Criminal Liability for Impersonation and Pretending to Be Another Person

A Philippine Legal Article

In Philippine law, “impersonation” is not always punished under a single, all-purpose crime called impersonation. The criminal liability depends on what exactly was pretended, how it was done, why it was done, and what harm resulted. A person who merely uses another’s name may violate one law; a person who pretends to be a government official may violate another; a person who assumes another’s identity online may incur liability under cybercrime law; and a person who uses a false identity to obtain money or property may be prosecuted for estafa, falsification, or both.

So the correct Philippine-law approach is this: pretending to be another person is punishable when the act falls within a specific penal provision. In practice, the most important Philippine rules are found in the Revised Penal Code, the Anti-Alias Law, and the Cybercrime Prevention Act, with related liability arising under the laws on falsification, estafa, libel/cyberlibel, forgery, and even election, immigration, or other special laws depending on the setting.

This article explains the subject comprehensively.


I. Core Legal Idea: There Is No Single Blanket Crime of “Impersonation”

Philippine criminal law punishes acts, not labels. A prosecutor does not usually file a case simply captioned “impersonation” unless a statute specifically defines that form of conduct. Instead, the State asks:

  • Did the accused pretend to be a public officer?
  • Did the accused use a fictitious name or conceal a true name?
  • Did the accused use an alias unlawfully?
  • Did the accused assume another’s identity through a computer system?
  • Did the impersonation become the means to commit estafa?
  • Was a document falsified to support the impersonation?
  • Was another person’s name or identity used to defame, threaten, or harass?
  • Did the impersonation produce damage, deceit, public confusion, or prejudice?

Because of this, one act of pretending to be another person may produce multiple criminal charges.


II. Main Philippine Criminal Provisions Relevant to Impersonation

1. Usurpation of Authority or Official Functions

Article 177, Revised Penal Code

This is one of the clearest provisions on impersonation in the Philippine setting.

It punishes two kinds of conduct:

First form: Usurpation of authority. A person knowingly and falsely represents himself or herself as an officer, agent, or representative of a department or agency of the Philippine Government or of a foreign government.

Second form: Usurpation of official functions. A person performs an act pertaining to a public officer or public employee without being lawfully entitled to do so.

Why this matters

A person who pretends to be a police officer, NBI agent, immigration officer, barangay official, prosecutor’s staff, court sheriff, or any public official may be liable even if no money was taken. The offense protects public order, trust in government, and the integrity of official functions.

Elements usually considered

For the false representation branch:

  • there is a representation of being a government officer, agent, or representative;
  • the representation is false;
  • the accused knows it is false.

For the unlawful exercise of function branch:

  • the accused performs an act that belongs to a public officer or employee;
  • the accused is not lawfully entitled to perform that act.

Examples

  • Wearing a police-like uniform and conducting “inspections.”
  • Introducing oneself as an NBI operative to intimidate others.
  • Serving fake warrants or fake government notices.
  • Demanding compliance while claiming to be from a government office.
  • Entering premises and conducting searches as if one were an authorized official.

Important point

Actual gain is not always necessary. The offense may exist from the false assumption of authority itself.


2. Using Fictitious Name and Concealing True Name

Article 178, Revised Penal Code

This article covers a narrower but important class of identity deception.

It punishes:

  • publicly using a fictitious name under circumstances specified by law, especially where done to conceal a crime, evade the execution of a judgment, or cause damage; and
  • concealing true name and other personal circumstances.

Distinction inside Article 178

There are really two related wrongs:

  1. Use of a fictitious name in legally significant or harmful circumstances.
  2. Concealment of true identity when required or when done in a context the law penalizes.

What is a fictitious name?

A name that is not one’s true name and is used in a way that has legal significance. Not every nickname is criminal. The law is concerned with deceptive identity use tied to unlawful purpose or prejudice.

Examples

  • Using a made-up identity while transacting in order to avoid detection after committing a crime.
  • Giving a false legal identity to evade service, judgment, or arrest.
  • Publicly assuming a fake name to cause damage or create confusion.

