A Legal Article in the Philippine Context
I. Introduction
A romance scam is a form of fraud where a scammer pretends to have romantic feelings or a serious personal relationship with the victim in order to obtain money, property, financial access, personal information, intimate images, or other benefits. In the Philippines, romance scams often occur through Facebook, Messenger, dating apps, Instagram, Telegram, WhatsApp, Viber, TikTok, email, online games, and other digital platforms.
The scam usually begins with affection, trust-building, constant communication, and emotional manipulation. The scammer may claim to be a foreigner, overseas Filipino worker, soldier, engineer, seafarer, businessperson, doctor, widower, single parent, or person in crisis. After gaining the victim’s trust, the scammer asks for money or favors. The requests may be framed as emergencies, travel expenses, customs fees, medical bills, business capital, investment opportunities, parcel release charges, visa costs, inheritance processing, or temporary loans.
A victim of a romance scam may file a criminal complaint in the Philippines if the facts show fraud, deceit, identity theft, cybercrime, extortion, blackmail, illegal access, money laundering, or other criminal acts. Filing a complaint requires organized evidence, a clear narrative, transaction records, and proper submission to law enforcement or the prosecutor’s office.
This article discusses how to file a criminal complaint for romance scam in the Philippines, including the possible crimes involved, evidence needed, where to report, how to prepare a complaint-affidavit, remedies for recovery, and practical steps to protect the victim.
II. What Is a Romance Scam?
A romance scam is a fraudulent scheme where the offender creates or exploits a supposed romantic relationship to induce the victim to part with money, property, personal information, or other valuable things.
The deception may include:
- pretending to be romantically interested;
- using a fake identity;
- stealing another person’s photos;
- pretending to be a foreign professional or military officer;
- claiming to be sending gifts or packages;
- inventing medical or travel emergencies;
- promising marriage or a future together;
- asking for loans with no intention to repay;
- offering fake investments;
- asking the victim to receive or transfer money;
- obtaining intimate photos and later threatening exposure;
- asking for identity documents, bank details, OTPs, or passwords;
- using love, guilt, fear, shame, or pity to pressure the victim.
The scam is not simply a failed relationship. It becomes legally actionable when there is deceit, fraudulent intent, unlawful taking, extortion, identity misuse, or other criminal conduct.
III. Romance Scam vs. Ordinary Relationship Dispute
Not every broken promise in a romantic relationship is a crime. Philippine law generally does not criminalize falling out of love, failing to marry, or refusing to repay informal expenses unless the legal elements of an offense are present.
A criminal complaint is stronger when the evidence shows:
- the offender used a false identity;
- the offender made false representations to obtain money;
- the offender never intended to repay or fulfill promises;
- the offender used fake emergencies;
- the offender impersonated another person;
- the offender used fake documents;
- the offender asked for money through repeated lies;
- the offender threatened to release intimate photos or messages;
- the offender hacked or accessed accounts;
- the offender used mule accounts or coordinated with others;
- the offender disappeared after receiving money;
- the same scheme was used on multiple victims.
A mere romantic breakup is different from a fraudulent scheme. The complaint should focus on the deception and the resulting damage, not only on emotional betrayal.
IV. Possible Crimes Involved
A romance scam may involve several crimes depending on the facts.
A. Estafa
Estafa is one of the most common charges in romance scam cases. It generally involves deceit or abuse of confidence that causes damage to another.
In a romance scam, estafa may arise when the offender induces the victim to send money through false pretenses, such as:
- “I need money for hospital bills, and I will pay you back.”
- “I am sending you a package, but you must pay customs fees.”
- “I need travel money to visit you.”
- “My bank account is frozen, but I will return the money soon.”
- “Invest in my business and we will marry after it succeeds.”
- “Pay this fee so I can release my inheritance.”
- “I was arrested at the airport and need bail.”
The key point is that the victim parted with money because of deceit.
B. Cybercrime-Related Estafa or Computer-Related Fraud
If the romance scam was committed through the internet, social media, dating apps, messaging apps, email, or electronic platforms, cybercrime laws may apply.
Cybercrime may be involved when:
- the fraud was carried out online;
- the offender used fake social media accounts;
- the offender used phishing links;
- the offender accessed the victim’s accounts;
- the offender used digital wallets, online banking, or electronic transfers;
- the offender sent fake digital documents;
- the offender impersonated a real person online;
- the offender used electronic communications to commit estafa.
Using information and communications technology can affect the legal characterization and penalties.
C. Identity Theft
Identity theft may be involved if the scammer used another person’s name, photos, documents, social media profile, or personal information to deceive the victim.
Examples include:
- using photos of a real foreign soldier;
- pretending to be a doctor, engineer, seafarer, or businessperson using stolen pictures;
- creating a fake profile under another person’s identity;
- sending fake passport or ID images;
- using the victim’s identity documents to open accounts or solicit money.
Identity theft can harm both the romance scam victim and the person whose identity was stolen.
D. Extortion, Grave Coercion, or Blackmail
If the scammer threatens to expose intimate photos, videos, chats, or personal information unless the victim pays money, the case may involve extortion, coercion, unjust vexation, cyber-related threats, or other offenses depending on the acts.
This is sometimes called sextortion.
Examples:
- “Send money or I will post your private photos.”
- “Pay me or I will send your videos to your family.”
- “Give me access to your bank account or I will expose you.”
- “If you report me, I will ruin your reputation.”
In these cases, immediate preservation of evidence and reporting are important.
E. Illegal Access or Hacking
If the offender gained access to the victim’s email, social media account, phone, e-wallet, bank account, cloud storage, or dating profile without permission, cybercrime involving illegal access or related offenses may arise.
