Advance Fee Loan Scam and Unauthorized Use of Digital Signature in the Philippines

Introduction

An advance fee loan scam occurs when a person is promised a loan but is required to pay money first before the loan is supposedly released. The scammer may call the payment a processing fee, insurance fee, activation fee, collateral fee, tax, attorney’s fee, notarization fee, bank clearance fee, anti-money laundering clearance, or cancellation fee. After the victim pays, the loan is not released. Instead, the scammer demands more money, disappears, threatens the victim, or uses the victim’s personal information for further fraud.

A more serious variation involves the unauthorized use of a person’s digital signature. The victim may be asked to send an electronic signature, sign an online form, upload a photo of a handwritten signature, sign a supposed loan agreement, click an electronic consent button, or submit a selfie with ID. The scammer may then attach that signature to fake contracts, promissory notes, acknowledgments, receipts, waivers, authorization letters, or supposed loan documents. In some cases, the victim never signs anything, but the scammer copies, traces, crops, edits, or fabricates the victim’s signature and uses it to claim that the victim agreed to pay fees, accepted a loan, authorized deductions, or waived legal rights.

In the Philippine context, this situation may involve estafa, cybercrime-related estafa, falsification, use of falsified documents, identity theft, unauthorized processing of personal information, violations of electronic commerce rules, data privacy violations, harassment, coercion, unfair debt collection, and civil liability for damages.

The legal analysis depends on the facts: whether money was paid, whether a loan was actually released, whether the signature was voluntarily given or forged, whether the document was altered, whether personal data was misused, whether threats were made, and whether the transaction was conducted online.


I. Nature of an Advance Fee Loan Scam

An advance fee loan scam is a fraudulent scheme where the victim is induced to pay money in advance in exchange for a larger promised loan that is never released.

The core elements are:

  1. A promise of a loan or credit facility.
  2. A representation that the loan is approved, guaranteed, or ready for release.
  3. A demand for an upfront payment before release.
  4. Reliance by the victim on the representation.
  5. Payment by the victim.
  6. Failure to release the loan.
  7. Damage to the victim.

The scam may be committed by an individual, fake loan agent, fake lending company, fake financing company, online lending page, social media account, messaging app user, or a person impersonating a legitimate lender.


II. Common Forms of Advance Fee Loan Scams

Scammers use different labels for the same basic scheme. Common examples include:

  1. Processing fee scam The victim is told that a fee must be paid before the loan can be processed or released.

  2. Insurance fee scam The victim is told that the loan must be insured first.

  3. Collateral fee scam The victim is told to pay a “collateral” amount even though no real collateral arrangement exists.

  4. Activation fee scam The scammer claims the borrower’s account must be activated before disbursement.

  5. Bank clearance scam The victim is told that the bank is holding the loan and requires a clearance fee.

  6. AMLA clearance scam The scammer falsely claims that anti-money laundering clearance must be paid by the borrower before release.

  7. Tax fee scam The victim is told to pay tax before receiving the loan.

  8. Attorney’s fee or notarization scam The victim is told that legal documents must be paid for before release.

  9. Cancellation fee scam When the victim refuses to pay more, the scammer claims the victim must pay to cancel the loan.

  10. Wrong-account correction scam The scammer claims the victim entered the wrong bank account number and must pay a correction fee.

  11. Locked funds scam The scammer claims that the loan has already been credited but is locked until the victim pays an unlocking fee.

  12. Digital contract trap The scammer uses a digitally signed document to threaten the victim with legal action, even though no loan was released.


III. How Digital Signatures Are Misused in Loan Scams

Digital signatures, electronic signatures, scanned signatures, and online consent tools can be misused in several ways.

A. Signature copied from a submitted ID or document

The victim may send a government ID, employment record, previous contract, or application form containing a signature. The scammer crops the signature and pastes it onto another document.

B. Signature uploaded for “verification”

The victim is asked to send a specimen signature to verify the loan application. The scammer later attaches it to a fake promissory note or loan agreement.

C. Signature placed on altered document

The victim signs one document, but the scammer changes the terms afterward or attaches the signature page to a different document.

D. Clickwrap or online consent abused

The victim clicks “I agree” on a website or app, but the platform later claims the victim agreed to terms that were not shown, were hidden, or were materially different.

E. Fake electronic signature generated by the scammer

The scammer types the victim’s name, uses a cursive font, creates an image signature, or uses software to fabricate a signature.

F. Signature taken from chat

The victim sends a photo of a signed note or message. The scammer uses it beyond the purpose for which it was sent.

G. Signature obtained by deception

The victim signs because the scammer falsely represents that the document is only for verification, reservation, application, or cancellation, but later uses it as a loan contract or acknowledgment of debt.

H. Forged digital document sent to intimidate victim

The scammer sends a supposed signed contract to threaten the victim with arrest, court action, barangay complaint, blacklisting, or public posting.


IV. Legal Significance of Electronic and Digital Signatures

Philippine law recognizes electronic documents and electronic signatures in appropriate cases. This means a contract or transaction is not invalid merely because it is electronic.

However, recognition of electronic signatures does not mean every digital signature is valid, enforceable, or authentic. A signature must still be attributable to the person, made with consent, and connected to a genuine transaction.

A digital or electronic signature may be challenged if:

  1. It was forged.
  2. It was copied without authority.
  3. It was attached to a different document.
  4. It was obtained through fraud.
  5. The signer did not understand or agree to the document.
  6. The document was altered after signing.
  7. The alleged lender cannot prove authenticity.
  8. The signature was not intended to create a binding loan obligation.
  9. There was no real loan release.
  10. The surrounding transaction was fraudulent.

Thus, a scammer cannot make a fake debt real merely by pasting a victim’s digital signature onto a document.


V. Difference Between Electronic Signature and Forged Signature

An electronic signature is a signature in electronic form used to identify a person and indicate approval of an electronic document or transaction.

A forged signature is a false signature made without authority or consent.

The fact that a signature appears electronic does not automatically make it valid. The question is whether the person actually authorized it.

Examples:

  • The victim voluntarily signs a genuine loan agreement after full disclosure: potentially valid.
  • The victim signs a blank form and the scammer later fills in different terms: questionable or fraudulent.
  • The scammer copies the victim’s signature from an ID and places it on a promissory note: forged or unauthorized.
  • The victim clicks a button after being deceived that it was only for identity verification: potentially vitiated by fraud.
  • The victim’s typed name appears on a fake contract without consent: unauthorized.

VI. Estafa in Advance Fee Loan Scams

The most common criminal issue is estafa or swindling.

Estafa may arise when the scammer deceives the victim into paying money by falsely representing that:

  1. A loan has been approved.
  2. The scammer is authorized to process or release the loan.
  3. The advance fee is required for release.
  4. The loan will be released after payment.
  5. The company is legitimate.
  6. The payment is refundable.
  7. A signed document creates an obligation to pay more fees.
  8. A cancellation fee is legally required.
  9. The victim will be sued or arrested if more money is not paid.

