A Philippine legal article
Text messages are often treated casually because they arrive on an ordinary phone and can be deleted with a tap. Legally, that is a mistake. In the Philippines, a threat sent by SMS, chat, or similar electronic message can form the basis of a criminal complaint. The fact that the threat was sent electronically does not make it less serious. In many cases, the medium simply becomes part of the evidence problem: the case may be viable, but only if the complainant preserves the message properly and files the complaint in the right way.
This article explains the Philippine legal framework on grave threats by text message, what prosecutors and courts usually look for, how electronic evidence should be preserved, where and how a complaint may be filed, what practical mistakes to avoid, and how related laws may also apply.
1. What is “grave threats” under Philippine law?
Under the Revised Penal Code, threats may be punished when a person threatens another with the infliction of a wrong amounting to a crime. In plain terms, grave threats usually involve a serious warning that the sender will kill, injure, kidnap, burn property, destroy a home, or commit some other criminal act against the recipient or the recipient’s family, property, or interests.
A text such as the following may fall within the concept of grave threats, depending on context:
- “Papatayin kita mamaya.”
- “Ipapahamak ko anak mo.”
- “Susunugin ko bahay ninyo.”
- “Mag-ingat ka pag-uwi mo, babarilin kita.”
Not every offensive or frightening message automatically qualifies as grave threats. The law distinguishes between serious threats, lighter threats, insults, harassment, unjust vexation, coercion, and other crimes. What matters is the content, the seriousness, the context, and whether the threatened act would itself be a crime.
Key idea
For grave threats, the prosecution generally focuses on whether the message conveyed a serious intent to inflict a criminal wrong, not merely whether the recipient felt offended.
2. Does a threat by text message count as a crime even if there was no face-to-face confrontation?
Yes. A criminal threat need not be made in person. A threat can be uttered orally, written in a letter, sent through SMS, transmitted by private message, or delivered through another person. A text message is still a written communication. In Philippine practice, the main issue is usually not whether a text can constitute a threat, but whether the prosecution can prove:
- the exact content of the message,
- that it came from the accused or is attributable to the accused, and
- that the message is authentic and admissible.
That is why evidence preservation matters as much as the legal theory.
3. Is every threatening text automatically “grave threats”?
No. The same message may lead to different possible charges depending on the facts.
It may be grave threats when:
- the threat is serious,
- the threatened act is itself a crime,
- the message shows intent to intimidate or menace,
- the context supports real hostility or danger.
It may instead be another offense when:
- the statement is vague, conditional, or unserious,
- it is part of harassment but not clearly a threat of a specific crime,
- the conduct is coercive rather than merely threatening,
- the message is part of domestic abuse, stalking, extortion, or blackmail,
- the message includes sexual threats, image-based threats, or threats against a child.
The exact offense depends on the totality of facts. The label “grave threats” is common, but it is not the only criminal theory available.
4. When is a text threat especially strong as a criminal case?
A case becomes stronger when one or more of these are present:
- the threat is specific: who will be harmed, how, and when;
- the sender repeats the threat several times;
- the sender knows the victim’s address, route, workplace, child’s school, or schedule;
- the sender attaches a demand, such as money, sex, silence, or withdrawal of another complaint;
- the sender has prior acts of violence, stalking, gun display, trespass, or actual assault;
- the sender uses multiple numbers or accounts in a coordinated way;
- the threat follows a breakup, labor dispute, land conflict, debt dispute, or family feud;
- the recipient has corroborating witnesses or related messages.
The law punishes threats, but prosecution becomes much easier when the surrounding circumstances show that the message was not idle talk.
5. Threat with a condition or demand: why it matters
Some threats are not just warnings. They are demands. For example:
- “Give me ₱50,000 or I will kill you.”
- “Withdraw the case or I will burn your car.”
- “Meet me tonight or I will hurt your brother.”
