How to File Case Against Online Scammer Impersonating Foreigner

How to File a Case Against an Online Scammer Impersonating a Foreigner (Philippine Guide)

This practical guide is written for victims, counsel, and investigators operating in the Philippines. It outlines the laws, evidence rules, jurisdiction, and step-by-step procedure to bring a case when a scammer “catfishes” or pretends to be a foreign national.


1) What conduct is punishable?

Typical fact patterns:

  • Romance/relationship scams using photos of a foreigner and promises of marriage, gifts, or “emergency” remittances.
  • Investment/job/parcel scams where a fake foreign CEO, engineer, soldier, or oil-rig worker asks for fees, taxes, or “clearance” payments.
  • Account takeovers (e.g., messaging apps) pretending to be your foreign friend or boss to request urgent money.
  • Impostor domains and pages (e.g., “firstname-lastname-global.com”) used to solicit funds or private data.

Key legal angles:

  • Deceit to obtain money or property (estafa).
  • Use of a real person’s identity or likeness (computer-related identity theft).
  • Fake online profiles, spoofed emails, and forged e-receipts (computer-related fraud/forgery).
  • Domains or pages built around someone’s name to profit or mislead (cybersquatting).

Note: The fact that the persona is a “foreigner” is legally incidental; what matters is the deceit and use of ICT. The real person whose identity was hijacked may also be a separate complainant.


2) Governing laws (Philippine context)

  • Revised Penal Code (RPC)

    • Estafa (Art. 315) – swindling through deceit, causing damage (e.g., sending money).
    • Use of fictitious/assumed name (Art. 178) and falsification provisions may apply depending on acts.
  • Cybercrime Prevention Act of 2012 (RA 10175)

    • Penalizes computer-related identity theft, computer-related fraud, illegal access, computer-related forgery, and cybersquatting.
    • Penalty uplift: crimes committed through ICT (e.g., online estafa) are generally punished one degree higher than their RPC counterparts.
    • Jurisdiction: broad—covers offenses when any element occurs in the Philippines, when a Philippine computer system is used, when damage is suffered in the Philippines, or when committed by a Filipino even abroad.
    • Data preservation: service providers must preserve traffic data for a limited period upon lawful request—move quickly.
  • Rules on Electronic Evidence (A.M. No. 01-7-01-SC)

    • Electronic documents and printouts (screenshots, chats, emails, website captures) are admissible if properly authenticated.
  • Rule on Cybercrime Warrants (A.M. No. 17-11-03-SC)

    • Courts may issue preservation, disclosure, search, seizure, and examination orders for computer data (often called “cyber warrants”).
  • Data Privacy Act of 2012 (RA 10173)

    • For unauthorized processing or misuse of personal data (useful when your identity was hijacked). The National Privacy Commission (NPC) can investigate and direct compliance/sanctions.
  • Access Devices Regulation Act (RA 8484)

    • If credit/debit cards or similar access devices are involved.
  • Special laws (situational)

    • Anti-Photo and Video Voyeurism (RA 9995) or OSAEC (RA 11930) if sexual extortion or minors are involved.
    • Anti-Cyber Libel may protect the real person being defamed; it’s separate from your fraud case.

3) Where and how to report (criminal track)

Primary agencies:

  • PNP Anti-Cybercrime Group (PNP-ACG) – police investigations, preservation requests, entrapment operations when feasible.
  • NBI Cybercrime Division – parallel national investigative authority.
  • Department of Justice (DOJ–Office of Cybercrime) – coordination, prosecutions, and international legal assistance.
  • Office of the City/Provincial Prosecutor (OCP/OPP) – files the criminal case in court after preliminary investigation.

Venue/Jurisdiction tips

  • You may file with law enforcement where you reside, where the deceit was received, or where payment was sent/received.
  • Cybercrime cases go to designated Cybercrime courts (RTC) after the prosecutor files the Information.

4) Evidence you should preserve (immediately)

Create a read-only archive and keep the chain of custody clear.

