A Legal Article in the Philippine Context
I. Introduction
Text messages, chat messages, private messages, and other electronic communications are now common ways by which threats are made in the Philippines. A person may receive a message saying “Papatayin kita,” “Abangan mo ako,” “Susunugin ko bahay mo,” “Ipapahiya kita kapag hindi ka nagbayad,” or “Kapag hindi mo binawi ang kaso, may mangyayari sa pamilya mo.” These messages may be dismissed by some as mere anger or online drama, but under Philippine criminal law, a serious threat sent by text message can give rise to criminal liability.
The main offense often considered is grave threats under the Revised Penal Code. Depending on the facts, the same text message may also involve light threats, unjust vexation, grave coercion, extortion, violence against women and their children, cyber-related offenses, data privacy violations, harassment, or other crimes.
The central legal question is:
When does a threatening text message become grave threats under Philippine criminal law?
The practical answer is:
A text message may constitute grave threats when the sender threatens another person with the infliction of a wrong amounting to a crime, such as death, serious physical harm, burning of property, kidnapping, rape, or other criminal harm, especially when the threat is serious, intentional, and capable of causing fear or compulsion.
This article explains grave threats by text message in the Philippine context, including elements, examples, evidence, procedure, defenses, relation to cybercrime, protection orders, harassment, debt collection, domestic violence, and practical steps for complainants and respondents.
This is general legal information, not legal advice for a specific case.
II. Legal Basis of Grave Threats
Grave threats are punished under the Revised Penal Code, particularly under the provisions on threats and coercions.
The offense generally involves threatening another person with the infliction of a wrong amounting to a crime. The threat may be made orally, in writing, by conduct, through intermediaries, or through modern communication methods such as text messages, chat, email, or social media direct messages.
A text message is not legally harmless merely because it is digital. If the message contains a criminal threat and the elements of the offense are present, it may be used as evidence in a criminal complaint.
III. What Is a Threat?
A threat is a declaration of intention to cause harm, injury, damage, or unlawful consequences to another person, their family, property, reputation, liberty, or rights.
A threat may be:
- verbal;
- written;
- sent by text message;
- sent through chat or email;
- posted online;
- implied through conduct;
- communicated through another person;
- made with words, images, emojis, symbols, or coded language.
In criminal law, the question is not merely whether the recipient felt offended. The question is whether the sender communicated an intention to inflict a wrong, and whether that wrong amounts to a crime or otherwise falls within the punishable threat provisions.
IV. What Makes a Threat “Grave”?
A threat is grave when the threatened wrong amounts to a crime and is serious enough to fall under the penal provisions on grave threats.
Examples of threatened wrongs that may amount to crimes include:
- killing the recipient;
- seriously injuring the recipient;
- burning the recipient’s house;
- kidnapping the recipient or family member;
- raping the recipient;
- shooting or stabbing the recipient;
- destroying property through arson or other criminal means;
- harming the recipient’s child;
- forcing the recipient to withdraw a case through threats of violence;
- extorting money by threatening criminal harm;
- threatening to plant evidence or cause unlawful arrest, depending on circumstances;
- threatening to commit another serious criminal act.
Not every rude or angry message is grave threats. The threatened harm must be legally significant.
V. Grave Threats by Text Message
A text message may be the means by which the threat is communicated.
Examples:
- “Papatayin kita pag nakita kita.”
- “Abangan mo ako mamaya, hindi ka na makakauwi nang buhay.”
- “Susunugin ko bahay ninyo.”
- “Ipapapatay kita kapag hindi mo binayaran ang utang.”
- “Pag tumestigo ka, damay pamilya mo.”
- “Babarilin kita sa labas ng opisina.”
- “Alam ko saan nag-aaral anak mo. May mangyayari sa kanya.”
- “Pag hindi mo binawi reklamo mo, ipapadukot kita.”
- “Sasaksakin kita pag nagkita tayo.”
- “Papapasukin ko bahay mo mamaya at papatayin kita.”
The exact words matter, but context also matters. A message that seems vague may become threatening when combined with prior violence, stalking, weapons, demands, or specific circumstances.
VI. Elements of Grave Threats
The basic elements of grave threats may be understood as follows:
- The offender threatens another person;
- The threat is to inflict a wrong amounting to a crime;
- The threat is deliberate and serious, not merely a harmless joke or casual expression;
- The threat is communicated to the offended party or intended to reach the offended party;
- The circumstances show that the threat was meant to intimidate, alarm, compel, or cause fear.
Depending on the specific form of grave threats charged, the presence or absence of a condition or demand may affect the applicable penalty and legal classification.
VII. Threat With a Condition
A grave threat may be conditional.
A conditional threat occurs when the sender demands that the victim do or refrain from doing something, and threatens criminal harm if the condition is not obeyed.
Examples:
- “Bayaran mo ako bukas o papatayin kita.”
- “Bawiin mo kaso mo o susunugin ko bahay mo.”
- “Makipagbalikan ka sa akin o sasaktan ko anak mo.”
- “Huwag kang pupunta sa police o ipapapatay kita.”
- “Pumirma ka sa dokumento o babarilin kita.”
- “Magpadala ka ng pera o may mangyayari sa pamilya mo.”
Conditional threats are serious because they are used to force action, silence, payment, surrender of rights, or compliance.
VIII. Threat Without a Condition
A threat may also be unconditional.
Examples:
- “Papatayin kita.”
- “Susunugin ko bahay mo.”
- “Babarilin kita.”
- “Hindi ka na aabot ng bukas.”
- “May kalalagyan ka.”
- “Abangan mo ako.”
Even without an express demand, the message may still be punishable if it communicates a serious threat to commit a crime.