When a threat is tied to a condition or demand, the legal consequences may be more serious. It may still be prosecuted as grave threats, but prosecutors may also examine whether the facts point to extortion, coercion, robbery-related conduct, VAWC, or another offense depending on the relationship and surrounding acts.
The existence of a demand is important because it shows purposeful intimidation, not merely anger.
6. Does the victim need to prove the sender really intended to carry out the threat?
Not necessarily in the sense of proving a future completed attack. A threat can be punishable even if the sender never actually attacks. The offense lies in the threatening act itself. What must be shown is that the communication was serious enough to constitute a threat under criminal law.
That said, real-world indicators strengthen the case:
- prior violence,
- photos of weapons,
- travel to the victim’s location,
- surveillance or stalking,
- “I’m outside your house” type messages,
- third-party reports that the accused was looking for the victim,
- immediate follow-up calls or visits.
The more concrete the surrounding facts, the less likely the accused can dismiss the message as a joke, emotional outburst, or fabricated screenshot.
7. Are screenshots enough?
Usually, screenshots are helpful but not ideal by themselves.
A screenshot is often the starting point, not the gold standard. In electronic evidence, authenticity is crucial. A screenshot can be cropped, edited, renamed, resent, or detached from the phone and SIM from which it came. A prosecutor may still consider it, but a stronger case preserves the original source.
Best practice
Keep the actual device that received the threat, the SIM card if applicable, and the message thread in its original form.
Why the original matters
The original phone may show:
- the full conversation thread,
- the exact phone number or sender name as saved,
- timestamps,
- continuity of messages,
- whether the thread was interrupted or altered,
- associated call logs,
- linked contacts,
- backups or synced data.
If there is later a forensic examination, the original handset is far more persuasive than a printout alone.
8. How should evidence be preserved immediately?
The first hours after receiving a grave threat are important. Do not delete anything.
Preserve the message in layers
First layer: do not alter the thread Leave the message where it is. Do not reply emotionally in a way that may muddy the record. Do not delete, edit contact names, or re-save the number under a misleading label.
Second layer: document what exists Take clear screenshots showing:
- the number or sender identity,
- the date and time,
- the message content,
- the surrounding thread if relevant,
- any profile information or display name.
When possible, take both close screenshots and wider photos showing the entire phone in your hand with the message displayed.
Third layer: preserve the device Set the phone aside if necessary and stop using that thread excessively. If the matter is serious, keep the phone available for inspection. Preserve the SIM card and do not replace it casually.
Fourth layer: create secure copies Back up the phone lawfully. Save screenshots and photos to a secure cloud account, an external drive, and perhaps a second trusted device. Keep file names and dates organized.
Fifth layer: preserve related evidence Keep:
- call logs,
- voicemails,
- missed calls,
- contact details,
- prior quarrel messages,
- apology messages,
- money demands,
- location sharing,
- social media messages tied to the same threat,
- witness messages saying they also saw the threat,
- CCTV if the sender also appeared physically nearby.
9. What should never be done?
Several common mistakes weaken cases.
Do not:
- delete the message thread after taking screenshots;
- restore the phone to factory settings;
- change the contact name after receiving the threat;
- forward edited or cropped copies as if they were originals;
- create fake “reconstructed” screenshots;
- provoke the sender into making more threats through entrapment-style baiting;
- access the sender’s accounts without authority;
- steal the sender’s phone;
- secretly record private conversations in a way that may violate the Anti-Wiretapping Law.
A critical caution on recordings
Preserving a threatening text sent to you is generally different from secretly recording a private call. A received text is already in your possession. Secretly recording a private oral communication raises separate legal issues. Be careful not to gather evidence illegally.
10. How do Philippine rules treat text messages as evidence?
In Philippine procedure, electronic communications can be admitted in evidence, but they must be authenticated. Courts and prosecutors generally want proof that the message is what the complainant says it is.
