How to File a Complaint Against Online Scammers in the Philippines

I. Introduction

Online scams are now among the most common legal problems in the Philippines. Scammers operate through Facebook, Messenger, Instagram, TikTok, Telegram, Viber, WhatsApp, email, SMS, online marketplaces, dating apps, job platforms, fake websites, e-wallets, bank transfers, cryptocurrency wallets, phishing links, fake investment groups, fake loan apps, fake delivery notices, and impersonation accounts.

A victim may lose money, personal data, identity documents, access to bank or e-wallet accounts, reputation, business opportunities, or peace of mind. In many cases, the scammer disappears, blocks the victim, changes account names, deletes posts, or uses another person’s payment account.

Filing a complaint is possible, but success depends heavily on evidence, speed, correct classification of the scam, identification of the suspect, and proper choice of forum. Some cases are criminal, some are civil, some involve cybercrime, some involve consumer protection, some require bank or e-wallet dispute procedures, and some need urgent data protection action.

This article explains how to file a complaint against online scammers in the Philippines, including the types of online scams, possible criminal offenses, evidence to preserve, where to report, how to prepare a complaint-affidavit, what remedies are available, and practical steps to increase the chance of recovery or accountability.


II. What Is an Online Scam?

An online scam is a fraudulent act committed through digital means to obtain money, property, personal information, account access, services, or other benefits from a victim.

It usually involves three elements:

  1. Deception — the scammer lies, conceals, impersonates, fabricates, or misrepresents;
  2. Reliance — the victim believes the representation and acts on it;
  3. Damage — the victim loses money, property, access, data, or suffers harm.

Not every online dispute is a scam. A delayed delivery, failed refund, bad customer service, or business disagreement may be civil rather than criminal. The key question is whether the other party used deceit from the beginning or committed a separate unlawful act.


III. Common Types of Online Scams in the Philippines

Online scams take many forms. Correctly identifying the type of scam helps determine where to file and what law may apply.

A. Online Selling Scams

These involve fake sellers, fake listings, fake products, fake tracking numbers, or sellers who accept payment and disappear.

Examples:

  1. Seller posts an item that does not exist;
  2. Seller uses stolen product photos;
  3. Seller receives payment then blocks the buyer;
  4. Seller sends a fake or unrelated item;
  5. Seller gives fake courier tracking;
  6. Seller sells the same item to multiple buyers;
  7. Seller impersonates a legitimate store.

Possible remedies include criminal complaint for estafa, cybercrime complaint, small claims, platform complaint, bank or e-wallet report, and consumer complaint if the seller is a business.

B. Investment Scams

These promise unusually high returns, guaranteed profits, cryptocurrency earnings, trading profits, staking income, “double your money,” networking income, or passive returns.

Warning signs:

  1. Guaranteed high return;
  2. Referral commissions;
  3. Pressure to recruit;
  4. No legitimate underlying business;
  5. No clear registration or authority;
  6. Celebrity or fake testimonial ads;
  7. Withdrawal delays;
  8. Requirement to pay tax or unlocking fees before withdrawing.

Possible laws may involve estafa, syndicated estafa, securities violations, cybercrime, and other offenses.

C. Phishing and Account Takeover

Phishing scams trick victims into giving passwords, OTPs, PINs, card numbers, or account access.

Examples:

  1. Fake bank login page;
  2. Fake e-wallet verification;
  3. Fake delivery link;
  4. Fake job application link;
  5. Fake SIM registration link;
  6. Fake government aid link;
  7. Fake prize claim link.

Possible issues include identity theft, unauthorized access, computer-related fraud, access device fraud, and bank or e-wallet disputes.

D. Fake Loan App Scams

Fake or abusive loan apps may collect personal data, demand advance fees, disburse loans without clear consent, impose hidden charges, access contacts, and harass borrowers.

Possible complaints may involve unauthorized lending, data privacy violations, threats, coercion, cyber libel, unfair collection practices, estafa, or phishing.

E. Romance Scams

A scammer builds emotional trust through dating apps or social media, then asks for money for emergencies, gifts, travel, hospital bills, customs clearance, business problems, or release of packages.

Common signs:

  1. Refuses video calls;
  2. Claims to be abroad;
  3. Sends stolen photos;
  4. Love-bombs quickly;
  5. Asks for money through remittance or crypto;
  6. Claims package is stuck in customs;
  7. Introduces fake lawyer, courier, or officer.

Possible complaint is usually estafa or cybercrime, but identity tracing can be difficult.

F. Job and Work-from-Home Scams

These involve fake employers, fake recruiters, paid training, task scams, “like and earn,” crypto task groups, fake overseas jobs, or fake processing fees.

Examples:

  1. Applicant pays for training or equipment but no job exists;
  2. Victim earns small first payout then is asked to deposit more;
  3. Fake recruiter charges placement fee;
  4. Victim is asked to open bank or e-wallet accounts for others;
  5. Victim becomes a money mule.

Possible issues include estafa, illegal recruitment, trafficking, cybercrime, and labor-related complaints.

G. Fake Government Assistance or Ayuda Scams

Scammers pose as government agencies or officials offering ayuda, scholarships, medical aid, cash assistance, or grants in exchange for registration fees, personal data, or OTPs.

Possible issues include estafa, phishing, identity theft, and unlawful use of government names or symbols.

H. Impersonation Scams

The scammer pretends to be:

  1. A relative;
  2. A friend;
  3. A company officer;
  4. A bank employee;
  5. A government employee;
  6. A police officer;
  7. A lawyer;
  8. A courier;
  9. A buyer or seller;
  10. A celebrity or influencer.

Impersonation may support estafa, identity theft, cybercrime, falsification, or usurpation depending on facts.

I. Package, Customs, and Delivery Scams

The victim is told that a package is waiting but must pay delivery fees, customs fees, insurance, penalties, or clearance charges.

Common scam pattern:

  1. A romantic partner or seller says a package was sent;
  2. A fake courier contacts the victim;
  3. A fake customs officer demands payment;
  4. More fees are demanded repeatedly;
  5. Package never arrives.

Possible complaint may involve estafa, impersonation, cybercrime, and phishing.

J. Crypto and Trading Scams

These involve fake exchanges, fake wallets, fake brokers, pump-and-dump groups, fake mining, fake arbitrage, or false trading returns.

Warning signs:

  1. Guaranteed profit;
  2. App or website not independently verifiable;
  3. Withdrawal requires extra deposit;
  4. Account shows fake profits;
  5. “Mentor” controls trades;
  6. Customer service exists only in chat groups.

Complaints can be complicated because funds may move quickly across wallets.

K. Sextortion and Blackmail Scams

A scammer obtains intimate photos, videos, or chats and threatens to release them unless money is paid.

This is urgent and sensitive. Victims should preserve evidence, avoid further payment where possible, report to cybercrime authorities, and seek support. Possible offenses include threats, coercion, anti-photo/video voyeurism issues, cybercrime, extortion, and other crimes depending on facts.


IV. Is an Online Scam a Criminal Case, Civil Case, or Both?

An online scam may create both criminal and civil liability.

A. Criminal Case

A criminal case seeks punishment of the offender. It may also include restitution or civil liability arising from the crime. Common offenses include estafa, cybercrime-related fraud, identity theft, illegal recruitment, falsification, and threats.

B. Civil Case

A civil case seeks recovery of money, damages, return of property, or enforcement of an obligation. Small claims may be appropriate when the scammer’s identity and address are known and the main goal is refund.