IX. Threat Demanding Money or Property
If the threat is used to demand money, property, documents, sexual favors, silence, or other benefit, the case may involve not only grave threats but also extortion, robbery-related offenses, coercion, cybercrime, or other crimes depending on facts.
Examples:
- “Magpadala ka ng ₱20,000 o papatayin kita.”
- “Bayaran mo ako kahit hindi mo utang o ipapahiya kita at sasaktan pamilya mo.”
- “Send money now or I will burn your shop.”
- “Give me your ATM PIN or I will hurt your child.”
- “Withdraw the complaint and pay me or you will disappear.”
The presence of demand may aggravate the seriousness of the case and may change the legal classification.
X. Threat Against a Family Member
A grave threat may be directed not only at the recipient but also at the recipient’s family or close relations.
Examples:
- “Papatayin ko anak mo.”
- “Damay asawa mo.”
- “Susunugin ko bahay ninyo habang natutulog pamilya mo.”
- “Alam ko saan nag-aaral kapatid mo.”
- “Hindi ligtas ang nanay mo.”
Threats against children, spouses, parents, siblings, or household members can be powerful evidence of intimidation and danger. They may also implicate special laws, especially if children or women are involved.
XI. Threat Against Property
A threat to commit a crime against property may also constitute grave threats.
Examples:
- “Susunugin ko bahay mo.”
- “Babasagin ko kotse mo at susunugin ko.”
- “Wawasakin ko tindahan mo.”
- “Papapasukin ko bahay mo at sisirain lahat.”
- “Lalagyan ko ng bomba ang opisina mo.”
The threatened act must amount to a crime, such as arson, malicious mischief, destructive acts, or other criminal offenses.
XII. Threat to Kill
A death threat is one of the clearest examples of a possible grave threat.
Messages such as “Papatayin kita,” “I will kill you,” or “Babarilin kita” should be taken seriously, especially if accompanied by:
- prior violence;
- known access to weapons;
- knowledge of the victim’s location;
- stalking;
- repeated messages;
- a specific time or place;
- previous attempts;
- anger over a pending case;
- domestic abuse;
- demand for money or compliance;
- threats to family.
The recipient need not wait for an actual attack before reporting.
XIII. Threat to Cause Serious Physical Injury
A threat to cause serious physical harm may also be grave threats.
Examples:
- “Babasagin ko mukha mo.”
- “Puputulin ko kamay mo.”
- “Sasaksakin kita.”
- “Bubugbugin kita hanggang hindi ka makalakad.”
- “Ipapaospital kita.”
- “Pipilayin kita.”
Whether the threat amounts to grave threats depends on the words, context, and seriousness of the threatened wrong.
XIV. Threats in Filipino, English, Dialect, Slang, or Emojis
Threats may be made in any language or expression understood by the parties.
Examples of Filipino or slang threats:
- “Tigok ka.”
- “May kalalagyan ka.”
- “Ipapaligpit kita.”
- “Di ka na aabot bukas.”
- “Abangan mo.”
- “Malalagot ka sa akin.”
- “Hindi ka na makakauwi.”
- “Paputukan kita.”
- “Papatumbahin kita.”
Emojis may also matter if used in threatening context, such as gun, knife, coffin, skull, fire, or blood symbols accompanying threatening words.
If the message uses dialect, coded words, or slang, the complainant should explain the meaning in the complaint-affidavit.
XV. Serious Threat Versus Mere Anger
Not all angry words are grave threats. Courts and prosecutors consider whether the words are serious or merely expressions of anger, annoyance, frustration, or exaggeration.
For example, during a heated argument, a person may say “Papatayin kita” without actual intent to intimidate. However, even angry words can be criminal if the circumstances show seriousness and intent to threaten.
Factors considered include:
- Exact wording;
- Relationship between parties;
- Prior conflict;
- Previous violence;
- Repetition of messages;
- Time and place mentioned;
- Presence of weapons;
- Sender’s ability to carry out the threat;
- Recipient’s reasonable fear;
- Whether a demand was made;
- Whether sender followed the message with action;
- Whether the sender later apologized or repeated the threat.
A “joke” or “anger” defense is not automatically successful.
XVI. Grave Threats Versus Light Threats
Light threats involve less serious threats or threats of a wrong that may not amount to a grave crime, depending on circumstances.
A message may be considered light threats rather than grave threats if:
- the threatened harm is less serious;
- the threat does not involve a crime of the gravity contemplated by grave threats;
- the threat is conditional but involves a lesser wrong;
- the facts do not show grave intimidation.
Examples might include threats of minor harm, threats to cause inconvenience, or other less serious wrongs.
However, threats to kill, burn a house, shoot, stab, kidnap, or seriously injure are generally treated more seriously.
XVII. Grave Threats Versus Unjust Vexation
Unjust vexation generally involves acts that annoy, irritate, disturb, or torment another without necessarily involving a serious criminal threat.
Examples:
- repeated insulting texts;
- annoying messages at midnight;
- abusive but non-threatening words;
- unwanted contact;
- irritating accusations;
- repeated nuisance calls.
If the text says only “Wala kang kwenta,” “Magsisisi ka,” or “Nakakainis ka,” the facts may support unjust vexation or harassment but not necessarily grave threats.
If the message says “Papatayin kita,” the case may move from mere annoyance to criminal threat.
XVIII. Grave Threats Versus Grave Coercion
Grave threats and grave coercion may overlap.
Grave threats focus on threatening a future wrong amounting to a crime.
Grave coercion focuses on preventing a person from doing something not prohibited by law, or compelling a person to do something against their will, through violence, threats, or intimidation.
Examples of possible coercion by text:
- “Do not testify or I will kill you.”
