How to Report a Crypto Scam Group in the Philippines

The meteoric rise of digital assets has brought a parallel surge in sophisticated financial crimes. In the Philippines, cryptocurrency scam groups have evolved from rudimentary phishing operations into highly structured syndicates. Operating primarily through encrypted communication channels such as Telegram, WhatsApp, Discord, and Facebook Messenger, these groups orchestrate complex fraudulent schemes—ranging from "pig-butchering" (romance/investment hybrids) to fake decentralized finance (DeFi) platforms and unregistered token offerings.

For victims seeking justice and financial recovery, navigating the intersection of decentralized technology and traditional Philippine jurisprudence can be daunting. This legal article delineates the comprehensive framework, evidentiary requirements, and multi-agency reporting procedures necessary to hold these illicit groups criminally and civilly liable.


I. The Philippine Legal and Regulatory Framework

Cryptocurrency transactions are not beyond the reach of law enforcement. The Philippine legal framework tackles crypto fraud through a combination of traditional penal statutes, cybercrime legislation, and securities regulations.

1. Cyber-Estafa (Art. 315, RPC in relation to Sec. 6, R.A. 10175)

The primary criminal charge against crypto scam groups is Estafa (Swindling) under Article 315 of the Revised Penal Code (RPC). When fraud is perpetrated through information and communications technologies (ICT), Section 6 of the Cybercrime Prevention Act of 2012 (Republic Act No. 10175) applies. This statutory provision automatically increases the penalty by one degree, exposing perpetrators to significantly higher prison sentences.

2. Violations of the Securities Regulation Code (R.A. 8799)

Many crypto scam groups solicit funds under the guise of "passive trading bots," "staking pools," or "guaranteed high-yield investment programs." Under Philippine jurisprudence, if a token or digital asset scheme involves an investment of money in a common enterprise with a reasonable expectation of profits primarily from the efforts of others, it constitutes an Investment Contract (the Howey Test, adopted in SEC vs. Prosperity.Com, Inc.).

  • Operating such a scheme without a license violates Section 8 (Requirement of Registration of Securities) and Section 26 (Fraudulent Transactions) of the SRC.

3. The Anti-Financial Account Scamming Act (AFASA)

If the scam group utilized local e-wallets (e.g., GCash, Maya) or traditional bank accounts belonging to "money mules" to funnel fiat currency into crypto exchanges, they violate the Anti-Financial Account Scamming Act. This law penalizes account taking, money muling, and social engineering behaviors, providing faster mechanisms for financial institutions to flag and temporarily freeze suspicious accounts.


II. Evidentiary Preservation: The "First Responder" Phase

In digital forensics, time is the enemy of evidence. Scam groups routinely delete entire chat histories, unsend messages, or deactivate accounts once they realize a victim is onto them. Before filing a formal complaint, you must secure all digital footprints.

Evidence Category Specific Items Needed Legal/Investigative Purpose
Transaction Details Public wallet addresses (sender & receiver), Transaction Hashes (TXID), exact blockchain network used (e.g., ERC-20, TRC-20, BEP-20). Allows law enforcement to conduct on-chain blockchain analysis and map fund routing.
Communication Logs Unaltered, full-screen screenshots of chats. Do not crop. Ensure the scammer's unique handle, profile ID, or phone number is visible. Establishes the element of deceit (decepticon) and false pretenses required for Estafa.
Platform Data Uniform Resource Locators (URLs) of the fraudulent trading dashboards, fake whitepapers, and emails. Pinpoints the digital infrastructure hosted by the syndicate for potential domain takedowns.
Fiat-to-Crypto Link Receipts/histories from Virtual Asset Service Providers (VASPs) like Coins.ph, GCash, Maya, or Binance showing the direct conversion of Philippine Pesos (PHP) to crypto. Proves the actual financial damage and establishes the cash-out or cash-in entry points.

Pro-Tip on Digital Integrity: Save all digital evidence into an external hard drive or secure cloud storage. Maintain the original files to preserve metadata. Do not clear your application caches, as forensic units may need to perform a physical data clone of your device to ensure admissibility in court under the Rules on Electronic Evidence.


III. Drafting the Complaint-Affidavit

The bedrock of your legal action is the Complaint-Affidavit. While law enforcement agencies can assist in its preparation, arriving with a professionally drafted or meticulously outlined sworn statement accelerates the process. The affidavit must explicitly detail:

  1. The Chronology: How the initial contact was established (e.g., targeted via a Telegram direct message or Facebook ad).
  2. The Inducement: The specific fraudulent representations made by the administrators or members of the group (e.g., promising a risk-free 50% weekly return).
  3. The Mechanics of Fraud: Step-by-step description of how money was sent, how the platform blocked withdrawals, and how the group demanded further "taxes" or "release fees" to recover the initial capital.
  4. Valuation: The exact monetary loss. State both the cryptocurrency amount and its fiat PHP equivalent based on the Bangko Sentral ng Pilipinas (BSP) or reputable exchange reference rates on the exact date of the loss.