C. Administrative or Regulatory Complaint

Some scams involve regulated entities or businesses. Complaints may be filed with agencies supervising lending companies, financing companies, banks, securities offerings, consumer trade, data privacy, or telecommunications.

D. Platform or Payment Dispute

Reports to Facebook, Shopee, Lazada, TikTok, GCash, Maya, banks, remittance centers, or other platforms may help freeze accounts, preserve records, reverse transactions where possible, or identify accounts through legal process.

A victim may need several remedies at once.


V. Possible Criminal Offenses

The exact offense depends on the facts. Commonly relevant offenses include the following.

1. Estafa

Estafa is one of the most common complaints in online scams. It generally involves deceit, abuse of confidence, or fraudulent means causing damage.

In online selling and investment scams, estafa may exist when the scammer deceived the victim into paying money.

Examples:

  1. Fake seller accepts payment for nonexistent item;
  2. Fake investor promises guaranteed profit;
  3. Scammer pretends to be a legitimate business;
  4. Scammer obtains money through false identity;
  5. Scammer claims money is needed for a fake emergency;
  6. Scammer fabricates documents to induce payment.

The strongest estafa cases show that deceit existed before or at the time the victim paid.

2. Cybercrime-Related Estafa or Computer-Related Fraud

If fraud was committed using a computer system, mobile phone, internet platform, messaging app, social media, online banking, e-wallet, website, or other digital means, cybercrime laws may be relevant.

The online medium may affect penalties and investigative handling.

3. Identity Theft

Identity theft may arise when a scammer uses another person’s name, photos, ID, account, business identity, or personal information without authority.

Examples:

  1. Fake profile using stolen photos;
  2. Seller uses another person’s ID;
  3. Scammer impersonates a real business;
  4. Scammer uses victim’s ID to borrow money;
  5. Scammer opens accounts using stolen identity.

4. Phishing and Unauthorized Access

If the scam involves obtaining passwords, OTPs, PINs, or login credentials, it may involve unauthorized access, misuse of devices, computer-related fraud, or related cyber offenses.

5. Falsification

Falsification may be involved if the scammer uses fake or altered:

  1. IDs;
  2. Receipts;
  3. Bank confirmations;
  4. Courier waybills;
  5. Contracts;
  6. Certificates;
  7. Government permits;
  8. Court documents;
  9. Screenshots;
  10. Proof of payment.

6. Illegal Recruitment

If the scam involves fake overseas or local employment and collection of placement fees, processing fees, training fees, or deployment charges, illegal recruitment laws may apply.

This is especially serious if multiple victims are involved or if the scammer is not licensed to recruit.

7. Securities and Investment Violations

If the scam involves public solicitation of investments, pooled funds, profit-sharing, crypto investment schemes, or sale of securities without authority, securities laws may be involved.

Investment scams may be both criminal and regulatory matters.

8. Threats, Coercion, and Extortion

If the scammer threatens to release photos, harm the victim, report false cases, contact family, or expose private information unless paid, the case may involve threats, coercion, robbery-extortion, unjust vexation, cyber harassment, or related crimes depending on the facts.

9. Libel, Cyber Libel, and Defamation Issues

Sometimes scammers also destroy the victim’s reputation. Conversely, victims should be careful when publicly naming alleged scammers without adequate proof. Public accusations can lead to defamation counterclaims if done recklessly.

10. Data Privacy Violations

If the scam involves misuse, unauthorized sharing, or public posting of personal data, data privacy remedies may apply. This is common in fake loan apps, phishing, identity theft, and doxing.


VI. First Response After Discovering the Scam

Time matters. Scammers move fast. The victim should act immediately.

Step 1: Stop Sending Money

Do not pay additional “release fees,” “taxes,” “verification fees,” “unlocking charges,” “lawyer fees,” “customs fees,” or “refund processing fees.” Many scams continue by repeatedly inventing new fees.

Step 2: Preserve Evidence

Take screenshots before the scammer deletes posts, changes names, or blocks you.

Step 3: Report to the Payment Channel

Immediately report to the bank, e-wallet, remittance center, crypto exchange, or payment provider used.

Ask if they can:

  1. Freeze or hold the recipient account;
  2. Flag the transaction;
  3. Preserve records;
  4. Provide a complaint reference number;
  5. Advise on dispute procedures;
  6. Require a police or cybercrime report.

Step 4: Report to the Platform

Report the scam account, page, listing, group, or website to the platform.

Step 5: Warn Yourself Against Recovery Scams

After being scammed, victims are often targeted by “recovery agents” who promise to recover money for a fee. Many are also scammers.

Step 6: Prepare a Timeline

Write down what happened while details are fresh.

Step 7: File the Proper Complaint

Choose the appropriate route: cybercrime authorities, police, prosecutor, regulator, platform, bank, e-wallet, consumer office, privacy regulator, or court.


VII. Evidence to Preserve

Evidence is the most important part of an online scam complaint. Without evidence, authorities may be unable to identify the scammer or prove the case.

A. Identity Evidence

Save:

  1. Profile name;
  2. Username;
  3. Account URL;
  4. Page URL;
  5. Profile photo;
  6. Display name history, if available;
  7. Phone number;
  8. Email address;
  9. Claimed address;
  10. Claimed business name;
  11. IDs sent by scammer;
  12. Video call screenshots, if any;
  13. Voice messages;
  14. Names of group admins;
  15. Bank or e-wallet account name.

B. Transaction Evidence

Save:

  1. Product listing or offer;
  2. Advertisement;
  3. Chat conversations;
  4. Order confirmation;
  5. Contract or agreement;
  6. Invoice;
  7. Payment instructions;
  8. Proof of payment;
  9. Bank transfer receipt;
  10. E-wallet receipt;
  11. Remittance receipt;
  12. Crypto wallet address and transaction hash;
  13. Amount paid;
  14. Date and time;
  15. Recipient account details.

C. Deception Evidence

Save proof of false statements:

  1. Fake product availability;
  2. Fake investment promise;
  3. Fake employment offer;
  4. Fake government assistance;
  5. Fake courier receipt;
  6. Fake bank screenshot;
  7. Fake ID;
  8. Fake permit;
  9. Fake testimonials;
  10. Fake tracking number;
  11. False guarantee;
  12. Promise to refund;
  13. Admissions or inconsistent excuses.

D. Damage Evidence

Save proof of loss:

  1. Amount paid;
  2. Account debit;
  3. Loss of account access;
  4. Unauthorized transactions;
  5. Fees paid;
  6. Loans taken to pay scammer;
  7. Damage to business or reputation;
  8. Emotional distress evidence, where relevant;
  9. Costs incurred because of the scam.

E. Platform Evidence

Save:

  1. App or website link;
  2. Listing ID;
  3. Order number;
  4. Platform dispute ticket;
  5. Platform response;
  6. Seller store page;
  7. Ratings and reviews;
  8. Deleted post screenshots, if available;
  9. Group name and admin details.

F. Communication Evidence

Save:

  1. Full chat history;
  2. SMS messages;
  3. Emails;
  4. Call logs;
  5. Voice recordings where lawfully usable;
  6. Video call details;
  7. Message timestamps;
  8. Screenshots showing blocking;
  9. Deleted account notice;
  10. New accounts used by scammer.

VIII. How to Take Screenshots Properly

Screenshots should be complete and credible.