  • Identity artifacts: profile URL/handle, display name, bio, phone numbers, email addresses, wallet IDs, domain WHOIS, IPs (if available).
  • Conversation logs: entire chat/email threads, including headers and timestamps. Export originals (HTML/JSON/EML) if you can; also take date-stamped screenshots.
  • Money trail: deposit slips, bank/e-wallet (GCash/Maya/etc.) transaction history, remittance receipts, tracking numbers, courier waybills, QR codes, crypto tx hashes.
  • Devices & links: links to posts, groups, pages; any files they sent (PDF invoices, images, voice notes).
  • Your notes: a short timeline—who said what, when you sent money, amounts, and how you discovered the impersonation.

Authenticating e-evidence

  • Capture full-page screenshots (with URL bar and system time visible).
  • Export platform data downloads (e.g., “Download your information”).
  • Keep original files; store hashes (optional but helpful).
  • Be ready to testify that the screenshots/exports are faithful copies from your device/account.

5) Freezing the funds (time-critical)

  • Immediately notify your bank/e-wallet via their fraud desk; request a hold/freeze on the beneficiary account and file a transaction dispute.
  • Provide your police/NBI reference number and all supporting evidence.
  • Ask law enforcement to issue letters to the financial institution and, where needed, to coordinate with the AMLC for possible freeze orders on suspect/mule accounts.

The sooner you act, the higher the chance of recovery. Money mules may be separately criminally liable even if “not the mastermind.”


6) Step-by-step: Building and filing your case

A) Takedown & preservation (parallel to criminal filing)

  1. Report the fake profile/domain to the platform or registrar (identity theft/impersonation).
  2. Request preservation of logs/content. Law enforcement can send formal preservation orders; don’t delay.

B) Law-enforcement report

  1. Go to PNP-ACG or NBI. Bring valid ID and your evidence pack.
  2. Give a succinct narrative: (a) how the impostor presented themself as a foreigner, (b) what you were told, (c) amounts sent, (d) where and when.
  3. Obtain a blotter/acknowledgment and case reference.

C) Complaint-Affidavit (for the Prosecutor)

Prepare and notarize a Complaint-Affidavit with annexes. Core contents:

  • Your identity & capacity.
  • Chronology of facts (dates, platforms, messages, payments).
  • Offenses charged (e.g., Estafa under RPC; Computer-Related Identity Theft/Fraud under RA 10175; other applicable laws).
  • Elements satisfied (point facts to each element).
  • Damages (total loss + incidental expenses).
  • Prayer (issuance of subpoenas; filing of Informations; restitution; further investigation as needed).

Filing with the OCP/OPP starts preliminary investigation. The respondent gets a subpoena and may file a Counter-Affidavit. The prosecutor will issue a Resolution; if probable cause is found, an Information is filed in the RTC (Cybercrime Court).


7) Civil remedies (recover the money)

  • Independent civil action for damages (Civil Code Arts. 19/20/21) or attach civil liability to the criminal case.
  • Small Claims may be available if your total is within the current threshold (ask the clerk of court for the latest limit and requirements). Small claims are document-driven and no lawyers are required.
  • You can sue mule account holders who received/withdrew your funds—even if they claim they were “just asked to help.”

8) If the scammer is overseas

  • You can still file in the Philippines if any element occurred here or damage was suffered here.
  • DOJ, NBI, and PNP can pursue mutual legal assistance and cooperate with foreign LE for data, service of process, or arrests (subject to treaties and local laws).
  • Expect longer timelines; strong evidence and quick preservation requests are crucial.

9) Common defenses & how to counter them

  • “It was a gift/loan.” → Keep messages showing inducement and deceit (promises, fabricated emergencies).
  • “I wasn’t the user of that account.” → Seek subscriber info, login logs, and CCTV/withdrawal evidence against mule accounts via cyber warrants.
  • “No intent to defraud.” → Highlight pattern (multiple victims, scripted pitches, fake docs, immediate cash-outs).

