How to File a Complaint for Cyberstalking, Grave Threats, and Online Extortion

I. Introduction

Cyberstalking, grave threats, and online extortion are serious legal matters in the Philippines. They often occur through social media, messaging apps, dating apps, email, online games, forums, video calls, fake accounts, anonymous numbers, e-wallet accounts, or other internet-based communication channels.

A person may be cyberstalked by an ex-partner, former friend, rejected suitor, scammer, debt collector, business adversary, anonymous account, online harasser, or criminal group. The conduct may involve repeated unwanted messages, monitoring, threats to harm, threats to expose private information, demands for money, sexual coercion, doxxing, impersonation, account hacking, or publication of defamatory content.

Filing a complaint requires more than saying “I am being harassed online.” The complainant must preserve evidence, identify the harmful acts, determine the possible crimes, prepare sworn statements, and report to the proper authorities. Because these offenses often overlap, a single incident may involve cybercrime, threats, coercion, extortion, unjust vexation, libel, data privacy violations, violence against women, anti-voyeurism, or other legal remedies.

This article explains how to file a complaint for cyberstalking, grave threats, and online extortion in the Philippine context.


II. Key Terms and Legal Concepts

A. Cyberstalking

“Cyberstalking” is commonly used to describe repeated online conduct that harasses, monitors, intimidates, threatens, or causes fear to another person. Philippine law does not always use the term “cyberstalking” as a single standalone offense in every situation. Instead, the conduct may be prosecuted or addressed through existing laws, such as:

  • Unjust vexation;
  • Grave threats;
  • Light threats or other threats;
  • Grave coercion;
  • Cyber libel;
  • Online gender-based sexual harassment;
  • Violence Against Women and Their Children, where applicable;
  • Anti-photo and video voyeurism violations;
  • Data privacy violations;
  • Identity-related offenses;
  • Illegal access or hacking;
  • Stalking-like conduct under protective order frameworks, where applicable.

Thus, when filing a complaint, the complainant should describe the specific acts rather than rely only on the label “cyberstalking.”

Examples include:

  • Repeatedly sending unwanted messages despite being told to stop;
  • Creating multiple fake accounts to contact the victim;
  • Monitoring the victim’s online activity and commenting on every post;
  • Sending threats to the victim’s family, employer, classmates, or partner;
  • Publishing the victim’s private information;
  • Tracking the victim’s location;
  • Threatening to appear at the victim’s home or workplace;
  • Using private photos, videos, or secrets to control the victim;
  • Impersonating the victim online;
  • Harassing the victim’s friends to reach the victim;
  • Repeatedly sending disturbing, sexual, violent, or degrading messages.

B. Grave Threats

Grave threats occur when a person threatens another with the infliction of a wrong amounting to a crime, such as killing, physical injury, rape, arson, kidnapping, destruction of property, or other criminal harm.

In online cases, grave threats may be made through:

  • Chat messages;
  • Text messages;
  • Voice notes;
  • Video calls;
  • Email;
  • Social media posts;
  • Comments;
  • Group chats;
  • Fake accounts;
  • Anonymous numbers;
  • Online gaming chats;
  • Dating apps.

Examples:

  • “I will kill you.”
  • “I will burn your house.”
  • “I will have you raped.”
  • “I will shoot you when I see you.”
  • “I will hurt your child.”
  • “I know where you live; I will come tonight.”
  • “I will destroy your car.”
  • “I will send people to beat you.”

The seriousness depends on the words, context, capability, surrounding acts, identity of the sender, prior conduct, and whether the threat caused fear or was made with conditions.


C. Online Extortion

Online extortion involves using threats, intimidation, coercion, exposure, fear, or pressure to obtain money, property, sexual acts, images, services, silence, or other advantage.

Examples include:

  • “Send money or I will post your nude photos.”
  • “Pay me or I will tell your employer.”
  • “Give me ₱50,000 or I will accuse you online.”
  • “Send more photos or I will expose the first ones.”
  • “Transfer money or I will send your chats to your family.”
  • “Pay or I will hack your account.”
  • “Give me your password or I will ruin your reputation.”
  • “Send money or I will release the video call recording.”
  • “Settle now or I will file a fake case against you.”

Online extortion may overlap with grave threats, coercion, robbery-extortion concepts, unjust vexation, cybercrime, data privacy violations, and, in sexual-image cases, anti-voyeurism laws.


III. Common Forms of Cyberstalking, Threats, and Online Extortion

A. Sextortion

Sextortion occurs when the offender uses intimate photos, videos, sexual conversations, or recorded video calls to demand money, more sexual content, sexual acts, or continued communication.

The victim may be threatened with publication to:

  • Family;
  • Employer;
  • School;
  • Church;
  • Spouse or partner;
  • Social media followers;
  • Group chats;
  • Workmates;
  • Clients;
  • Community pages.

Sextortion is serious. The victim should not pay if possible, should preserve evidence, and should report immediately.


B. Doxxing and Data Exposure

Doxxing means exposing private or identifying information online to harass, shame, threaten, or endanger the victim.

Information may include:

  • Full name;
  • Home address;
  • Phone number;
  • Workplace;
  • School;
  • Family members;
  • Government IDs;
  • Bank details;
  • Photos;
  • Private messages;
  • Medical information;
  • Location;
  • Vehicle plate number.