That usually means proving:
- where the message appeared,
- when it was received,
- what device stored it,
- who had custody of the device,
- why the sender is linked to the number or account,
- and that the printout or screenshot accurately reflects the original.
Practical meaning
A complaint can begin with screenshots, but a prosecutor will be far more comfortable when the complainant can produce:
- the phone,
- the SIM,
- the thread,
- a sworn statement identifying the messages,
- and, if available, corroboration linking the number to the accused.
11. How do you prove that the number belongs to the accused?
This is often the hardest part.
A threatening message from an unknown number is not worthless, but attribution is essential. The prosecution must connect the message to a real person. That may be done through one or more of the following:
- the accused admits using the number;
- prior messages from that same number clearly identify the sender;
- the complainant has long communicated with that number and can explain why it is the accused’s number;
- the sender mentions facts known only to the accused;
- the number is registered, used, or publicly held out by the accused;
- witnesses know the accused uses that number;
- the same number calls the complainant and the voice is recognized;
- the accused sends linked messages from a known social media account;
- police or prosecutors later obtain telecom records or certifications through lawful process;
- SIM registration or subscriber records point to the accused, subject to proper proof.
Important qualification
A registered SIM is useful but not always conclusive. Phones are shared, borrowed, lost, lent, sold, or used by someone other than the registered owner. Registration helps identify leads; it does not automatically end the case.
12. Is a police blotter enough?
No. A police blotter is not the criminal case itself.
A blotter entry is useful because it records that the victim reported the threat promptly. It may support credibility and show contemporaneous reporting. But blottering alone does not commence the criminal prosecution in the sense of getting a prosecutor to evaluate probable cause for filing an information in court.
What a blotter can do
- memorialize the incident,
- trigger police assistance,
- support requests for immediate protection,
- identify officers and station records,
- help document urgency.
What it cannot do by itself
- replace a complaint-affidavit,
- substitute for actual evidence,
- guarantee filing of criminal charges,
- prove the truth of the contents of the threat.
13. Where should the complaint be filed?
As a rule, the criminal complaint is ordinarily brought before the proper investigative body and then the Office of the City or Provincial Prosecutor with jurisdiction over the place where the offense, or an essential element of it, occurred.
With text-message threats, venue may be discussed in terms of where:
- the message was sent,
- the message was received,
- the threat was read and took effect,
- or related acts occurred.
In practice, complainants often start with:
- the local police station,
- the PNP Anti-Cybercrime Group when digital evidence is involved,
- the NBI when identity tracing or digital investigation is needed,
- or directly with the prosecutor’s office through a complaint-affidavit.
For serious threats, going straight to the prosecutor with a well-documented affidavit is often the cleaner route, while police or NBI assistance may help on identification and evidence preservation.
14. Must the matter go through barangay conciliation first?
Sometimes yes, sometimes no.
Philippine law on barangay conciliation applies to many disputes between individuals residing in the same city or municipality, but there are important exceptions. Cases involving offenses punishable by higher penalties, urgent matters, public officers in relation to official duties, parties in different localities, or situations otherwise exempt by law need not pass through barangay conciliation.
For grave threats, barangay referral is not automatic. Much depends on:
- the specific offense actually being charged,
- the imposable penalty,
- whether the parties reside in the same city or municipality,
- whether the threat is tied to domestic violence or urgent danger,
- and whether an exception applies.
Practical point
Where there is a credible threat to life or safety, do not assume you must first negotiate at the barangay. Immediate safety and proper legal filing come first. If a prosecutor later requires clarification on barangay conciliation, that can be addressed in the complaint.
15. What if the threat is from a spouse, ex-partner, boyfriend, live-in partner, or co-parent?
Then the case may be more than simple grave threats.
When the threat is part of abuse against a woman or her child by a current or former husband, wife, intimate partner, live-in partner, dating partner, or the father of the child, the Anti-Violence Against Women and Their Children Act may come into play. In such cases, threatening texts can be evidence of psychological violence, coercive control, harassment, intimidation, stalking, or continuing abuse.