- “Sign the deed or I will hurt your child.”
- “Stop seeing that person or I will burn your house.”
- “Delete your post or I will attack you.”
Depending on the facts, the prosecutor may consider grave threats, grave coercion, or both, but charges must be legally appropriate.
XIX. Grave Threats Versus Extortion
A threatening text may become extortion-related when the sender demands money or property.
Examples:
- “Pay me ₱50,000 or I will kill you.”
- “Send money or I will expose you and hurt your family.”
- “Deposit to this account or I will burn your store.”
- “Give me your motorcycle or I will shoot you.”
The threat is no longer merely an expression of harm. It becomes a means of obtaining something.
The legal classification may depend on whether the act falls under threats, robbery, extortion, coercion, cybercrime, or other provisions.
XX. Grave Threats and Cybercrime
A text message itself may not automatically mean the case is a separate cybercrime. However, electronic communication is relevant because:
- The threat is transmitted by electronic means;
- Digital evidence rules apply;
- The sender may be anonymous or use fake accounts;
- Subscriber records may be needed;
- Cybercrime units may help investigate;
- The same conduct may involve identity theft, hacking, blackmail, cyber harassment, cyber libel, or unlawful disclosure.
If the threat is sent through SMS, Messenger, Viber, WhatsApp, Telegram, email, Instagram, TikTok, X, or other digital platforms, evidence preservation becomes crucial.
XXI. Does the Cybercrime Law Increase the Penalty?
Certain crimes committed through information and communications technology may have cybercrime implications. Whether the penalty is affected depends on the specific offense charged, the applicable law, and the manner of commission.
Not every threatening text automatically results in a cybercrime penalty increase. Prosecutors must determine the proper charge based on the law and facts.
However, the use of electronic communications may justify referral to cybercrime investigators and application of electronic evidence rules.
XXII. Grave Threats and Violence Against Women and Their Children
If the sender is a spouse, former spouse, live-in partner, former partner, boyfriend, ex-boyfriend, dating partner, or person with whom the woman has or had a sexual or dating relationship, threatening text messages may fall under the law on violence against women and their children.
Threats may constitute psychological violence, harassment, intimidation, stalking-like conduct, or coercive control.
Examples:
- “Kapag hindi ka bumalik sa akin, papatayin kita.”
- “Pag may bago kang lalaki, sasaktan ko kayo.”
- “Hindi mo makukuha mga bata kung hindi ka susunod.”
- “Susunugin ko bahay ng pamilya mo.”
- “Papatayin ko sarili ko at isasama kita.”
In such cases, remedies may include a criminal complaint and protection orders.
XXIII. Barangay Protection Order and Court Protection Orders
For covered violence against women and children cases, the victim may seek protection orders.
A protection order may prohibit the respondent from:
- contacting the victim;
- texting or calling the victim;
- approaching the victim;
- going near the victim’s home, workplace, school, or children;
- threatening or harassing the victim;
- possessing or using firearms, where applicable;
- committing further violence.
Threatening text messages can be strong evidence supporting a protection order.
XXIV. Grave Threats Against Children
Threats sent to a child or threats against a child are serious.
Examples:
- “Papatayin kita pag pumasok ka bukas.”
- “Aabangan kita sa school.”
- “Sasaktan ko kapatid mo.”
- “Ipapahiya kita sa buong klase at sasaktan kita.”
If the victim is a minor, child protection laws, anti-bullying policies, school discipline, and social welfare intervention may apply.
Parents or guardians should preserve evidence and report promptly.
XXV. Grave Threats and School Bullying
Students may send threats through text or group chats.
Possible remedies include:
- school complaint;
- anti-bullying procedures;
- barangay or police report;
- child protection referral;
- counseling;
- criminal complaint in serious cases;
- juvenile justice procedures if the sender is a minor.
Schools should not treat death threats as ordinary teasing.
XXVI. Grave Threats and Workplace Harassment
Threatening text messages may arise from workplace disputes involving:
- co-workers;
- supervisors;
- employees;
- clients;
- contractors;
- union disputes;
- termination issues;
- salary disputes;
- disciplinary proceedings.
A threatened employee should report to HR, security, and law enforcement if serious.
The employer may also investigate and discipline the sender if the threat is work-related or affects workplace safety.
XXVII. Grave Threats and Debt Collection
Debt collectors sometimes send threatening messages.
Examples:
- “Pag hindi ka nagbayad, papatayin ka namin.”
- “Pupuntahan ka namin at bubugbugin ka.”
- “Damay pamilya mo.”
- “Ipapakulong ka namin bukas kahit walang kaso.”
- “Ipopost namin mukha mo at papahiyain ka.”
A debt does not authorize threats or harassment. Ordinary nonpayment of debt is generally civil, not a basis for death threats, public shaming, or unlawful intimidation.
A borrower may still owe a lawful debt, but the collector may be criminally or administratively liable for threats and harassment.
XXVIII. Grave Threats and Online Lending Apps
Some online lending app collectors send threatening messages to borrowers and their contacts. These may involve:
- grave threats;
- unjust vexation;
- coercion;
- data privacy violations;
- unfair collection practices;
- cyber harassment;
- identity misuse;
- extortion;
- fake legal notices;
- public shaming.
Borrowers should preserve the messages, demand lawful accounting, avoid panic payments, and report threats.
XXIX. Grave Threats and Political or Community Disputes
Threatening text messages may arise from:
- barangay disputes;
- election conflicts;
- land disputes;
- homeowners’ association disputes;
- business rivalry;
- union organizing;
- whistleblowing;
- complaints against public officials;
- neighborhood quarrels.
If threats are connected to testimony, voting, public complaints, or official proceedings, other legal issues may arise.