Doxxing may support complaints under privacy law, cybercrime law, threats, harassment, unjust vexation, and civil damages.


C. Revenge Posting or Threatened Posting of Intimate Images

The unauthorized publication or threatened publication of intimate images may involve:

  • Anti-photo and video voyeurism laws;
  • Cybercrime;
  • Data privacy violations;
  • Grave threats or coercion;
  • Violence Against Women and Their Children, if applicable;
  • Safe Spaces Act violations;
  • Civil damages.

The victim should preserve the threat and avoid negotiating endlessly.


D. Fake Accounts and Impersonation

A cyberstalker may create fake accounts to:

  • Contact the victim after being blocked;
  • Pretend to be the victim;
  • Post defamatory content;
  • Message the victim’s contacts;
  • Request money from others;
  • Lure the victim into responding;
  • Spread private information;
  • Monitor the victim.

Impersonation can support cybercrime, privacy, fraud, or civil remedies depending on what was done.


E. Repeated Unwanted Messages

Repeated unwanted messages may become actionable when they are threatening, obscene, abusive, persistent, or intended to disturb the victim’s peace.

Examples:

  • Hundreds of calls or messages per day;
  • Messages from new accounts after blocking;
  • Late-night threats;
  • Abusive comments on public posts;
  • Repeated “I am watching you” messages;
  • Threats to appear at home or office;
  • Contacting the victim’s family after being told to stop.

F. Location Tracking and Surveillance

Online stalking may include tracking the victim through:

  • Shared location features;
  • Spyware;
  • Compromised accounts;
  • Stolen passwords;
  • Device tracking apps;
  • AirTags or Bluetooth trackers;
  • Social media check-ins;
  • Mutual contacts;
  • Work schedules;
  • Delivery addresses;
  • Ride-hailing information.

If illegal access or spyware is involved, additional cybercrime and privacy violations may apply.


IV. Laws That May Apply

A. Revised Penal Code

The Revised Penal Code may apply to:

  • Grave threats;
  • Light threats;
  • Other threats;
  • Grave coercion;
  • Unjust vexation;
  • Slander or oral defamation;
  • Libel;
  • Falsification;
  • Usurpation of authority;
  • Robbery or extortion-related offenses, depending on facts;
  • Alarms and scandals;
  • Intriguing against honor.

For online acts, the Cybercrime Prevention Act may affect liability when the offense is committed through information and communications technology.


B. Cybercrime Prevention Act

The Cybercrime Prevention Act may apply when the unlawful act is committed through a computer system or digital communication. Online threats, cyber libel, identity misuse, unauthorized access, computer-related fraud, and related acts may fall within its framework.

Where a Revised Penal Code offense is committed through information and communications technology, cybercrime law may increase the seriousness of the offense.


C. Data Privacy Act

The Data Privacy Act may apply when personal information is collected, used, disclosed, posted, shared, sold, or threatened to be disclosed without lawful basis.

Examples:

  • Posting the victim’s address;
  • Sending the victim’s private information to relatives;
  • Publishing government ID photos;
  • Sharing phone number and workplace;
  • Uploading private chats;
  • Using personal data to extort money;
  • Collecting contacts or photos through deception;
  • Refusing to take down unlawfully posted personal information.

A complaint may be filed with the National Privacy Commission where personal data misuse is involved.


D. Anti-Photo and Video Voyeurism Law

This law may apply when intimate photos or videos are recorded, copied, reproduced, sold, distributed, published, broadcast, shown, or threatened to be exposed without consent, depending on the circumstances.

It is highly relevant in sextortion, revenge porn, hidden camera cases, and threats to distribute intimate material.


E. Safe Spaces Act

The Safe Spaces Act may apply where the online conduct involves gender-based sexual harassment, misogynistic, homophobic, transphobic, sexist, or sexually degrading conduct.

Examples:

  • Unwanted sexual comments;
  • Threats to spread sexual rumors;
  • Repeated sexual messages;
  • Online sexual harassment;
  • Gender-based humiliation;
  • Harassment in social media or messaging platforms.

F. Violence Against Women and Their Children

If the victim is a woman and the offender is a person with whom she has or had a sexual or dating relationship, or if the abuse affects her child, the VAWC law may apply. Psychological violence, threats, coercion, harassment, economic abuse, and control through online means may fall within this framework.

Possible remedies may include:

  • Barangay Protection Order;
  • Temporary Protection Order;
  • Permanent Protection Order;
  • Criminal complaint;
  • Other protective reliefs.

G. Civil Code

Even if a criminal case is difficult to prove, the victim may have civil remedies for damages based on:

  • Abuse of rights;
  • Acts contrary to morals, good customs, or public policy;
  • Defamation;
  • Invasion of privacy;
  • Emotional distress;
  • Damage to reputation;
  • Unjust enrichment;
  • Fraud or coercion.

Civil remedies may include actual damages, moral damages, nominal damages, exemplary damages, and attorney’s fees where legally justified.


V. Where to File a Complaint

A victim may file or seek assistance from one or more of the following:

A. Local Police Station

Useful for immediate threats, documentation, blotter, home safety, and referral to cybercrime units.