This matters because:
- the legal framework changes,
- protection orders may be available,
- the total course of conduct becomes relevant,
- and messages that might look isolated in an ordinary threats case may become powerful evidence of abuse.
Where children are threatened, the case may also implicate child-protection laws.
16. What if the threat is tied to blackmail, sexual coercion, or image-based abuse?
A threatening text may be only one part of a larger offense. Examples:
- “Send me money or I will post your photos.”
- “Meet me or I will send your intimate videos to your office.”
- “Withdraw your complaint or I will expose you online.”
In these cases, prosecutors may examine not only grave threats but also other crimes depending on the facts, including coercion, extortion-type conduct, VAWC, child protection laws, or special laws involving sexual exploitation or image-based abuse.
The right charge depends on the full factual matrix, not merely on the wording of one message.
17. What if the sender uses Facebook Messenger, Viber, WhatsApp, Telegram, or email instead of SMS?
The legal concern is substantially similar. The medium changes, but the issues remain:
- Was there a serious threat?
- Can the message be authenticated?
- Can it be attributed to the accused?
- Was it preserved lawfully?
In app-based cases, additional evidence may include:
- profile URLs,
- usernames,
- linked email addresses,
- chat export files,
- device backups,
- screenshots of profile pages,
- friends or mutual contacts who recognize the account,
- recovery emails or numbers if lawfully available through legal process,
- metadata from the device.
Do not assume that disappearing messages can be reconstructed later. Preserve them immediately.
18. What should be included in a complaint-affidavit?
A strong complaint-affidavit is factual, chronological, and specific. It should not read like a rant. It should tell the prosecutor exactly what happened and attach the evidence in an organized way.
A useful complaint-affidavit usually states:
- the full identities and addresses of the complainant and respondent, if known;
- the relationship between them, if any;
- prior incidents that explain motive or context;
- the exact date, time, and manner the threatening messages were received;
- the exact words of the threat, quoted faithfully;
- why the complainant believes the number or account belongs to the respondent;
- the effect of the threat, including fear, security measures, or disruption;
- the preservation steps taken;
- the supporting annexes;
- the criminal offense being alleged, or at least the factual basis for it.
Good practice
Quote the messages exactly as they appear, preserving spelling, slang, abbreviations, and language. Do not “clean up” the text. If it is in Filipino or another language, retain the original and add an English translation only if necessary.
19. What annexes should be attached?
Typical annexes may include:
- screenshots of the messages;
- photos of the phone displaying the thread;
- printouts of the thread;
- a copy of call logs;
- photos of the SIM tray or SIM details if relevant;
- screenshots of contact details or profile pages;
- sworn statements of witnesses who saw the messages or know the number;
- blotter entry;
- medical certificate if stress or injury followed related acts;
- photos or CCTV if the sender appeared physically near the victim;
- previous messages showing ownership or use of the number by the accused;
- proof of related disputes, demands, or prior incidents.
Annexes should be labeled clearly and referred to in the affidavit by exhibit or annex number.
20. Should the complainant submit the phone itself?
Sometimes yes, but not always by permanently surrendering it at once.
The practical approach is usually to bring the phone for examination, copying, photographing, or notation by investigators, while retaining the ability to produce it later if needed. The complainant should ask for proper acknowledgment if the device is taken into custody.
If the device must be turned over
Request documentation showing:
- the date and time received,
- the officer or office receiving it,
- the condition of the device,
- the SIM card involved,
- and the purpose of turnover.
This helps preserve chain of custody and avoids later disputes about tampering or loss.
21. Can the police or prosecutor obtain telecom records?
Potentially, yes, through proper legal channels.
Telecom records, subscriber information, or related data are not usually handed out casually to private complainants. Law enforcement or prosecutors may pursue lawful requests, subpoenas, or court processes where appropriate. These records can help:
- link a number to a subscriber,
- confirm message activity,
- support call history,
- identify related accounts or activation details.