In advance fee loan scams, the deceit usually exists before or at the time the victim parts with money. The victim pays because of the false promise of loan release. When the loan is not released and the scammer demands more fees or disappears, the facts may support estafa.


VII. Cybercrime-Related Estafa

If the scam is committed through electronic means, it may be treated as cybercrime-related estafa.

This may apply when the fraudulent acts occur through:

  • Facebook
  • Messenger
  • Viber
  • Telegram
  • WhatsApp
  • TikTok
  • Instagram
  • Email
  • SMS
  • Online loan app
  • Fake lending website
  • E-wallet transaction
  • Online banking
  • Electronic document platform
  • Digital signature platform
  • Cloud document signing tool

Cybercrime-related treatment may affect penalties, investigation, evidence preservation, and the involvement of cybercrime units.


VIII. Falsification and Use of Falsified Documents

Unauthorized use of a digital signature may amount to falsification or use of falsified documents, depending on the facts.

Falsification may be involved when a person:

  1. Counterfeits or imitates a signature.
  2. Makes it appear that a person participated in an act when they did not.
  3. Alters a genuine document.
  4. Inserts false statements in a document.
  5. Uses a signature for a document not authorized by the signer.
  6. Creates a fake loan agreement.
  7. Creates a fake promissory note.
  8. Creates a fake acknowledgment of debt.
  9. Creates a fake waiver or consent.
  10. Creates a fake notarized document.

If the scammer then sends, presents, uploads, or relies on the falsified document, separate liability for using a falsified document may arise.


IX. Falsification of Private, Commercial, or Public Documents

The legal classification may depend on the type of document.

A. Private document

A fake loan agreement between private persons may be treated as a private document. Falsification of a private document may be punishable if damage or intent to cause damage is present.

B. Commercial document

If the document is a commercial instrument, financial document, promissory note, receipt, or business record, it may be treated more seriously.

C. Public or notarized document

If the scammer creates a fake notarized document, fake affidavit, fake notarial acknowledgment, or fake public document, the offense may be more serious.

A notarized-looking document is not automatically valid. A fake notarization, forged notarial seal, nonexistent notary, or notarization without personal appearance may be challenged.


X. Identity Theft

Unauthorized use of a digital signature may also involve identity theft.

Identity theft occurs when a person uses another person’s identifying information without authority, especially for fraud.

In loan scam cases, identifying information may include:

  • Name
  • Address
  • Date of birth
  • Government ID
  • Photo
  • Selfie
  • Signature
  • Phone number
  • Email address
  • Bank details
  • E-wallet account
  • Employment information
  • Tax identification number
  • SSS, GSIS, PhilHealth, Pag-IBIG numbers
  • Passport details
  • Biometric data

If the scammer uses this information to create fake documents, apply for loans, open accounts, impersonate the victim, or threaten others, identity theft concerns arise.


XI. Data Privacy Violations

Loan scams often involve collection and misuse of personal information.

A scammer or abusive lender may violate privacy principles by:

  1. Collecting excessive personal data.
  2. Using data for a purpose not disclosed.
  3. Sharing the victim’s ID or signature without consent.
  4. Posting the victim’s personal information online.
  5. Sending the victim’s documents to relatives or employers.
  6. Using contact lists for harassment.
  7. Selling borrower data to other scammers.
  8. Failing to secure submitted documents.
  9. Using the victim’s signature to create fake documents.
  10. Retaining personal data after the transaction is cancelled.

Data privacy issues are especially serious when sensitive personal information, government IDs, financial records, or identity documents are involved.


XII. Unauthorized Digital Signature and Consent

Consent is central to the validity of a digital signature.

Consent may be absent or defective when:

  1. The victim never signed the document.
  2. The signature was copied from another source.
  3. The victim signed under false pretenses.
  4. The document was changed after signing.
  5. The victim was not shown the full document.
  6. The terms were hidden.
  7. The victim was pressured, threatened, or misled.
  8. The victim believed the signature was only for identity verification.
  9. The victim did not intend to create a loan obligation.
  10. The victim was tricked into signing a blank or incomplete form.

Fraud vitiates consent. A document obtained by fraud may be voidable, unenforceable, or evidence of a criminal act, depending on the circumstances.


XIII. No Loan Release, No Real Debt

A common scam tactic is to tell the victim:

“You signed the loan contract, so you must pay the processing fee, cancellation fee, penalty, or amortization.”

If no loan proceeds were released, the supposed lender may have no basis to collect repayment of the loan principal. The victim should distinguish between:

  1. A real loan that was actually released; and
  2. A fake loan transaction used only to extract advance fees.

A contract that was created by fraud, supported by forged signature, or used to demand payment for a loan never released may be challenged.

The scammer may claim that the victim owes:

  • Cancellation fee
  • Penalty
  • Breach fee
  • Attorney’s fee
  • Processing fee
  • Tax
  • Insurance
  • Account unlocking fee

These demands are often part of the scam, especially when no loan was disbursed.


XIV. Threats Based on a Fake Digital Contract

Scammers often use fake digitally signed documents to threaten victims.

Common threats include:

  • “You will be sued for breach of contract.”
  • “You will be arrested.”
  • “Police are coming to your house.”
  • “Your barangay will be notified.”
  • “Your name will be blacklisted.”
  • “Your NBI record will be affected.”
  • “Your employer will receive a complaint.”
  • “Your family will be contacted.”
  • “Your ID will be posted online.”
  • “You must pay cancellation fee to avoid a case.”

These threats are often legally baseless or exaggerated. Real legal proceedings require formal processes. Arrest does not happen merely because a borrower refuses to pay a suspicious advance fee or cancellation charge.

If threats are made, they should be preserved as evidence.


XV. Imprisonment for Debt

The Philippine Constitution prohibits imprisonment for debt. A person cannot be jailed merely for failure to pay a civil debt.

However, fraud is different from debt. A person who obtains money through deceit may face criminal liability. In an advance fee loan scam, the person exposed to criminal liability is usually the scammer who induced payment through false representations.

Scammers misuse criminal-law language to scare victims into paying more money.


XVI. When a Digital Loan Agreement May Be Valid

Not all digital loan agreements are scams. A legitimate online loan may be valid if:

  1. The lender is legally authorized.
  2. The borrower knowingly applies.
  3. The terms are clearly disclosed.
  4. The borrower gives valid consent.
  5. The electronic signature is authentic.
  6. The loan proceeds are actually released.
  7. Fees and interest are lawful and transparent.
  8. The lender complies with lending, consumer, and data privacy rules.
  9. Payments are made through official channels.
  10. Receipts and records are available.

The issue is not whether the document is digital. The issue is whether the transaction is genuine, lawful, and consensual.


