A Philippine Legal Article
Cyber libel and online extortion often happen together. A person is attacked on Facebook, TikTok, YouTube, X, Instagram, Messenger, Viber, Telegram, email, or through anonymous pages. Then the victim is threatened: pay money, give in to a demand, stop speaking, resign, or suffer more public humiliation. In the Philippine setting, these acts can trigger criminal liability under several laws at once, most notably the Revised Penal Code, the Cybercrime Prevention Act of 2012, and in some cases related laws on threats, coercion, unjust vexation, and data privacy.
This article explains the Philippine legal framework, what cyber libel and online extortion mean, how to preserve evidence, where to file, what prosecutors usually look for, possible defenses, remedies, procedure, risks, penalties in general terms, and practical strategy.
I. The Basic Philippine Legal Framework
In Philippine law, online abuse is rarely analyzed under just one statute. A single set of acts may produce multiple criminal complaints.
The most important legal sources are:
- Article 353 of the Revised Penal Code (RPC) — defines libel
- Article 355 of the RPC — punishes libel by writing or similar means
- Republic Act No. 10175 — the Cybercrime Prevention Act of 2012, which covers cyber libel and other computer-related offenses
- RPC provisions on grave threats, light threats, grave coercion, unjust vexation, robbery/extortion-related conduct, and sometimes attempted robbery or other offenses depending on facts
- Republic Act No. 9995 if intimate images or videos are involved
- Republic Act No. 10173 or the Data Privacy Act if personal data is unlawfully processed or exposed
- Republic Act No. 11930 if scams and abusive online conduct overlap with anti-scam regulation
- Rules on electronic evidence, because proof is usually digital
A complaint may therefore be framed as:
- Cyber libel, and
- Online extortion, usually pleaded through the offenses that best match the threats or coercive acts actually committed.
There is no single Penal Code article literally titled “online extortion” that automatically fits every internet threat. In practice, prosecutors look at the exact words used, the demand made, the means employed, and the intended harm. Depending on the facts, the charge may be grave threats, grave coercion, attempted robbery by extortion theory, unjust vexation, other coercive crimes, or a combination.
II. What Is Cyber Libel in the Philippines?
A. Core Definition
Libel is generally a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.
When libel is committed through a computer system or similar means online, it may become cyber libel under the Cybercrime Prevention Act.
B. Essential Elements of Libel
To succeed in a criminal complaint for libel or cyber libel, the prosecution generally has to show:
There is an imputation The statement accuses or suggests something defamatory: criminality, corruption, immorality, dishonesty, incompetence, promiscuity, fraud, cheating, mental defect, or similar discrediting matter.
The imputation is public It was communicated to a third person. A private message to the victim alone is not usually libel, though it may still be threatening or coercive.
The person defamed is identifiable The victim may be named directly, tagged, pictured, or identifiable by context.
There is malice Malice is often presumed in defamatory imputations, unless the statement is privileged or otherwise justified. Actual malice becomes especially important when the complainant is a public official or public figure, or where constitutional free speech issues are raised.
C. Why It Becomes “Cyber” Libel
The defamatory matter is posted or transmitted through:
- social media posts
- stories, reels, shorts, videos
- blogs, websites, forums
- comment sections
- emails
- messaging apps
- online newsletters
- digital publications
- possibly live streams with persistent online publication
A post does not need to go viral to be cyber libel. One public post visible to others may be enough.
D. Share, Comment, Repost, Screenshot
Liability becomes more fact-specific when the accused did not create the original post but:
- reposted it
- quote-posted it
- shared it with approving language
- added defamatory captions
- republished it in another group
- circulated screenshots with defamatory commentary
Mere passive receipt is different from republication. But once a person adopts or republishes a defamatory statement, exposure to liability increases.
E. Group Chats and Private Channels
A message in a “private” group chat can still amount to publication if shown to third persons. The smaller the audience, the more factual nuance there is, but privacy settings do not automatically erase criminal liability.
III. What Is Online Extortion in the Philippine Setting?
“Online extortion” is not always charged under one fixed label. It is a practical description for conduct where a person uses the internet or electronic communications to obtain money, property, advantage, sexual compliance, silence, withdrawal of a complaint, or some other benefit by threat, intimidation, exposure, or harassment.
Common forms include:
- “Pay me or I will post more accusations about you.”
- “Send money or I will release your private photos.”