This may happen when the victim was tricked into:
- giving passwords;
- sharing OTPs;
- clicking phishing links;
- installing remote access apps;
- scanning malicious QR codes;
- sharing recovery codes.
F. Data Privacy Violations
If the scammer unlawfully collected, used, disclosed, sold, or threatened to disclose the victim’s personal information, privacy-related remedies may also be relevant.
This is especially important where the scammer obtained:
- government IDs;
- bank details;
- private photos;
- addresses;
- workplace information;
- family contacts;
- medical details;
- intimate communications.
G. Money Laundering Concerns
Romance scam proceeds may be transferred through bank accounts, e-wallets, remittance centers, cryptocurrency wallets, or mule accounts. If the scheme is organized or involves substantial amounts, money laundering issues may arise.
A victim may unknowingly become involved if the scammer asks the victim to receive money from others and forward it. This is dangerous. The victim may be used as a money mule.
H. Falsification and Use of Falsified Documents
Romance scammers often use fake documents, such as:
- fake passports;
- fake military IDs;
- fake employment contracts;
- fake hospital bills;
- fake customs documents;
- fake bank certificates;
- fake inheritance papers;
- fake travel itineraries;
- fake court or police documents;
- fake receipts;
- fake shipping records.
Using falsified documents to obtain money may support additional criminal allegations.
V. Common Romance Scam Patterns in the Philippines
A. Package or Parcel Scam
The scammer claims to send expensive gifts, cash, jewelry, gadgets, or documents to the victim. A fake courier or customs officer then contacts the victim and demands payment for customs duties, taxes, clearance, anti-money laundering certificate, insurance, storage, or delivery.
Red flags include:
- payment requested through personal bank or e-wallet accounts;
- courier has no verifiable office;
- fake tracking website;
- pressure to pay immediately;
- repeated new fees;
- claims that the package contains undeclared cash;
- threats of arrest if fees are not paid.
B. Soldier or Foreign Professional Scam
The scammer pretends to be a foreign soldier, engineer, doctor, oil rig worker, seafarer, or contractor. They claim they cannot access their money but will repay the victim later.
Common excuses include:
- bank account frozen;
- contract delayed;
- emergency leave;
- mission restrictions;
- medical emergency;
- travel documents needed;
- equipment stuck in customs.
C. Travel-to-the-Philippines Scam
The scammer says they will visit the victim but needs money for:
- plane ticket;
- visa;
- immigration fees;
- airport clearance;
- travel insurance;
- luggage fees;
- hotel booking;
- emergency medical clearance;
- fake detention at airport.
Often, the scammer never arrives.
D. Medical Emergency Scam
The scammer claims to be hospitalized, injured, or needing urgent surgery. Sometimes a fake doctor or hospital staff contacts the victim.
The victim should verify independently before sending money. Fake hospital bills are common.
E. Investment Romance Scam
The scammer builds romance and then introduces a supposed investment opportunity, often involving cryptocurrency, forex, online trading, casino games, or business ventures. The victim is encouraged to invest, sees fake profits, and is later asked to pay fees before withdrawal.
This may combine romance scam with investment fraud.
F. Loan Scam
The scammer asks for repeated loans, promising repayment after salary, inheritance, contract release, remittance, or travel. The issue becomes criminal when the evidence shows fraudulent intent from the start.
G. Sextortion
The scammer obtains intimate photos, videos, or chats and threatens exposure unless the victim pays. This may happen quickly or after a longer fake relationship.
The victim should not continue paying. Scammers usually demand more after the first payment.
H. Money Mule Romance Scam
The scammer asks the victim to receive funds from third parties and forward them elsewhere. The victim may be told it is for business, charity, inheritance, salary, or family assistance.
This is extremely risky. The funds may be proceeds of crime, and the victim may be investigated as part of the laundering chain.
VI. Immediate Steps After Discovering the Scam
A. Stop Sending Money
Do not send additional payments for “final clearance,” “refund processing,” “withdrawal tax,” “package release,” “anti-terror certificate,” “lawyer fee,” “airport fee,” or “account unlocking.”
Repeated payment demands are a common feature of romance scams.
B. Do Not Delete Conversations
Victims often delete messages out of embarrassment, anger, or fear. This can weaken the case. Preserve everything.
Save:
- chat threads;
- voice messages;
- video call records if available;
- usernames;
- profile links;
- phone numbers;
- email addresses;
- payment instructions;
- receipts;
- screenshots of posts;
- fake documents;
- photos used by the scammer;
- dating app profile;
- group chat records;
- call logs.
C. Take Screenshots Properly
Screenshots should show:
- the scammer’s account name;
- profile photo;
- URL or username;
- date and time;
- complete message context;
- payment instructions;
- promises and representations;
- threats, if any;
- transaction confirmation.
Do not crop too aggressively. Preserve full context.
D. Export or Back Up Chats
Where possible, export the conversation or back it up. Screenshots are useful, but original chat data may be more persuasive.
E. Secure Accounts
Change passwords for:
- email;
- social media;
- banking apps;
- e-wallets;
- dating apps;
- cloud storage;
- phone lock screen;
- messaging apps.
Enable two-factor authentication. Revoke suspicious logins and connected devices.
F. Report to Bank or E-Wallet Provider Immediately
If money was sent through bank transfer, GCash, Maya, remittance, card, or other payment channel, report fraud immediately.
Ask for:
- fraud ticket or case number;
- investigation of recipient account;
- possible hold or freeze;
- transaction reversal procedure, if available;
- chargeback procedure, if card payment was used;
- written acknowledgment of report.