XXX. Grave Threats Against Witnesses
Threatening a witness may be especially serious.
Examples:
- “Pag tumestigo ka, papatayin kita.”
- “Bawiin mo statement mo o damay pamilya mo.”
- “Huwag kang pupunta sa hearing.”
Such messages may support grave threats and may also affect pending proceedings. The victim should inform the prosecutor, police, court, or investigating authority handling the main case.
XXXI. Grave Threats and Public Officers
Threats against public officers may involve additional concerns if connected to official duties.
Examples:
- threatening a barangay official;
- threatening a teacher in connection with school duties;
- threatening a police officer;
- threatening a judge, prosecutor, or court personnel;
- threatening a government employee for performing official functions.
Depending on the circumstances, the case may involve threats, direct assault, obstruction-related issues, contempt, or administrative concerns.
XXXII. Where Is the Crime Committed When the Threat Is by Text?
Venue can be complex in electronic communications.
Possible places relevant to venue include:
- where the message was sent;
- where the message was received and read;
- where the offended party suffered fear or intimidation;
- where the sender is located;
- where the threatened act is to be carried out;
- where an essential element of the offense occurred.
In practice, complainants often report to the police station, prosecutor, or cybercrime office in the place where they received the threat or reside, but proper venue may depend on the facts and the offense charged.
If venue is uncertain, explain in the complaint where the message was received, where the sender is believed to be, and where the threatened harm is connected.
XXXIII. Prescription
Criminal offenses have prescriptive periods. The applicable period depends on the penalty of the offense charged.
A complainant should act promptly because delay can create problems:
- messages may be deleted;
- phone may be lost;
- number may be deactivated;
- witnesses may forget;
- platform records may be unavailable;
- the sender may change SIM or account;
- prescription may become an issue.
Prompt reporting strengthens both safety and evidence.
XXXIV. Evidence in Grave Threats by Text Message
Evidence is crucial. A complaint based only on verbal memory may be weak.
Important evidence includes:
- Original text messages;
- Screenshots;
- Sender’s number;
- Date and time of messages;
- Full message thread;
- Call logs;
- Voice messages;
- Related chat messages;
- Proof of sender identity;
- Prior threats;
- Prior violence;
- Witnesses who saw the messages;
- Police or barangay blotter;
- Protection order records, if any;
- Screenshots of social media profile linked to the number;
- E-wallet or account details linked to sender;
- Telecom or platform records obtained lawfully;
- Evidence of the sender’s capacity to carry out the threat.
The strongest cases show both the threatening words and the identity of the sender.
XXXV. Screenshots as Evidence
Screenshots are useful but may be challenged.
A respondent may claim:
- screenshot was edited;
- sender name was changed;
- phone number is not theirs;
- message was fabricated;
- message was taken out of context;
- someone else used the phone;
- the date is wrong;
- the conversation is incomplete.
To strengthen screenshots:
- include the sender’s number;
- include date and time;
- capture the entire conversation;
- avoid cropping;
- keep the original phone;
- back up the messages;
- photograph the phone with another device;
- have police view the original messages;
- preserve SIM card;
- avoid editing screenshots except redaction for public sharing.
XXXVI. Original Phone and SIM Card
The original phone and SIM card may be important evidence.
Preserve:
- original message thread;
- SIM card used to receive the message;
- call logs;
- contact details;
- screenshots;
- backup files.
Avoid factory reset, deletion, or transferring messages without backup. If the phone must be replaced, preserve the old device if possible.
XXXVII. Authentication of Electronic Evidence
Electronic evidence must be authenticated. This means the complainant must show that the messages are what they claim to be.
Authentication may be supported by:
- testimony of recipient;
- original phone;
- screenshots;
- witnesses;
- sender admissions;
- prior messages from same number;
- subscriber records;
- platform records;
- pattern of communication;
- content referring to facts known only to sender;
- forensic examination, where needed.
The complainant should be prepared to explain how they received and preserved the messages.
XXXVIII. Proving Sender Identity
Identity is often the hardest issue.
The complainant must show that the respondent sent the message or is responsible for it.
Evidence may include:
- the number is known as respondent’s number;
- previous normal conversations from the same number;
- respondent identifies themselves in the message;
- respondent refers to private facts;
- respondent later admits sending it;
- the number is linked to respondent’s e-wallet or account;
- witnesses know the number belongs to respondent;
- respondent uses the same number in business or work records;
- social media account linked to the number;
- telecom subscriber information obtained through lawful process;
- CCTV showing respondent using phone at relevant time, where available.
Mere suspicion is not enough. The complaint should explain why the sender is believed to be the respondent.
XXXIX. Unknown Sender or Anonymous Number
If the sender is unknown, the complaint may still be reported.
The complainant should provide:
- phone number;
- message content;
- date and time;
- screenshots;
- possible suspects;
- reason for suspicion;
- prior incidents;
- any identifying clues;
- e-wallet or payment details if demand was made;
- links to accounts, if any.
Authorities may use lawful processes to obtain subscriber or platform information.
XL. SIM Registration and Threats
SIM registration may help trace a number, but it does not automatically prove the sender’s identity.
A registered SIM may be:
- used by the registered owner;
- borrowed by another person;
- stolen;
- fraudulently registered;
- used by a family member;
- used by an employee;
- used in a scam operation.
Subscriber records may help, but additional evidence may still be needed to prove actual authorship.
Private individuals generally cannot demand telecom subscriber data directly. Law enforcement or legal process may be needed.
XLI. Threats Through Messaging Apps
Threats may be sent through:
- Messenger;
- Viber;
- WhatsApp;
- Telegram;
- Signal;
- Instagram;
- TikTok;
- X;
- email;
- dating apps;
- gaming chats;
- workplace messaging apps;
- group chats.