B. Philippine National Police Anti-Cybercrime Group

Appropriate for cybercrime-related complaints involving online threats, extortion, hacking, fake accounts, cyber libel, and sextortion.

C. National Bureau of Investigation Cybercrime Division

Appropriate for cybercrime complaints, digital evidence preservation, tracing, and serious online extortion cases.

D. City or Provincial Prosecutor’s Office

A criminal complaint may be filed directly with the prosecutor’s office through a complaint-affidavit and supporting evidence.

E. Barangay

Useful for immediate local documentation, mediation in proper cases, and protection assistance. However, serious cybercrime, grave threats, sextortion, or urgent safety issues should not be treated as mere barangay disputes.

F. Women and Children Protection Desk

Appropriate where the victim is a woman or child and the case involves domestic, dating, sexual, gender-based, or child-related abuse.

G. National Privacy Commission

Appropriate where personal data was misused, posted, threatened, harvested, or disclosed without authority.

H. Social Media Platforms and Service Providers

Reports may be filed for account takedown, preservation, impersonation, harassment, intimate image abuse, or threats. Platform reporting does not replace legal reporting, but it can help reduce harm.


VI. Immediate Safety Steps Before Filing

Before filing, the victim should prioritize safety.

  1. Do not meet the offender alone.
  2. Do not pay extortion demands if avoidable.
  3. Do not send more intimate images or personal information.
  4. Do not delete messages before saving evidence.
  5. Do not provoke, dare, or threaten the offender.
  6. Inform a trusted person if there is immediate danger.
  7. Call police or emergency responders if the threat is immediate.
  8. Secure accounts and passwords.
  9. Turn off location sharing.
  10. Preserve evidence in multiple safe copies.

If the offender knows the victim’s address or workplace and has made a credible threat, physical safety planning is important.


VII. Evidence to Preserve

Evidence is the backbone of a cyberstalking, grave threats, or online extortion complaint.

A. Digital Communications

Preserve:

  • Chat messages;
  • Text messages;
  • Emails;
  • Voice messages;
  • Missed call logs;
  • Video call records, if lawfully obtained;
  • Social media comments;
  • Group chat posts;
  • Private messages;
  • Dating app conversations;
  • Online gaming chats.

Screenshots should show:

  • Sender name;
  • Username or account handle;
  • Phone number or email;
  • Date and time;
  • Full message;
  • Platform;
  • Profile link, if available.

B. Threats and Demands

Specifically preserve messages showing:

  • Threat to kill or harm;
  • Threat to publish private information;
  • Threat to release intimate images;
  • Demand for money;
  • Demand for sexual acts or images;
  • Demand to continue relationship;
  • Threat to contact family or employer;
  • Threat to file false cases;
  • Threat to damage property;
  • Deadline or condition attached to threat.

C. Account Information

Save:

  • Profile URLs;
  • Usernames;
  • Display names;
  • Profile photos;
  • Email addresses;
  • Phone numbers;
  • Account IDs;
  • Linked accounts;
  • Screenshots of fake accounts;
  • History of account name changes, if visible.

D. Payment Information

For extortion, preserve:

  • Bank account numbers;
  • E-wallet numbers;
  • QR codes;
  • Remittance names;
  • Cryptocurrency wallet addresses;
  • Payment receipts;
  • Transaction reference numbers;
  • Screenshots of payment instructions;
  • Demands connected to payment.

E. Published Content

If the offender posted content online, save:

  • URL;
  • Screenshot;
  • Date and time accessed;
  • Account name;
  • Comments;
  • Shares;
  • Reactions;
  • Captions;
  • Uploaded images or videos;
  • Group name or page name.

If possible, ask a trusted person to also capture the post as a witness before it is deleted.


F. Evidence of Identity

If the offender is known, preserve:

  • Real name;
  • Address;
  • Workplace;
  • School;
  • Prior relationship evidence;
  • Photos;
  • Common contacts;
  • Phone number;
  • Video call screenshots;
  • Admissions;
  • Payment account matching identity;
  • Delivery address;
  • Prior documents sent.

If the offender is anonymous, the complaint can still be filed, but identification may require law enforcement assistance.


G. Effect on the Victim

Preserve evidence of harm:

  • Medical or psychological consultation;
  • Missed work or school;
  • Security expenses;
  • Employer notice;
  • Family distress;
  • Public humiliation;
  • Threat-related relocation;
  • Lost income;
  • Damage to reputation;
  • Platform takedown notices.

This may matter for damages and seriousness of the complaint.


VIII. How to Preserve Digital Evidence Properly

  1. Take screenshots immediately.
  2. Export full chat history if possible.
  3. Keep the original device.
  4. Do not crop screenshots if avoidable.
  5. Include timestamps and sender information.
  6. Save URLs.
  7. Record screen scrolling through the conversation if needed.
  8. Back up files to secure storage.
  9. Print important screenshots for filing.
  10. Keep electronic copies in original format.
  11. Do not edit, alter, or fabricate evidence.
  12. Note the date and time you captured evidence.
  13. Ask witnesses to execute affidavits if they saw posts or received messages.

Digital evidence is stronger when it can be authenticated and connected to the offender.


IX. Complaint-Affidavit

A criminal complaint usually requires a complaint-affidavit. This is a sworn written statement narrating the facts.