Speed matters because funds may be withdrawn quickly.
G. Report Fake Profiles
Report the scam account to the social media platform or dating app, but do not rely only on platform reporting. Preserve evidence before reporting because the account may be removed.
H. Avoid Direct Threats
Do not threaten the scammer with violence, public shaming, or illegal retaliation. Keep communications professional if further contact is necessary for evidence preservation.
VII. Evidence Needed for a Criminal Complaint
A strong criminal complaint depends on evidence. The victim should organize the proof before filing.
A. Identity or Account Evidence
Gather:
- real name, if known;
- aliases;
- usernames;
- profile links;
- phone numbers;
- email addresses;
- dating app IDs;
- social media account URLs;
- photos used;
- copies of IDs sent by scammer;
- names of alleged accomplices;
- bank or e-wallet account names;
- recipient account numbers;
- remittance claim details.
Even if the scammer’s real identity is unknown, account identifiers are important.
B. Communication Evidence
Preserve:
- full chat history;
- messages requesting money;
- promises to repay;
- romantic representations;
- fake emergencies;
- fake documents;
- threats;
- instructions on where to send money;
- refusal to return money;
- admission of receipt;
- inconsistencies in the scammer’s story.
C. Transaction Evidence
Collect:
- bank transfer receipts;
- e-wallet receipts;
- remittance slips;
- card statements;
- cryptocurrency transaction hashes;
- screenshots of payment confirmation;
- account names and numbers;
- transaction reference numbers;
- dates and times;
- amounts sent;
- proof of charges or deductions.
D. Damage Evidence
Summarize:
- total amount lost;
- dates of each payment;
- unpaid loans;
- additional fees paid;
- cost of borrowing money to send to scammer;
- emotional distress, if relevant;
- reputational harm from threats;
- unauthorized account access;
- identity document misuse.
E. Deception Evidence
This is crucial. Show why the money was sent.
Evidence may include:
- fake promise of marriage;
- fake medical emergency;
- fake package delivery;
- fake customs notice;
- fake travel document;
- fake bank freeze explanation;
- fake investment dashboard;
- fake identity documents;
- fake photos;
- fake third-party messages;
- claim that money would be repaid;
- claim that fees were necessary.
F. Witnesses
Possible witnesses include:
- relatives who saw the communications;
- friends who warned the victim;
- bank personnel who received the report;
- other victims;
- persons whose identities were used;
- recipient account holders, if known;
- platform administrators, if available.
VIII. Where to File or Report
A romance scam victim in the Philippines may approach several channels depending on the facts.
A. Police Cybercrime Unit
If the scam was committed online, the victim may report to a cybercrime unit of law enforcement. This is often appropriate for scams involving social media, dating apps, electronic transfers, identity theft, hacking, phishing, or sextortion.
Bring printed and digital copies of evidence.
B. Local Police Station
A victim may initially report to the local police station, especially if the suspect is known or located nearby. The report may be recorded in the blotter and referred to the appropriate investigative unit.
A police blotter is not the criminal case itself. It is a record of the report. A formal complaint-affidavit and supporting evidence are usually needed for prosecution.
C. Prosecutor’s Office
A criminal complaint may be filed with the Office of the City or Provincial Prosecutor having jurisdiction, especially when the suspect is identifiable and evidence is ready.
The prosecutor evaluates whether there is probable cause to file a criminal case in court.
D. NBI or Other Investigative Agencies
For online fraud, identity theft, cybercrime, large-scale scams, foreign elements, or organized schemes, the victim may seek assistance from investigative agencies with cybercrime capability.
E. Bank or E-Wallet Provider
This is not a substitute for a criminal complaint, but it is essential for fund tracing and possible freezing.
F. Dating App or Social Media Platform
Reporting to the platform can help suspend the account and preserve platform-level records, but law enforcement may be needed to request deeper account information.
IX. Jurisdiction and Venue
Venue in criminal cases can be complicated when the victim, scammer, bank, server, or platform are in different places.
For practical purposes, the victim may begin by reporting in the locality where:
- the victim resides;
- the victim sent the money;
- the deceitful messages were received;
- the bank or e-wallet transaction occurred;
- the offender resides, if known;
- the damage was suffered.
Cybercrime may involve special rules because acts occur through electronic systems. Law enforcement and prosecutors can guide the victim on proper venue based on the complaint.
The victim should not delay reporting merely because venue is uncertain. Initial reporting can preserve evidence and generate referrals.
X. Preparing the Complaint-Affidavit
The complaint-affidavit is the victim’s sworn statement. It should narrate the facts clearly and attach evidence.
A. Structure of the Complaint-Affidavit
A good complaint-affidavit usually includes:
- personal information of the complainant;
- how the complainant met the scammer;
- the identity or online account of the scammer;
- the romantic relationship or trust-building stage;
- the false representations made;
- the specific requests for money or property;
- the dates and amounts sent;
- the payment channels and recipient accounts;
- what happened after payment;
- how the scam was discovered;
- efforts to recover the money;
- threats or blackmail, if any;
- total damage suffered;
- list of attached evidence;
- request for investigation and prosecution.
B. Tone and Style
The affidavit should be factual, chronological, and specific. Avoid unnecessary insults, speculation, or emotional exaggeration.
Instead of saying:
“He is evil and ruined my life.”
It is better to state:
“On 15 March 2026, he represented that he needed ₱25,000 for hospital expenses and promised to return the amount on 30 March 2026. Relying on this representation, I transferred ₱25,000 to GCash number ______ under the name ______. After receiving the money, he asked for more funds and later blocked me.”
