How to File a Case Against an Online Scammer Impersonating a “Foreigner” (Philippine Guide)
This is general information for Philippine readers and not a substitute for legal advice. If you can, consult a lawyer early—especially when money or sensitive data is involved.
The short version
- Secure and preserve evidence (don’t delete chats; export copies; keep originals).
- Identify the offense(s) (estafa, computer-related identity theft, etc.).
- Report immediately to NBI Cybercrime Division or PNP Anti-Cybercrime Group for case build-up and data preservation orders.
- Prepare a complaint-affidavit (with annexes) and file with the Office of the City/Provincial Prosecutor that has venue.
- Pursue related remedies (bank/e-wallet disputes, Data Privacy complaint, platform takedowns).
- Follow the preliminary investigation through to the filing of an Information in the proper Regional Trial Court (Special Cybercrime Court).
- Claim civil damages in the criminal case, or file a separate civil/small-claims action.
What crimes typically apply
An online scammer “posing as a foreigner” doesn’t change the nature of the offense; the law looks at acts and results, not the nationality they claim. These are the usual bases:
Estafa (swindling) under the Revised Penal Code (RPC, Art. 315) – deceit + damage (e.g., you were induced to send money/goods). When estafa is done through ICT (apps, social media, e-wallets, email), the Cybercrime Prevention Act of 2012 (RA 10175, Sec. 6) generally makes the penalty one degree higher.
Computer-Related Identity Theft (RA 10175, Sec. 4(b)(3)) – “acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another, without right.” If the scammer used a real person’s name/photos/passport—especially a real foreigner—this fits.
Computer-Related Fraud (RA 10175, Sec. 4(b)(2)) – manipulation of computer data or systems with fraudulent intent.
Using a fictitious name / concealing true name (RPC, Art. 178) – often added where appropriate.
If applicable, special laws:
- Data Privacy Act (RA 10173) – unauthorized processing or misuse of personal data.
- Access Devices Law (RA 8484) – if credit/debit cards or access devices are abused.
- Anti-Photo and Video Voyeurism (RA 9995) or Anti-Child Pornography (RA 9775) – if “sextortion” or sexual images are involved.
Tip: You don’t have to pick only one. Prosecutors often combine estafa (for the loss) with computer-related identity theft/fraud (for the online modality).
Jurisdiction, venue, and cross-border issues
- You can file in the Philippines if any element occurred here (e.g., you received the deceiving messages here, sent money from here, or suffered loss here).
- RA 10175 allows extraterritorial application in several scenarios (e.g., when a Filipino or a Philippine computer system is involved), which helps if the scammer is abroad.
- Criminal complaints are first filed with the City/Provincial Prosecutor for preliminary investigation. Trials go to Regional Trial Courts designated as Special Cybercrime Courts.
- If the scammer is unknown (“John/Jane Doe”), you may still open a case and request law-enforcement build-up (subpoenaing platforms, telcos, banks/e-wallets).
- Barangay conciliation usually does not apply to cybercrime (different localities, unknown address, or offenses punishable by more than 1 year).
Evidence: what to keep, how to preserve, and why it matters
Under the Rules on Electronic Evidence, electronic documents are admissible if you can show authenticity and integrity. Do this:
Capture and preserve
- Keep originals on your device/service. Don’t edit or “forward” as your sole copy.
- Export chats/messages (Telegram/FB/WhatsApp/IG), download email headers, and save HTML/PDF copies.
- Screenshots are fine as working copies, but keep the native files too. Try to capture the system clock in screen recordings.
- Save filenames with dates; keep a simple log (who/what/when/how much).
- Bank/e-wallet proofs: receipts, reference numbers, transaction IDs; if crypto, TXIDs and wallet addresses.
- Account links: profile URLs/handles, phone numbers, email addresses, IPs (if any), courier receipts, GCASH/Maya reference nos., etc.
Avoid spoliation
- Don’t block or delete until you’ve captured the content.