XVII. Red Flags of an Advance Fee Loan Scam

A loan offer is suspicious if:

  1. Approval is guaranteed.
  2. The lender does not conduct meaningful verification.
  3. The lender asks for payment before releasing money.
  4. Payments are sent to personal GCash, Maya, or bank accounts.
  5. The company cannot be verified.
  6. The agent refuses to provide an office address.
  7. The page or account is newly created.
  8. The supposed contract has grammar errors, inconsistent names, or vague terms.
  9. The lender sends a digitally signed document too quickly.
  10. The victim is pressured to sign immediately.
  11. The lender asks for OTP, password, PIN, or remote access.
  12. The lender demands a selfie with ID without clear privacy safeguards.
  13. Fees keep increasing after each payment.
  14. The lender threatens arrest or public shaming.
  15. The lender uses fake government, bank, or regulator logos.
  16. The loan is supposedly credited but “locked.”
  17. The victim must pay to cancel a loan never received.
  18. Official receipts are not issued.
  19. The lender refuses to deduct fees from loan proceeds.
  20. The agent communicates only through private messaging apps.

XVIII. Red Flags of Unauthorized Digital Signature Use

Unauthorized digital signature use may be suspected if:

  1. The document contains a signature the victim never placed.
  2. The signature looks cropped, pixelated, resized, or pasted.
  3. The document has inconsistent fonts, spacing, or formatting.
  4. The signature appears on pages the victim never saw.
  5. The victim signed a different document.
  6. The document terms differ from what was discussed.
  7. The signature appears on a fake notarized document.
  8. The document has no audit trail.
  9. The platform cannot show signing logs.
  10. The signature was taken from an ID or previous document.
  11. The date or time of signing is impossible.
  12. The victim was not given a copy at the time of signing.
  13. The document was sent only after the victim refused to pay more.
  14. The signature appears beside false statements.
  15. The supposed lender cannot prove how the signature was obtained.

XIX. Evidence Needed by the Victim

A victim should preserve all possible evidence.

Important evidence includes:

  1. Screenshots of loan advertisement.
  2. Screenshots of chat conversations.
  3. URLs or profile links.
  4. Phone numbers used by the scammer.
  5. Email addresses.
  6. Fake company name.
  7. Fake agent name.
  8. Bank or e-wallet account numbers.
  9. Payment receipts and transaction references.
  10. Loan application forms.
  11. Digital documents sent by the scammer.
  12. Copies of signed and unsigned versions.
  13. Metadata, if available.
  14. Email headers, if applicable.
  15. Screen recordings showing the account or website.
  16. Proof that no loan was released.
  17. Threat messages.
  18. Proof that the signature was copied or altered.
  19. Official denial from the legitimate company, if impersonated.
  20. Timeline of events.

The victim should avoid deleting messages, blocking too early without preserving evidence, or editing screenshots in a way that affects authenticity.


XX. Digital Evidence Preservation

Digital evidence is fragile. A scammer may delete accounts, change usernames, unsend messages, or take down websites.

The victim should:

  1. Take full screenshots showing date, time, account name, and message content.
  2. Save the conversation export if the app allows it.
  3. Copy profile links and page URLs.
  4. Record the user ID if visible.
  5. Download documents in original format.
  6. Preserve email attachments.
  7. Keep transaction confirmations.
  8. Save the device used in the transaction.
  9. Avoid altering the original files.
  10. Back up evidence securely.

For signed electronic documents, the victim should preserve the original file because it may contain metadata, timestamps, signing certificates, or audit trails.


XXI. Checking the Authenticity of a Digital Signature

A victim or investigator may examine:

  1. Whether the signature was inserted as an image.
  2. Whether the document has metadata showing editing history.
  3. Whether the signature platform has an audit trail.
  4. Whether the signer’s email or phone number was used.
  5. Whether OTP or identity verification occurred.
  6. Whether the IP address or device is associated with the victim.
  7. Whether the document was modified after signing.
  8. Whether the signature matches other known signatures.
  9. Whether the signature appears copied from an ID.
  10. Whether the document was created before or after the alleged signing.

A technical forensic review may be useful in serious cases.


XXII. Common Fake Documents in These Scams

Scammers may send documents titled:

  • Loan Agreement
  • Promissory Note
  • Disclosure Statement
  • Certificate of Loan Approval
  • Release Order
  • Memorandum of Agreement
  • Affidavit of Undertaking
  • Waiver
  • Authorization Letter
  • Debt Acknowledgment
  • Notice of Breach
  • Demand Letter
  • Court Notice
  • Barangay Notice
  • Police Complaint
  • NBI Report
  • Blacklist Certificate
  • Anti-Money Laundering Certificate
  • Insurance Certificate
  • Bank Clearance
  • Tax Clearance
  • Notarized Loan Contract

The title of a document does not prove its validity. The contents, authenticity, authority, and circumstances matter.


XXIII. Fake Notarization

Scammers may send fake notarized documents to intimidate victims.

Red flags include:

  1. Notarial seal appears blurred or copied.
  2. Notary details are incomplete.
  3. No notarial register number.
  4. No personal appearance occurred.
  5. The victim never presented ID to a notary.
  6. The notary is unknown or nonexistent.
  7. The notarial venue is inconsistent.
  8. The document date is impossible.
  9. The signature was inserted electronically after notarization.
  10. The notarial page is attached to a different document.

A fake notarization may create separate issues of falsification and professional misconduct if a real notary is involved.


XXIV. Unauthorized Use of Government or Company Logos

Scammers may use logos of:

  • Banks
  • Lending companies
  • Financing companies
  • Cooperatives
  • Government agencies
  • Courts
  • Police units
  • Barangays
  • Anti-cybercrime offices
  • Tax authorities
  • Insurance companies
  • E-wallet providers

Use of a logo does not prove authority. A victim should verify through independent official channels, not through contact details given by the scammer.

Unauthorized use of names, logos, certificates, or seals may support fraud, falsification, or misrepresentation allegations.


XXV. Legal Remedies of the Victim

A victim may consider several remedies.

A. Criminal complaint

Possible criminal complaints may include:

  1. Estafa.
  2. Cybercrime-related estafa.
  3. Falsification.
  4. Use of falsified document.
  5. Identity theft.
  6. Computer-related fraud.
  7. Unlawful access or misuse of computer systems, if applicable.
  8. Threats or coercion, if threats were made.
  9. Unjust vexation or harassment-related offenses, depending on facts.
  10. Other offenses based on the conduct.

B. Civil action

The victim may seek:

  1. Return of money paid.
  2. Actual damages.
  3. Moral damages, in proper cases.
  4. Exemplary damages, in proper cases.
  5. Attorney’s fees, where justified.
  6. Costs of suit.
  7. Declaration that a document is void, unenforceable, or falsified, where appropriate.

C. Administrative or regulatory complaints

If a real lending company, financing company, online lending app, or regulated entity is involved, complaints may be filed with the appropriate regulator.

If personal data was misused, a data privacy complaint may be considered.

D. Reports to banks, e-wallets, and platforms

The victim should immediately report the receiving account, fake page, fake website, or abusive account.


XXVI. Where a Victim May Report

Depending on the facts, a victim may report to:

  1. Local police.
  2. Cybercrime police units.
  3. National Bureau of Investigation cybercrime office.
  4. City or provincial prosecutor.
  5. Bank or e-wallet fraud department.
  6. Social media platform.
  7. Payment provider.
  8. Regulator of lending or financing companies.
  9. Data privacy authority.
  10. Barangay, where threats or local harassment are involved and where appropriate.