- “Resign or I will destroy your reputation online.”
- “Give me a settlement now or I will keep posting lies every day.”
- “Transfer funds or I will expose your employees/customers.”
- “Do this for me or I will upload your chat logs.”
Possible criminal characterizations
Depending on facts, the prosecutor may study whether the conduct constitutes:
- Grave threats
- Light threats
- Grave coercion
- Unjust vexation
- Attempted or related extortion/robbery theory, depending on the method and demand
- Violations involving intimate content
- Identity theft, unauthorized access, data interference, or other cybercrime-related acts, if hacking or account compromise is involved
The legal theory matters. A threat to defame someone unless money is paid is not analyzed exactly the same way as a threat to kill, a threat to injure property, a threat to reveal intimate images, or a threat backed by stolen credentials. The complaint must fit the facts.
IV. When Cyber Libel and Online Extortion Overlap
This is common. The sequence often looks like this:
A false or exaggerated accusation is posted online.
The victim suffers reputational harm.
The accused sends a demand:
- pay money
- provide benefits
- withdraw a case
- refrain from complaining
- surrender property
- comply with a personal or business demand
The accused threatens continued publication, exposure, tagging of family/employer, or release of more material.
In that scenario, a complainant may explore:
- Cyber libel for the defamatory posts
- Threats/coercion/extortion-related charges for the demands and intimidation
- Data privacy or intimate image offenses, if applicable
- Civil damages alongside the criminal case or through a separate action
V. Important Distinctions Before Filing
A. Not Every Harsh Online Statement Is Cyber Libel
A complaint may fail if the statement is:
- clearly an opinion without defamatory factual imputation
- a fair comment on a matter of public interest
- substantially true and made with lawful motive and justifiable end
- privileged communication
- too vague to identify the complainant
- not shown to have been published to others
B. Truth Is Not Always a Complete Shortcut
In Philippine libel law, the defense of truth is not as simple as saying, “I only told the truth.” The manner, motive, context, and subject matter still matter. A statement may still lead to litigation even where the defendant insists it is true.
C. Extortion Requires a Real Demand or Coercive Pressure
Annoying messages alone do not automatically become extortion. There is usually some demand, compulsion, threat, or pressure toward surrendering money, benefit, action, or inaction.
D. Evidence Quality Often Decides the Case
Digital complaints are often lost not because the facts were weak, but because the evidence was poorly preserved.
VI. First Things to Do Before Filing
The victim’s first response should be disciplined, not emotional.
1. Preserve everything immediately
Save:
- full screenshots
- profile URLs
- account names and IDs
- timestamps and dates
- direct links to posts, comments, reels, videos, stories, channels
- message threads
- emails with headers if possible
- audio/video files
- payment demands
- QR codes, account numbers, e-wallet numbers, crypto wallet addresses
- usernames across platforms
- witnesses who saw the posts live
- screen recordings showing the page, URL, and scrolling context
Take screenshots that show the whole screen, not cropped snippets. Include the address bar or app interface where possible.
2. Preserve metadata and originals
Do not rely only on printed screenshots. Keep:
- original image files
- original chat exports
- downloaded videos
- message source files
- device backups
- cloud backups
- raw emails
3. Avoid editing or annotating the evidence
Do not draw arrows, circles, or labels on the original files. Make copies for marking up and keep clean originals.
4. Consider notarization or authenticated affidavits
Notarization of screenshots is not a magic cure, but affidavits from the victim and witnesses strengthen authenticity and chronology.
5. Do not provoke more messages unless strategically necessary
Sometimes victims try to trap the offender into confessing. That can work, but it can also escalate risk or contaminate evidence. Controlled communication is better.
6. Report the content to the platform
Platform reports are not a substitute for criminal filing, but they can reduce continuing harm and create a record.
7. Secure your accounts
Change passwords, activate two-factor authentication, log out unknown devices, and preserve access logs if compromise is suspected.
VII. Where to File in the Philippines
A criminal complaint may be brought through one or more of these routes, depending on the facts and local practice:
A. Office of the City or Provincial Prosecutor
This is the standard path for many criminal complaints. The complainant files a complaint-affidavit with supporting evidence for preliminary investigation.
B. National Bureau of Investigation (NBI)
The NBI Cybercrime Division is often approached for internet-based offenses, especially where tracing, technical analysis, or cross-platform evidence is involved.