C. Attachments
Attachments should be labeled clearly:
- Annex A: Screenshot of dating profile;
- Annex B: Messenger conversation;
- Annex C: Payment receipt dated ___;
- Annex D: Fake customs document;
- Annex E: Bank fraud report;
- Annex F: Demand message and refusal;
- Annex G: Threats to expose photos.
Organized attachments make the complaint easier to evaluate.
XI. Sample Timeline Format
A timeline helps investigators and prosecutors.
| Date | Event | Evidence |
|---|---|---|
| 5 Jan 2026 | Met suspect on dating app | Annex A |
| 10 Jan 2026 | Suspect claimed romantic interest and daily communication began | Annex B |
| 25 Jan 2026 | Suspect claimed he was sending a package | Annex C |
| 30 Jan 2026 | Fake courier demanded ₱18,000 clearance fee | Annex D |
| 31 Jan 2026 | Victim sent ₱18,000 to GCash account | Annex E |
| 3 Feb 2026 | Additional ₱35,000 demanded for customs penalty | Annex F |
| 4 Feb 2026 | Victim sent ₱35,000 | Annex G |
| 10 Feb 2026 | Suspect blocked victim | Annex H |
A clear timeline can show the pattern of deceit.
XII. Proving Deceit
For fraud-based complaints, proving deceit is essential. The complaint should show that the offender made false representations before the victim sent money.
Examples of evidence of deceit:
- scammer used fake identity;
- scammer used another person’s photos;
- scammer claimed to send package that never existed;
- fake courier demanded fees;
- scammer promised repayment but disappeared;
- scammer claimed emergency that was false;
- scammer used fake hospital bills;
- scammer used fake investment platform;
- scammer said money was needed for travel but never booked travel;
- scammer used the same story on other victims.
The victim should show cause and effect: because of the false statement, the victim sent money.
XIII. Proving Damage
Damage is usually proven through money transfers and receipts.
Prepare a summary:
| Transaction No. | Date | Amount | Payment Channel | Recipient | Reference No. |
|---|---|---|---|---|---|
| 1 | 31 Jan 2026 | ₱18,000 | GCash | Name / Number | Ref. No. |
| 2 | 4 Feb 2026 | ₱35,000 | Bank transfer | Name / Account | Ref. No. |
| 3 | 9 Feb 2026 | ₱12,500 | Remittance | Name | Ref. No. |
| Total | ₱65,500 |
This helps establish the amount claimed.
XIV. What If the Scammer’s Real Name Is Unknown?
A complaint may still be filed even if the scammer’s real name is unknown. The complaint may identify the offender by:
- username;
- phone number;
- email address;
- bank account;
- e-wallet account;
- remittance recipient name;
- social media URL;
- dating app profile;
- IP-related details if available;
- alias used.
Law enforcement may investigate the real identity behind these identifiers. Financial institutions and platforms may require formal legal process before disclosing account details.
The victim should avoid guessing identities without evidence.
XV. What If the Recipient Account Belongs to a Different Person?
This is common. The recipient account holder may be:
- the scammer;
- an accomplice;
- a money mule;
- a person whose account was rented;
- a person whose account was hacked;
- a fake or fraudulently opened account.
The complaint should include the recipient account details without assuming facts not yet proven. The account holder may be investigated to explain receipt and movement of funds.
XVI. What If the Scammer Is Abroad?
Many romance scammers operate from outside the Philippines. Filing a complaint may still be useful, especially if:
- the victim is in the Philippines;
- money passed through Philippine bank or e-wallet accounts;
- local mule accounts were used;
- accomplices are in the Philippines;
- the scammer used Philippine phone numbers or local accounts;
- the victim’s Philippine accounts were hacked.
Cross-border cases are harder, but local reporting creates an official record and may trigger coordination through proper channels.
XVII. What If the Victim Sent Money Voluntarily?
Scammers often argue that the money was voluntarily given as a gift. The victim must show that the transfer was caused by deceit, not pure generosity.
Evidence that the money was not a simple gift may include:
- promise to repay;
- emergency lie;
- fake package fees;
- fake investment;
- fake travel expenses;
- specific purpose stated by scammer;
- demand for additional fees;
- pressure tactics;
- fake documents;
- refusal to account for the money.
A voluntary transfer can still be fraudulent if consent was obtained through deception.
XVIII. Gifts, Loans, and Fraud
Romance scam cases often involve blurred lines between gifts, loans, and fraud.
A. Genuine Gift
If the victim freely gave money without false representation and without expectation of repayment, criminal recovery may be difficult.
B. Loan
If the victim lent money and the other person simply failed to repay, the matter may be civil unless there was fraud from the beginning.
C. Fraudulent Loan
If the borrower used false pretenses to obtain the loan and never intended to repay, estafa may be considered.
D. Scam Disguised as Romance
If the entire relationship was created to obtain money, the case is stronger as fraud.
The complaint should explain why the transaction was not a mere gift or ordinary failed loan.
XIX. Demand Letter Before Filing
A demand letter is not always required, but it can be useful when the suspect or recipient account holder is known.
A demand letter may:
- identify the amount owed;
- state the factual basis;
- demand return of money;
- set a deadline;
- preserve a record of refusal;
- support the claim that the victim tried to recover funds.
However, in urgent cybercrime, sextortion, or account freezing situations, do not delay reporting just to send a demand letter.
XX. Sextortion and Intimate Image Threats
If the romance scam involves threats to expose intimate images or videos, the victim should act carefully.