For online scams, cybercrime reporting is often useful because digital evidence and electronic accounts may need technical investigation.


XXVII. Immediate Steps After Discovering the Scam

A victim should act quickly.

1. Stop paying

Do not send additional processing fees, cancellation fees, unlocking fees, or penalties.

2. Preserve evidence

Save all messages, documents, receipts, and screenshots.

3. Report the payment account

Contact the bank, e-wallet, or remittance provider immediately.

4. Secure personal accounts

Change passwords and enable two-factor authentication.

5. Protect identity documents

If IDs and signatures were sent, monitor for unauthorized accounts or loans.

6. Revoke access

If an app was installed, review permissions and uninstall suspicious apps after preserving evidence.

7. Warn contacts

If the scammer has contact information, warn relatives, friends, or employer not to respond.

8. File a report

Make a formal report if money, documents, or signatures were misused.


XXVIII. What to Do If a Signature Was Forged or Misused

If the victim’s digital signature was used without authority, the victim should:

  1. Save the document containing the signature.
  2. Save the original source from which the signature may have been copied.
  3. Write a clear statement denying authorization.
  4. Demand that the scammer stop using the signature, if safe and appropriate.
  5. Notify any company or platform receiving the fake document.
  6. Report to law enforcement or cybercrime authorities.
  7. Report identity theft risk to banks and e-wallets.
  8. Secure IDs, email, SIM, and financial accounts.
  9. Consider executing an affidavit of denial or affidavit of unauthorized signature.
  10. Preserve all versions of the document.

XXIX. Affidavit of Unauthorized Digital Signature

An affidavit may be useful to document the victim’s denial.

It may state:

  1. The affiant’s identity.
  2. The loan scam facts.
  3. The documents submitted to the scammer.
  4. The signature that was misused.
  5. The document where the unauthorized signature appears.
  6. The fact that the affiant did not sign or authorize the document.
  7. The fact that no loan was released, if true.
  8. The amount paid, if any.
  9. The threats or demands received.
  10. The request for investigation.

This affidavit may be attached to complaints, reports, or notices to institutions.


XXX. Sample Affidavit Language

A victim’s affidavit may include language such as:

I did not sign, authorize, approve, or consent to the use of my signature in the document titled “[title of document]” dated “[date].” The signature appearing on said document was used without my authority. I believe it was copied, inserted, or fabricated from the documents I submitted during the supposed loan application. I never received any loan proceeds from the person or entity concerned. Any demand for payment based on said document is denied and disputed.

The affidavit should be tailored to the actual facts and should not include statements the affiant cannot truthfully support.


XXXI. Demand Letter for Unauthorized Use of Signature

A demand letter may state:

I deny having signed or authorized the document you sent to me. I further deny receiving any loan proceeds. Your use of my signature is unauthorized and appears to have been made to force me to pay alleged fees or penalties. I demand that you immediately cease and desist from using my name, signature, identification documents, and personal information. I also demand the return of the amounts I paid, totaling [amount], and reserve all rights to file criminal, civil, administrative, and data privacy complaints.

A demand letter is not always required before filing a criminal complaint, especially when urgent reporting is necessary.


XXXII. Complaint-Affidavit Structure

A complaint-affidavit may be structured as follows:

  1. Personal circumstances of complainant.
  2. How the loan offer was discovered.
  3. Identity or alias of respondent.
  4. Representations made by respondent.
  5. Submission of documents and digital signature.
  6. Fake approval or loan promise.
  7. Fees demanded.
  8. Payments made.
  9. Failure to release loan.
  10. Unauthorized use of digital signature.
  11. Threats or harassment.
  12. Damage suffered.
  13. Evidence attached.
  14. Request for investigation and prosecution.

A clear chronology helps investigators understand the fraud.


XXXIII. Evidence Checklist

The victim should prepare:

  • Government ID of complainant
  • Screenshots of the loan offer
  • Full chat history
  • Payment receipts
  • Bank or e-wallet transaction records
  • Account numbers of recipient
  • Fake loan agreement
  • Fake promissory note
  • Digital signature file, if any
  • Original document where signature may have been copied from
  • Fake demand letters
  • Threat messages
  • Social media profile links
  • Website links
  • Email headers
  • Mobile numbers
  • Proof no loan was released
  • Affidavit of unauthorized signature
  • Affidavit of loss or compromise, if relevant
  • Certification from legitimate company, if impersonated
  • Timeline of events

XXXIV. If the Scammer Claims the Victim Owes a Cancellation Fee

A cancellation fee is a common second-stage scam.

The scammer may claim that because the victim signed an online document, the victim must pay to cancel the loan.

A victim should ask:

  1. Was a loan actually released?
  2. Was the lender legally authorized?
  3. Was the signature valid and voluntary?
  4. Were cancellation charges clearly disclosed?
  5. Was the document altered?
  6. Was the fee lawful?
  7. Is the demand part of a pattern of repeated advance fees?

If no loan was released and the signature was unauthorized or obtained by fraud, the cancellation fee may be part of the scam.


XXXV. If the Scammer Threatens Criminal Charges Against the Victim

Scammers may accuse the victim of:

  • Breach of contract
  • Estafa
  • Fraud
  • Loan evasion
  • Nonpayment
  • Violation of cybercrime law
  • False application
  • Contract abandonment

A victim should not panic. A real criminal case is not created by a scammer’s threat. The victim should preserve the threat and report it.

If the victim used truthful information and did not receive a loan, refusal to pay additional scam fees is not the same as fraud.


XXXVI. If the Scammer Posts the Victim’s Signature or ID Online

If the scammer publicly posts the victim’s ID, signature, photo, or personal details, the victim should:

  1. Take screenshots with URLs and timestamps.
  2. Report the post to the platform.
  3. File a complaint for privacy violation or cyber-related offense where appropriate.
  4. Notify affected contacts.
  5. Monitor for identity theft.
  6. Preserve evidence before the post is deleted.
  7. Avoid engaging emotionally in public comments.
  8. Consider requesting takedown through formal channels.

Public disclosure of identity documents and signatures can cause continuing harm.


XXXVII. If the Victim Installed a Loan App

Some advance fee scams use apps that request device permissions.

The victim should check whether the app accessed:

  • Contacts
  • Photos
  • SMS
  • Camera
  • Microphone
  • Location
  • Storage
  • Call logs
  • Clipboard
  • Notifications

Steps:

  1. Screenshot the app details.
  2. Preserve messages and documents.
  3. Revoke permissions.
  4. Uninstall the app if unsafe.
  5. Change passwords.
  6. Monitor accounts.
  7. Warn contacts.
  8. Report the app to the platform and authorities.

If the app harvested data and used it for harassment, privacy and cybercrime issues may arise.


XXXVIII. If the Victim Gave OTP, PIN, or Password

No legitimate lender should ask for OTP, PIN, password, or remote access.