C. Philippine National Police Anti-Cybercrime Group (PNP-ACG)
The PNP-ACG receives complaints involving cyber offenses and can assist in evidence gathering and investigation.
D. Local Police or Prosecutor’s Office
Some cases begin with local authorities, then get referred or coordinated with cybercrime units.
E. For private sexual images or recordings
Complaints may also involve agencies handling violence against women or child protection concerns, depending on the case.
VIII. Venue: Where the Case May Be Filed
Venue is critical in libel cases. In Philippine practice, libel venue rules are technical and should be handled carefully.
For cyber libel, venue questions may involve:
- where the defamatory material was accessed
- where it was first published
- where the offended party resides
- where the complainant actually held office, if a public official
- statutory and procedural rules as interpreted by jurisprudence
A wrong choice of venue can derail the case. This is one of the most technical parts of cyber libel litigation.
For threats or coercion-type offenses, venue may involve:
- where the threat was sent
- where it was received
- where the demand took effect
- where payment was sought or to be delivered
- where the intimidation caused actionable effect
Because venue in cyber cases can be heavily litigated, the complaint should state facts clearly and specifically.
IX. What the Complaint-Affidavit Should Contain
A strong complaint-affidavit is factual, chronological, and evidence-centered.
It should usually include:
- Full names and addresses of complainant and respondent, if known
- How the complainant knows the respondent, or why the respondent is believed to own or control the account
- Dates, times, and platform details
- Exact words or posts complained of
- Why the posts are defamatory
- How the complainant is identifiable
- How the posts were published to third persons
- How the respondent acted with malice
- The extortionate demand or threat, quoting exact language when possible
- The damage or fear caused
- Attached evidence, properly labeled
- Request for filing of the appropriate criminal information
Attachments often include:
- screenshots of posts and comments
- screenshots of messages demanding money or compliance
- printouts and digital copies
- USB or storage device with originals
- affidavits of witnesses
- proof of identity and residence
- proof of business or employment injury, if relevant
- medical or psychological reports, where harm escalated
- proof of payment if money was actually given
- bank/e-wallet transaction records
- certifications or logs from platforms or service providers if obtained
X. How to Prove That the Account Belongs to the Respondent
This is one of the biggest practical hurdles. Many respondents deny ownership.
Ways to connect the respondent to the account include:
- the account uses their real name, photos, voice, email, or phone number
- the account has long-standing personal content linked to them
- friends or associates interact with the account as theirs
- the account references facts only they know
- the respondent admits ownership in messages
- the same account used to transact with the complainant
- linked payment accounts or bank data
- IP logs or subscriber information, when lawfully obtained
- device examination
- witness testimony
- continuity of language, photos, videos, nicknames, and personal identifiers
Anonymous pages are harder, but not impossible, to trace.
XI. Electronic Evidence in Philippine Cases
Digital proof is not accepted just because it exists. It must be shown to be authentic and relevant.
Typical evidentiary concerns:
- Is the screenshot genuine?
- Was the post altered?
- Is the date accurate?
- Was the post public?
- Who owns the account?
- Was the message sent by the respondent?
- Was the evidence lawfully obtained?
- Can the original file be produced?
Best practices:
- keep original files
- preserve chain of custody
- use device extraction or forensic copying where necessary
- have the person who captured the material execute an affidavit
- preserve URLs and platform identifiers
- use screen recordings
- capture surrounding context, not isolated lines
- obtain certifications from service providers where possible through lawful process
A screenshot alone may still be useful, but stronger cases usually combine screenshots with corroborating circumstances.
XII. Elements the Prosecutor Will Likely Examine in Cyber Libel
The prosecutor generally asks:
1. Is there a defamatory imputation?
Example:
- “She is a scammer.”
- “He steals company funds.”
- “This doctor is fake.”
- “That teacher sleeps with students.”
These are generally more actionable than vague insults such as “You’re the worst.”
2. Is the complainant identifiable?
Even without naming the victim, a post may still be actionable if enough people can tell who is meant.
3. Was there publication?
A post visible to others, a comment thread, a shared reel, or a message sent to multiple people can satisfy publication.
4. Was there malice?
If the statement is inherently defamatory, malice may be presumed, subject to defenses.
5. Is it cyber libel rather than ordinary libel?
If published through digital means, the cybercrime law may apply.