A. Do Not Pay More
Payment often leads to more demands.
B. Preserve Threats
Screenshot and save:
- threats;
- account names;
- payment demands;
- images or references used for blackmail;
- recipient accounts;
- deadlines or pressure messages.
C. Report Immediately
Sextortion is time-sensitive. Law enforcement may advise on preserving evidence and avoiding further exposure.
D. Secure Social Media
Increase privacy settings, warn trusted contacts if necessary, and report fake accounts.
E. Avoid Engaging Emotionally
Do not send more intimate content or personal information. Do not threaten revenge. Keep evidence.
XXI. When the Scammer Uses the Victim’s Photos or Identity
If the scammer uses the victim’s photos or identity to scam others, the victim should:
- report fake profiles;
- preserve screenshots of impersonation;
- notify contacts if necessary;
- file an identity theft or cybercrime report;
- report to platforms;
- secure accounts;
- prepare an affidavit stating that the victim did not authorize the use.
This is important because other victims may later trace the fake account to the innocent person whose photos were used.
XXII. Financial Institution Reports
Reporting to banks and e-wallets is essential but must be done properly.
The report should include:
- statement that the transaction was induced by fraud;
- transaction details;
- recipient account details;
- copies of receipts;
- screenshots of scam messages;
- request to freeze or hold funds if still available;
- request for investigation;
- request for written reference number.
Banks and e-wallets may not be able to return funds without due process, but the report helps preserve the trail.
XXIII. Chargeback and Reversal
If payment was made by credit card or debit card, the victim should immediately ask about chargeback or transaction dispute procedures.
Chargeback may be possible where:
- transaction was unauthorized;
- merchant was fraudulent;
- service was not provided;
- amount was misrepresented;
- fake platform processed payment.
Deadlines apply. Delay may defeat chargeback rights.
For bank transfers or e-wallet transfers personally authorized by the victim, reversal is usually more difficult, but prompt reporting is still important.
XXIV. Cryptocurrency Romance Scams
Romance scams increasingly involve cryptocurrency. The scammer may introduce a fake trading platform, ask the victim to buy crypto, or provide wallet addresses for payment.
Recovery is difficult because crypto transfers are generally irreversible. Still, preserve:
- wallet address;
- transaction hash;
- exchange used;
- chat instructions;
- screenshots of fake investment dashboard;
- deposit and withdrawal records;
- KYC records from exchanges, if available.
If a regulated exchange was used, law enforcement may request information through proper channels.
XXV. Romance Scam Combined With Investment Scam
Some romance scammers build trust and later invite the victim to invest in cryptocurrency, forex, online trading, casino platforms, or business ventures. This is sometimes called “pig butchering” in general fraud terminology, where the victim is emotionally groomed before larger financial exploitation.
Common features:
- romantic grooming;
- introduction to a profitable platform;
- small initial gains;
- encouragement to invest more;
- fake dashboard showing profits;
- withdrawal blocked;
- taxes or fees demanded;
- account frozen after victim stops paying.
The complaint should include both the romantic manipulation and the investment fraud mechanics.
XXVI. Romance Scam and Parcel Customs Fraud
In parcel scams, the victim may receive messages from a fake courier or customs agent. The complaint should include both the romantic scammer and the fake courier account if available.
Evidence should include:
- tracking number;
- courier website;
- email address;
- phone number;
- bank or e-wallet account;
- fake customs documents;
- payment demands;
- messages linking the scammer to the courier.
Legitimate customs fees are not paid to random personal e-wallet accounts.
XXVII. Romance Scam and Immigration or Travel Fraud
The scammer may claim to need money for immigration clearance, visa penalty, travel tax, anti-terror certificate, airport detention, or release from immigration custody.
The victim should preserve:
- fake travel itinerary;
- passport photo sent;
- ticket screenshots;
- airport messages;
- name of supposed immigration officer;
- payment demands;
- account details.
These documents may show falsification and deceit.
XXVIII. Romance Scam and Fake Military Identity
A common scheme involves a fake soldier. The scammer may claim that military rules prevent video calls, bank access, or direct communication.
Red flags include:
- asks for money for leave papers;
- claims commanding officer needs payment;
- claims military package is being sent;
- uses stolen uniform photos;
- cannot video call clearly;
- asks for secrecy;
- uses poor or inconsistent identity details.
Military identity documents sent online should not be trusted without independent verification.
XXIX. Romance Scam and Fake Hospital Bills
The scammer may send hospital photos, doctor messages, or medical bills. The victim should not send money without verification.
Evidence for complaint includes:
- hospital bill image;
- name of supposed hospital;
- doctor or nurse contact;
- payment account;
- chat history;
- later inconsistencies.
Fake medical emergencies can strongly show deceit.
XXX. Romance Scam and Fake Inheritance
The scammer claims to have inherited money but needs fees for lawyers, bank release, taxes, or court clearance. A fake lawyer or bank officer may contact the victim.
Evidence includes:
- fake legal documents;
- fake bank certificate;
- fake lawyer ID;
- payment demands;
- bank account details;
- messages promising repayment after inheritance release.
This often involves multiple fake personalities controlled by the same group.
XXXI. Filing With the Prosecutor: Procedure Overview
The typical process for a criminal complaint may involve:
- preparation of complaint-affidavit;
- attachment of evidence;
- filing before the prosecutor’s office or referral by law enforcement;
- docketing and assignment;
- subpoena to respondent, if identifiable;
- respondent’s counter-affidavit;
- complainant’s reply-affidavit, if needed;
- prosecutor’s resolution;
- filing of information in court if probable cause is found;
- court proceedings.