10) Practical do’s and don’ts

Do

  • Act within weeks, not months—data retention windows are short.
  • Keep all originals and a clean, numbered annex file.
  • Coordinate bank/e-wallet freezes the same day you discover the fraud.

Don’t

  • Pay more to “unlock/refund” funds—classic double-dip.
  • Doxx or hack back (you could commit crimes yourself).
  • Destroy or overwrite devices used to communicate.

11) Simple evidence checklist (clip & use)

  • Valid ID (complainant)
  • Timeline (1–2 pages)
  • Screenshots/exports of the impostor profile/page
  • Full chat/email threads (raw exports + screenshots)
  • Proof of payments (receipts, bank/e-wallet statements)
  • List of accounts/phones/emails used by scammer
  • Any witness statements
  • Platform takedown reports / reference numbers
  • Bank dispute or case numbers
  • Notarized Complaint-Affidavit + Annexes

12) Template: Complaint-Affidavit (sample language)

REPUBLIC OF THE PHILIPPINES [City/Province]

COMPLAINT-AFFIDAVIT

I, [Name], Filipino, of legal age, with address at [address], after having been duly sworn, depose and state:

  1. I am the complainant in this case for Estafa under Article 315 of the RPC and violations of RA 10175 (Computer-Related Identity Theft and Fraud).
  2. On [dates], a person using the name [Impostor Name] represented themself online as [describe “foreigner” persona], and induced me to send money/items through [platforms] on the false pretense of [romance/investment/parcel/job].
  3. Relying on such misrepresentations, I sent ₱[amount] via [bank/e-wallet/remittance] on [dates] to [account details].
  4. I later discovered that the persona and documents were false and that I was defrauded.
  5. Attached as Annexes “A” to “__” are true and faithful copies of the impostor’s profile, chats/emails, payment proofs, and other corroborating evidence.
  6. The acts constitute deceit causing damage (elements of Estafa), committed through ICT (penalty one degree higher), and include computer-related identity theft/fraud under RA 10175. PRAYER: I respectfully pray that subpoenas be issued, the case be filed in court, and the accused be held criminally liable with restitution of my losses.

[Signature over Printed Name] Affiant

SUBSCRIBED AND SWORN to before me this [date] at [city]. [Notary Public]


13) Costs, timing, and expectations

  • Filing a criminal complaint is generally free; you’ll spend for notarization, certified copies, and optional private counsel.
  • Asset recovery is uncertain; results improve with fast freezes, identifiable mule accounts, and platform cooperation.
  • Timelines vary widely; cross-border cases take longer.

14) When the foreigner’s identity is the one hijacked

  • The real foreigner can file their own complaint (identity theft, defamation), or issue an Apostilled affidavit/Special Power of Attorney if abroad to authorize a Philippine lawyer/representative.
  • Platforms often act faster on impersonation reports from the person being impersonated—coordinate with them.

15) Quick FAQ

Q: Do I need to confront the scammer or set up a sting? A: No. Work with PNP-ACG/NBI; civilians should not run entrapments.

Q: The account holder is a “money mule”—do I still file? A: Yes. Mules are often charged and can lead investigators up the chain.

Q: Can I sue even if I only sent a small amount? A: Yes. Criminal liability does not depend on size, though penalties scale; small amounts may fit Small Claims for civil recovery.


16) Final pointers (to maximize your chances)

  • Speed + Documentation win cyber cases.
  • File bank freezes and LEO reports the same day you confirm the scam.
  • Build your case around elements of the offense; don’t just narrate—prove deceit, reliance, damage, and ICT use.
  • Keep everything organized (Annex tabs, index, and timeline).
  • If unsure, consult counsel—especially for cross-border aspects and to push for cyber warrants.

Disclaimer: This is general information for the Philippine setting and not a substitute for tailored legal advice. If you’d like, I can turn this into a printable checklist pack (timeline template + annex index + affidavit in editable form).

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.