If these were given:

  1. Contact the bank or e-wallet immediately.
  2. Freeze or secure the account.
  3. Change passwords.
  4. Revoke logged-in devices.
  5. Report unauthorized transactions.
  6. Replace compromised cards if needed.
  7. Secure email and SIM.
  8. Preserve the chat where the OTP was requested.
  9. File a cybercrime report if funds were taken.
  10. Monitor for further unauthorized activity.

XXXIX. If the Victim Sent a Selfie with ID and Signature

A selfie with ID is commonly used for identity verification but is dangerous if sent to scammers.

Risks include:

  1. Opening e-wallet accounts.
  2. Applying for online loans.
  3. Creating fake authorizations.
  4. Impersonating the victim.
  5. Bypassing account verification.
  6. Threatening public exposure.
  7. Creating fake debt documents.
  8. Selling identity packets to other fraudsters.

The victim should monitor messages from banks, lenders, and e-wallets and immediately dispute any unauthorized transaction.


XL. Liability of the Receiving Account Holder

Payments in scams are often sent to bank or e-wallet accounts under names different from the fake agent.

The account holder may be:

  1. The scammer.
  2. A money mule.
  3. A recruited accomplice.
  4. A person whose account was rented.
  5. A person whose identity was stolen.
  6. Another victim.

A person who knowingly receives or transfers scam proceeds may face liability. Even lending an account to someone else can create serious legal exposure.

Victims should report account details to payment providers and law enforcement.


XLI. Liability of a Fake Loan Agent

A fake loan agent may be liable even if they claim they are “only an agent.”

Liability may arise if the agent:

  1. Made false representations.
  2. Collected advance fees.
  3. Sent fake documents.
  4. Used unauthorized signatures.
  5. Threatened the victim.
  6. Received or routed payments.
  7. Pretended to represent a company.
  8. Participated in the fraudulent scheme.
  9. Recruited victims.
  10. Helped conceal the real operator.

Participation in fraud cannot be excused merely by using the label “agent.”


XLII. Liability of a Real Lending Company

If a real lending company is involved, the issue becomes whether the acts were authorized.

There are three possible scenarios:

A. Impersonation

The scammer used the name of a real company without authority. The real company may also be a victim.

B. Rogue agent or employee

A real employee or agent acted outside authority. The company may still face questions depending on supervision, apparent authority, benefit received, and negligence.

C. Company practice

The company itself uses deceptive advance fees, unauthorized signatures, or abusive practices. This may create corporate, officer, civil, administrative, and possibly criminal liability.

Victims should verify with the company through independent official contact channels.


XLIII. Validity of a Digitally Signed Loan Contract

A digitally signed loan contract may be challenged on grounds such as:

  1. Forgery.
  2. Fraud.
  3. Lack of consent.
  4. Mistake.
  5. Alteration.
  6. Absence of consideration.
  7. No release of loan proceeds.
  8. Illegality of fees.
  9. Lack of authority of lender.
  10. Misrepresentation.
  11. Unconscionable terms.
  12. Violation of consumer protection rules.
  13. Data privacy violations.
  14. Failure to comply with disclosure requirements.

The burden of proving authenticity may fall on the party relying on the signature, especially when the alleged signer specifically denies it.


XLIV. What If the Victim Actually Signed but Was Deceived?

Even if the victim actually signed, the document may still be challenged if consent was obtained through fraud.

Examples:

  • The victim was told the document was only for verification.
  • The victim was not shown the full terms.
  • The victim was told the fee was refundable.
  • The victim signed after being told the loan was already approved.
  • The victim signed under pressure to avoid fake legal consequences.
  • The victim signed a blank or incomplete document.
  • The victim signed one version but another version was later used.

A signature does not cure fraud.


XLV. What If the Victim Did Not Read the Digital Contract?

As a general rule, a person who signs a contract is expected to read it. However, in scams, the issue is often not mere failure to read but fraud, concealment, alteration, forgery, or misrepresentation.

The victim’s position is stronger if there is evidence that:

  1. The document was not made available.
  2. The terms were hidden.
  3. The signature was copied.
  4. The document was altered after signing.
  5. The victim was misled about the nature of the document.
  6. The lender used threats or deception.
  7. No loan was released.
  8. The supposed fees were invented after payment.

XLVI. Official Receipts and Payment Channels

A legitimate lender or financing company should generally use official payment channels and issue proper receipts.

Warning signs include:

  1. Payment to personal GCash or Maya.
  2. Payment to a different individual.
  3. Refusal to issue receipt.
  4. Receipt with no company details.
  5. Receipt sent as editable image.
  6. Payment split into multiple small transfers.
  7. Payment to crypto wallet.
  8. Payment to remittance recipient unrelated to the company.
  9. Payment account changes frequently.
  10. Agent becomes angry when asked for official receipt.

Payment evidence is crucial in proving the scam.


XLVII. Recovery of Money

Recovery may be difficult if the scammer withdraws funds immediately. However, victims should still report quickly.

Possible recovery routes include:

  1. Freezing or investigation by bank or e-wallet.
  2. Refund through platform dispute process, where available.
  3. Criminal case with civil liability.
  4. Civil action against known respondents.
  5. Small claims, if facts and defendant identity permit.
  6. Settlement, if respondent is identified and willing to refund.
  7. Regulatory intervention, if a real company is involved.

Immediate reporting improves the chance of tracing funds.


XLVIII. Small Claims

If the scammer is known, identifiable, and reachable, and the victim’s primary goal is to recover money, a small claims case may be considered for qualifying money claims.

However, small claims may not be enough when:

  1. The identity is fake.
  2. The case involves serious fraud.
  3. A forged signature is involved.
  4. Criminal prosecution is desired.
  5. The scam is syndicated.
  6. There are data privacy or cybercrime issues.
  7. Injunctive or declaratory relief is needed.

A criminal complaint may be more appropriate when deceit and falsification are central.


XLIX. Barangay Proceedings

Barangay conciliation may apply to certain disputes between individuals in the same locality. But many advance fee loan scams involve online fraud, unknown respondents, different locations, corporate entities, or serious criminal offenses. In such cases, barangay proceedings may be unavailable, unnecessary, or impractical.

Victims should not rely on barangay settlement when urgent cybercrime or financial fraud reporting is needed.


L. If the Scammer Uses a Fake Lawyer or Fake Police Officer

Some scammers send messages from supposed lawyers, police officers, prosecutors, barangay officials, or court personnel.

Red flags include:

  1. Threats through personal messaging apps.
  2. Demand for payment to stop arrest.
  3. Fake warrant.
  4. Fake subpoena.
  5. No official case number.
  6. Poorly formatted legal documents.
  7. Payment to personal e-wallet.
  8. Refusal to provide office details.
  9. Immediate threat of imprisonment for debt.
  10. Use of intimidation rather than formal service.

Impersonation of lawyers or public officers may create additional liability.


LI. If the Victim Receives a Real Demand Letter

Not every demand letter is fake. If the victim receives a formal demand letter from a real law office or company, the victim should not ignore it.