Practical limit

A casual nickname, screen name, pen name, or stage name is not automatically criminal. Criminal liability usually arises when the false identity is used in harmful, fraudulent, or legally material circumstances.


3. The Anti-Alias Law

Commonwealth Act No. 142, as amended

This is often overlooked but highly relevant.

Philippine law regulates the use of aliases. As a rule, a person may not use an alias except as allowed by law or with proper authority. There are recognized exceptions for some contexts, such as stage names and pen names, but the law targets unauthorized use of aliases that can mislead the public or defeat official identification.

Why this matters in impersonation cases

Someone may not necessarily use the exact identity of a real person, yet may still commit an offense by assuming an unauthorized alias in a way the law forbids.

Difference from Article 178

  • Article 178 focuses on fictitious names and concealment in penal contexts.
  • The Anti-Alias Law focuses on the unlawful use of aliases more broadly.

Examples

  • Repeatedly using an unauthorized second legal identity in official or business dealings.
  • Maintaining two inconsistent public identities for deceptive purposes.
  • Signing and acting under an alias without lawful basis in transactions where true identity matters.

4. Computer-Related Identity Theft

Cybercrime Prevention Act of 2012 (Republic Act No. 10175)

This is the most direct modern law against digital impersonation.

The Act punishes computer-related identity theft, generally understood as the intentional acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another through information and communications technologies, without right.

This is crucial

In the Philippines, online impersonation is not merely a social problem; it can be a specific cybercrime.

Common online examples

  • Creating fake social media accounts in another person’s name.
  • Taking over another’s email, account credentials, or digital identity.
  • Using another person’s photos and details to solicit money, romance, favors, or business.
  • Assuming another’s online identity to deceive contacts, customers, or the public.
  • Using another person’s digital credentials to transact, borrow, or gain access.

Key features

  • The offense requires a computer or ICT-based setting.
  • The target is identifying information.
  • Lack of authority is central.
  • Actual economic damage strengthens the case but is not always the only concern.

Related cyber offenses

Digital impersonation may also overlap with:

  • computer-related fraud,
  • computer-related forgery,
  • cyber libel,
  • illegal access or account takeover,
  • online scams prosecuted through cybercrime mechanisms.

5. Estafa When Impersonation Is the Means of Fraud

Article 315, Revised Penal Code

If a person pretends to be another person in order to obtain money, property, credit, signature, or advantage through deceit, the case often becomes estafa.

The essential concept is simple: impersonation becomes criminal because it is a fraudulent false pretense used to induce the victim to part with money or property.

Typical forms

  • Pretending to be the account owner to withdraw funds or collect remittances.
  • Pretending to be a relative, agent, employee, lawyer, or authorized representative to receive money.
  • Pretending to be a seller, buyer, borrower, or beneficiary using another person’s identity.
  • Pretending to be a corporate officer to order goods on credit.
  • Pretending to be a victim’s friend or family member online to solicit emergency funds.

Core estafa idea

There must be deceit and damage or prejudice capable of pecuniary estimation.

Why impersonation matters here

The false identity is often the very deceit that causes the victim to act.

Multiple liability

If fake IDs, fake signatures, or fake authorizations are used, the accused may face both estafa and falsification.


6. Falsification of Public, Official, or Private Documents

Articles 171, 172, and related provisions of the Revised Penal Code

Impersonation is frequently supported by false documents. When that happens, the law on falsification becomes central.

Common impersonation-linked falsification acts

  • Signing another person’s name without authority.
  • Creating fake IDs, certificates, authorizations, deeds, affidavits, contracts, receipts, or letters.
  • Causing it to appear that a real person participated in an act when they did not.
  • Making untruthful statements in a narration of facts in a public document under circumstances penalized by law.
  • Using falsified documents knowing they are falsified.

Examples

  • Fake SPA or special power of attorney to sell property.
  • Fake authorization letter to claim a package, check, or remittance.
  • Fake school, company, or government ID to support assumed identity.
  • Fake signed contract or notarized document using another person’s name.