If the respondent is unknown, law enforcement investigation may be needed first to identify the offender.
XXXII. Filing With Law Enforcement: Procedure Overview
A victim reporting to law enforcement should expect to:
- present valid ID;
- narrate the facts;
- submit screenshots and receipts;
- provide digital copies;
- sign a complaint sheet or affidavit;
- identify accounts and phone numbers used;
- provide device access if needed for evidence viewing;
- receive a reference number or report record;
- cooperate in follow-up investigation.
The victim should ask what additional documents are needed and where the case will be referred.
XXXIII. Importance of Digital Evidence Integrity
Digital evidence can be challenged. Preserve integrity by:
- keeping original devices;
- not editing screenshots;
- saving full conversation threads;
- keeping metadata where possible;
- noting dates and times;
- backing up files;
- avoiding fake or reconstructed messages;
- preserving URLs;
- downloading receipts from official apps;
- printing and saving digital copies.
Do not fabricate evidence. False evidence can expose the complainant to liability.
XXXIV. Authentication of Screenshots
Screenshots may be accepted as part of evidence, but they may need authentication. The victim should be ready to testify that:
- the screenshots came from the victim’s own account or device;
- they accurately reflect the messages received;
- the account shown belongs to or was used by the scammer, based on the victim’s interactions;
- the screenshots were not altered;
- the payments were made in reliance on those messages.
Original device access can help support authenticity.
XXXV. If There Are Multiple Victims
Multiple victims strengthen the pattern of fraud. However, each victim should prepare their own affidavit and evidence.
Victims may coordinate, but they should avoid:
- harassing the suspect;
- publicly posting private data;
- making unsupported accusations;
- altering evidence;
- pressuring other victims to exaggerate;
- signing statements they did not personally verify.
A group complaint may be possible if facts are connected, but individual documentation remains important.
XXXVI. Public Posting and Cyberlibel Risks
Victims often want to post the scammer’s name, photos, account numbers, or accusations online. This may warn others but can create legal risks, especially if the wrong person is identified or statements go beyond provable facts.
Possible risks include:
- cyberlibel;
- defamation;
- data privacy complaints;
- harassment allegations;
- exposure of investigation details;
- retaliation by the scammer.
A safer approach is to report to authorities, banks, e-wallets, and platforms. If posting a warning, keep it factual, avoid unnecessary personal data, and do not state unproven allegations as final guilt.
XXXVII. Can the Victim Recover the Money?
Recovery is possible but not guaranteed.
Recovery is more likely when:
- the report is made immediately;
- funds remain in the recipient account;
- the recipient account holder is identifiable;
- the scammer is local;
- there is strong transaction evidence;
- the bank or e-wallet can freeze funds;
- the suspect agrees to restitution;
- a criminal or civil case succeeds.
Recovery is harder when:
- funds were withdrawn immediately;
- funds moved through multiple mule accounts;
- funds were converted to cryptocurrency;
- scammer is abroad;
- identity is fake;
- victim delayed reporting;
- evidence is incomplete;
- payments were sent as cash remittance to false identities.
Even when recovery is difficult, filing a complaint can help prevent further scams and may support future tracing.
XXXVIII. Civil Action for Recovery
A victim may pursue civil recovery in addition to or alongside criminal remedies, depending on the case.
Possible civil remedies include:
- recovery of sum of money;
- damages;
- restitution in the criminal case;
- small claims, if appropriate and the defendant is known;
- civil action based on fraud;
- action against recipient account holder if involvement is proven.
Civil recovery is practical only when the defendant is identifiable and has assets or funds that can be reached.
XXXIX. Small Claims
Small claims may be considered for straightforward money recovery against a known person, especially if the issue is a loan or sum of money.
However, romance scam cases often involve fraud, fake identities, cybercrime, or unknown defendants. If criminal fraud is central, the prosecutor or law enforcement route may be more appropriate.
Small claims cannot imprison the scammer. It is focused on money recovery.
XL. Affidavit of Desistance and Settlement
If the scammer offers to return the money, the victim should be careful before signing any affidavit of desistance or settlement.
Consider:
- Has full payment been made?
- Is the payment cleared and irreversible?
- Are there other victims?
- Did the scam involve threats or intimate images?
- Does the settlement waive all claims?
- Is the victim being pressured?
- Is the criminal offense one that the State may still prosecute?
An affidavit of desistance does not always automatically terminate a criminal case. Fraud affects public interest, especially if repeated or organized.
XLI. Role of Lawyers
A victim may file reports without a lawyer, but legal assistance is helpful when:
- the amount lost is large;
- the suspect is known;
- the case involves sextortion;
- the victim may have been used as a money mule;
- the scam involves cryptocurrency or foreign accounts;
- the victim wants to file directly with the prosecutor;
- civil recovery is being considered;
- there are threats, blackmail, or public exposure;
- the victim received a counter-threat of cyberlibel;
- the evidence is complex.
A lawyer can help draft affidavits, organize evidence, identify proper charges, and avoid harmful statements.
XLII. If the Victim Was Used as a Money Mule
A romance scammer may ask the victim to receive money from third parties and forward it. The victim may believe they are helping a romantic partner, but they may unknowingly receive proceeds from other victims.
If this happened, the victim should:
- stop all transfers immediately;
- preserve all instructions from the scammer;
- do not delete transaction records;
- consult legal counsel;
- report truthfully;
- avoid spending received funds;
- cooperate with authorities;
- document that the victim was deceived.
This situation is legally sensitive because other victims may complain against the account holder who received their money.