Instead, the victim should:

  1. Verify the sender independently.
  2. Check whether a real loan was released.
  3. Review whether the signature is authentic.
  4. Prepare a written denial if the document is forged or unauthorized.
  5. Request proof of loan release.
  6. Request the complete contract and transaction history.
  7. Preserve all scam evidence.
  8. Consult counsel if the amount is significant.

A calm written response is better than panic payment.


LII. Defenses Against a Claim Based on Unauthorized Digital Signature

If a person is sued or threatened based on a digitally signed document they deny, possible defenses include:

  1. Forgery.
  2. Lack of consent.
  3. Fraud.
  4. Mistake.
  5. Alteration.
  6. No loan release.
  7. Absence or failure of consideration.
  8. Lack of authority of the supposed lender.
  9. Unlawful fees.
  10. Invalid electronic signature.
  11. Lack of proof of authentication.
  12. Identity theft.
  13. Unconscionable or deceptive transaction.
  14. Misrepresentation.
  15. Violation of consumer protection or data privacy rules.

Evidence will determine which defenses apply.


LIII. Burden of Proving the Signature

A party relying on a signature generally has to prove that the signature is genuine when it is specifically denied. In electronic transactions, this may require proof of authentication, audit trails, access logs, device records, email verification, OTP logs, or other evidence showing that the alleged signer actually signed.

A mere image of a signature pasted onto a document is weak if the alleged signer denies it and circumstances show fraud.


LIV. Digital Signature Audit Trails

For legitimate electronic signing platforms, audit trails may show:

  1. Email address used.
  2. Mobile number used.
  3. Time of access.
  4. IP address.
  5. Device information.
  6. Authentication method.
  7. Document viewed.
  8. Consent steps.
  9. Completion certificate.
  10. Whether the document was modified after signing.

If no audit trail exists, or if the audit trail points to a device or account not controlled by the victim, the signature may be challenged.


LV. Contract Alteration After Signing

A scammer may ask the victim to sign one version, then later alter:

  • Loan amount
  • Fees
  • Interest
  • Penalties
  • Due date
  • Account details
  • Waiver clauses
  • Acknowledgment of release
  • Cancellation charge
  • Personal data consent
  • Authorization to contact third parties

Material alteration without consent may affect validity and may support falsification or fraud.


LVI. Acknowledgment of Loan Release

Some fake documents state that the borrower has received the loan even when no money was released.

This is critical. The victim should specifically deny any false acknowledgment of receipt.

Evidence that no loan was released may include:

  1. Bank statements.
  2. E-wallet history.
  3. No deposit confirmation.
  4. Chat messages showing funds were “pending” or “locked.”
  5. Continued demands for release fees.
  6. Absence of official disbursement record.
  7. Inconsistent transfer screenshots.
  8. Fake receipt from scammer.

If no proceeds were received, the document may be fraudulent.


LVII. Authorized Fees vs. Scam Fees

A legitimate lender may have lawful fees, but these must be transparent and properly documented.

A fee is suspicious when:

  1. It is demanded before release.
  2. It is paid to a personal account.
  3. It was not disclosed.
  4. It changes repeatedly.
  5. It is described vaguely.
  6. It is required to unlock funds.
  7. It is not receipted.
  8. It is accompanied by threats.
  9. It is inconsistent with the written terms.
  10. It exists only after the victim asks for cancellation or refund.

Repeated advance fees are strong indicators of fraud.


LVIII. Online Lending App Harassment

If the scam involves a lending app, the victim may experience:

  1. Contact list harassment.
  2. Public shaming.
  3. Threats to post ID.
  4. Fake legal notices.
  5. Calls to employer.
  6. Text blasts to relatives.
  7. Excessive penalties.
  8. Defamatory accusations.
  9. Unauthorized data access.
  10. Collection by abusive third-party collectors.

Even if a real loan exists, collection must be lawful. If no loan exists and the app only collected fees, the matter may be both fraud and data misuse.


LIX. Sample Notice to Bank or E-Wallet

A report to a payment provider may state:

I am reporting a fraudulent transaction. I transferred [amount] on [date/time] to [account name/number] with reference number [reference]. The recipient represented that the payment was required for release of an approved loan, but no loan was released and additional payments were demanded. The recipient also used or threatened to use my digital signature without authority. Please investigate, preserve records, and take appropriate action on the receiving account.

Attach receipts and screenshots if possible.


LX. Sample Notice to a Legitimate Company Being Impersonated

If a scammer used a real company’s name:

I am writing to verify whether [name/alias] is authorized to represent your company. This person offered me a loan under your company’s name, required advance fees, and sent documents bearing my digital signature. Payments were requested through [account details]. Please confirm whether the transaction, agent, account, and documents are legitimate. If not, please issue a written confirmation that they are unauthorized, as I intend to report the matter.

Such confirmation can help prove misrepresentation.


LXI. Sample Cease-and-Desist for Signature Misuse

A cease-and-desist letter may state:

You are hereby directed to cease and desist from using my name, digital signature, identification documents, photographs, and personal information. I deny authorizing the document you sent and deny receiving any loan proceeds. Any further use, publication, transmission, or reliance on my personal data and unauthorized signature will be included in my complaints for the appropriate criminal, civil, administrative, and data privacy remedies.

This should be sent only if safe and strategically useful.


LXII. When to Consult a Lawyer

Legal assistance is advisable when:

  1. The amount lost is significant.
  2. The victim’s signature was used on a contract or promissory note.
  3. The scammer has the victim’s IDs and selfie.
  4. A real company or collector is demanding payment.
  5. There are threats of public posting.
  6. The victim receives a demand letter.
  7. A case has been filed or threatened.
  8. The victim’s employer or family is being contacted.
  9. The victim’s identity was used for other loans.
  10. The victim wants to file criminal and civil actions.

A lawyer can help prepare affidavits, preserve evidence, respond to demands, and file complaints.


LXIII. If a Debt Collector Contacts the Victim

If a collector claims the victim owes money based on a digitally signed loan agreement, the victim should ask for:

  1. Name of creditor.
  2. Proof of authority to collect.
  3. Complete loan agreement.
  4. Proof of loan disbursement.
  5. Account statement.
  6. Date and method of signing.
  7. Digital signature audit trail.
  8. Breakdown of principal, interest, fees, and penalties.
  9. Privacy basis for processing personal data.
  10. Complaint or dispute procedure.

If the debt is disputed due to fraud or unauthorized signature, the victim should state the dispute in writing.


LXIV. If the Victim’s Contacts Are Harassed

If relatives, friends, or employers are contacted:

  1. Save screenshots of messages sent to them.
  2. Ask contacts to preserve phone numbers and accounts used.
  3. Do not let contacts pay.
  4. Send a written dispute to the collector or lender, if identifiable.
  5. Report harassment to authorities or regulators.
  6. Include third-party harassment in the complaint.
  7. Document reputational harm.

Contacting third parties and revealing alleged debt or personal information may create separate legal issues.