Very important

In Philippine practice, the documentary side often makes the case stronger. A mere oral pretense can already be criminal, but once a fake document is involved, liability becomes broader and easier to anchor in a specific penal provision.


7. Forgery and Counterfeiting-Related Liability

Where impersonation involves signatures, seals, bank documents, access devices, or government issuances, liability may also attach under the laws on forgery, counterfeiting, or special laws regulating IDs, checks, passports, licenses, and access devices.

Examples include:

  • forging signatures;
  • fabricating ATM, banking, or payment credentials;
  • using counterfeit identification cards;
  • simulating official issuances or permits.

Whether the charge is under the Revised Penal Code or a special law depends on the instrument used.


8. Libel, Slander, and Cyber Libel Through Fake Identity

Pretending to be another person can also be the means to commit defamation.

Examples

  • Creating a fake account in someone else’s name and posting statements that disgrace them.
  • Sending defamatory messages while making it appear they came from the victim.
  • Impersonating another person in order to publish accusations or immoral content.

In such cases, possible liabilities include:

  • cyber libel if committed online;
  • traditional libel if through written or similar means;
  • other offenses if the conduct includes threats, harassment, or fraud.

There may also be a separate injury to the impersonated person, especially where the impersonation harms reputation or relationships.


9. Unjust Vexation, Grave Threats, Coercion, and Similar Offenses

Sometimes the impersonation is not primarily about money or documents but about causing fear, annoyance, or compulsion.

Examples:

  • pretending to be a police officer to force someone to come along;
  • pretending to be a creditor’s representative to threaten a debtor;
  • pretending to be another person to torment, harass, or humiliate someone.

Depending on the facts, the prosecution may consider:

  • unjust vexation,
  • grave threats,
  • light threats,
  • grave coercion,
  • alarm and scandal,
  • offenses against honor.

These are fact-dependent and often accompany, rather than replace, the main impersonation-related charge.


III. Distinguishing the Main Identity-Related Offenses

A practical way to understand Philippine law on pretending to be another person is to separate the offenses by object:

A. Pretending to be a government official

Usually Article 177.

B. Using a fake legal identity or hiding true identity

Usually Article 178 and/or the Anti-Alias Law.

C. Assuming another’s digital identity

Usually computer-related identity theft under RA 10175, possibly with fraud or libel.

D. Pretending to be another in order to obtain money or property

Usually estafa, often with falsification.

E. Creating or using fake documents to support the assumed identity

Usually falsification, plus any underlying offense.

F. Using impersonation to defame, threaten, or harass

Possible cyber libel, threats, coercion, or related offenses.


IV. Is There a Crime If No Money Was Taken?

Yes, sometimes.

A common misconception is that pretending to be another person becomes criminal only when money is stolen. That is not correct.

Criminal liability may arise even without actual monetary loss when, for example:

  • a person falsely represents himself as a public officer;
  • a person performs official acts without authority;
  • a person unlawfully uses a fictitious name or alias in penalized circumstances;
  • a person commits computer-related identity theft;
  • a person uses falsified documents;
  • a person causes reputational harm or intimidation.

Money damage becomes essential mainly where the charge is estafa or another fraud-based offense.


V. Is There a Crime If the Person Only Used a Fake Name Online “As a Joke”?

Possibly, but not always.

The law distinguishes harmless pseudonym use from punishable deception.

A fake online name may be non-criminal where it is merely:

  • a username,
  • a gaming handle,
  • a pen name,
  • a parody that no reasonable person would take as genuine,
  • a private nickname without deceit or prejudice.

Liability becomes more likely when the fake identity is used to:

  • pass oneself off as a real existing person;
  • deceive others into sending money or information;
  • access accounts;
  • injure reputation;
  • evade law enforcement;
  • impersonate government authority;
  • create confusion in legally significant transactions.

The decisive factor is deceit plus legally recognized harm or prohibited conduct.


VI. Is Pretending to Be a Real Existing Person Worse Than Using a Made-Up Person?

Usually, yes.

There is a practical legal difference between:

  1. inventing a false persona, and
  2. assuming the identity of a real person.