It should include:

  1. Full name and address of complainant;
  2. Identity of respondent, if known;
  3. Relationship between complainant and respondent;
  4. Platforms used;
  5. Description of cyberstalking conduct;
  6. Exact threats made;
  7. Extortion demands;
  8. Dates and times;
  9. Payment details, if any;
  10. Prior blocking or request to stop;
  11. Fear, harm, or damage suffered;
  12. Evidence attached as annexes;
  13. Request for investigation and prosecution.

The affidavit should be specific, chronological, and factual.


X. Suggested Structure of the Complaint-Affidavit

A. Personal Background

State who you are and how you know the respondent.

Example:

I am [name], of legal age, residing at [address]. Respondent [name/username] is known to me as [former partner/online acquaintance/unknown account/collector/etc.].

B. Beginning of Contact

Explain how the communication began.

I first communicated with respondent through [platform] on or about [date].

C. Cyberstalking Acts

Describe repeated unwanted conduct.

Despite my repeated requests for respondent to stop contacting me, respondent created several accounts and sent messages to me, my relatives, and my co-workers.

D. Grave Threats

Quote or describe the threats.

On [date], respondent sent the message: “[exact words].” I understood this as a threat to harm me because respondent knows where I live and had previously gone to my workplace.

E. Online Extortion

Describe demands.

Respondent demanded that I send ₱[amount] to [account] by [deadline], otherwise respondent would publish my private photos and send them to my employer.

F. Evidence

List annexes.

Attached are screenshots of the messages, account profiles, payment demands, and posts, marked as Annexes “A” to “H.”

G. Relief

Request action.

I am filing this complaint for cyberstalking-related harassment, grave threats, online extortion, and other appropriate offenses.


XI. Sample Complaint-Affidavit Allegation

A sample passage may read:

On [date], respondent using the account “[username]” sent me repeated messages threatening to publish my private photos unless I sent ₱[amount] through [payment channel]. Respondent also messaged my sister and employer, saying that he/she would ruin my reputation. On [date], respondent sent a message stating, “I know where you live. If you do not pay, I will go there and hurt you.” I felt fear for my safety because respondent knows my address and had previously sent photos of my house. I did not consent to the publication of my private information or photos. I am attaching screenshots of the threats, payment demands, account profile, and messages to my family.

This must be adapted to actual facts.


XII. Filing Procedure

Step 1: Secure Immediate Safety

If there is an immediate threat, contact police, barangay, building security, family, or emergency responders first.

Step 2: Preserve Evidence

Before blocking or reporting the account, save evidence. If blocking is needed for safety, preserve what you can first.

Step 3: Prepare a Chronology

Write a timeline with dates, platforms, threats, payments, and witnesses.

Step 4: Print and Save Annexes

Prepare printed screenshots and electronic copies. Label them clearly.

Step 5: Execute a Complaint-Affidavit

The affidavit must be signed and sworn before an authorized officer.

Step 6: File With the Proper Office

File with police cybercrime unit, NBI cybercrime, prosecutor’s office, or other proper agency.

Step 7: Cooperate With Investigation

You may be asked to provide your phone, links, account details, original files, witnesses, or additional affidavits.

Step 8: Attend Preliminary Investigation

If the prosecutor conducts preliminary investigation, attend hearings and submit required documents.

Step 9: Seek Protective or Ancillary Remedies

Consider restraining orders, protection orders, takedown requests, privacy complaints, or civil action where appropriate.


XIII. What to Bring When Filing

Bring:

  • Valid government ID;
  • Complaint-affidavit;
  • Printed screenshots;
  • Electronic copies in USB or device;
  • Phone containing original messages;
  • List of usernames, links, numbers, and emails;
  • Payment receipts;
  • Witness affidavits;
  • Medical or psychological records, if relevant;
  • Police blotter, if any;
  • Prior demand or stop-contact message, if any;
  • Proof of relationship, if VAWC applies;
  • Proof of posted content, if any.

Do not surrender your only copy of evidence without keeping backups.


XIV. When the Offender Is Unknown or Using a Fake Account

A complaint may still be filed even if the offender’s real name is unknown. The respondent may be identified as:

  • The person using a specific username;
  • Unknown person behind a phone number;
  • Unknown person behind an email account;
  • Unknown person operating a social media profile;
  • John Doe or Jane Doe, depending on procedure.

Investigators may seek preservation or disclosure through lawful process from platforms, telecoms, banks, e-wallets, or service providers.

The complainant should provide every available identifier.


XV. If the Offender Is Abroad

If the offender is abroad, filing may be harder but still possible. The victim should preserve evidence and report to cybercrime authorities. The case may involve:

  • Cross-border cooperation;
  • Platform reporting;
  • Financial institution records;
  • International service providers;
  • Foreign law enforcement channels;
  • Immigration and identity issues;
  • Money mule accounts in the Philippines.

If the money was sent to a Philippine account, the local recipient may be an important investigative lead.


XVI. If the Offender Is a Former Partner

When the offender is a former spouse, boyfriend, girlfriend, live-in partner, dating partner, or sexual partner, the case may involve additional legal remedies.