Best practices:

  1. Capture the full conversation, not just selected messages;
  2. Include date and time;
  3. Include account name and profile photo;
  4. Include URL or username where possible;
  5. Capture payment instructions and proof of payment;
  6. Capture the listing before it is deleted;
  7. Capture the profile page;
  8. Capture group posts and comments;
  9. Avoid editing screenshots;
  10. Back up the files;
  11. Keep the original device;
  12. Export chat history if possible.

If screenshots are cropped too narrowly, the scammer may claim they are edited or taken out of context.


IX. Make a Chronology

A written timeline helps authorities understand the case quickly.

A chronology should include:

  1. Date you first saw the offer;
  2. Platform used;
  3. Scammer’s name or account;
  4. What the scammer promised;
  5. Amount requested;
  6. Date and time of payment;
  7. Payment account used;
  8. What happened after payment;
  9. Demands for additional money;
  10. Date you realized it was a scam;
  11. Attempts to contact scammer;
  12. Reports to bank, e-wallet, or platform;
  13. Amount lost;
  14. Evidence attached.

Example:

Date Event
June 1 Saw Facebook post selling iPhone for ₱18,000
June 1 Seller claimed item was available and original
June 2 Sent ₱10,000 deposit via GCash
June 2 Seller promised same-day shipping
June 3 Seller sent fake tracking number
June 4 Courier confirmed tracking number invalid
June 5 Seller blocked me
June 6 Reported to GCash and Facebook

This structure is useful for a complaint-affidavit.


X. Report Immediately to Bank, E-Wallet, or Payment Provider

If money was sent through a bank, e-wallet, remittance center, or payment gateway, report immediately.

Provide:

  1. Your name and account;
  2. Transaction reference number;
  3. Date and time;
  4. Amount;
  5. Recipient account name and number;
  6. Screenshot of scam;
  7. Police or cybercrime report, if available;
  8. Request to preserve records;
  9. Request to freeze or hold funds if possible.

The provider may not always reverse the transaction, especially if funds have already been withdrawn. But quick reporting may help preserve evidence or stop further transfers.


XI. Report to the Online Platform

Report the account or listing to the platform used.

A. Facebook, Instagram, TikTok, and Similar Platforms

Report:

  1. Fake profile;
  2. Scam page;
  3. Fraudulent marketplace listing;
  4. Impersonation account;
  5. Fake investment group;
  6. Blackmail or threats;
  7. Harassment.

B. Online Marketplaces

Use the buyer protection or dispute system quickly. Platforms may have deadlines for refunds, return requests, or seller complaints.

C. Messaging Apps

Report spam, impersonation, threats, or fraud accounts where possible. Save evidence before blocking.

Platform reports may not replace legal complaints, but they can help stop the scammer from victimizing others.


XII. Where to File a Complaint

The proper place depends on the type of scam and available evidence.

1. Cybercrime Units

If the scam occurred online, a cybercrime complaint may be filed with specialized law enforcement units. These units may assist with digital evidence, online accounts, tracing, and coordination with platforms.

A cybercrime complaint is especially appropriate for:

  1. Phishing;
  2. Account hacking;
  3. Online estafa;
  4. Identity theft;
  5. Sextortion;
  6. Online threats;
  7. Fake websites;
  8. Crypto scams;
  9. Fake online investment groups;
  10. Social media scams.

2. Local Police

A victim may report to the local police station, especially if the suspect is known, local, or if immediate blotter documentation is needed.

A police blotter is not the same as a full criminal case, but it may document the incident and support further complaint.

3. Prosecutor’s Office

A criminal complaint may be filed with the prosecutor’s office through a complaint-affidavit and supporting evidence. The prosecutor evaluates probable cause.

This route is often used when the suspect is known or identifiable.

4. National Bureau or Specialized Investigation Offices

For larger, organized, multi-victim, cross-border, or complex online scams, specialized investigative bodies may be appropriate.

5. Securities Regulator

For investment scams, fake securities offerings, crypto investment solicitations, pooled funds, or guaranteed profit schemes, file a regulatory complaint with the securities regulator.

6. Lending or Financing Regulator

For fake loan apps or unauthorized lending operations, file with the regulator supervising lending and financing companies.

7. National Privacy Regulator

For misuse of personal information, contact-list harassment, public posting of personal data, identity theft, unauthorized data processing, or data breach, file a privacy complaint or report.

8. Consumer Protection Offices

If the scam involves a registered seller or business, product misrepresentation, defective goods, warranty refusal, or deceptive selling practice, consumer complaint channels may help.

9. Small Claims Court

If the scammer’s real identity and address are known, and the claim is for a sum of money within small claims rules, small claims may be considered. This is civil, not criminal.

10. Barangay

Barangay conciliation may be relevant only in limited cases, usually when both parties are individuals residing in the same city or municipality and the dispute is covered by barangay conciliation rules. It is not a substitute for cybercrime investigation in serious online scams.


XIII. Filing a Criminal Complaint: General Procedure

A criminal complaint usually follows these steps.

Step 1: Prepare Evidence

Organize screenshots, receipts, chat logs, account details, and timeline.

Step 2: Prepare Complaint-Affidavit

The complaint-affidavit is the sworn statement explaining what happened.

Step 3: Attach Supporting Documents

Attach all evidence and label them clearly.

Step 4: File With Proper Office

File with law enforcement or the prosecutor, depending on the case and local procedure.

Step 5: Preliminary Investigation

If the suspect is identified, the prosecutor may require the respondent to submit a counter-affidavit.

Step 6: Prosecutor Resolution

The prosecutor determines whether probable cause exists.

Step 7: Filing in Court

If probable cause is found, a criminal information may be filed in court.

Step 8: Court Proceedings

The case proceeds through arraignment, pre-trial, trial, and decision, unless resolved earlier.


XIV. Complaint-Affidavit: What It Should Contain

A complaint-affidavit should be factual, clear, and chronological.

It should include:

  1. Full name, age, address, and contact details of complainant;
  2. Identity of respondent, if known;
  3. Online account names used by respondent;
  4. Platform used;
  5. Date and manner of first contact;
  6. Exact representations made by the scammer;
  7. Amount requested;
  8. Reason victim relied on the scammer;
  9. Payment details;
  10. What happened after payment;
  11. How victim discovered the scam;
  12. Demands for refund;
  13. Damage suffered;
  14. Evidence attached;
  15. Statement that facts are true based on personal knowledge.

Avoid exaggeration. State only what can be supported.


XV. Sample Complaint-Affidavit Narrative

A basic narrative may read:

On [date], I saw a post on [platform] by an account using the name [account name] offering [item/service/investment]. The respondent represented that [state representation]. Relying on this representation, I agreed to transact and was instructed to send payment to [bank/e-wallet/account name/account number].

On [date and time], I transferred ₱[amount] to the said account. After receiving payment, respondent [failed to deliver / sent fake tracking / demanded additional payment / blocked me / deleted the post]. I later verified that [tracking number was fake / photos were stolen / business was not real / other victims had the same experience].

Despite my demand for refund, respondent failed and refused to return the money. Because of respondent’s deceit, I suffered damage in the amount of ₱[amount]. Attached are screenshots of the conversation, proof of payment, the online listing, respondent’s account details, and my demand messages.

This should be customized to the facts.


XVI. Attachments to Complaint-Affidavit

Attach evidence in an organized way.