- Don’t “clean” your device. Forensic artifacts (cookies, logs) can help tie the account to a person.
Move fast on data preservation
- Ask NBI/PNP to issue preservation requests to platforms/telcos/banks under RA 10175 (Sec. 15) so logs aren’t auto-deleted.
- Because of the SIM Registration Act (RA 11934), subscriber data may be traceable (subject to due process, e.g., subpoena/court order).
Exactly where to go and what to file
1) Law-enforcement intake (recommended first)
NBI Cybercrime Division or PNP Anti-Cybercrime Group: bring your ID, narrative, and evidence bundle.
They can:
- Help identify offenses and prepare a complaint-affidavit;
- Seek preservation and later disclosure of platform/telco/bank records;
- Coordinate case build-up (e.g., tracing e-wallet KYC, IP logs, CCTV at cash-out points).
2) Prosecutor’s Office (criminal case)
File a Complaint-Affidavit with annexes at the Office of the City/Provincial Prosecutor where any element occurred (e.g., where you sent the funds, where you received the deceitful message).
What to submit:
- Complaint-Affidavit (notarized/subscribed before the prosecutor) narrating facts chronologically;
- Annexes: compiled evidence with exhibit labels;
- Witness affidavits, if any;
- IDs and proof of authority if you represent a company.
Preliminary investigation follows: the prosecutor subpoenas respondents, receives counter-affidavits, and issues a Resolution. If probable cause is found, an Information is filed in court.
3) Parallel remedies (often at the same time)
- Bank/e-wallet dispute/chargeback/fraud report: earlier is better; provide your police/NBI reference if available.
- Data Privacy Complaint (National Privacy Commission) if your personal data was misused or disclosed.
- Platform takedown: report the account/profile/pages and submit your police/NBI reference.
- Civil action: You may (a) let civil liability be included in the criminal case, (b) file a separate civil action for damages (Civil Code Arts. 19/20/21, or quasi-delict), or (c) use Small Claims (useful for purely money claims up to the current small-claims ceiling; check the latest limit before filing).
Penalties and money recovery, in plain terms
- Estafa penalties scale with the amount defrauded (the thresholds were adjusted by RA 10951). If done via ICT, expect a one-degree higher penalty under RA 10175.
- Computer-related identity theft/fraud are punishable with imprisonment and fines under RA 10175.
- Civil damages may be awarded (actual loss, moral/exemplary damages, attorney’s fees).
- Asset freezing/forfeiture can be pursued via law enforcement and, where appropriate, the AMLC (especially for larger or patterned transactions).
Step-by-step checklist (you can literally follow this)
- Make a working evidence folder. Put raw exports, screenshots, receipts, and a simple timeline.
- List every identifier tied to the scammer (usernames, URLs, phone/email, bank/e-wallet details, courier info, crypto wallets).
- Compute your loss (principal + fees/shipping/forex).
- Report to NBI/PNP; request data preservation on platforms/telcos/banks/e-wallets.
- Draft your Complaint-Affidavit (see template below) and file with the Prosecutor (bring original ID; sign before prosecutor or a notary).
- Submit platform/bank reports and note reference numbers.
- Track the prosecutor’s subpoena (ask for the IS/Case number) and respond to any clarifications.
- If identity becomes known, law enforcement may apply for cyber warrants (search/seizure/disclosure of computer data) to complete attribution.
- Decide on civil strategy (join in the criminal case or file separate/small-claims).
- Keep all communications from authorities and service providers in your folder.
Venue pointers (to avoid dismissal)
- You can generally file where you sent the money, received the deceit, kept your affected account, or where a device used in the offense is located.
- If multiple places are involved, pick one and justify it in your affidavit (“I sent ₱___ from my bank in ___ City; I received the deceitful messages in ___ City”).
- If the respondent is unknown or abroad, say so and emphasize that elements and loss occurred in the Philippines.