Possible issues:

  • VAWC;
  • Protection orders;
  • Anti-photo and video voyeurism;
  • Psychological violence;
  • Threats;
  • Coercion;
  • Stalking;
  • Property disputes;
  • Custody or child-related threats;
  • Harassment of family members.

Evidence of the relationship may be relevant, including photos, messages, admissions, or witness statements.


XVII. If the Victim Is a Woman

Women victims may consider whether the conduct falls under VAWC, Safe Spaces Act, cybercrime, threats, coercion, or anti-voyeurism laws.

If the offender is or was a dating or sexual partner, threats and online harassment may be part of psychological violence. The victim may seek help from the Women and Children Protection Desk, barangay, prosecutor, or court.


XVIII. If the Victim Is a Minor

If the victim is a minor, child protection laws may apply. Parents or guardians should act promptly. If sexual images, grooming, exploitation, or coercion are involved, the matter is urgent.

Important steps:

  • Do not blame the child;
  • Preserve evidence;
  • Avoid sharing intimate images further;
  • Report to child protection authorities or cybercrime units;
  • Seek psychological support;
  • Coordinate with school if needed;
  • Protect the child from continued contact.

XIX. If the Offender Is a Minor

If the offender is a minor, juvenile justice rules may affect the process. The victim may still report the conduct, but the handling of the child in conflict with the law may involve social welfare authorities, diversion, intervention, or special proceedings depending on the offense and age.


XX. If Intimate Images Are Involved

If intimate images or videos are involved:

  1. Do not send more images.
  2. Do not pay ransom if avoidable.
  3. Save threats and profile links.
  4. Report to platform for intimate image abuse.
  5. File a complaint with cybercrime authorities.
  6. Consider anti-voyeurism, cybercrime, privacy, VAWC, or Safe Spaces remedies.
  7. Ask trusted contacts not to forward or save the material.
  8. Seek takedown assistance.

Victims should not be blamed for having private images. The unlawful act is the unauthorized use, threat, or distribution.


XXI. If Money Was Already Paid

If the victim already paid extortion money:

  • Preserve proof of payment;
  • Report immediately to the bank, e-wallet, or remittance provider;
  • Request preservation or freezing if possible;
  • Include the payment account in the complaint;
  • Do not continue paying;
  • Save further demands;
  • Watch for secondary scams promising recovery.

Payment does not prevent filing a complaint. It may help prove the extortion demand and damage.


XXII. If the Threat Is Immediate

If the message says the offender is on the way, has a weapon, is outside the house, or will harm the victim soon:

  • Call police or emergency responders;
  • Inform family or security;
  • Do not meet the offender;
  • Move to a safer location if needed;
  • Preserve the message;
  • File a blotter or complaint immediately;
  • Consider protective remedies.

Immediate safety is more important than perfect documentation.


XXIII. If the Threat Is Conditional

Many threats are conditional:

  • “Pay or I will post.”
  • “Meet me or I will hurt you.”
  • “Come back to me or I will expose you.”
  • “Delete your complaint or I will kill you.”
  • “Send photos or I will send the old ones.”

Conditional threats may still be legally serious. They may support grave threats, coercion, extortion, or other offenses.


XXIV. If the Threat Was Sent Through a Group Chat

If threats were made in a group chat:

  • Save the full thread;
  • Capture group name and members;
  • Identify who saw the threat;
  • Ask witnesses to preserve their copies;
  • Secure affidavits from group members if possible;
  • Save any reactions or follow-up messages.

Group chat threats may also worsen reputational or emotional harm.


XXV. If the Offender Posted the Victim’s Information Online

The victim should:

  1. Screenshot the post with URL and timestamp.
  2. Report the post to the platform.
  3. File a complaint if the post contains threats, private data, intimate images, or defamatory statements.
  4. Ask trusted people not to engage or share.
  5. Consider data privacy complaint.
  6. Request takedown.
  7. Preserve evidence before takedown.

Do not rely only on platform reporting if there is criminal conduct.


XXVI. If the Offender Uses Multiple Accounts

The complaint should show the pattern:

  • Main account;
  • Backup accounts;
  • Fake profiles;
  • New phone numbers;
  • Email addresses;
  • Repeated wording;
  • Same photos or writing style;
  • Admissions that the accounts are connected;
  • Similar threats;
  • Timing of messages after blocking.

A pattern of evasion supports stalking or harassment allegations.


XXVII. If the Offender Contacts Family, Friends, Employer, or School

This may strengthen the complaint. The victim should ask those persons to preserve:

  • Messages received;
  • Call logs;
  • Screenshots;
  • Sender details;
  • Dates and times;
  • Any threats or defamatory statements.

They may execute witness affidavits. They may also be victims if they were threatened or if their personal data was misused.


XXVIII. If the Offender Threatens to File False Cases

Threatening to file a complaint is not always illegal if the person has a legitimate grievance. But threatening false accusations to obtain money, sex, silence, or submission may be unlawful.

Examples:

  • “Pay me or I will falsely accuse you of rape.”
  • “Come back to me or I will report you for abuse.”
  • “Send money or I will say you scammed me.”
  • “Withdraw your complaint or I will file a fake case.”

Preserve the exact wording and context.