Possible attachments:

  1. Screenshot of profile or page;
  2. Screenshot of listing or advertisement;
  3. Full chat history;
  4. Payment receipt;
  5. Bank or e-wallet transaction confirmation;
  6. Recipient account details;
  7. Fake documents sent by scammer;
  8. Demand message;
  9. Proof of blocking or deletion;
  10. Platform report acknowledgment;
  11. Bank or e-wallet report acknowledgment;
  12. Statements from other victims;
  13. Certification from courier, bank, or platform if available;
  14. IDs or documents used by scammer;
  15. Timeline.

Label attachments as Annex “A,” “B,” “C,” and so on if required.


XVII. If the Scammer’s Real Identity Is Unknown

Many online scammers use fake names. Filing is harder but still possible.

You may know only:

  1. Social media account;
  2. Phone number;
  3. Bank account name;
  4. E-wallet number;
  5. Email address;
  6. IP-related platform record;
  7. Crypto wallet address;
  8. Delivery address;
  9. Remittance claim name;
  10. Account screenshots.

In such cases, file a complaint with cybercrime authorities and payment providers. Law enforcement may request records through proper legal process.

Victims should not attempt illegal hacking, doxing, threats, or vigilante investigation.


XVIII. If the Payment Account Name Is Different From the Scammer

This is common. The recipient account may belong to:

  1. The scammer;
  2. A relative;
  3. A money mule;
  4. A hacked account;
  5. A rented e-wallet;
  6. An innocent third party;
  7. A fake identity account;
  8. A remittance pickup person.

The payment account holder may be investigated. Include the account name and number in the complaint. Do not assume automatically, without evidence, that the account holder is innocent or guilty. Let the evidence establish participation.


XIX. Money Mules

A money mule is a person whose account is used to receive and transfer scam proceeds. Some mules knowingly participate; others are tricked.

Signs of mule activity:

  1. Account receives funds from multiple victims;
  2. Funds are withdrawn quickly;
  3. Account holder claims to be only a “cash-out” person;
  4. Account holder rented or sold account access;
  5. Account used for many unrelated scams.

A victim should report the account immediately to the payment provider and authorities.


XX. Can the Victim Recover the Money?

Recovery depends on timing, traceability, and whether funds remain in the account.

Possible recovery routes:

  1. Reversal by payment provider, if still possible;
  2. Account freeze and return through proper process;
  3. Restitution in criminal case;
  4. Settlement with respondent;
  5. Small claims judgment;
  6. Civil action for damages;
  7. Platform buyer protection;
  8. Insurance or fraud protection, if applicable.

Unfortunately, many scammers withdraw or transfer funds quickly. Filing a complaint is still important for investigation, accountability, and possible future recovery.


XXI. Bank and E-Wallet Freezing

Victims often ask whether a bank or e-wallet can freeze the scammer’s account.

In practice, immediate freezing may require the provider’s internal fraud process, suspicious transaction review, regulatory obligations, or legal order. A mere private request may not always be enough.

Still, report immediately and provide:

  1. Transaction reference;
  2. Proof of fraud;
  3. Police or cybercrime report if available;
  4. Complaint-affidavit if available;
  5. Request to preserve funds and records.

Speed is critical.


XXII. If the Scam Involves GCash, Maya, Bank Transfer, or Remittance

Report to the relevant provider immediately.

Include:

  1. Your account name;
  2. Recipient account name;
  3. Recipient number or account;
  4. Transaction reference;
  5. Date and time;
  6. Amount;
  7. Screenshots of scam;
  8. Police or cybercrime report, if available.

Ask for:

  1. Complaint ticket number;
  2. Whether funds can be held;
  3. Whether account can be flagged;
  4. What documents are needed;
  5. Whether they can coordinate with authorities;
  6. Whether you need a subpoena, court order, or law enforcement request.

XXIII. If the Scam Involves Cryptocurrency

Crypto scams are harder because transactions may be irreversible and cross-border.

Preserve:

  1. Wallet addresses;
  2. Transaction hash;
  3. Exchange account details;
  4. Chat history;
  5. Fake investment platform screenshots;
  6. Deposit records;
  7. Withdrawal denial messages;
  8. KYC information, if any;
  9. Website URLs;
  10. Email addresses.

Report to:

  1. Exchange used;
  2. Cybercrime authorities;
  3. Securities regulator if investment scheme;
  4. Platform hosting the scam group.

Do not pay “recovery experts” who promise guaranteed crypto recovery for a fee. Many are scammers.


XXIV. If the Scam Involves an Online Seller

For online selling scams, consider multiple routes:

  1. Report seller to platform;
  2. Report payment account to bank or e-wallet;
  3. Send demand for refund;
  4. File criminal complaint if deceit is clear;
  5. File small claims if identity and address are known;
  6. File consumer complaint if seller is a registered business;
  7. Preserve product listing, chats, and payment proof.

If the issue is mere refund dispute and seller is known, small claims may be faster than criminal complaint. If the seller used fake identity, fake listing, or disappeared, criminal complaint may be appropriate.


XXV. If the Scam Involves Investment

For investment scams, act fast.

Evidence:

  1. Investment pitch;
  2. Profit promise;
  3. Referral structure;
  4. Group chat;
  5. Payment records;
  6. Dashboard screenshots;
  7. Withdrawal denial;
  8. Names of recruiters;
  9. SEC or business registration claims;
  10. Promotional videos;
  11. Testimonials;
  12. Contracts or certificates.

Report to:

  1. Law enforcement or cybercrime unit;
  2. Prosecutor;
  3. Securities regulator;
  4. Bank or payment provider;
  5. Platform hosting the promotion.

Multiple victims should coordinate and prepare individual affidavits.


XXVI. If the Scam Involves Fake Employment or Overseas Job

Preserve:

  1. Job post;
  2. Recruiter profile;
  3. Company name used;
  4. Employment offer;
  5. Fees requested;
  6. Receipts;
  7. Passport or ID documents submitted;
  8. Chat history;
  9. Interview records;
  10. Fake visa or contract;
  11. Other victims.

Possible complaint routes:

  1. Anti-illegal recruitment authorities;
  2. Labor or migrant worker offices;
  3. Cybercrime authorities;
  4. Prosecutor;
  5. Platform;
  6. Payment providers.

If recruitment is for overseas work and fees were collected without lawful authority, the case may be serious.


XXVII. If the Scam Involves Phishing or Unauthorized Transactions

Act immediately.

Steps:

  1. Contact bank or e-wallet hotline;
  2. Freeze account or card if possible;
  3. Change passwords;
  4. Revoke access sessions;
  5. Report unauthorized transactions;
  6. Preserve phishing link and messages;
  7. File cybercrime report;
  8. Request investigation;
  9. Monitor other accounts;
  10. Replace compromised IDs or cards if needed.

Do not delete phishing messages immediately; preserve screenshots and links.


XXVIII. If the Scam Involves Identity Theft

If someone used your identity:

  1. Save fake profile or account;
  2. Save unauthorized loan or transaction notices;
  3. Report to platform;
  4. Report to bank or lender;
  5. File cybercrime complaint;
  6. File privacy complaint if personal data was misused;
  7. Execute affidavit of denial if needed;
  8. Notify credit providers;
  9. Monitor accounts;
  10. Replace compromised IDs where appropriate.

If your ID was used for online loans, send written disputes to the lenders and demand copies of alleged applications.


XXIX. If the Scam Involves Sextortion

Sextortion requires urgent and careful handling.