But these records do not replace the actual threatening message preserved on the victim’s device.
22. What is the role of the PNP Anti-Cybercrime Group or the NBI?
Even when the crime charged is rooted in the Revised Penal Code, a digital component may make specialized assistance useful. The PNP Anti-Cybercrime Group or the NBI may help in:
- preserving digital evidence,
- documenting devices,
- tracing numbers or accounts,
- coordinating requests for service-provider data,
- preparing forensic reports,
- identifying linked digital identities.
This is especially useful when:
- the sender used multiple SIMs,
- threats came from apps and disposable accounts,
- the accused denies ownership of the number,
- the case involves broader harassment across platforms.
23. What standard does the prosecutor use at the complaint stage?
At the preliminary investigation stage, the prosecutor is not deciding guilt beyond reasonable doubt. The question is usually whether there is probable cause to believe that a crime was committed and that the respondent is probably guilty of it.
That means the complainant does not need to prove the whole case as if trial were already underway. But the complainant must still present enough factual and documentary basis to show that the charge is not speculative.
A weak complaint usually fails because:
- the threat is too vague,
- the screenshots are incomplete,
- the sender is not linked to the accused,
- the messages appear fabricated or contextless,
- the affidavit is sloppy or contradictory.
24. What defenses do accused persons commonly raise?
Common defenses include:
- “That is not my number.”
- “The screenshot is fake.”
- “I was joking.”
- “I was angry but not serious.”
- “The message was taken out of context.”
- “Someone else used my phone.”
- “There is no proof I sent it.”
- “The complainant edited the message.”
- “The case should not have been filed in that city.”
- “This was just a private quarrel.”
A good complainant anticipates these defenses by preserving the original thread, proving attribution, and documenting context.
25. Are threats still punishable if the sender later apologizes?
Yes. An apology may affect settlement discussions, credibility, or even sentencing considerations later, but it does not automatically erase criminal liability.
In fact, an apology message can sometimes strengthen the case if it effectively admits sending the threatening message. For example:
- “Sorry sa sinabi kong papatayin kita.”
- “Nag-init lang ulo ko kagabi.”
Do not delete apology messages. Preserve them as part of the full chain.
26. What if the sender deletes the conversation on their side?
That does not destroy the case if the complainant preserved the messages on their own device. A sender cannot erase the recipient’s evidence by deleting their own copy. The recipient’s phone, screenshots, backups, and related evidence remain relevant.
27. Is fear or actual panic required?
The prosecution usually benefits when the complainant describes genuine fear and the steps taken because of it, but the offense is centered on the threatening act itself. Still, the complainant should describe actual impact honestly:
- inability to sleep,
- changing routes,
- asking family members to stay indoors,
- missing work,
- seeking police help,
- moving temporarily,
- notifying the school of a child,
- installing locks or cameras.
These facts help show the threat was taken seriously for good reason.
28. What if the message came from an anonymous or prepaid number?
Anonymous-sounding messages are common, but anonymity does not automatically defeat the complaint. Cases can still proceed if attribution can be built through circumstantial evidence.
Useful indicators include:
- recurring use of the same number,
- matching language or nicknames,
- references only the accused would know,
- follow-up calls,
- simultaneous social media messages,
- prior known use of the number,
- admissions to third parties,
- location coincidence,
- telecom leads from investigators.
The case becomes harder, not impossible.
29. Can the complainant reply to ask who the sender is?
A limited reply may sometimes help identify the sender, but caution is necessary. Do not engage in prolonged emotional exchanges, threats, retaliation, or manipulation. Avoid escalating the situation.
The safest approach is usually:
- preserve the message,
- respond minimally if needed for safety,
- and seek police or legal guidance before trying to draw the sender out.
A reckless back-and-forth can create confusing context or expose the complainant to more danger.