XXIX. If the Offender Is a Debt Collector

Debt collection harassment may overlap with cyberstalking, threats, and online extortion when collectors:

  • Threaten bodily harm;
  • Threaten public shaming;
  • Contact family or employer;
  • Post personal data;
  • Demand payment through intimidation;
  • Use fake legal documents;
  • Threaten arrest without basis;
  • Harass through multiple numbers.

Additional remedies may include complaints with regulators and the National Privacy Commission.


XXX. If the Offender Is an Online Seller, Buyer, or Business Contact

Online extortion may arise from business disputes. Examples:

  • Threatening false reviews unless refunded beyond agreement;
  • Threatening exposure unless paid;
  • Threatening to post private data;
  • Demanding money after a transaction;
  • Using delivery information to harass.

A genuine consumer complaint is different from extortion. The line is crossed when threats are used to obtain unlawful gain or force an act.


XXXI. Protective Orders and Restraining Relief

Depending on the relationship and legal basis, the victim may seek protective relief, especially in domestic, dating, sexual, gender-based, or family contexts.

Possible relief may include:

  • No-contact order;
  • Protection order under VAWC, if applicable;
  • Takedown or injunctive relief;
  • Court orders to stop harassment;
  • Orders protecting children or family members;
  • Orders relating to residence, workplace, or communication.

The availability of remedies depends on the law invoked and facts.


XXXII. Takedown Requests

Takedown requests may be made to:

  • Social media platforms;
  • Website hosts;
  • Search engines;
  • Group administrators;
  • Forum moderators;
  • Law enforcement;
  • Privacy regulators, where appropriate.

For intimate images or personal data, urgent takedown may reduce harm. But evidence should be preserved before takedown, if safely possible.


XXXIII. Account Security Measures

Victims should secure their digital life:

  1. Change passwords.
  2. Enable two-factor authentication.
  3. Log out other sessions.
  4. Review account recovery email and phone.
  5. Remove unknown devices.
  6. Check email forwarding rules.
  7. Revoke suspicious app permissions.
  8. Check cloud storage sharing.
  9. Turn off location sharing.
  10. Scan devices for spyware.
  11. Inform contacts not to respond to impersonators.
  12. Use stronger privacy settings.

If hacking is suspected, report it as part of the complaint.


XXXIV. Financial Safety Measures

If extortion involved money:

  • Notify banks and e-wallet providers;
  • Change online banking passwords;
  • Freeze compromised cards;
  • Monitor transactions;
  • Preserve account statements;
  • Report unauthorized transactions;
  • Avoid sending more money;
  • Beware of fake investigators or recovery agents.

XXXV. What Not to Do

Victims should avoid:

  1. Deleting evidence;
  2. Paying repeatedly;
  3. Sending more intimate content;
  4. Threatening the offender violently;
  5. Publicly posting unverified accusations;
  6. Engaging in long emotional arguments;
  7. Hacking the offender’s account;
  8. Meeting the offender alone;
  9. Giving additional personal information;
  10. Ignoring immediate threats;
  11. Forwarding intimate images to others;
  12. Fabricating screenshots;
  13. Assuming anonymous accounts cannot be traced;
  14. Waiting too long to report serious threats.

XXXVI. Possible Defenses of the Respondent

A respondent may argue:

  • The messages are fake;
  • The account was hacked;
  • The screenshots were edited;
  • The complainant consented;
  • The words were jokes or not serious;
  • There was no intent to threaten;
  • There was no demand for money;
  • The complaint is motivated by revenge;
  • The identity of the sender is not proven;
  • The dispute is purely personal or civil;
  • The alleged private material was never published;
  • The complainant initiated the exchange.

Because these defenses are common, evidence authentication and context matter.


XXXVII. Importance of Context

Threats and extortion are evaluated in context. A single message may be serious if it is specific and credible. A pattern of conduct may be serious even if each individual message seems less severe.

Relevant context includes:

  • Prior relationship;
  • Prior violence;
  • Knowledge of victim’s address;
  • Access to private material;
  • Repeated messages;
  • Use of multiple accounts;
  • Payment demands;
  • Threats to family;
  • Actual publication of data;
  • Physical appearances near victim;
  • Prior compliance by victim due to fear.

XXXVIII. Authentication of Electronic Evidence

Electronic evidence may need authentication. The complainant should be ready to explain:

  • How the screenshot was taken;
  • What device was used;
  • Who owns the account;
  • How the complainant knows the respondent;
  • Whether the number or account was previously used by respondent;
  • Whether the respondent admitted ownership;
  • Whether payments were sent to respondent’s account;
  • Whether witnesses saw the messages;
  • Whether platform links still exist.

The original phone or account may be important.


XXXIX. Chain of Custody

For serious cases, especially those involving devices, intimate images, hacking, or large extortion amounts, chain of custody is important. The victim should keep original files and avoid transferring evidence carelessly.

If law enforcement takes a device for examination, ask for proper receipt or documentation.


XL. Role of Witnesses

Witnesses may include:

  • Family members who received threats;
  • Friends who saw posts;
  • Co-workers contacted by offender;
  • Barangay officials;
  • Police officers who recorded blotter;
  • IT personnel;
  • Platform administrators;
  • Bank or e-wallet representatives;
  • Persons who know the respondent’s account;
  • Persons who saw the respondent admit the threats.

Witness affidavits can strengthen the complaint.