Steps:

  1. Preserve threats and account details;
  2. Do not send more intimate material;
  3. Avoid paying repeatedly, as demands may continue;
  4. Report to cybercrime authorities;
  5. Report account to platform;
  6. Tell trusted persons if safety requires;
  7. Save payment demands;
  8. Block only after preserving evidence;
  9. Seek legal and emotional support;
  10. If the victim is a minor, treat the matter as extremely urgent.

Do not blame the victim. The offender is responsible for threats and exploitation.


XXX. If the Scam Involves Minors

If a minor is victimized, parents or guardians should act quickly.

Important steps:

  1. Preserve evidence;
  2. Avoid public posting of the minor’s private information;
  3. Report to cybercrime authorities;
  4. Report to platform;
  5. Seek child protection assistance if sexual content, grooming, or exploitation is involved;
  6. Provide emotional support;
  7. Avoid victim-blaming;
  8. Coordinate with school if necessary.

Cases involving children can trigger special protections and more serious offenses.


XXXI. Can You File a Case If the Amount Is Small?

Yes. Even small amounts can be reported, especially if there are multiple victims. Scammers often rely on victims not filing because the amount is small.

Practical considerations:

  1. For very small amounts, platform and payment reports may be most efficient;
  2. If the scammer is known, small claims may be possible;
  3. If many victims exist, group complaint may be stronger;
  4. Criminal complaint may still be appropriate if deceit is clear.

The seriousness is not only the amount lost, but the fraudulent scheme.


XXXII. Group Complaints

Group complaints are useful when many victims were scammed by the same person, account, app, or scheme.

Advantages:

  1. Shows pattern;
  2. Strengthens proof of intent;
  3. Helps identify suspect;
  4. Increases law enforcement interest;
  5. Shares evidence;
  6. May show syndicated activity;
  7. Helps compute total damage.

Each victim should still prepare an individual statement or affidavit showing their own transaction and loss.


XXXIII. Publicly Posting “Scammer Alert”

Victims often post warnings online. This can help others but can also create legal risk.

Safer practices:

  1. Stick to verifiable facts;
  2. Avoid insults and threats;
  3. Do not post unrelated family members;
  4. Avoid exposing private addresses or IDs beyond necessity;
  5. State that a complaint is being prepared or filed if true;
  6. Use screenshots carefully;
  7. Avoid fabricating or exaggerating;
  8. Do not encourage harassment;
  9. Consider reporting to authorities before posting;
  10. Remove or update post if the matter is resolved.

Calling someone a scammer publicly without sufficient proof may lead to defamation issues. Truth and good motives matter, but reckless posting is risky.


XXXIV. Demand Letter Before Filing

A demand letter or demand message can be useful, especially in online selling or refund disputes. It shows that the victim asked for return of money and the other party refused.

A demand should include:

  1. Transaction date;
  2. Amount paid;
  3. Payment method;
  4. Promise made by the other party;
  5. Failure to deliver or return money;
  6. Demand for refund;
  7. Deadline;
  8. Notice that legal remedies may be pursued.

Do not threaten violence, public shaming, or false charges.


XXXV. Sample Demand Message

On [date], I paid you ₱[amount] through [payment channel] for [item/service/investment/transaction]. You represented that [state promise]. Despite payment, you failed to [deliver/refund/perform], and your explanations are inconsistent with our agreement.

I demand the return of ₱[amount] within [number] days from receipt of this message. If you fail to refund, I will file the appropriate complaints with the authorities, payment provider, and platform.

This message should be factual and saved as evidence.


XXXVI. If the Scammer Offers Settlement

Settlement may be accepted, but protect yourself.

A settlement should state:

  1. Amount to be paid;
  2. Payment deadline;
  3. Payment method;
  4. Whether payment is full or partial;
  5. Consequence of non-payment;
  6. Whether complaints will be withdrawn only after full payment;
  7. No further false promises;
  8. Written acknowledgment after payment.

Do not withdraw a complaint or delete evidence before payment clears.


XXXVII. If the Scammer Returns Part of the Money

Partial refund does not automatically erase liability unless the victim agrees to full settlement.

Clarify in writing:

  1. Amount received;
  2. Remaining balance;
  3. Deadline for balance;
  4. Whether the partial payment is accepted without waiving claims;
  5. Whether legal action continues if balance is unpaid.

XXXVIII. If the Scammer Uses Another Person’s ID

Scammers often send IDs to appear legitimate. The ID may be stolen.

Do not assume the person in the ID is the scammer. Include it in the complaint, but state how it was used. Authorities can determine whether the ID owner is the offender, a victim of identity theft, or connected to the scam.


XXXIX. If the Scammer Uses a Fake Business Registration

A scammer may send screenshots of DTI, SEC, BIR, or mayor’s permit documents. These may be fake, expired, unrelated, or copied from legitimate businesses.

Verify:

  1. Exact business name;
  2. Owner or company name;
  3. Address;
  4. Registration number;
  5. Whether the document matches the seller;
  6. Whether the business confirms the transaction;
  7. Whether the app or page is official.

Using another business’s registration can support impersonation or fraud.


XL. If the Scammer Is Abroad

Cross-border scams are harder but still reportable.

Preserve all evidence and file with cybercrime authorities. Also report to:

  1. Platform;
  2. Bank or e-wallet;
  3. Remittance provider;
  4. Foreign platform or exchange if applicable;
  5. Embassy or foreign law enforcement channels if instructed by authorities.

Recovery is more difficult when the offender is outside the Philippines, but reporting helps preserve records and may support international coordination.


XLI. If the Victim Is Abroad but the Scammer Is in the Philippines

An OFW or overseas victim may still file a complaint in the Philippines. A representative may need authorization to file or coordinate. Documents may need notarization or consular acknowledgment depending on the process.

Useful steps:

  1. Preserve digital evidence;
  2. Prepare affidavit;
  3. Authorize a representative if needed;
  4. Report to payment provider;
  5. File with cybercrime authorities or prosecutor;
  6. Attend proceedings as required or allowed.

XLII. Small Claims as a Recovery Tool

If the scammer’s real identity and address are known, small claims may be practical for money recovery.

Small claims is useful when:

  1. Amount is within the small claims limit;
  2. Defendant can be served;
  3. Evidence shows payment and obligation to refund;
  4. Main goal is money recovery;
  5. Criminal intent is hard to prove.

Small claims is not for punishing crime. It results in a civil money judgment.


XLIII. Estafa vs. Small Claims

Use this distinction:

  • Estafa: the scammer deceived you from the beginning and should be criminally prosecuted.
  • Small claims: someone owes you money and you want a court order for payment.

Some cases may support both, but avoid double recovery. A victim should consider legal advice when filing both criminal and civil actions involving the same amount.


XLIV. If the Scam Is Really a Business Dispute

Not every bad transaction is a criminal scam. A case may be civil if:

  1. Seller had the item but delivery failed;
  2. Supplier caused delay;
  3. Refund is disputed;
  4. Contract terms are unclear;
  5. Business failed after accepting payment;
  6. Service provider performed partially;
  7. The parties disagree on quality;
  8. Buyer changed mind;
  9. Courier lost parcel;
  10. There is no proof of deceit from the beginning.

A civil claim may still be valid even if criminal complaint is weak.


XLV. Avoiding False or Weak Complaints

A complaint should not be based only on anger or suspicion. Weak complaints may be dismissed.