For app-based threats, preserve:
- username;
- profile link;
- profile photo;
- message ID if available;
- date and time;
- full thread;
- account URL;
- screenshots;
- device notifications;
- email address or phone linked to account, if visible;
- mutual contacts;
- group members.
XLII. Group Chat Threats
Threats in group chats may have witnesses.
Preserve:
- group name;
- participants;
- sender profile;
- threatening message;
- reactions and replies;
- date and time;
- full context;
- admin details;
- screenshots from other members, if available.
Group threats may also involve public humiliation, defamation, harassment, or conspiracy depending on facts.
XLIII. Threats With Images, Voice Notes, or Videos
A threat may be sent through media:
- photo of a gun;
- video of the sender holding a weapon;
- voice message saying “papatayin kita”;
- photo of the victim’s house;
- map or location pin;
- photo of the victim’s child’s school;
- burning object;
- edited image of victim.
These materials can strengthen the seriousness of the threat.
Preserve the original file, metadata where possible, and screenshots.
XLIV. Threats With Location Information
A threat becomes more serious when the sender shows knowledge of the victim’s location.
Examples:
- “Nasa labas ako ng bahay mo.”
- “Nakikita kita ngayon.”
- “Alam ko route mo pauwi.”
- “Nasa tapat ako ng office mo.”
- sending a photo of the victim’s gate;
- sending a live location near the victim.
These facts should be reported immediately because they may show imminent danger.
XLV. Immediate Safety Steps
If the threat appears imminent:
- Do not meet the sender;
- Move to a safe place;
- Inform trusted people;
- Call police or emergency assistance;
- Notify building, school, or workplace security;
- Preserve messages;
- Avoid predictable routes;
- Secure children and vulnerable family members;
- Consider temporary relocation if danger is serious;
- Seek protection order if domestic violence is involved.
Legal action is important, but safety comes first.
XLVI. Police Blotter
A police blotter records the complaint and may be the first formal step.
The blotter should include:
- complainant’s name;
- sender’s name or number;
- exact threatening words;
- date and time received;
- relationship between parties;
- prior incidents;
- fear or danger caused;
- evidence shown;
- action requested;
- officer handling the report.
A blotter is not the same as a criminal conviction or final case, but it documents the incident.
XLVII. Barangay Report
A barangay report may help when:
- the sender is a neighbor;
- immediate local safety is needed;
- the issue involves community dispute;
- domestic violence protection order is needed;
- the complainant wants local documentation.
However, serious death threats should not be treated as mere barangay misunderstanding. Police or prosecutor action may be necessary.
XLVIII. Filing a Criminal Complaint
A criminal complaint usually requires a complaint-affidavit and supporting evidence.
The complaint-affidavit should state:
- Personal details of complainant;
- Identity of respondent, if known;
- Phone number or account used;
- Exact messages received;
- Dates and times;
- Relationship or prior conflict;
- Why the complainant believes respondent sent the messages;
- Why the messages constitute threats;
- Fear or danger caused;
- Any demand or condition;
- Prior incidents;
- Evidence attached;
- Witnesses;
- Request for prosecution.
The affidavit should be factual and chronological.
XLIX. Sample Complaint-Affidavit Allegation
A complainant may write:
“On 15 April 2026 at around 9:30 p.m., I received a text message from mobile number 09XX-XXX-XXXX stating: ‘Abangan mo bukas sa labas ng opisina mo. Papatayin kita.’ I know this number belongs to respondent because respondent has used the same number to communicate with me since January 2025. Respondent and I had a dispute regarding ___, and respondent previously threatened me on ___. I felt fear for my life because respondent knows where I work and has previously confronted me there.”
This kind of statement identifies the message, sender, context, and fear.
L. Evidence Attachments
Attach:
- screenshots of messages;
- printed message thread;
- photo of phone showing message;
- call logs;
- prior messages showing identity;
- police blotter;
- barangay blotter;
- witness affidavits;
- proof of relationship;
- social media profile screenshots;
- demand messages, if any;
- protection order records;
- medical or psychological records if relevant;
- photos or videos linked to threat;
- proof of sender’s weapon access, if relevant;
- other supporting documents.
Keep originals.
LI. Role of Prosecutor
The prosecutor evaluates whether probable cause exists.
The prosecutor may consider:
- whether the message contains a threat;
- whether the threatened wrong amounts to a crime;
- whether the respondent sent the message;
- whether the evidence is authentic;
- whether the threat is serious;
- whether a different offense is more appropriate;
- whether the complaint was filed in proper venue;
- whether prescription has run;
- whether the parties are covered by special laws.
The prosecutor may dismiss, require additional evidence, or file a case in court.
LII. Role of Court
If a case is filed, the court determines guilt beyond reasonable doubt.
The court may evaluate:
- authenticity of electronic evidence;
- identity of sender;
- exact words used;
- context;
- seriousness of threat;
- credibility of complainant and witnesses;
- defenses;
- whether the offense charged is proven;
- penalty and civil liability.
The burden of proof in criminal cases is high.
LIII. Burden of Proof
The prosecution must prove the accused’s guilt beyond reasonable doubt.
This includes proving:
- A threatening message was sent;
- The message threatened a wrong amounting to a crime;
- The accused was the sender or responsible for sending;
- The threat was serious and intentional;
- Venue and jurisdiction are proper;
- Evidence is authentic and credible.
The accused does not have to prove innocence. The prosecution must prove guilt.