6. Is the complaint timely?
Prescription and filing timing matter. Delay can create procedural problems.
XIII. Elements the Prosecutor Will Likely Examine in Online Extortion or Threats
The prosecutor usually studies:
What exactly was demanded?
- money
- property
- silence
- sexual favors
- a public apology
- withdrawal of charges
- resignation
- free goods or services
What threat backed the demand?
- more posts
- release of secrets
- exposure of images
- harm to family
- business destruction
- criminal accusation
- hacking exposure
- contact with employer or clients
Was the threat unlawful or coercive? A lawful demand stated in lawful terms is different from a coercive threat.
Was the complainant placed in fear or pressured into compliance?
Was there an attempt, partial compliance, or completed payment?
Were there accompanying offenses?
- hacking
- unauthorized account access
- identity theft
- data exposure
- revenge porn
- doxxing
XIV. A Demand Letter Is Not the Same as Extortion
This distinction matters.
A real legal demand, such as:
- “Pay your unpaid debt by Friday or we will file a case,”
is not automatically extortion if the claim is legitimate and the threatened action is lawful.
But it may become problematic where the sender says, in substance:
- “Pay me or I will post lies about you.”
- “Give me money and I won’t spread your private pictures.”
- “Settle now or I will accuse you online of crimes I cannot prove.”
- “Transfer cash or I will ruin your reputation every day.”
The difference lies in lawful assertion of rights versus coercive abuse, intimidation, or unlawful reputational threats.
XV. Prescription and Timing
Timing matters in criminal cases. The applicable prescriptive period can depend on:
- whether the case is ordinary libel or cyber libel
- how the offense is classified
- how related threat/coercion offenses are charged
- current jurisprudence and prosecutorial approach
In practical terms, delay is dangerous. Even apart from prescription, delay weakens digital evidence because:
- posts get deleted
- accounts disappear
- stories expire
- platforms change records
- witnesses forget
- devices are replaced
A victim should preserve and act promptly.
XVI. The Typical Filing Process
1. Evidence gathering
The victim compiles digital and witness evidence.
2. Drafting of complaint-affidavit
The facts are laid out under oath.
3. Filing with prosecutor or investigative agency
The complaint is docketed.
4. Evaluation or referral for investigation
The agency may receive additional affidavits or ask for clarifications.
5. Counter-affidavit from respondent
The accused responds, often denying authorship, invoking truth, opinion, lack of malice, or mistaken identity.
6. Reply/Rejoinder in some cases
The complainant may answer new points.
7. Resolution on probable cause
The prosecutor decides whether enough basis exists to file in court.
8. Filing of information in court
If probable cause is found, the case proceeds criminally.
9. Arraignment, pre-trial, trial
Evidence is presented formally.
10. Judgment
The court decides guilt and civil liability.
XVII. Standard Defenses in Cyber Libel Cases
A respondent commonly raises:
A. The statement is true
Truth may be asserted, but it is not a guaranteed shield in all situations.
B. The statement is opinion, not factual imputation
Pure opinion is less actionable than a factual accusation.
C. There is no malice
Especially if it concerns public issues or fair comment.
D. The complainant is not identifiable
If the audience could not tell who was being referred to, the case weakens.
E. There was no publication
For example, the communication was private and not intended for others.
F. The respondent did not own or control the account
A frequent defense in anonymous-page cases.
G. The post was fabricated, altered, or taken out of context
This attacks authenticity.
H. The communication is privileged
Certain communications enjoy qualified privilege.
I. Lack of jurisdiction or improper venue
Technical but powerful.
XVIII. Standard Defenses in Online Extortion or Threat Cases
A. No demand was made
The respondent may say there was no request for money or benefit.
B. The words were mere anger, not a real threat
Context matters.
C. The demand was lawful
For example, collection of a debt by lawful means.
D. No fear or coercion existed
The complainant was not compelled.
E. The screenshots are fake
Authenticity challenge again.
F. Someone else used the account
Identity defense.
XIX. Can You File Both Criminal and Civil Actions?
Yes, often there can be civil liability for damages arising from the defamatory or coercive acts.
Possible damages may include:
- moral damages
- exemplary damages
- actual damages, if provable
- attorney’s fees in proper cases
Business losses, canceled contracts, job consequences, medical treatment, and emotional suffering can become relevant, but must be properly proven.