Before filing criminal complaint, ask:

  1. What exactly did the scammer say?
  2. Was the statement false when made?
  3. Did I rely on it?
  4. Did I pay because of it?
  5. What proof do I have?
  6. Can I identify the suspect?
  7. Is this fraud or mere breach of agreement?
  8. What documents support the claim?

A strong complaint is factual, organized, and evidence-based.


XLVI. What Happens After Filing?

After filing, several things may happen:

  1. Authorities may evaluate the complaint;
  2. More documents may be requested;
  3. The payment provider may be asked to preserve records;
  4. The suspect may be identified;
  5. A preliminary investigation may be conducted;
  6. The complaint may be dismissed for insufficient evidence;
  7. A criminal case may be filed in court;
  8. Settlement may occur;
  9. The case may proceed to trial;
  10. Restitution may be ordered if conviction or settlement occurs.

Filing a complaint does not guarantee immediate refund or arrest. It starts a legal process.


XLVII. Arrest Is Not Automatic

Victims often expect immediate arrest. In most online scam cases, arrest does not happen immediately unless there are grounds for lawful warrantless arrest or a warrant is later issued by a court.

Usually, the process involves investigation, complaint, prosecutor evaluation, and court action.

A victim should focus on evidence and proper filing rather than expecting instant arrest.


XLVIII. What If the Scammer Blocks You?

Being blocked is evidence, but it is not enough by itself. Preserve:

  1. Prior chats;
  2. Proof of payment;
  3. Profile screenshots;
  4. Blocking notice;
  5. Deleted account evidence;
  6. Other contact attempts;
  7. Demand messages, if possible;
  8. Reports to platform and payment provider.

Blocking after payment may help show fraudulent intent, especially with other evidence.


XLIX. What If the Scammer Deletes the Account?

If the account is deleted:

  1. Save any prior screenshots;
  2. Check cached messages;
  3. Ask other victims for screenshots;
  4. Save URL or username;
  5. Report to platform;
  6. Provide payment account details to authorities;
  7. Search transaction records;
  8. Preserve device evidence.

Deleted accounts may still have records with the platform, but access usually requires legal process.


L. What If the Platform Refuses to Provide Information?

Platforms generally do not disclose private user data to victims directly. They may require legal process from law enforcement, prosecutor, or court.

Victims should provide all available identifiers:

  1. Profile URL;
  2. Username;
  3. Email, if visible;
  4. Phone number;
  5. Transaction details;
  6. Group name;
  7. Listing ID;
  8. Screenshots;
  9. Time of messages;
  10. Report ticket number.

Authorities may request preservation or disclosure through proper channels.


LI. What If the Bank or E-Wallet Refuses to Reveal Recipient Details?

Banks and e-wallets are bound by privacy, bank secrecy, and internal rules. They may not disclose account details to victims without proper legal process.

However, victims can still:

  1. File a fraud report;
  2. Ask for account freeze review;
  3. Provide proof;
  4. Request preservation of records;
  5. Obtain a complaint reference;
  6. Submit police or prosecutor documents;
  7. Ask authorities to request records.

LII. Recovery Scams After the Scam

Victims may be contacted by people claiming they can recover funds, trace scammers, hack accounts, or reverse crypto transfers for a fee.

Warning signs:

  1. Guaranteed recovery;
  2. Upfront fee;
  3. Claims to know police or bank insiders;
  4. Uses Telegram only;
  5. Asks for passwords or OTPs;
  6. Requests remote access to device;
  7. Claims to be “ethical hacker” with no proof;
  8. Demands more fees after initial payment.

Do not give account access or pay recovery fees to unverified persons.


LIII. Protecting Your Accounts After a Scam

If you clicked links or shared information:

  1. Change passwords;
  2. Enable two-factor authentication;
  3. Log out of all sessions;
  4. Change email password first;
  5. Notify bank or e-wallet;
  6. Freeze cards if needed;
  7. Review recent transactions;
  8. Remove unknown devices;
  9. Scan device for malware;
  10. Replace compromised IDs if necessary;
  11. Warn contacts about impersonation;
  12. Monitor future loan or credit messages.

LIV. If You Gave Your ID or Selfie

If you sent your ID, selfie, or personal details to a scammer:

  1. Preserve the conversation;
  2. Report identity theft risk;
  3. Monitor loan apps and accounts;
  4. Inform banks if financial details were shared;
  5. File cybercrime report if identity is used;
  6. Report fake accounts using your identity;
  7. Consider replacing ID if severely compromised;
  8. Keep affidavit of loss or compromise if needed;
  9. Watch for SIM or account takeover attempts;
  10. Do not send more documents.

LV. If Scammer Uses Your Photos or Name to Scam Others

If your identity is being used:

  1. Post a careful warning that your identity is being misused;
  2. Report fake accounts to platforms;
  3. File cybercrime complaint;
  4. Preserve screenshots;
  5. Tell contacts not to transact with impersonators;
  6. Notify payment providers if accounts are linked;
  7. Request takedown;
  8. Prepare affidavit of denial for victims who contact you.

Avoid blaming victims who thought they were transacting with you.


LVI. If You Are Accused of Being the Scammer Because Your Account Was Used

If your bank, e-wallet, social media, or ID was used without authority, act quickly.

Steps:

  1. File a report that your account or identity was compromised;
  2. Preserve proof of hacking or loss of control;
  3. Cooperate with authorities;
  4. Do not ignore notices from victims or banks;
  5. Change passwords;
  6. Submit affidavit of denial where needed;
  7. Explain any account transactions;
  8. Seek legal advice if named in a complaint.

If you knowingly allowed your account to receive scam proceeds, you may face liability.


LVII. Complaint Against Unknown Persons

If the suspect is unknown, a complaint may be filed against “unknown person/s” with all available identifiers. Authorities may later identify respondents through investigation.

Include:

  1. Account names;
  2. Usernames;
  3. URLs;
  4. Phone numbers;
  5. Payment accounts;
  6. Email addresses;
  7. IP-related clues if available;
  8. Transaction references;
  9. Device or platform data;
  10. Other victims’ information.

LVIII. Importance of Exact Names and Numbers

Small errors can delay investigation. Write exactly:

  1. Account name as displayed;
  2. Account number or mobile number;
  3. Transaction reference;
  4. Date and time;
  5. Amount;
  6. Platform username;
  7. URL;
  8. Email address;
  9. Wallet address;
  10. Group name.

Do not rely only on memory.


LIX. If the Scammer Is a Minor

If the scammer is a minor, special juvenile justice rules may apply. The victim may still report and seek restitution, but the handling of the offender may differ.

Parents or guardians may become relevant, especially for civil liability or restitution.


LX. If the Scammer Is a Company

If the scam was done through a company or online business:

  1. Identify the legal entity;
  2. Identify officers involved;
  3. Identify who communicated;
  4. Check registration;
  5. Preserve invoices and contracts;
  6. Send demand to official address;
  7. File consumer, regulatory, civil, or criminal complaint depending on facts.

Corporate officers are not automatically criminally liable, but they may be liable if they personally participated in fraud or directed the scam.


LXI. If the Scammer Uses a Registered Business Name

A registered business name does not automatically prove legitimacy. It also does not shield the person from liability.

For a sole proprietorship, the owner may be personally liable. For a corporation, the corporation is a separate juridical person, but officers involved in fraud may face personal consequences.


LXII. If the Scam Involves Fake Receipts or Fake Payment Proof

Fake receipts, altered screenshots, and fake bank confirmations should be preserved. They may support falsification or fraud allegations.