LIV. Common Defenses
A respondent may raise defenses such as:
- The message was fabricated;
- The screenshot was edited;
- The number does not belong to respondent;
- Someone else used the phone;
- The SIM was lost or stolen;
- The statement was a joke;
- The message was made in anger and not serious;
- The words did not threaten a crime;
- The complainant took the message out of context;
- The complainant provoked or fabricated the case;
- The threat was not communicated to the complainant;
- The accused did not intend to threaten;
- The case was filed in the wrong venue;
- Prescription has run.
The success of these defenses depends on evidence.
LV. “It Was Just a Joke” Defense
A sender may say the message was only a joke.
The court or prosecutor may consider:
- whether the parties joke that way;
- whether the recipient reasonably understood it as a threat;
- whether the sender repeated it;
- whether it was made during conflict;
- whether it was followed by stalking or confrontation;
- whether the sender had weapons;
- whether the sender apologized immediately;
- whether the message included specific details.
A joke defense is weak when the message is specific, repeated, and made in a context of conflict or violence.
LVI. “I Was Angry” Defense
Anger does not automatically excuse a threat.
Many threats are made in anger. The issue is whether the words and circumstances show a criminal threat.
However, if words were uttered in a sudden quarrel without serious intent, that may affect classification or credibility.
Context matters.
LVII. “Someone Else Used My Phone” Defense
This defense may be raised when:
- phone was shared;
- SIM was stolen;
- account was hacked;
- family member used phone;
- employee used business phone;
- phone was lost.
The respondent should support this with evidence, such as:
- lost SIM report;
- police report;
- account compromise notice;
- proof of location elsewhere;
- witnesses;
- device access records;
- messages showing hacking.
A bare denial may not be enough if other evidence links respondent to the number.
LVIII. Countercharges
The respondent may file countercharges if the complaint is false or malicious.
Possible counterclaims or countercharges may include:
- perjury;
- malicious prosecution;
- damages;
- unjust vexation;
- cyber libel, if the complainant publicly accused respondent falsely;
- harassment, if the complaint is part of abuse.
However, respondents should avoid retaliatory threats or online attacks, which may create new liability.
LIX. Settlement and Desistance
Parties may settle some threat-related disputes, especially if the threat arose from a private conflict and no ongoing danger exists.
Settlement may include:
- apology;
- undertaking not to contact;
- payment of damages;
- no-contact agreement;
- barangay agreement;
- withdrawal of civil claims.
However, criminal liability is not always automatically extinguished by settlement. The State may continue prosecution if evidence supports it, especially where the threat is serious, public safety is involved, or special laws apply.
LX. Affidavit of Desistance
An affidavit of desistance is a statement by the complainant that they no longer wish to pursue the case.
It does not automatically dismiss a criminal case.
Prosecutors and courts may still proceed if there is enough evidence.
A complainant should not sign desistance under pressure, intimidation, bribery, or renewed threats.
LXI. Protection From Retaliation
After reporting, the complainant should watch for retaliation.
Retaliation may include:
- new threats;
- stalking;
- public shaming;
- threats to witnesses;
- threats to family;
- workplace harassment;
- fake counterclaims;
- doxxing;
- online posts.
Report retaliation immediately and preserve evidence.
LXII. Civil Liability
A person convicted of grave threats may also face civil liability.
Civil liability may include:
- moral damages;
- actual damages;
- medical or psychological treatment costs;
- lost income if threat caused absence or business loss;
- attorney’s fees in proper cases;
- other damages proven.
Even without conviction, a separate civil action may sometimes be considered depending on facts.
LXIII. Administrative Remedies
If the sender is an employee, student, public officer, professional, or member of an organization, administrative remedies may be available.
Examples:
- workplace disciplinary complaint;
- school disciplinary complaint;
- complaint against public officer;
- professional ethics complaint;
- homeowners’ association complaint;
- platform abuse report;
- organization grievance process.
Administrative remedies do not necessarily replace criminal remedies.
LXIV. Reporting to Platforms
If the threat was sent through a platform, report it to the platform.
Possible actions:
- account restriction;
- removal of threatening content;
- preservation of records;
- blocking;
- safety intervention;
- reporting to law enforcement where appropriate.
Platform reporting should not be the only step if the threat is serious. Police or legal reporting may still be necessary.
LXV. Threats and Firearms
If the sender owns or has access to firearms, include that in the report.
Evidence may include:
- firearm photos;
- prior gun threats;
- posts with guns;
- known license or possession;
- witness statements;
- previous incidents;
- messages saying “babarilin kita.”
This may affect police response, protection measures, and perceived seriousness of the threat.
LXVI. Threats and Stalking
Repeated threats plus monitoring, following, or unwanted contact may indicate stalking-like conduct.
Examples:
- sender repeatedly texts threats;
- sender appears near home or work;
- sender sends photos of victim’s location;
- sender uses multiple numbers;
- sender contacts friends and relatives;
- sender tracks social media activity;
- sender threatens new partner.
This pattern should be documented because repeated conduct may support stronger protective action.
LXVII. Threats and Doxxing
Doxxing means exposing personal information to encourage harassment or harm.
Examples:
- posting victim’s address;
- sharing phone number with threats;
- posting workplace or school;
- telling others to confront the victim;
- sharing family details.
Doxxing combined with threats may involve data privacy, cybercrime, harassment, and safety concerns.
LXVIII. Threats to Release Intimate Images
A message threatening to release intimate photos or videos may involve several legal issues.
Examples:
- “Send money or I will post your private video.”
- “Makipagbalikan ka o ikakalat ko pictures mo.”
- “If you report me, I will upload your nude photos.”
This may involve grave threats, coercion, extortion, violence against women, photo or video voyeurism, cybercrime, and privacy violations.
Do not send more intimate materials. Preserve evidence and report.