LXV. Practical Prevention

To avoid advance fee loan scams and signature misuse:

  1. Do not pay money to get money.
  2. Verify lenders through official channels.
  3. Avoid lenders who use only personal messaging apps.
  4. Do not send signature specimens to unknown lenders.
  5. Watermark documents submitted for verification.
  6. Write the purpose on copies of IDs, such as “For loan application with [company] only.”
  7. Do not sign blank or incomplete documents.
  8. Keep copies of every signed document.
  9. Use official company portals only.
  10. Avoid personal-account payments.
  11. Never share OTPs, passwords, or PINs.
  12. Read digital terms before signing.
  13. Check if fees can be deducted from proceeds.
  14. Avoid pressure tactics.
  15. Do not install suspicious loan apps.
  16. Limit app permissions.
  17. Use separate email for applications if possible.
  18. Ask for official receipts.
  19. Verify physical office and registration.
  20. Stop immediately when additional fees are demanded.

LXVI. Watermarking IDs and Signature Pages

When submitting documents to a legitimate entity, a person may reduce misuse risk by watermarking copies.

A watermark may state:

Submitted to [Company Name] for [specific purpose] only, on [date]. Not valid for loans, contracts, guarantees, or third-party use without my written consent.

This does not prevent all misuse, but it helps show the intended purpose and makes fraudulent reuse harder.

Do not place the watermark in a way that makes the document unacceptable for legitimate verification. The goal is to deter misuse while keeping required information readable.


LXVII. Do Not Sign Blank Documents

A person should never sign:

  • Blank loan forms
  • Blank promissory notes
  • Blank authorization letters
  • Blank waivers
  • Incomplete contracts
  • Signature pages without full documents
  • “For verification only” forms that do not state the purpose
  • Documents sent as images without full terms
  • Contracts with missing lender details

A blank signature can be weaponized.


LXVIII. How to Respond to a Scammer’s Threat

A victim may respond briefly:

I deny that I owe any amount. No loan was released to me. I do not authorize your use of my name, signature, ID, or personal information. I will preserve these messages and report the matter to the proper authorities.

After that, further argument is usually unhelpful. Scammers use conversation to pressure victims.


LXIX. Do Not Pay to Stop Harassment

Scammers may promise to stop using the victim’s signature or personal data if the victim pays more.

Paying does not guarantee they will stop. It may encourage further extortion.

The better response is to preserve evidence, report accounts, secure identity, and file complaints.


LXX. If the Victim Is Embarrassed

Victims often delay reporting because they feel embarrassed. This helps scammers. Advance fee loan scams are designed to manipulate urgency, fear, and financial need. Prompt reporting is important because digital evidence disappears and funds move quickly.

A victim should focus on evidence, security, and legal remedies rather than shame.


LXXI. Special Concern: Students, Employees, OFWs, and Pensioners

Certain groups are frequent targets.

A. Students

Students may be offered tuition loans or gadget loans and asked to sign digital forms. They may not understand the legal effect of signatures and data sharing.

B. Employees

Employees may be offered salary loans and asked to submit payslips, company IDs, and signatures. Scammers may later threaten to contact HR.

C. Overseas Filipino workers

OFWs may be targeted with deployment loans, seafarer loans, remittance-backed loans, or emergency family loans.

D. Pensioners

Pensioners may be asked for pension account details, IDs, ATM cards, and signatures. Surrendering ATM cards or PINs is especially dangerous.


LXXII. Special Concern: Use of Signature to Apply for Other Loans

A scammer may use the victim’s signature to apply for other loans or accounts. Warning signs include:

  1. Calls from lenders the victim never contacted.
  2. Unexpected OTPs.
  3. Loan approval notices.
  4. Collection messages for unknown debts.
  5. New e-wallet or bank verification messages.
  6. Delivery of SIMs or cards not requested.
  7. Credit-related messages.
  8. Calls to employer or relatives.
  9. Unauthorized deductions.
  10. Unknown accounts using the victim’s name.

The victim should dispute these immediately in writing.


LXXIII. If the Victim Is Accused of Fraud by a Real Lender

Sometimes a real lender may claim the victim applied and signed. The victim should respond with a formal dispute:

  1. Deny the unauthorized application.
  2. Request proof of disbursement.
  3. Request signing logs.
  4. Request copies of submitted IDs.
  5. Request account where funds were released.
  6. State that identity documents may have been compromised.
  7. Attach police or cybercrime report, if available.
  8. Demand suspension of collection while investigation is pending.
  9. Request correction or deletion of fraudulent records.
  10. Preserve all communications.

LXXIV. If the Loan Was Released to Another Account

If a lender claims the loan was released but the victim did not receive it, determine:

  1. What account received the money?
  2. Whose name is on that account?
  3. Was the account provided by the victim?
  4. Was the account altered by the scammer?
  5. Was the victim tricked into using a mule account?
  6. Did the lender verify account ownership?
  7. Was the digital signature authentic?
  8. Was the borrower identity verified properly?

A loan released to an account not controlled by the victim may support identity theft or fraud.


LXXV. If the Victim Did Receive Some Money

Some predatory schemes release a small amount but demand huge fees or penalties.

The legal analysis changes if money was actually received. The issues may include:

  1. Whether the lender is registered.
  2. Whether terms were disclosed.
  3. Whether interest and fees are lawful.
  4. Whether the signature was valid.
  5. Whether deductions were hidden.
  6. Whether collection practices are abusive.
  7. Whether personal data was misused.
  8. Whether the transaction is void, voidable, or enforceable.
  9. Whether the borrower still owes the principal.
  10. Whether regulatory complaints are appropriate.

A borrower should not falsely claim no loan was received if funds were actually disbursed. The correct approach is to challenge unlawful charges, fraud, or abusive practices.


LXXVI. If the Victim Gave Consent to One Use Only

A person may authorize use of a signature for one purpose but not another.

For example:

  • Authorized: identity verification for application.
  • Unauthorized: promissory note.
  • Authorized: consent to credit check.
  • Unauthorized: acknowledgment of loan release.
  • Authorized: application form.
  • Unauthorized: waiver of claims.
  • Authorized: receipt of documents.
  • Unauthorized: contract with penalties.

Limited consent must not be expanded into a different legal obligation.


LXXVII. Civil Damages for Misuse of Signature

Unauthorized use of a signature may cause:

  1. Financial loss.
  2. Reputational harm.
  3. Emotional distress.
  4. Loss of employment opportunity.
  5. Harassment by collectors.
  6. Credit or lending record problems.
  7. Identity theft damage.
  8. Legal expenses.
  9. Family conflict.
  10. Public embarrassment.

Depending on proof and legal basis, the victim may seek damages.


LXXVIII. Possible Liability of Platforms

Social media platforms, messaging apps, e-wallets, or document-signing platforms may not automatically be liable for every scam committed through them. However, they may be important sources of evidence and may have procedures for reporting fraud, account takedown, or data preservation.

Victims should report fake accounts and fraudulent pages promptly.