Practical affidavit template (fill-in outline)
Title: Complaint-Affidavit for Estafa (Art. 315), Computer-Related Identity Theft and Fraud (RA 10175) Complainant: [Your full name], Filipino, of legal age, [civil status], with address at [complete address]. Respondent/s: [Name/s if known], a.k.a. “[username/handle]”, and John/Jane Doe.
- Introduction. I am filing this Complaint-Affidavit to charge the Respondent/s with Estafa under Article 315 of the RPC, in relation to RA 10175, and Computer-Related Identity Theft/Fraud under RA 10175, as the facts show.
- Chronology. (Dates/times; where you were; platform used; what they said; why you believed them; amounts sent; where/how sent; delivery/non-delivery.)
- Impersonation details. (State that Respondent pretended to be a foreign national; attach screenshots/links; if a real person was impersonated, note proof.)
- Loss/Damage. (Exact amounts; attach proofs; emotional distress if claiming moral damages in civil aspect.)
- Elements of the offenses. (Tie facts to deceit + damage; use of ICT; unauthorized use of identity/information.)
- Venue/Jurisdiction. (Why the prosecutor has venue; where elements occurred.)
- Reliefs. (Find probable cause; file Information in court; issue subpoenas to platforms/telcos/banks to identify Respondent and secure records; include civil liability.)
Annexes: A – Chat export; B – Screenshots; C – Transaction receipts; D – Platform report receipts; E – Your ID; F – Any witness affidavit; G – Proof that the identity used belongs to someone else (if available).
Jurat: (Subscribed and sworn to before the prosecutor/notary, with ID details and date.)
Common fact patterns and how they map to charges
- Romance/“US soldier/engineer” scam → Estafa + Computer-Related Identity Theft; sometimes Data Privacy if your photos/data were harvested and reused.
- Investment/crypto flipping with bogus “foreign fund manager” → Estafa + Computer-Related Fraud; possibly Securities issues if public solicitation (report also to SEC).
- Parcel/customs fee ruse (“I sent gifts from abroad; pay clearance”) → Estafa; supporting evidence: fake airway bills, fake BOC emails.
- Sextortion by “foreigner” → Estafa (if money extorted), Anti-Voyeurism (RA 9995), and RA 10175 offenses.
- Account takeovers leading to requests to your friends → Illegal Access + Computer-Related Identity Theft + Estafa.
Timelines, costs, and expectations
- No filing fee for criminal complaints; you’ll spend for printing/notarization and (optionally) counsel.
- Preliminary investigation often takes weeks to a few months. Complex cyber attributions can take longer—hence the value of early preservation.
- Recovery of funds is not guaranteed, but quick bank/e-wallet reports, asset freezing, and civil claims increase your chances.
Good practices that strengthen your case
- Name your files sensibly (e.g.,
2025-08-31_GCash_Ref123456.pdf
). - Authenticate exports (email headers, chat exports) and keep device originals.
- Keep an event log (date–action–who you spoke with–reference numbers).
- Don’t negotiate with the scammer once you decide to pursue a case—stop contact after preservation.
- Don’t publicly dox; let authorities handle it (defamation and privacy issues can boomerang).
FAQs
Q: I never learned the real identity. Can I still file? Yes. File against John/Jane Doe with all available identifiers. Law enforcement can subpoena platforms/telcos/banks for KYC/IP logs.
Q: What if I sent money via e-wallet or remittance? Keep reference numbers and time stamps. Those enable tracing to cash-out points and KYC’d accounts.
Q: Can I sue for damages only? Yes. You can reserve the civil action in the criminal case or file separately (including Small Claims for purely money claims up to the current ceiling).
Q: The scammer used my photos/name to fool others. You may file Computer-Related Identity Theft and a Data Privacy complaint, plus request platform takedowns.
Final reminders
- Speed matters. Platform and telco logs can expire—ask for preservation right away.
- Completeness beats volume. A clean timeline + clearly labeled exhibits persuades prosecutors.
- Stay safe. If threats arise, keep copies off-device and inform authorities.
If you want, I can turn this into a fillable complaint-affidavit template and a one-page evidence checklist you can print and use.