LXIX. Threats by Ex-Partner
Threats from former partners are especially concerning because of emotional history and possible access to personal information.
Warning signs:
- “Kung hindi kita makukuha, walang makakakuha sa iyo.”
- “Papatayin ko bagong boyfriend mo.”
- “Susunugin ko bahay ninyo.”
- “Damay pamilya mo.”
- “Magpapakamatay ako at isasama kita.”
Victims should consider protection orders, police reporting, and safety planning.
LXX. Threats by Neighbor
Neighbor threats are risky because the sender knows the victim’s residence.
Steps:
- preserve messages;
- report to barangay and police;
- avoid confrontation;
- secure CCTV if possible;
- inform household members;
- document prior incidents;
- seek protection if threats escalate.
Barangay mediation may help in minor disputes, but serious threats require law enforcement attention.
LXXI. Threats by Co-Worker
If a co-worker sends threats:
- preserve messages;
- report to HR and security;
- file police complaint if serious;
- avoid being alone with the sender;
- request workplace safety measures;
- document prior conflict;
- avoid retaliatory messages.
Employers have an interest in maintaining workplace safety.
LXXII. Threats by Public Official
If the sender is a public official or law enforcement officer, the threat may be more intimidating because of authority or weapon access.
Possible steps:
- preserve evidence;
- report to appropriate police or internal affairs office;
- seek legal help;
- file administrative complaint;
- report to prosecutor if criminal;
- inform trusted persons;
- avoid private meetings.
LXXIII. Threats by Anonymous Online Account
Anonymous threats should not be ignored.
Preserve:
- username;
- profile URL;
- screenshot;
- message content;
- date and time;
- platform;
- any linked phone or email;
- profile photo;
- mutual groups;
- prior interactions.
Report to platform and cybercrime authorities if serious.
LXXIV. Threats by Text After Blocking
Harassers may use multiple numbers.
Document:
- all numbers used;
- repeated wording;
- timing;
- references to prior messages;
- why you believe same person is behind them;
- any admissions;
- any linked accounts.
Repeated contact after blocking can show persistence and seriousness.
LXXV. Can the Victim Post the Threat Online?
Posting a threat publicly may warn others, but it can also create legal risks.
Risks include:
- defamation counterclaim;
- exposure of personal data;
- escalation by sender;
- compromise of investigation;
- harassment by third parties;
- violation of privacy of family members or minors.
A safer approach is to report to authorities and share only with trusted persons for safety. If posting, redact personal data and avoid unverified accusations.
LXXVI. Can the Victim Record Calls?
If threats are made by call, recording may raise legal and evidentiary questions. The safest approach is to preserve call logs, put communications in writing, and report threats. If recording is considered, legal advice may be needed because privacy and anti-wiretapping rules may apply depending on who records and how.
Text messages are easier to preserve because the written threat is already visible.
LXXVII. Should the Victim Reply?
A victim is not required to reply.
If responding, keep it calm and short:
- “Do not threaten me.”
- “Do not contact me again.”
- “I am preserving your messages.”
- “I will report further threats to authorities.”
Do not threaten back. A retaliatory threat can create liability.
LXXVIII. What Not to Do
Do not:
- Delete messages;
- Edit screenshots;
- Threaten the sender back;
- Meet the sender alone;
- Post unredacted personal information online;
- Ignore specific death threats;
- Assume anonymous numbers cannot be traced;
- Sign desistance under pressure;
- Surrender money or documents because of threats without advice;
- Delay reporting if danger is imminent;
- Fabricate or exaggerate messages;
- Harass the sender’s relatives.
LXXIX. Practical Step-by-Step Guide for Victims
Step 1: Assess Immediate Danger
If the sender is nearby, armed, or threatens immediate harm, seek police or emergency help.
Step 2: Preserve Evidence
Save messages, screenshots, call logs, and full conversation threads.
Step 3: Identify the Sender
Write down why you believe the number or account belongs to a particular person.
Step 4: Inform Trusted People
Tell family, workplace security, school, or trusted friends if safety is at risk.
Step 5: File a Police Blotter
Report the threat and show the original messages.
Step 6: Prepare Complaint-Affidavit
State facts clearly, quote exact words, and attach evidence.
Step 7: Consider Special Remedies
If domestic violence, child abuse, workplace danger, or data privacy violation is involved, pursue additional remedies.
Step 8: Avoid Direct Confrontation
Do not meet the sender alone or threaten back.
Step 9: Preserve New Evidence
Save all new messages, new numbers, and retaliation.
Step 10: Follow Through
Attend prosecutor, barangay, police, or court proceedings as required.
LXXX. Practical Step-by-Step Guide for Respondents
If accused of grave threats by text:
Step 1: Do Not Send More Messages
Stop contacting the complainant, especially if emotions are high.
Step 2: Preserve Your Evidence
Keep the full conversation, not just favorable parts.
Step 3: Check the Alleged Message
Determine whether it was sent, altered, or taken out of context.
Step 4: Secure Proof of Phone Control
If phone was lost, stolen, hacked, or borrowed, gather proof.
Step 5: Avoid Retaliation
Do not threaten, shame, or pressure the complainant.
Step 6: Prepare Counter-Affidavit
Respond factually to the accusation.
Step 7: Raise Defenses Properly
Explain context, identity issues, lack of seriousness, or fabrication if supported.
Step 8: Seek Legal Assistance
Threat cases can affect liberty, reputation, employment, and family relations.
LXXXI. Sample Evidence Checklist for Victims
Prepare:
- phone with original messages;
- screenshots;
- printed copies;
- sender’s number;
- sender’s name and known identity;
- prior messages from same number;
- call logs;
- police blotter;
- barangay report;
- witness affidavits;
- timeline of events;
- proof of prior conflict;
- proof sender knows victim’s location;
- photos or videos linked to threat;
- protection order documents, if any;
- proof of additional harassment.