LXXIX. Practical Legal Analysis Framework

To analyze a case, ask:

  1. Who offered the loan?
  2. Is the lender real and authorized?
  3. Was the loan actually approved?
  4. Was money demanded before release?
  5. What was the fee called?
  6. Was the fee disclosed in writing?
  7. Was payment made to official channels?
  8. Was an official receipt issued?
  9. Was the loan actually released?
  10. Was a digital signature used?
  11. Did the victim authorize the exact document?
  12. Was the document altered?
  13. Was the signature copied or fabricated?
  14. Were threats made?
  15. Was personal data misused?
  16. Were third parties contacted?
  17. What evidence exists?
  18. What remedy is desired: prosecution, refund, takedown, defense, or all of these?

LXXX. Common Mistakes by Victims

Victims often make mistakes such as:

  1. Paying more after the first suspicious fee.
  2. Deleting chats out of anger or fear.
  3. Blocking before preserving evidence.
  4. Sending more IDs to “verify refund.”
  5. Paying cancellation fees.
  6. Believing fake arrest threats.
  7. Ignoring real demand letters.
  8. Failing to report payment accounts immediately.
  9. Not securing email, phone, and e-wallet accounts.
  10. Not warning relatives or employer.
  11. Publicly accusing without preserving proof.
  12. Using edited screenshots as only evidence.
  13. Failing to keep original digital documents.
  14. Waiting too long to report.
  15. Assuming a pasted signature is automatically enforceable.

LXXXI. Common Defenses of Scammers

Scammers or accused persons may claim:

  1. The fee was legitimate.
  2. The victim voluntarily paid.
  3. The victim signed the contract.
  4. The loan was delayed, not denied.
  5. The victim cancelled and owes a fee.
  6. The agent forwarded money to another person.
  7. The account was hacked.
  8. The signature was provided by the victim.
  9. The victim submitted false information.
  10. The matter is purely civil.

These defenses may be countered by evidence of false representations, repeated fee demands, lack of loan release, forged signature, personal payment channels, fake documents, and threats.


LXXXII. Key Legal Principles

  1. A loan offer requiring upfront payment before release is highly suspicious.
  2. A digital signature is not valid if forged, copied, altered, or obtained by fraud.
  3. No loan release usually means no real loan principal to repay.
  4. A fake contract cannot create a lawful debt.
  5. A victim cannot be imprisoned merely for refusing to pay a debt or fake fee.
  6. Fraud may create criminal liability for the scammer.
  7. Online loan scams may be cybercrime-related.
  8. Unauthorized use of a signature may amount to falsification or identity theft.
  9. Misuse of personal data may create data privacy liability.
  10. Evidence preservation is urgent.
  11. Payment accounts should be reported quickly.
  12. Repeated demands for “unlocking,” “AMLA,” “insurance,” or “cancellation” fees are classic scam indicators.
  13. Official receipts, verified company identity, and proof of loan release matter.
  14. Threats should be documented, not obeyed.
  15. A victim should dispute unauthorized digital documents in writing.

LXXXIII. Sample Victim Action Plan

A practical sequence is:

  1. Stop paying immediately.
  2. Save chats, documents, receipts, and profile links.
  3. Download the fake digitally signed document.
  4. Preserve the original source of the signature, if known.
  5. Screenshot threats and demands.
  6. Report payment account to bank or e-wallet.
  7. Secure email, phone, banking, and e-wallet accounts.
  8. Warn contacts if the scammer has access to them.
  9. Prepare a timeline of events.
  10. Execute an affidavit of unauthorized digital signature, if needed.
  11. File a cybercrime or police report.
  12. File a prosecutor’s complaint if evidence is sufficient.
  13. Report data privacy misuse if personal information is threatened or disclosed.
  14. Dispute any debt claim from collectors or lenders.
  15. Monitor for identity theft.

LXXXIV. Sample Timeline Format

A victim may prepare a timeline like this:

Date Event Evidence
Date 1 Saw loan advertisement online Screenshot of post
Date 2 Contacted agent Chat screenshot
Date 3 Submitted ID and signature Chat/file record
Date 4 Received loan approval Fake approval letter
Date 5 Paid processing fee E-wallet receipt
Date 6 Asked for insurance fee Chat screenshot
Date 7 Refused to pay more Chat screenshot
Date 8 Received fake signed contract PDF/document
Date 9 Threatened with arrest or posting Chat screenshot
Date 10 Reported to bank/e-wallet Report reference

A clear timeline makes complaints easier to evaluate.


LXXXV. Sample Written Dispute to a Collector

If contacted by a collector, the victim may write:

I dispute this alleged debt. I did not authorize the use of my digital signature on the document you are relying on, and I deny receiving the alleged loan proceeds. Please provide proof of loan disbursement, the complete loan agreement, the electronic signature audit trail, proof of authority to collect, and a full statement of account. Pending verification, cease collection activity and do not contact third parties regarding this disputed matter.

This creates a record of dispute.


LXXXVI. Sample Report Summary

A report to authorities may summarize:

I was induced to pay advance fees for a supposed loan that was never released. The respondent represented that my loan had been approved and required payment before release. After I paid, more fees were demanded. When I refused, the respondent used or sent a document bearing my digital signature, which I did not authorize for that purpose, and threatened legal action or public disclosure. I request investigation for estafa, cybercrime-related offenses, falsification, identity theft, and other applicable violations.


LXXXVII. Final Practical Warnings

A person should be especially cautious when a supposed lender says:

  • “Pay first before release.”
  • “Your loan is approved but locked.”
  • “You must pay AMLA clearance.”
  • “Send your signature for verification.”
  • “Sign this blank form.”
  • “Pay cancellation fee or you will be arrested.”
  • “We will post your ID.”
  • “Your NBI record will be affected.”
  • “Do not tell anyone.”
  • “Pay through my personal GCash.”
  • “The company account is under maintenance.”
  • “The document is already legally binding even without release.”
  • “You must pay more to refund your money.”

These are common manipulation tactics.


Conclusion

Advance fee loan scams and unauthorized use of digital signatures are serious problems in the Philippines. They combine financial fraud, identity misuse, electronic document manipulation, and intimidation. The victim is promised a loan, induced to pay money first, and then pressured with more fees or threats. When a digital signature is involved, the scammer may attempt to create the appearance of a valid debt, contract, promissory note, waiver, or cancellation obligation.

Philippine law recognizes electronic signatures and electronic documents, but only when they are authentic, authorized, and supported by genuine consent. A signature that is copied, forged, pasted, fabricated, altered, or obtained through deception may be challenged. If no loan was released, a supposed loan contract or cancellation fee demand is highly suspect.

The legal remedies may include criminal complaints for estafa, cybercrime-related estafa, falsification, identity theft, and related offenses; civil claims for recovery and damages; data privacy complaints; regulatory complaints; and reports to banks, e-wallets, and online platforms. The victim’s strongest protection is prompt action: stop paying, preserve evidence, secure accounts, report payment channels, dispute unauthorized documents, and file the appropriate complaint.

The central rule is simple: a legitimate loan should not require repeated unexplained advance payments to unlock money, and a digital signature cannot lawfully be used beyond the person’s actual consent.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.