IV. The Multi-Agency Reporting Procedure

The Philippines utilizes a multi-agency approach to combat cyber-enabled financial fraud. Depending on the nature of the crypto scam group, reports should be routed concurrently to the following bodies:

┌────────────────────────────────────────┐
                  │   Cryptocurrency Scam Group Identified │
                  └───────────────────┬────────────────────┘
                                      │
         ┌────────────────────────────┼────────────────────────────┐
         ▼                            ▼                            ▼
┌──────────────────┐        ┌──────────────────┐        ┌──────────────────┐
│     NBI-CCD      │        │     PNP-ACG      │        │     SEC-EIPD     │
│(Complex Tech/    │        │(Local Operations/│        │ (Unregistered    │
│ Syndicates)      │        │ Entrapments)     │        │ Investment Pools)│
└────────┬─────────┘        └────────┬─────────┘        └────────┬─────────┘
         │                           │                           │
         └───────────────────────────┼───────────────────────────┘
                                     ▼
                  ┌────────────────────────────────────────┐
                  │    Coordination with Anti-Money        │
                  │   Laundering Council (AMLC) & VASPs    │
                  └────────────────────────────────────────┘

1. National Bureau of Investigation – Cybercrime Division (NBI-CCD)

  • When to file: Ideal for high-value losses, organized syndicates with international elements, or cases requiring deep blockchain tracing.
  • Procedure: Visit the NBI Main Office (Taft Avenue, Manila) and proceed to the Cybercrime Division, or file an initial digital complaint via ccd@nbi.gov.ph.
  • Action: An investigating agent will conduct a clarificatory interview. If a prima facie case of cybercrime is established, the NBI can issue subpoenas to local telecommunication companies and local crypto exchanges to unmask the real identities behind the numbers and accounts.

2. Philippine National Police – Anti-Cybercrime Group (PNP-ACG)

  • When to file: Best for localized scam operators, situations where the suspect's physical location is suspected within the country, or when immediate tactical intervention (like an entrapment operation) is viable.
  • Procedure: File a complaint at the PNP-ACG Headquarters in Camp Crame, Quezon City, or at any Regional Anti-Cybercrime Unit (RACU) nationwide. Reports can also be initiated through their e-complaint desk via acg.pnp.gov.ph.
  • Action: The incident will be logged into the official police blotter, and the cyber-forensics unit will map the operational footprints of the group.

3. Securities and Exchange Commission – Enforcement and Investor Protection Department (SEC-EIPD)

  • When to file: Essential if the scam group functions as a public investment scheme, offering fake yields or tokens to the general public without a secondary license.
  • Procedure: Submit a formal complaint to the EIPD via eipd@sec.gov.ph or through the SEC i-Report portal.
  • Action: The SEC enforces administrative sanctions. They can issue a Cease-and-Desist Order (CDO) against the group, publish public investor advisories naming the entities, and initiate criminal complaints for violations of the SRC, which are forwarded to the Department of Justice (DOJ).

4. Virtual Asset Service Providers (VASPs) and E-Wallets

Simultaneously, notify the compliance and fraud departments of the gateways used (e.g., GCash, Maya, Coins.ph, or Binance). Provide them with the transaction hashes and the police/NBI acknowledgement receipt. Under modern anti-money laundering and AFASA rules, platforms can temporarily hold or flag suspect accounts if there is a pending law enforcement inquiry.


V. Strategic Considerations for Victims

Critical Caveat on Secondary Scams: Falling victim to a crypto scam group triggers secondary vulnerabilities. Beware of entities online claiming to be "Recovery Specialists," "Ethical Hackers," or "Asset Recovery Lawyers" who promise to hack the scammers and claw back funds for an upfront fee. Legitimate recovery is only executed through official law enforcement subpeonas, asset freeze orders issued by the Court of Appeals via the Anti-Money Laundering Council (AMLC), or voluntary compliance by regulated exchanges.

  • Prescription Period: Under Section 22 of R.A. 10175, violations of the Cybercrime Law prescribe in fifteen (15) years. However, waiting reduces the probability of asset recovery, as funds are quickly moved through crypto mixers, peer-to-peer (P2P) networks, or decentralized exchanges (DEXs).
  • Operational Silence: Once you have engaged law enforcement, maintain strict confidentiality. Do not alert the scam group or blast their handles publicly on social media. Public exposure often prompts syndicates to burn their digital infrastructure, change wallet configurations, and slip further into anonymity, completely stymieing ongoing covert police investigations.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.