Using the identity of a real existing person tends to increase legal risk because it may involve:

  • identity theft,
  • usurpation of civil personality in transactions,
  • falsification,
  • libel or reputational harm,
  • fraud against third parties who know the real person,
  • documentary misrepresentation,
  • privacy-related harms.

A made-up persona may still be punishable if used to commit fraud or concealment, but taking the identity of a real person often produces more concrete prejudice and clearer proof.


VII. The Role of Intent

Intent matters greatly.

1. Malicious or fraudulent intent

Strongly supports prosecution in estafa, identity theft, falsification, and similar offenses.

2. Knowledge of falsity

Essential where the law punishes false representation knowingly.

3. Intent to gain

Relevant in fraud-related settings.

4. Intent to cause damage

Important in fictitious-name and related cases.

5. Intent to conceal identity

Material when the use of false identity is to avoid detection, evade judgment, or hide prior wrongdoing.

But some offenses protect public order and official functions, so the act itself may be punishable even without proof of a successful fraud.


VIII. Good Faith, Mistake, and Lack of Criminal Intent

Possible defenses may include:

  • good faith,
  • lack of intent to defraud,
  • absence of unlawful purpose,
  • honest mistake,
  • authority or permission,
  • identity confusion without deceit,
  • parody or satire clearly not intended as genuine.

Examples:

  • a person uses a stage name or screen name in a context where that is openly understood;
  • a clerical error leads to incorrect name use without intent to deceive;
  • a person acts under actual authority from the named person;
  • the alleged impersonation is obviously theatrical, comedic, or fictional.

But these defenses weaken quickly when there is evidence of:

  • fake documents,
  • misleading account profiles,
  • attempts to obtain property,
  • false official claims,
  • account takeover,
  • or persistent concealment.

IX. Consent: Does Permission From the Real Person Remove Liability?

Sometimes it helps; sometimes it does not.

If the real person authorizes another to act on their behalf, that may defeat the allegation that the accused falsely assumed the person’s identity. But authorization must be real, provable, and legally sufficient.

Still, permission is not a universal shield. For example:

  • one cannot lawfully authorize another to impersonate a public officer;
  • one cannot validate a falsified public document by private consent;
  • one cannot defeat statutes that regulate identity use for public reasons by informal permission alone.

Authority must match the legal act done. A valid power of attorney, corporate authority, or written permission may matter, but it does not legalize acts prohibited for reasons of public policy.


X. Multiple Charges From One Act

Philippine prosecutors may file more than one charge if each offense has distinct legal elements.

A person who pretends to be another may, depending on facts, face:

  • Article 177 for pretending to be a public officer;
  • Article 178 for fictitious name;
  • Anti-Alias Law violation;
  • RA 10175 identity theft for online identity misuse;
  • estafa for obtaining money;
  • falsification for forged documents;
  • cyber libel for defamatory posts under a false identity;
  • grave threats/coercion if intimidation was used.

The key question is whether each offense requires proof of an element the others do not.


XI. Public Officer Impersonation: Special Dangers and Common Patterns

Among all forms of impersonation, pretending to be a government official is especially serious because it:

  • undermines public trust,
  • allows coercion,
  • creates fear of arrest or sanction,
  • facilitates extortion,
  • interferes with government functions.

Common Philippine scenarios

  • fake police operations;
  • fake anti-drug, immigration, customs, or tax enforcement;
  • fake court or sheriff demands;
  • fake barangay summons;
  • fake “undercover” agents seeking money or favors.

Even without stealing money, the conduct can be independently punishable because the law protects the integrity of public office.


XII. Online Impersonation in the Philippines

This area has become one of the most important.

Common factual patterns

  • fake Facebook or Instagram profiles using another person’s photos;
  • Messenger scams where the impostor borrows money from the victim’s friends;
  • fake seller or buyer profiles in online marketplaces;
  • impersonation in dating apps;
  • cloned business pages collecting payments;
  • fake email identities used in invoices, procurement, or payroll fraud;
  • impersonation of lawyers, recruiters, or government personnel online.

