behavior triggers moderation systems or user complaints [3] [1].

2. The anatomy of a CyberTip: sections and typical fields

A formal CyberTipline Report commonly includes a Section A with contact information for the reporting ESP and guidance on requesting more information, sections that capture the incident type and context, and an area for additional materials or cross-references; reports can include file identifiers, URLs, time and date stamps, email headers, subject lines, content snippets, account names, and IP addresses among other metadata [3] [2]. The CyberTipline Reporting API documentation shows reporters can and do submit structured details such as whether a URL is externally hosted, email addresses tied to the incident, headers and content of communications, and indicators like EXIF data or whether the reporter viewed the full file contents [2].

3. Evidence, preservation, and downstream handling

When an ESP files a CyberTip, that submission serves as a request to preserve the reported content for a statutory period (treated as a preservation request under 18 U.S.C. §2258A), and NCMEC analysts then review and label images and videos with descriptors like estimated age range and content type to help law enforcement prioritize investigations and to assist platforms in removing content [6] [5]. The reporting guidance and practitioner materials note potential evidentiary issues — for example, if logs or summarized records from NCMEC are used instead of originals there can be questions about modification or completeness — so many CyberTips include references to original logs or retained copies that platforms are asked to keep [3] [2].

4. Scale, trends, and analytical role

The CyberTipline processes enormous volumes: NCMEC’s public reporting pages and partner analyses document tens of millions of reports and hundreds of millions of files across recent years, with platforms submitting millions of images and videos annually and NCMEC extracting trends such as rising online enticement, sextortion, and emergent threats like AI-generated material [5] [7] [8] [9]. NCMEC does not simply forward raw tips; analysts aggregate, label, bundle duplicates tied to viral incidents, and provide law enforcement and platforms with analyses intended to prioritize urgent cases and support takedown and investigative work [5] [8].

5. Limits, controversies, and the perspectives that matter

Reporting requirements compel ESPs to flag “apparent” CSAM but do not specify uniform proactive detection obligations or a single template of required fields, so submission quality can vary — NCMEC and outside observers have noted that a small share of industry reports lack sufficient location or jurisdiction detail, complicating law enforcement referrals [4] [9]. Advocates and platforms stress the CyberTipline’s value for victim rescue and content removal [5] [1], whereas legal practitioners and evidence specialists warn about chain-of-custody and completeness concerns when courts rely on secondary records versus originals [3]. Those divergent perspectives reveal implicit agendas: platforms emphasize scalability and automated detection, NCMEC emphasizes triage and preservation, and defense or civil-liberties observers often highlight evidentiary safeguards and false-positive risks — a full assessment requires reviewing the original CyberTip content, platform retention practices, and law enforcement follow-ups, which are beyond the scope of the cited public sources [2] [3] [4].

Want to dive deeper?
How does NCMEC decide which law enforcement agency receives a CyberTip report?
What retention and evidence-preservation practices do major platforms follow after submitting CyberTips?
How has the rise of AI-generated sexual imagery affected CyberTipline reporting and analysis?