How to File a Cybercrime Complaint in the Philippines

In the digital age, the Philippine legal system has evolved to address the complexities of crimes committed through information and communications technologies (ICT). The primary legislation governing these offenses is Republic Act No. 10175, otherwise known as the Cybercrime Prevention Act of 2012. This guide outlines the comprehensive process, jurisdictional mandates, and evidentiary requirements for filing a formal complaint.


1. Legal Basis and Jurisdictional Authorities

The law recognizes several categories of cybercrime, including offenses against the confidentiality and integrity of computer data (hacking, data interference), computer-related offenses (identity theft, fraud), and content-related offenses (cyber libel, online child abuse).

To file a complaint, victims may approach three primary government bodies:

  • Philippine National Police - Anti-Cybercrime Group (PNP-ACG): Headquartered at Camp Crame, Quezon City, with Regional Satellite Offices nationwide. It is the primary first responder for immediate police assistance.
  • National Bureau of Investigation - Cybercrime Division (NBI-CCD): Located at the NBI Main Building in Manila and through its regional offices. The NBI is often preferred for complex investigations involving financial syndicates or transnational elements.
  • Cybercrime Investigation and Coordinating Center (CICC): An inter-agency body under the DICT that provides technical coordination and operates the 1326 Scam Watch hotline for real-time reporting of online fraud.

2. Step-by-Step Filing Procedure

Filing a cybercrime complaint is a formal process that shifts from initial reporting to a criminal investigation.

Phase I: Evidence Preservation

Before contacting authorities, you must secure digital evidence. Under the Rules on Electronic Evidence (REE), digital data is fragile and easily altered.

  • Screenshots: Capture full-screen images showing the perpetrator’s profile, URLs, timestamps, and the specific offensive content.
  • Links: Copy the direct Permanent Link (URL) of the post or profile.
  • Transaction Records: Save e-receipts, SMS alerts, and reference numbers for financial fraud.
  • Logs: For hacking, preserve system logs or login history notifications.

Phase II: The Complaint-Affidavit

You must execute a Complaint-Affidavit, which is a sworn written statement detailing the facts of the case. It should include:

  1. Narrative: A chronological account of what happened, when, and how.
  2. Identifiers: Any known handles, IP addresses, mobile numbers, or email addresses used by the suspect.
  3. Annexes: Labeled evidence (e.g., "Annex A: Screenshot of the threat").

Phase III: Agency Intake

You may report via online portals (e.g., the CICC or PNP-ACG website) or walk-in.

  • In-person: Bring your printed evidence and a valid government ID.
  • Verification: An investigator will conduct an initial interview and verify the digital trail.
  • Forensics: If necessary, you may be asked to surrender your device temporarily for a forensic mirror-image to ensure the evidence is court-admissible.

3. Evidentiary Standards and Digital Forensics

The "Best Evidence Rule" applies differently in cybercrime. A printout of a screenshot is considered a functional equivalent of an original document under the REE, provided the integrity of the data can be authenticated.

Authorities use Digital Forensic Examination to:

  • Trace the source (IP tracking).
  • Verify the authenticity of electronic messages.
  • Recover deleted data that might serve as "smoking gun" evidence.

4. Special Considerations: Cyber Libel

A significant development in Philippine jurisprudence (reiterated in 2024-2026 rulings) concerns the Prescriptive Period for Cyber Libel.

  • Duration: The Supreme Court has clarified that Cyber Libel prescribes in one (1) year from the time the offended party discovers the publication.
  • Penalty: Unlike traditional libel, Cyber Libel carries a penalty one degree higher, making it a non-bailable offense if the maximum penalty exceeds six years.

5. Summary of Key Steps for Victims

Step Action Objective
1 Do Not Delete Maintain the digital trail; do not block the suspect immediately if it deletes the chat history.
2 Report to Platform Use the "Report" button on Facebook/Instagram to trigger the platform's internal moderation.
3 Visit PNP/NBI Provide your Sworn Statement to initiate the criminal machinery.
4 Prosecution Once the agency finds merit, the case is endorsed to the Department of Justice (DOJ) for Preliminary Investigation.

Important Warning

Avoid "online vigilante" justice. Posting the suspect’s identity before a case is filed can expose you to counter-suits for cyber libel or violations of the Data Privacy Act (RA 10173). Always allow law enforcement to handle the identification and apprehension of suspects through legal warrants (e.g., Warrant to Disclose Computer Data).

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.