XLI. Remedies if Prosecutor Dismisses the Complaint

If the prosecutor dismisses the complaint, the complainant may have remedies under procedural rules, such as:

  • Motion for reconsideration;
  • Petition for review or appeal to the proper authority;
  • Filing a civil case, if appropriate;
  • Filing with another regulator for privacy or platform-related remedies;
  • Refiling if new evidence emerges, subject to rules.

A dismissal at preliminary investigation does not always mean the acts were acceptable. It may mean the evidence was insufficient for criminal prosecution.


XLII. Civil Action for Damages

A victim may seek damages if the online conduct caused harm.

Possible damages include:

  • Actual damages;
  • Moral damages;
  • Nominal damages;
  • Exemplary damages;
  • Attorney’s fees;
  • Litigation expenses.

Harm may include emotional distress, reputational injury, lost work, medical expenses, relocation, security costs, business loss, or family disruption.


XLIII. Settlement

Settlement may happen if the offender apologizes, stops, pays restitution, removes content, or agrees not to contact the victim.

However:

  • Serious criminal acts are offenses against the State;
  • Settlement does not automatically erase criminal liability;
  • Affidavit of desistance may not automatically dismiss the case;
  • The victim should not sign unclear waivers;
  • Any settlement should include takedown, no-contact, return or deletion of private material, and confidentiality terms where appropriate;
  • Settlement should not involve further coercion.

In sextortion or threats, settlement should be approached carefully.


XLIV. Affidavit of Desistance

An affidavit of desistance means the complainant no longer wants to pursue the case. It does not automatically terminate a criminal proceeding. Prosecutors and courts may still continue if evidence supports the charge.

A victim should not sign an affidavit of desistance under pressure, threats, or fear. If forced to sign, the coercion itself may be reported.


XLV. If the Offender Apologizes

An apology may be useful evidence. It may show admission of the account, conduct, or harm. Preserve it.

However, an apology does not automatically erase liability, especially if threats, extortion, intimate image abuse, or serious harassment occurred.


XLVI. If the Offender Deletes the Account or Messages

Deletion does not necessarily end the case. The victim should preserve what was captured. Investigators may still pursue other identifiers:

  • Phone numbers;
  • Emails;
  • Payment accounts;
  • IP-related records through lawful process;
  • Witnesses;
  • Backups;
  • Platform logs, if preserved;
  • Device evidence.

This is why early preservation is crucial.


XLVII. If the Victim Has No Screenshots

If the victim did not save evidence before deletion, the case becomes harder but not always impossible.

Possible alternatives:

  • Witnesses who saw the messages;
  • Platform notifications;
  • Email notifications;
  • Phone call logs;
  • Bank or e-wallet records;
  • Screenshots from recipients;
  • Device backups;
  • Cloud backups;
  • Admissions by offender;
  • Police blotter made shortly after incident.

Still, victims should preserve evidence as early as possible.


XLVIII. Special Case: Threats of Suicide by the Offender

Sometimes an offender uses suicide threats to force communication, money, reconciliation, or withdrawal of a complaint.

The victim should:

  • Treat credible self-harm threats seriously;
  • Contact emergency responders or people near the offender if identity or location is known;
  • Avoid insulting, daring, or encouraging self-harm;
  • State a firm boundary;
  • Preserve the messages;
  • Not give money or withdraw a complaint merely because of the threat;
  • Report the threat as part of the coercive pattern if relevant.

A victim is generally not required to stay in a relationship, send money, or tolerate abuse because another person threatens self-harm.


XLIX. Special Case: Threats to Children or Family

Threats to children, parents, siblings, spouse, or household members should be taken seriously. The complaint should include these family members as threatened persons or witnesses where appropriate.

If children are involved, report promptly and consider protection measures.


L. Special Case: Workplace Harassment

If the offender contacts the victim’s employer or co-workers:

  • Preserve messages;
  • Inform HR or security;
  • Ask employer to preserve emails or CCTV if physical threats are made;
  • Avoid engaging the offender through work systems;
  • Include workplace harassment in complaint;
  • Consider privacy and defamation remedies.

Employers should not disclose employee information casually to unknown callers or harassers.


LI. Special Case: School Harassment

If the victim is a student or teacher and the offender contacts classmates, teachers, or school officials:

  • Preserve messages;
  • Inform school administration;
  • Request safety measures;
  • Report threats to police if serious;
  • Consider child protection if minors are involved;
  • Include school-related harm in the complaint.

LII. Filing With the National Privacy Commission

A privacy complaint may be appropriate when the offender:

  • Posted the victim’s personal data;
  • Shared private messages;
  • Distributed IDs or address;
  • Used personal data to threaten or extort;
  • Processed data without consent or lawful basis;
  • Refused to take down private information.

The complaint should include:

  • Description of personal data involved;
  • How it was obtained;
  • How it was used or disclosed;
  • Screenshots and links;
  • Harm suffered;
  • Identity of respondent, if known;
  • Relief requested.

Privacy remedies may proceed separately from criminal complaints.


LIII. Filing Platform Reports

For urgent online harm, report the account or content to the platform under categories such as:

  • Harassment;
  • Threats;
  • Blackmail;
  • Intimate image abuse;
  • Impersonation;
  • Hate or sexual harassment;
  • Doxxing;
  • Privacy violation;
  • Scam or fraud.