Evidence:

  1. Screenshot sent by scammer;
  2. Bank confirmation that no payment was received;
  3. Metadata or file details if available;
  4. Chat context;
  5. Comparison with genuine receipts;
  6. Account statement.

LXIII. If the Scam Involves Fake Courier Tracking

Preserve:

  1. Tracking number;
  2. Courier website result;
  3. Chat where tracking was sent;
  4. Courier confirmation that number is invalid or not yours;
  5. Waybill image;
  6. Delivery address used;
  7. Sender details.

Fake tracking can strongly support deceit in online selling scams.


LXIV. If the Scam Involves Fake Documents From Government or Court

Scammers may send fake subpoenas, warrants, permits, IDs, business certificates, tax documents, or court notices.

Do not rely on the contact details inside the suspicious document. Verify directly with the supposed issuing office through independent official channels.

Using fake government or court documents may support additional complaints.


LXV. If the Scam Involves Threats

If the scammer threatens harm, exposure, false cases, or public shaming:

  1. Save threats;
  2. Do not respond emotionally;
  3. Report immediately if safety is at risk;
  4. Notify family or workplace if needed;
  5. File appropriate complaint;
  6. Avoid meeting the scammer alone;
  7. Preserve phone numbers and account details.

Threats may be separate offenses even if money was not paid.


LXVI. If the Scam Involves Personal Meeting

Some online scams lead to meetups, such as fake buyers, fake sellers, or fake job interviews.

If personal safety is involved:

  1. Do not meet alone;
  2. Choose public places;
  3. Inform trusted persons;
  4. Preserve messages;
  5. Report robbery, theft, or threats immediately;
  6. Get CCTV information if available;
  7. File police report.

Online scams can become offline crimes.


LXVII. If Goods Were Delivered But Fake or Defective

If you received something but it was fake, defective, or different:

  1. Take photos and videos immediately;
  2. Preserve packaging;
  3. Keep waybill;
  4. Make unboxing video if possible;
  5. Do not alter the item;
  6. Contact seller in writing;
  7. File platform dispute;
  8. Request refund or replacement;
  9. Consider consumer complaint;
  10. Consider estafa if deceit is clear.

Small claims may also be possible if seller identity is known.


LXVIII. If the Scam Is From a Fake Online Store Website

Preserve:

  1. Website URL;
  2. Domain name;
  3. Product page;
  4. Checkout page;
  5. Payment page;
  6. Confirmation email;
  7. Contact page;
  8. Terms and privacy policy;
  9. Payment receipt;
  10. Delivery promise;
  11. WHOIS or domain details if lawfully available;
  12. Ads that led to the site.

Report to payment provider, hosting platform, domain registrar if appropriate, and cybercrime authorities.


LXIX. If the Scam Came From SMS

SMS scams may involve fake bank alerts, delivery messages, prizes, SIM registration, loan offers, or government aid.

Preserve:

  1. Sender number or sender ID;
  2. Full message;
  3. Link;
  4. Date and time;
  5. Screenshot before deleting;
  6. Any site visited;
  7. Any data entered;
  8. Any unauthorized transaction.

Report to telco, bank/e-wallet if affected, and cybercrime authorities.


LXX. If the Scam Came From Email

Preserve:

  1. Full email;
  2. Sender address;
  3. Reply-to address;
  4. Headers, if possible;
  5. Attachments;
  6. Links;
  7. Payment instructions;
  8. Files downloaded;
  9. Any credentials entered.

Do not click further links. Change passwords if credentials were entered.


LXXI. If the Scam Involves Business Email Compromise

Business email compromise happens when a scammer intercepts or impersonates business email and changes payment instructions.

Steps:

  1. Notify bank immediately;
  2. Notify business counterpart;
  3. Preserve emails and headers;
  4. Check if your email was compromised;
  5. Change passwords and enable two-factor authentication;
  6. File cybercrime report;
  7. Investigate internal controls;
  8. Notify affected clients or suppliers.

This can involve large losses and needs urgent action.


LXXII. If the Scam Involves Fake Check or Overpayment

A scammer may send fake proof of deposit or overpay by check, then ask for refund of the excess. The original payment later bounces or is reversed.

Do not refund until payment has fully cleared. Preserve bank notices and messages.


LXXIII. If the Scam Involves Marketplace Buyer Fraud

Sellers can also be victims. Buyer scams include:

  1. Fake proof of payment;
  2. Chargeback fraud;
  3. False non-receipt claims;
  4. Item switching on return;
  5. COD refusal with fake orders;
  6. Fake courier pickup;
  7. Overpayment scam;
  8. Use of stolen accounts.

Sellers may file complaints and small claims, depending on facts.


LXXIV. If the Scam Involves Online Lending Under Your Name

If someone used your identity to borrow:

  1. Request documents from lender;
  2. Dispute the loan in writing;
  3. State that you did not apply;
  4. Ask for application logs and disbursement details;
  5. File cybercrime and privacy complaints;
  6. Report compromised ID;
  7. Monitor collection harassment;
  8. Notify references or contacts if needed;
  9. Keep all collection messages;
  10. Seek legal advice if sued or reported.

LXXV. If the Scam Involves Unauthorized Card Transactions

Immediately:

  1. Call bank;
  2. Block card;
  3. File dispute;
  4. Change online banking passwords;
  5. Preserve OTP or phishing messages;
  6. File cybercrime report if needed;
  7. Submit dispute forms on time;
  8. Monitor statements.

Card disputes have deadlines. Act quickly.


LXXVI. If the Scam Involves SIM Swap or SIM Registration Abuse

If your SIM stops working and accounts are compromised:

  1. Contact telco immediately;
  2. Request SIM blocking or replacement;
  3. Notify banks and e-wallets;
  4. Change passwords;
  5. File police or cybercrime report;
  6. Preserve telco records;
  7. Monitor transactions.

SIM control can lead to OTP interception and account takeover.


LXXVII. If the Scam Involves Hacked Social Media Account

If your account is hacked and used to scam contacts:

  1. Recover account;
  2. Change passwords;
  3. Enable two-factor authentication;
  4. Warn contacts;
  5. Preserve evidence of hack;
  6. Report to platform;
  7. File cybercrime report if money was lost;
  8. Cooperate with victims;
  9. Document that you did not solicit payments.

LXXVIII. Reporting to Telcos

If the scam used a mobile number, report to the telco. Provide:

  1. Number used;
  2. Scam messages;
  3. Date and time;
  4. Links;
  5. Payment request;
  6. Complaint reference from law enforcement if available.

Telcos may block or investigate numbers subject to rules.


LXXIX. Reporting to App Stores

For scam apps:

  1. Report the app through the app store;
  2. Mention fraud, phishing, unauthorized lending, data abuse, or impersonation;
  3. Attach screenshots;
  4. Report developer details;
  5. Report in-app payment demands;
  6. Preserve app page before removal.

App removal does not automatically recover money but may prevent more victims.


LXXX. Filing With a Prosecutor: Practical Tips

When filing with the prosecutor:

  1. Bring original IDs;
  2. Bring printed and digital copies of evidence;
  3. Prepare complaint-affidavit;
  4. Organize annexes;
  5. Bring proof of payment;
  6. Bring respondent details;
  7. Bring witnesses if needed;
  8. Prepare multiple copies;
  9. Be ready to swear to affidavit;
  10. Ask for receiving copy.

Requirements may vary by office, so be prepared.