XLIII. If the Victim Shared Bank Details or OTPs
If the victim shared OTPs, passwords, card details, or remote access, immediate action is necessary:
- contact bank or e-wallet;
- freeze accounts or cards if needed;
- change passwords;
- revoke devices;
- file unauthorized transaction dispute, if applicable;
- report phishing or hacking;
- preserve messages where the scammer requested the OTP;
- file cybercrime report.
Even if the provider claims the victim was negligent, the scammer may still be criminally liable.
XLIV. If the Victim Sent Intimate Images
If intimate images were sent, the victim should:
- stop sending more content;
- save evidence of threats;
- report the account;
- secure social media privacy;
- consider telling trusted contacts to ignore suspicious messages;
- file a cybercrime or police report;
- seek support from trusted family, friend, lawyer, or counselor;
- avoid paying repeated demands.
Shame is a tool used by scammers. The victim should focus on safety and evidence.
XLV. If the Victim Is a Minor
If the victim is a minor, the case becomes more serious. Parents, guardians, social workers, child protection units, and law enforcement may become involved.
Issues may include:
- child exploitation;
- online sexual abuse or exploitation;
- grooming;
- extortion;
- identity theft;
- trafficking-related concerns;
- child protection remedies.
The child should not be blamed or shamed. Evidence should be preserved carefully, and reporting should be prompt.
XLVI. If the Scammer Threatens the Victim
Threats should be taken seriously. The victim should preserve threatening messages and report them.
Threats may include:
- harm to victim or family;
- exposure of intimate content;
- false reports to police;
- contacting employer;
- public humiliation;
- account hacking;
- doxxing;
- demands for silence.
The complaint should include screenshots and explain the fear or pressure caused by the threats.
XLVII. If the Victim Borrowed Money to Send to the Scammer
Victims sometimes borrow from banks, lending apps, friends, relatives, or employers to send money. The scam does not automatically erase the victim’s obligations to lenders.
The victim should:
- document that borrowed funds were lost to fraud;
- negotiate payment arrangements with legitimate lenders;
- avoid illegal lending or harassment traps;
- include borrowed amounts in damage summary;
- avoid taking new loans to recover old losses.
The criminal complaint may claim the total amount lost, but recovery is not immediate.
XLVIII. If the Scam Involves a Dating App
Dating app evidence should be preserved quickly because accounts may disappear. Save:
- profile screenshots;
- user ID;
- photos;
- messages;
- match date;
- phone numbers later used;
- links to other platforms;
- subscription or verification details, if any.
Report the account to the app, but only after preserving evidence.
XLIX. If the Scam Involves Facebook or Messenger
For Facebook or Messenger scams, preserve:
- profile URL;
- account name and username;
- profile photos;
- mutual friends;
- Messenger thread;
- payment instructions;
- deleted-message notices, if any;
- group pages used;
- marketplace posts;
- comments or testimonials.
Do not rely on profile name alone. Many profiles use fake names or stolen photos.
L. If the Scam Involves Telegram, WhatsApp, Viber, or Signal
Messaging apps may use phone numbers, usernames, or hidden profiles. Preserve:
- username;
- phone number;
- display name;
- profile photo;
- group links;
- chat export;
- payment instructions;
- voice notes;
- call logs.
Some apps allow deletion for both parties. Screenshot and export early.
LI. If the Scam Involves Remittance Centers
If money was sent by remittance, preserve:
- sender receipt;
- tracking or control number;
- recipient name;
- recipient phone number;
- branch or payout location, if known;
- date and time of claim;
- ID details if available through proper request;
- CCTV possibility, if reported quickly.
Law enforcement may request additional records from the remittance provider.
LII. If the Scam Involves Bank Transfer
Preserve:
- bank name;
- account number;
- account name;
- transfer receipt;
- reference number;
- transaction date and time;
- amount;
- receiving bank;
- fraud report ticket.
Ask the bank if a recall, hold, or investigation request is available.
LIII. If the Scam Involves GCash, Maya, or E-Wallets
Preserve:
- wallet number;
- account name;
- transaction receipt;
- reference number;
- date and time;
- amount;
- QR code used;
- chat instructions;
- fraud report ticket.
Report immediately. E-wallet funds can move quickly.
LIV. If the Scam Involves Cash Meet-Up
If the victim handed over cash to the scammer or an accomplice:
- identify location;
- date and time;
- description of person;
- CCTV sources nearby;
- witnesses;
- vehicle details;
- chat arranging meet-up;
- receipts or acknowledgment, if any.
Report quickly because CCTV footage may be overwritten.
LV. If the Scammer Is Personally Known
If the scammer is a real person known to the victim, the case may be easier to pursue but still requires evidence.
The complaint should distinguish:
- ordinary romantic financial support;
- loans;
- fraudulent requests;
- false representations;
- threats;
- refusal to return money;
- pattern of deception.
If the suspect lives in the same city or municipality, barangay conciliation may arise for some civil disputes, but serious fraud, cybercrime, threats, or offenses outside barangay jurisdiction should be brought to proper authorities.
LVI. Barangay Proceedings
Barangay proceedings may be relevant only in limited cases, such as a simple money dispute between persons in the same locality. However, romance scams involving cybercrime, unknown offenders, serious fraud, threats, extortion, or multiple victims should generally be reported to law enforcement or prosecutors.
A barangay blotter or settlement is not a substitute for a criminal complaint in serious cases.
LVII. Prescription and Delay
Criminal and civil claims have prescriptive periods. The period depends on the offense and facts. Victims should file as soon as possible.