Likely Philippine liabilities

Depending on facts:

  • computer-related identity theft;
  • computer-related fraud;
  • estafa;
  • falsification if documents/screenshots/credentials are fabricated;
  • cyber libel if reputation is attacked;
  • unauthorized access offenses if accounts are hacked.

Important practical point

Not every fake profile automatically results in a conviction. Prosecutors still need evidence linking the accused to the account, device, transaction, or digital traces. But once identity misuse is tied to the accused through logs, devices, IP data, account recovery records, money trails, or witness testimony, liability becomes much more concrete.


XIII. Pretending to Be Another Person in Property and Family Matters

Impersonation can also appear in:

  • sale of land or vehicles,
  • loan applications,
  • bank withdrawals,
  • inheritance claims,
  • insurance claims,
  • marriage or civil registry matters,
  • notarial documents,
  • claims on remittances or parcels.

Examples

  • posing as the registered owner to sell property;
  • claiming to be the authorized heir;
  • pretending to be the account holder at a bank or remittance center;
  • signing as another person before a notary.

These cases often involve a combination of:

  • estafa,
  • falsification,
  • special-law violations,
  • and civil liability for damages or nullity of the transaction.

XIV. What If the Impersonation Was Only Attempted?

Attempted or frustrated stages may matter depending on the offense.

For fraud-related crimes, if the deceit is launched but the victim does not part with property, attempted liability may be considered where legally applicable. For falsification or usurpation-type offenses, the consummated act may occur as soon as the prohibited representation or document act is completed.

Everything turns on the specific offense charged.


XV. Evidence Commonly Used in Philippine Impersonation Cases

A case for impersonation or identity-based fraud is only as strong as its proof. Common evidence includes:

Documentary evidence

  • IDs, application forms, signatures, notarized documents, authorizations, receipts, chat screenshots, emails, transaction records.

Digital evidence

  • account registration records,
  • login history,
  • recovery email/phone,
  • device association,
  • metadata,
  • IP logs where obtainable,
  • digital forensic extraction,
  • payment account traces.

Witness testimony

  • victims,
  • persons deceived by the impersonation,
  • the real person whose identity was assumed,
  • bank or platform personnel,
  • law enforcement officers.

Comparison evidence

  • signature comparison,
  • photo comparison,
  • discrepancies in names, birthdays, addresses, and personal circumstances.

Circumstantial evidence

Often crucial where direct proof is limited. A combination of possession of fake documents, control of the account used, receipt of the proceeds, and false explanations may be enough to build the prosecution case.


XVI. Civil Liability Alongside Criminal Liability

Under Philippine law, a person who commits a crime may also incur civil liability.

In impersonation cases, this may include:

  • restitution of money or property taken,
  • actual damages,
  • moral damages in proper cases,
  • temperate damages,
  • exemplary damages where warranted,
  • attorney’s fees in certain situations.

Even where criminal conviction proves difficult, the conduct may still lead to civil consequences if damage is shown under the applicable standards.


XVII. Administrative and Regulatory Consequences

Where the impersonation occurs in regulated contexts, consequences may go beyond criminal court:

  • employment dismissal,
  • school discipline,
  • revocation of licenses,
  • disqualification from office,
  • immigration consequences,
  • professional sanctions,
  • blacklisting by agencies or platforms.

If a public employee commits identity-based deception, administrative liability may arise independently of the criminal case.


XVIII. Selected Scenario Analysis

1. Fake Facebook account using another person’s photos and name, asking friends for money

Most likely issues:

  • computer-related identity theft,
  • estafa if money was obtained,
  • possible cyber libel if defamatory content was posted.

2. Person pretends to be a police officer and conducts an inspection

Most likely issue:

  • Article 177 usurpation of authority or official functions,
  • plus threats/coercion or extortion-related charges if money or compliance was demanded.

3. Person signs a contract in another’s name without authority

Most likely issues:

  • falsification,
  • estafa if property or money changes hands,
  • possible civil nullity and damages.