LXXXI. Filing With Cybercrime Authorities: Practical Tips

When filing with cybercrime authorities:

  1. Bring the device used if possible;
  2. Bring screenshots and original files;
  3. Do not delete chats;
  4. Bring payment receipts;
  5. Bring account URLs;
  6. Bring phone numbers and email addresses;
  7. Bring timeline;
  8. Bring IDs;
  9. Provide platform report tickets;
  10. Explain if immediate preservation is needed.

Digital evidence is more useful when original accounts and devices are preserved.


LXXXII. How to Organize Evidence Folder

Create folders such as:

  1. “01 Profile and Account”
  2. “02 Offer or Listing”
  3. “03 Chat History”
  4. “04 Payment Proof”
  5. “05 Fake Documents”
  6. “06 Demand and Blocking”
  7. “07 Platform Reports”
  8. “08 Bank or E-Wallet Reports”
  9. “09 Other Victims”
  10. “10 Complaint-Affidavit”

Use filenames with dates and short descriptions.


LXXXIII. What Relief Can You Ask For?

Depending on the case, you may ask for:

  1. Investigation;
  2. Filing of criminal charges;
  3. Restitution;
  4. Return of money;
  5. Damages;
  6. Freezing or preservation of accounts;
  7. Takedown of fake account or post;
  8. Correction of records;
  9. Protection from threats;
  10. Assistance identifying suspect;
  11. Regulatory sanctions;
  12. Data deletion or privacy remedies;
  13. Injunction or court relief in serious cases.

The forum determines what relief it can grant.


LXXXIV. Can You Sue the Platform?

Generally, platforms are not automatically liable for every scam committed by users. Their liability depends on their role, knowledge, policies, and applicable law.

However, platforms may be asked to:

  1. Take down fake accounts;
  2. Preserve records;
  3. Process buyer protection claims;
  4. Suspend scam sellers;
  5. Provide records through legal process;
  6. Investigate policy violations.

A direct case against a platform is more complex and usually requires specific legal basis.


LXXXV. Can You Sue the Bank or E-Wallet?

A bank or e-wallet is not automatically liable just because a scammer used an account. Liability depends on facts such as negligence, failure to act on timely reports, unauthorized transactions, account verification issues, or regulatory duties.

The victim should first file a formal dispute or fraud report and request investigation.


LXXXVI. Can You File Against the Recipient Account Holder?

Yes, if evidence shows the recipient account holder participated, benefited, or is responsible. But if the account holder was also a victim of identity theft or account takeover, liability may require further proof.

Include the account holder details in the complaint and let authorities investigate.


LXXXVII. Prescription and Deadlines

Do not delay. Different offenses and civil claims have different prescriptive periods. Platform disputes, bank chargebacks, and e-wallet reports often have short deadlines.

Even when legal prescription is longer, evidence may disappear quickly.

Act as soon as possible.


LXXXVIII. Cost of Filing

Costs may include:

  1. Printing;
  2. Notarization;
  3. Transportation;
  4. Legal consultation;
  5. Filing fees for civil cases;
  6. Time spent attending proceedings.

Criminal complaints generally do not require the same filing fees as civil actions, but practical costs still exist.


LXXXIX. Lawyer or No Lawyer?

A lawyer is helpful when:

  1. Amount is large;
  2. There are multiple victims;
  3. Respondent is known and likely to contest;
  4. Case involves investment or securities;
  5. Case involves foreign parties;
  6. Victim is accused in return;
  7. Civil case is planned;
  8. Complex digital evidence exists;
  9. There is blackmail or sensitive material;
  10. Settlement documents are involved.

For simpler reports, victims may start with law enforcement or prosecutor assistance, but legal advice can improve strategy.


XC. Avoid These Mistakes

Victims should avoid:

  1. Deleting chats;
  2. Sending more money;
  3. Publicly posting without preserving evidence;
  4. Threatening violence;
  5. Hacking the scammer;
  6. Paying recovery scammers;
  7. Losing transaction references;
  8. Waiting too long;
  9. Filing vague complaints;
  10. Naming people without basis;
  11. Ignoring platform deadlines;
  12. Paying to personal accounts for “refund processing”;
  13. Signing settlement without payment;
  14. Sharing OTPs or passwords;
  15. Assuming a blotter alone is enough.

XCI. Preventive Measures Against Online Scams

Before transacting online:

  1. Verify seller or company identity;
  2. Search for scam reports;
  3. Use platform escrow or buyer protection;
  4. Avoid full payment to unknown sellers;
  5. Check if photos are stolen;
  6. Verify business registration independently;
  7. Avoid guaranteed investment returns;
  8. Do not share OTPs;
  9. Do not click suspicious links;
  10. Use strong passwords and two-factor authentication;
  11. Do not pay advance fees for loans or jobs;
  12. Check official websites;
  13. Use secure payment methods;
  14. Keep screenshots before payment;
  15. Trust urgency pressure less, not more.

XCII. Practical Complaint Checklist

Before filing, prepare:

  1. Your valid ID;
  2. Complaint-affidavit;
  3. Timeline of events;
  4. Scammer’s account name;
  5. Scammer’s profile URL;
  6. Phone number or email;
  7. Payment account details;
  8. Proof of payment;
  9. Full chat history;
  10. Offer or listing screenshots;
  11. Fake documents used;
  12. Demand messages;
  13. Proof of blocking or deletion;
  14. Platform report ticket;
  15. Bank or e-wallet report ticket;
  16. Names of other victims;
  17. Computation of loss;
  18. Printed and digital copies;
  19. Original device if needed;
  20. Backup of all files.

XCIII. Key Legal Principles

The following principles summarize the topic:

  1. Online scams may be criminal, civil, administrative, or all three.
  2. Estafa is common when deceit induced payment.
  3. Online use may trigger cybercrime implications.
  4. Evidence must be preserved immediately.
  5. Payment providers should be notified quickly.
  6. Platforms should be reported promptly.
  7. A police blotter is useful but may not be enough.
  8. A complaint-affidavit should be factual and supported by documents.
  9. Unknown scammers may still be reported using digital identifiers.
  10. Banks and platforms usually need legal process before disclosing private data.
  11. Small claims may help recover money if the scammer is known and reachable.
  12. Public accusations can create defamation risks if reckless.
  13. Multiple victims strengthen proof of scheme.
  14. Recovery is easier when funds are reported before withdrawal.
  15. Prevention and verification remain the best protection.

XCIV. Conclusion

Filing a complaint against online scammers in the Philippines requires fast action, organized evidence, and the correct legal route. The victim should immediately stop sending money, preserve screenshots and transaction records, report to the payment provider, report to the platform, prepare a clear timeline, and file with cybercrime authorities, police, prosecutor, or the appropriate regulator depending on the scam.

The strongest complaints show exactly what the scammer represented, why the victim relied on it, how much was paid, where the money was sent, what happened after payment, and what evidence proves deceit. Digital evidence such as chat logs, account URLs, payment receipts, fake documents, and platform records can make or break the case.

Not every online dispute is criminal. Some are civil refund or small claims matters. But when there is deliberate deception, fake identity, phishing, investment fraud, sextortion, illegal recruitment, or organized online fraud, formal complaints are appropriate and necessary.

A victim may not always recover money immediately, especially if the scammer withdrew funds quickly or used fake identities. Still, reporting is important. It can preserve records, identify offenders, support account freezes, prevent more victims, and create a legal basis for prosecution or restitution. The best response is prompt, factual, documented, and filed through proper channels.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.