XX. Injunctive and Takedown Considerations
Victims usually want the posts removed immediately. This raises practical and legal questions.
A. Platform reporting
This is usually the fastest first move.
B. Preservation requests
Important before deletion, if tracing is needed.
C. Court relief
In appropriate cases, separate civil or ancillary relief may be explored to restrain continued harmful conduct, though this is fact-specific and procedurally sensitive.
D. Be careful with deletion
Immediate deletion may reduce ongoing harm, but it can also remove visible evidence if the victim failed to preserve it first.
XXI. Special Situations
A. Anonymous “expose” pages
Victims often face fake pages or “awareness” accounts. These may still produce actionable cyber libel if the content is defamatory and the victim is identifiable.
B. Employee-employer cases
A worker may be defamed in company groups or threatened with exposure unless they resign or sign documents. This can involve labor, privacy, and criminal issues at once.
C. Business reputation attacks
A competitor, disgruntled customer, or former partner may post accusations and then demand money, discounts, or concessions. Corporate complainants may also sue if the business itself is defamed.
D. Intimate image extortion
This is especially serious. The complaint may go beyond cyber libel and fit laws specifically punishing unauthorized sharing or threatened sharing of sexual content.
E. Minor victims
Child protection laws and procedures may intensify the response.
F. Public officials and public figures
Free speech defenses become stronger and the complainant usually faces higher scrutiny on actual malice issues.
XXII. The Difference Between Defamation and Criticism
Philippine law does not punish all criticism. A complaint is stronger when the statement is not just harsh, but defamatory in a legally meaningful way.
Examples of stronger libel allegations:
- “This CPA falsifies tax filings.”
- “That principal steals school funds.”
- “This seller is a criminal fraudster.”
Examples that may be weaker or more debatable:
- “Terrible service.”
- “I don’t trust this brand.”
- “In my opinion, this politician is incompetent.”
The law draws a line between protected speech and punishable defamation, though the line can be contested.
XXIII. Practical Evidence Checklist
A victim should try to gather:
- full legal name of respondent, if known
- all usernames and aliases
- profile links
- screenshots of profile and posts
- comments and reactions
- date and time seen
- witness affidavits from persons who saw the content
- prior relationship history showing motive
- chat threads containing threats or demands
- payment instructions or account numbers
- proof of payment, if any
- screenshots before and after deletion
- device used to capture evidence
- raw media downloads
- proof of impact: lost clients, suspension, school complaint, emotional distress
- any apology, admission, or deletion message from respondent
XXIV. Common Mistakes Complainants Make
1. Filing based only on cropped screenshots
This invites authenticity attacks.
2. Failing to identify the exact offending words
General complaints such as “They ruined me online” are not enough.
3. Confusing insult with libel
Not every rude post is criminally defamatory.
4. Ignoring the extortion component
Some victims focus only on cyber libel and fail to highlight the demand and threat.
5. Threatening back
This can create counter-cases.
6. Waiting too long
Evidence disappears.
7. Publicly arguing the case online
This can complicate the record.
8. Not preserving proof of identity and residence
Necessary for filing and venue issues.
9. Using illegally obtained evidence
Unlawfully acquired data can create separate problems.
XXV. Common Mistakes Respondents Make
Ironically, many respondents worsen their exposure by:
- deleting posts after being confronted
- sending “settlement” messages that sound like admissions
- creating more dummy accounts
- contacting the victim’s family or employer
- escalating threats after receiving a demand to stop
- claiming “it was just a joke” after a serious accusation
- reposting the same accusations on backup accounts
Deletion does not erase liability if evidence was preserved.
XXVI. Can the Victim Settle?
Many criminal complaints, especially defamation-related disputes, are preceded by discussions, retractions, apologies, or settlements. Whether settlement is wise depends on:
- severity of harm
- risk of repeat behavior
- whether money was extorted
- whether intimate content is involved
- whether broader public safety is at risk
- business and reputational considerations
Retraction and apology may mitigate damage, but they do not automatically erase criminal exposure once the offense is committed.
XXVII. What Relief the Victim Usually Wants
Victims typically seek some combination of:
- criminal prosecution
- immediate cessation of posting
- deletion or takedown
- public retraction or apology
- damages
- return of money or property
- protection from further harassment
- tracing of anonymous perpetrators
- preservation of digital records
A well-drafted complaint should be clear about the harms suffered and the acts complained of.