LXXXII. Sample Timeline
| Date and Time | Event | Evidence |
|---|---|---|
| April 10, 8:00 p.m. | Respondent sent “Papatayin kita” | Screenshot A |
| April 10, 8:05 p.m. | Respondent called 6 times | Call Log B |
| April 11, 7:30 a.m. | Respondent appeared near workplace | Guard Report C |
| April 11, 10:00 a.m. | Police blotter filed | Blotter D |
| April 12, 9:00 p.m. | New number sent similar threat | Screenshot E |
A timeline helps authorities understand the pattern.
LXXXIII. Sample Message Preservation Method
The victim should:
- Screenshot the message with number visible;
- Screenshot the entire thread;
- Photograph the phone screen with another device;
- Back up the screenshots;
- Export the conversation if possible;
- Save the sender as number, not nickname, to avoid confusion;
- Keep the original phone;
- Do not delete the SIM;
- Print copies for filing;
- Bring the phone to police or prosecutor if required.
LXXXIV. Common Mistakes by Complainants
Common mistakes include:
- Deleting messages;
- Cropping screenshots too much;
- Not showing sender number;
- Failing to prove the number belongs to respondent;
- Delaying complaint;
- Posting accusations online before filing;
- Threatening back;
- Not preserving full conversation;
- Ignoring prior or subsequent threats;
- Not explaining slang or dialect;
- Failing to attach witness affidavits;
- Treating serious threats as mere barangay gossip.
LXXXV. Common Mistakes by Respondents
Common mistakes include:
- Sending more angry messages;
- Apologizing in a way that admits more than intended;
- Deleting own messages;
- Threatening the complainant to withdraw;
- Posting insults online;
- Fabricating lost-phone defenses;
- Ignoring subpoenas;
- Failing to file counter-affidavit;
- Contacting witnesses improperly;
- Assuming text threats are not evidence;
- Claiming “joke” despite serious context;
- Not preserving full conversation.
LXXXVI. Frequently Asked Questions
1. Is “Papatayin kita” by text message a crime?
It may be. A death threat by text can constitute grave threats if the elements are present and the message is serious under the circumstances.
2. What if the sender says it was only a joke?
That is a possible defense, but context matters. A serious, specific, repeated threat during conflict may still be punishable.
3. Is a screenshot enough?
A screenshot helps, but it is stronger if supported by the original phone, full message thread, proof of sender identity, call logs, witnesses, and related evidence.
4. What if I do not know who sent the threat?
You may still report it. Provide the number, screenshots, time, content, and possible identifying details. Authorities may investigate through lawful processes.
5. Can I file a case if the threat was sent through Messenger or Viber instead of SMS?
Yes. Threats sent through messaging apps may still be evidence of grave threats or other offenses.
6. Can I be jailed for sending a death threat by text?
If charged and convicted, criminal penalties may apply. The exact penalty depends on the offense proven and circumstances.
7. Should I go to the barangay first?
For serious death threats, police or prosecutor reporting may be appropriate. Barangay reporting may help for documentation or local safety, but it should not replace urgent law enforcement action when danger is serious.
8. What if the sender is my ex-partner?
Special laws on violence against women and children may apply, and protection orders may be available.
9. What if the threat is connected to a debt?
Debt does not justify threats. The sender may still be liable for grave threats or harassment.
10. What if the accused used someone else’s phone?
The prosecution must prove authorship. Evidence linking the accused to the message is important.
11. Can I post the threat online?
It is safer to report to authorities first. Public posting can create privacy, defamation, and safety risks.
12. What if the sender apologizes?
An apology may be considered, but it does not automatically erase criminal liability or safety risk.
LXXXVII. Key Legal and Practical Points
The key points are:
- Grave threats may be committed through text message.
- The threatened wrong must generally amount to a crime.
- Death threats, arson threats, kidnapping threats, rape threats, and serious harm threats are treated seriously.
- Conditional threats demanding money, silence, withdrawal of a case, or compliance may be more serious.
- Screenshots should be supported by original messages and proof of sender identity.
- The sender’s number alone may not be enough if authorship is disputed.
- Context matters: prior violence, repeated messages, weapons, location knowledge, and demands strengthen the case.
- Threats by intimate partners may also fall under violence against women and children laws.
- Threats against children, witnesses, public officers, or family members may involve additional remedies.
- Do not delete messages or threaten back.
- File a police report or criminal complaint promptly if the threat is serious.
- Seek protection orders when domestic violence or continuing danger is involved.
- Settlement or apology does not automatically end criminal liability.
- A false or fabricated threat complaint can also create legal consequences.
LXXXVIII. Conclusion
A grave threat sent by text message is not merely an online insult or private quarrel. In Philippine criminal law, a person who threatens another with death, serious injury, arson, kidnapping, rape, or another criminal wrong may be liable for grave threats if the elements are proven. The fact that the threat was sent by SMS, chat, or messaging app does not make it less serious. Digital messages can be powerful evidence when properly preserved and authenticated.
The most important practical rule is:
Preserve the message, prove the sender, document the context, and report serious threats promptly.
For victims, safety comes first. Do not delete messages, do not meet the sender alone, and do not threaten back. For respondents, stop communicating, preserve the full conversation, and answer accusations through lawful procedure. For both sides, context matters. Criminal liability depends not only on the words used, but also on intent, seriousness, identity, surrounding circumstances, and proof.
In the Philippine context, grave threats by text message should be handled carefully, promptly, and with respect for both personal safety and due process.