Before reporting, preserve evidence. After takedown, the content may be harder to access.


LIV. Filing With Banks, E-Wallets, and Payment Providers

If extortion payments were demanded or made, report to the payment provider.

Provide:

  • Account name;
  • Account number;
  • Transaction reference;
  • Date and amount;
  • Screenshot of demand;
  • Police report or complaint, if available;
  • Request for preservation or action.

Payment records can help identify the offender or money mule.


LV. Practical Checklist for Filing

Before filing, prepare:

  1. Complaint-affidavit;
  2. Chronology;
  3. Screenshots of threats;
  4. Screenshots of extortion demands;
  5. Profile links and usernames;
  6. Phone numbers and emails;
  7. Payment details;
  8. Witness affidavits;
  9. Proof of posted content;
  10. Valid ID;
  11. Electronic copies;
  12. Device containing original messages;
  13. Police blotter, if any;
  14. Medical or psychological records, if relevant;
  15. Proof of relationship, if VAWC applies.

LVI. Sample Chronology Table

Date Platform Act Evidence Effect
Jan. 1 Messenger Respondent threatened to post private photos Annex A Fear and distress
Jan. 2 SMS Respondent demanded ₱10,000 Annex B Extortion demand
Jan. 3 GCash Payment sent under fear Annex C Financial loss
Jan. 5 Facebook Respondent posted victim’s address Annex D Privacy violation
Jan. 6 Email Respondent threatened physical harm Annex E Grave threat

A table helps investigators understand the pattern quickly.


LVII. Sample Final Warning or Boundary Message

Before blocking or filing, a victim may send a brief message if safe:

Do not contact me again. Do not contact my family, friends, employer, or school. Do not publish, share, or threaten to publish my private information, photos, videos, or messages. Your threats and demands are being preserved and will be reported to the proper authorities.

Do not send a message if it will escalate immediate danger. Safety comes first.


LVIII. Frequently Asked Questions

1. Is cyberstalking a crime in the Philippines?

The term “cyberstalking” may not always be charged as one single offense, but the conduct can be prosecuted or addressed under laws on threats, coercion, unjust vexation, cybercrime, privacy, VAWC, Safe Spaces, anti-voyeurism, and civil damages.

2. Can online threats be grave threats?

Yes. Threats made through chat, text, email, or social media may support a complaint if the elements are present.

3. What if the offender says it was only a joke?

Context matters. Specific threats, repeated harassment, demands, prior conduct, and the victim’s reasonable fear may show that it was not a harmless joke.

4. Should I pay an online extortionist?

Payment often leads to more demands. Preserve evidence and report immediately. If personal safety is at risk, contact authorities.

5. What if intimate photos are involved?

Do not send more material. Preserve threats, report the account, and consider complaints under anti-voyeurism, cybercrime, privacy, VAWC, or Safe Spaces laws.

6. Can I file even if I do not know the offender’s real name?

Yes. Provide usernames, phone numbers, links, emails, payment accounts, and other identifiers. Authorities may investigate.

7. Are screenshots enough?

Screenshots are useful, but stronger evidence includes original messages, URLs, exported chats, device access, witnesses, payment records, and platform identifiers.

8. Can I block the offender?

Yes, but preserve evidence first if possible. For immediate safety, block right away and preserve whatever evidence remains.

9. Can I post the offender’s name online?

Be careful. Public accusations may expose you to defamation or privacy claims. Formal reporting is safer.

10. Can I file with both cybercrime authorities and the prosecutor?

Yes, depending on the case. Cybercrime units may investigate, while prosecutors determine criminal charges.

11. Can I get a protection order?

Possibly, especially if VAWC, domestic relationship, dating relationship, child protection, or other protective laws apply.

12. What if the offender is outside the Philippines?

Report locally and preserve evidence. Cross-border cases are harder but may still be investigated, especially if local payment accounts or accomplices are involved.

13. What if the offender deleted the messages?

Use saved screenshots, witnesses, backups, payment records, and platform identifiers. Early reporting helps preserve logs.

14. Can the offender be liable for contacting my employer?

Yes, depending on the content. It may involve harassment, defamation, privacy violation, coercion, or extortion.

15. What if I already paid?

Save proof of payment and report immediately. Do not keep paying without legal advice and safety planning.


LIX. Conclusion

Filing a complaint for cyberstalking, grave threats, and online extortion in the Philippines requires immediate safety action, careful evidence preservation, and a clear legal strategy. The victim should document the offender’s accounts, messages, threats, payment demands, published content, and the effect on the victim’s safety, reputation, privacy, and peace of mind.

The complaint may be filed with police, cybercrime authorities, the prosecutor’s office, the National Privacy Commission, the Women and Children Protection Desk, or other proper agencies depending on the facts. Where intimate images, personal data, dating abuse, gender-based harassment, or hacking are involved, additional remedies may be available.

The strongest complaints are specific, chronological, evidence-based, and supported by original digital records. Victims should avoid paying extortionists, deleting evidence, engaging in public retaliation, or meeting offenders alone. They should preserve proof, secure accounts, report promptly, seek protection when necessary, and use formal legal channels to stop the harassment and hold the offender accountable.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.