30. Is there a prescription period concern?
Criminal complaints should be filed promptly. Delay can weaken practical proof, raise doubts, and risk prescription issues depending on the offense charged. Even when the legal period has not yet expired, waiting too long may result in:
- lost devices,
- deleted threads,
- changed numbers,
- unavailable witnesses,
- weaker recollection,
- unavailable CCTV or telecom data.
Prompt action is always better in threats cases.
31. What immediate protective steps should a victim take aside from filing?
When the threat appears credible, legal filing is only one part of response. The complainant should also consider practical safety steps:
- tell trusted family or coworkers;
- preserve all contact attempts;
- avoid predictable travel patterns;
- secure the home and workplace;
- notify building security;
- inform a child’s school if relevant;
- document suspicious sightings;
- call police immediately for imminent danger;
- seek a protection order where a special law allows it, such as in VAWC situations.
A criminal complaint is not a substitute for urgent safety planning.
32. Can the complainant settle the matter privately?
Some parties try to settle after a complaint is filed. Whether compromise affects the criminal process depends on the offense, the stage of proceedings, and prosecutorial or judicial treatment of the case. But a complainant should be careful. A private “settlement” may become another tool of intimidation.
Where threats are serious, repeated, or tied to abuse, settlement should be approached with extreme caution and documented formally if pursued at all.
33. What does a strong evidence package look like?
A well-prepared complainant usually has:
- a clear complaint-affidavit;
- the original phone and SIM;
- uncropped screenshots;
- photos of the handset displaying the messages;
- full message thread, not just one line;
- proof linking the number to the respondent;
- blotter or incident report;
- witness affidavits if available;
- related digital evidence from other platforms;
- a timeline of events.
That package gives the prosecutor a coherent narrative and reduces room for denial.
34. What does a weak case usually look like?
A weak case often has these problems:
- only one cropped screenshot;
- no date or time visible;
- no preserved phone;
- no explanation of whose number it is;
- no prior or surrounding messages;
- no affidavit identifying the device and how the screenshot was made;
- inconsistent statements;
- messages that sound like mutual trash talk rather than a serious criminal threat.
A bad case can often be improved by proper documentation before filing.
35. A practical filing roadmap
In a Philippine setting, the most practical sequence is usually this:
Step 1: Secure safety
If the threat is immediate, contact police and prioritize physical protection.
Step 2: Preserve evidence
Do not delete the messages. Preserve the phone, SIM, screenshots, photos, backups, and related records.
Step 3: Document attribution
Gather everything showing the number or account belongs to the respondent.
Step 4: Prepare a complaint-affidavit
Write a factual, sworn narrative. Attach annexes in order.
Step 5: Report and seek assistance
Go to the police, PNP Anti-Cybercrime Group, or NBI as needed for documentation and tracing assistance.
Step 6: File with the proper prosecutor’s office
Submit the complaint-affidavit and annexes to the proper Office of the City or Provincial Prosecutor, subject to venue and any procedural requirements.
Step 7: Keep the originals
Retain the phone and all source files unless formally required to turn them over.
Step 8: Continue preserving new incidents
If more threats arrive, preserve each one and supplement the record.
36. Final legal takeaway
A text-message threat is not legally trivial just because it arrived on a phone. In Philippine criminal law, a serious threat transmitted by SMS or similar messaging can support a criminal complaint. The most decisive issues are usually not abstract points of law but practical ones: Was the threat serious? Was it preserved correctly? Can it be linked to the accused? Was the complaint filed clearly and promptly?
In many cases, the difference between a dismissed complaint and a prosecutable one lies in the first twenty-four hours of evidence preservation. Keep the phone. Keep the SIM. Keep the thread. Record the context. Draft a precise affidavit. File before the proper authorities. And where the threat is immediate or tied to domestic abuse, coercion, sexual exploitation, or danger to a child, treat the matter as a safety emergency, not merely a documentation exercise.
A threat sent by text may vanish from a screen with one tap. In law, it should not vanish from proof.