XXVIII. Penalties: General Caution
The exact penalties depend on the final offense charged, the mode of commission, the interaction of the RPC and cybercrime law, and prevailing jurisprudence.
For cyber libel, the online mode can elevate consequences beyond ordinary libel treatment. For threats or coercion/extortion-type offenses, the penalty depends on the specific article or law used. Because penalty analysis in cyber cases can be technical, one should avoid assuming that “online extortion” carries one fixed punishment in all scenarios.
XXIX. A Good Legal Theory Matters More Than Emotion
Many victims are clearly wronged but still file weak complaints because the legal theory is not matched to the facts.
A strong complaint does not merely say:
- “They embarrassed me online.”
It shows:
- what was said
- why it was defamatory
- how others saw it
- who posted it
- what demand was made
- what threat backed the demand
- what evidence proves it
- where and when it happened
- what law was violated
The more precise the framing, the stronger the complaint.
XXX. Sample Fact Patterns
1. Facebook smear plus money demand
A seller posts, “X is a scammer who steals from clients.” Then messages X: “Pay me ₱100,000 and I’ll delete everything.” Possible issues: cyber libel plus threats/coercion or extortion-related charging.
2. Anonymous page exposing private chats
A dummy account posts private screenshots and says it will release more unless the victim signs over business shares. Possible issues: cyber libel, threats/coercion, privacy-related issues, possibly computer-related offenses.
3. Threat to send allegations to employer
An ex-partner threatens to email the victim’s employer and school with accusations unless monthly payments are made. Possible issues: cyber libel if defamatory publication occurs, threats, coercion, possibly intimate-image law if applicable.
4. Group chat character assassination
A person circulates in a Viber group that a doctor is fake and dangerous, then demands free treatment to stop spreading it. Possible issues: publication in group chat, cyber libel, coercive demand.
XXXI. Strategic Notes for Victims
A. Separate outrage from proof
Strong feelings do not replace elements of the crime.
B. Organize by timeline
A chronological table helps prosecutors see the pattern quickly.
C. Preserve both public and private evidence
The public post proves publication; the private message may prove extortion.
D. Consider multiple respondents
The original poster, republisher, admin, or conspirator may each have different liability theories, depending on evidence.
E. Do not overcharge recklessly
Including every possible offense without factual support can weaken credibility.
XXXII. Strategic Notes for Lawyers and Drafters
A well-prepared Philippine complaint on this subject should usually address:
- identity of the respondent
- exact defamatory statements
- nature of publication
- actual or presumed malice
- digital means used
- the precise coercive or extortionate demand
- unlawful threat employed
- venue facts
- authentication of electronic evidence
- resulting reputational, emotional, and economic injury
- prayer for finding of probable cause
Affidavits should be detailed but not bloated. Digital annexes should be indexed cleanly.
XXXIII. Relationship With Constitutional Speech Protections
Any cyber libel complaint in the Philippines sits beside constitutional free expression values. This means criminal complaints for online speech are scrutinized, especially where:
- the subject is public interest
- the complainant is a public official
- the speech is commentary rather than factual accusation
- the words are rhetorical or opinion-based
- the case appears retaliatory or intended to silence criticism
A complainant should therefore avoid using cyber libel as a substitute for disagreeing with criticism. The complaint is strongest when the online publication crosses the line into false and malicious defamatory imputation, not merely offensive opinion.
XXXIV. Final Legal Takeaway
In the Philippines, filing a criminal complaint for cyber libel and online extortion requires more than showing that online content was offensive or frightening. The complainant must identify the exact defamatory imputations, prove publication and identifiability, connect the respondent to the digital acts, and clearly establish the coercive demand or threat that makes the conduct extortionate or otherwise criminally intimidating.
The most important practical rules are these:
- preserve digital evidence immediately
- capture originals, URLs, and context
- identify the respondent as accurately as possible
- separate libel facts from threat/extortion facts
- choose venue carefully
- prepare a detailed complaint-affidavit with organized annexes
- file promptly before evidence disappears or procedural issues arise
Because Philippine cyber cases often combine defamation, threats, coercion, privacy violations, and electronic evidence issues, success usually turns on precision, documentation, and proper legal characterization.
This article is general legal information, not a substitute for case-specific legal advice, and cybercrime procedure and jurisprudence should always be checked against the most current Philippine law and court rulings before filing.