Delay can weaken the case because:
- accounts may be deleted;
- records may be lost;
- CCTV may be overwritten;
- phone numbers may be abandoned;
- funds may be transferred;
- memories may fade;
- platforms may no longer retain data.
Prompt action improves both investigation and recovery chances.
LVIII. Protecting the Victim’s Privacy
Romance scam victims may fear humiliation. Complaints may involve intimate details, photos, or personal messages.
Victims may request sensitive handling, especially in sextortion or sexual exploitation cases. Evidence should be submitted only to proper authorities and not unnecessarily shared publicly.
When printing intimate evidence, place it in sealed or clearly labeled confidential annexes where appropriate.
LIX. Emotional Manipulation as Part of Fraud
Romance scams are psychologically manipulative. Scammers often use:
- love bombing;
- daily attention;
- future promises;
- jealousy;
- guilt;
- isolation from friends;
- urgency;
- secrecy;
- spiritual or family language;
- threats of self-harm;
- claims that “love means trust”;
- anger when questioned.
These facts may help explain why the victim relied on the scammer’s statements. The complaint may briefly describe the trust-building process, especially if the scammer argues that the transfers were voluntary gifts.
LX. Red Flags That Support the Complaint
The following red flags may support the conclusion that the relationship was fraudulent:
- refusal to video call clearly;
- inconsistent identity details;
- immediate intense romance;
- requests for secrecy;
- repeated emergencies;
- payments to different names;
- fake courier or lawyer involvement;
- refusal to meet in person;
- poor explanations for not accessing own money;
- pressure to send money immediately;
- request for OTPs or passwords;
- fake investment profits;
- threats after refusal to pay;
- disappearance after money is sent;
- same photos found under another name.
Include relevant red flags in the affidavit if supported by evidence.
LXI. What Not to Do
Victims should avoid:
- sending more money;
- deleting messages;
- fabricating evidence;
- pretending a voluntary transfer was unauthorized if it was not;
- publicly accusing the wrong person;
- threatening violence;
- giving the scammer more personal information;
- signing settlement documents without payment;
- accepting suspicious refunds from unrelated accounts;
- allowing the scammer to use the victim’s bank account;
- ignoring bank or e-wallet report deadlines;
- delaying complaint due to embarrassment.
LXII. Practical Complaint Checklist
Before filing, prepare:
- valid government ID;
- complaint-affidavit;
- timeline of events;
- list of suspects, aliases, and accounts;
- screenshots of profiles and chats;
- transaction receipts;
- bank or e-wallet report reference numbers;
- fake documents sent by scammer;
- demand letter, if any;
- proof of refusal or blocking;
- total loss computation;
- digital copies on USB or cloud folder, if accepted;
- printed copies of key evidence;
- list of witnesses;
- device containing original messages.
LXIII. Suggested Organization of Evidence Folder
Organize files like this:
- 01_Complaint_Affidavit
- 02_Timeline
- 03_Profile_and_Identity
- 04_Chat_Screenshots
- 05_Payment_Receipts
- 06_Fake_Documents
- 07_Threats_or_Extortion
- 08_Bank_EWallet_Reports
- 09_Demand_and_Response
- 10_Other_Victims_or_Witnesses
Clear organization helps investigators and prosecutors understand the case quickly.
LXIV. Possible Outcomes
After filing, possible outcomes include:
- investigation continues;
- suspect is identified;
- bank or e-wallet records are requested;
- account is frozen, if funds remain and legal basis exists;
- prosecutor finds probable cause;
- case is filed in court;
- complaint is dismissed for insufficient evidence;
- suspect offers settlement;
- victim is asked for additional documents;
- case is referred to another jurisdiction;
- foreign coordination is needed.
Dismissal does not always mean the scam did not happen. It may mean evidence was insufficient, identity was not established, or the wrong remedy was used.
LXV. Recovery Expectations
Victims should be realistic. Filing a complaint is important, but recovery may take time. Immediate refund is not guaranteed.
The best chance of recovery comes from:
- fast reporting;
- freezing funds before withdrawal;
- identifying local recipients;
- strong documentation;
- multiple victims coming forward;
- suspect settlement;
- successful criminal or civil case.
If funds are already gone, the case may still proceed criminally, but actual collection can be difficult.
LXVI. Prevention After Filing
After filing, victims should protect themselves from follow-up scams. Some scammers pretend to be recovery agents, hackers, lawyers, police officers, or government contacts who can recover the money for a fee.
Be cautious of anyone saying:
- “Pay me and I will hack the scammer.”
- “I know someone in the bank who can reverse it.”
- “You must pay processing fees for recovery.”
- “Your money is frozen but needs clearance.”
- “I am an investigator; send money for documents.”
Recovery scams often target previous victims.
LXVII. Conclusion
Filing a criminal complaint for romance scam in the Philippines requires more than saying that a relationship ended badly. The complaint must show fraud, deceit, unlawful threats, identity misuse, cybercrime, or another criminal act. The strongest complaints are supported by clear evidence: messages, fake profiles, false representations, transaction receipts, account details, threats, fake documents, and a chronological affidavit.
The victim should act quickly. Money transferred through banks, e-wallets, remittance centers, or cryptocurrency can disappear rapidly. Immediate reporting to the financial provider, preservation of digital evidence, and filing with law enforcement or the prosecutor can improve the chances of identifying the offender and recovering funds.
Romance scams are emotionally painful because they exploit trust, affection, and vulnerability. But embarrassment should not prevent reporting. The law may provide remedies when love was used as a tool for fraud. The safest course is to stop paying, preserve evidence, secure accounts, report promptly, and pursue the complaint through proper legal channels.