4. Person uses a fake legal name to avoid arrest or judgment

Most likely issue:

  • Article 178,
  • possibly other offenses depending on the circumstances.

5. Person uses a stage name or pen name openly in entertainment

Usually not criminal by itself, especially if legally permitted and not used for deceit.

6. Employee pretends to be company president to order goods from suppliers

Most likely issues:

  • estafa,
  • falsification if fake purchase orders, IDs, or signatures are used,
  • cybercrime if done electronically with identity misuse.

XIX. Relationship With Privacy and Data Concerns

Although criminal liability is the main topic, identity misuse often also involves:

  • unauthorized use of personal information,
  • dissemination of photos and personal details,
  • misuse of contact lists,
  • account compromise.

Where personal data is involved, there may be separate concerns under data privacy rules, though not every privacy wrong automatically creates criminal liability for impersonation. The criminal case still depends on the penal statute actually violated.


XX. Penalties: How They Are Determined

In Philippine criminal law, penalties depend on the specific charge proved.

That is why there is no single penalty for “pretending to be another person.” The penalty varies depending on whether the offense is:

  • usurpation of authority,
  • use of fictitious name,
  • anti-alias violation,
  • cybercrime identity theft,
  • estafa,
  • falsification,
  • cyber libel,
  • or another accompanying offense.

In practice, exact penalty computation may also depend on:

  • the statutory range,
  • whether the offense is under the Revised Penal Code or a special law,
  • the amount of damage in estafa-type cases,
  • aggravating or mitigating circumstances,
  • whether multiple offenses are charged,
  • and whether the crime was committed through information technology, which can affect charging and punishment under cybercrime rules.

For serious fraud-and-document cases, exposure can become substantially heavier than the penalty for mere false naming.


XXI. Key Doctrinal Takeaways

1. Impersonation is not one monolithic crime

Philippine law punishes it through several statutes.

2. The gravamen is the specific legal wrong

Public authority fraud, identity concealment, digital identity theft, documentary falsification, and property fraud are treated differently.

3. Pretending to be a public officer is independently dangerous

This is punishable even without completed pecuniary fraud.

4. Online impersonation is legally significant

RA 10175 gives prosecutors a direct tool against computer-related identity theft.

5. Fraud plus fake identity often means estafa

If money or property is obtained through the assumed identity, estafa becomes central.

6. Fake documents dramatically expand liability

Falsification often accompanies impersonation.

7. Not every pseudonym is a crime

A nickname or stage name is not automatically unlawful; deceit and legally relevant prejudice matter.

8. One act can generate several charges

Philippine criminal pleading often combines related offenses where the facts justify them.


XXII. Bottom Line

Under Philippine law, criminal liability for impersonation and pretending to be another person is real, broad, and highly fact-specific. The law does not rely on one generic offense alone. Instead, it punishes the conduct through a network of provisions aimed at protecting:

  • the integrity of public authority,
  • truthful personal identification,
  • the security of digital identity,
  • the authenticity of documents,
  • property and business transactions,
  • reputation,
  • and public order.

The most important Philippine anchors are:

  • Article 177, Revised Penal Code — usurpation of authority or official functions;
  • Article 178, Revised Penal Code — using fictitious name and concealing true name;
  • Commonwealth Act No. 142, as amended — the Anti-Alias Law;
  • Republic Act No. 10175 — computer-related identity theft and related cyber offenses;
  • Article 315, Revised Penal Code — estafa where impersonation is the deceit;
  • Articles 171–172 and related provisions — falsification and use of falsified documents;
  • and, where applicable, libel/cyber libel, threats, coercion, forgery, and other special-law offenses.

In short: pretending to be another person becomes criminal in the Philippines when the pretense invades a protected legal interest—public authority, identity integrity, property, reputation, or documentary truth—and when the act matches the elements of a penal law. The more the impersonation is tied to fraud, fake documents, government authority, or digital identity misuse, the more serious the criminal exposure becomes.

If you need this turned into a more formal law-review style piece with headings, footnote-style formatting, and a thesis-introduction-conclusion structure, say “convert this into law-review format.”

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.