How to Report a Romance Scam in the Philippines

I. Introduction

A romance scam is a form of fraud where a person pretends to have romantic intentions toward another in order to gain trust and obtain money, property, personal information, intimate images, account access, or other benefits. In the Philippines, romance scams commonly happen through Facebook, Messenger, dating apps, Instagram, WhatsApp, Telegram, Viber, text messages, and sometimes through email.

Although romance scams are often described as “online love scams,” they are not merely private relationship problems. They may involve criminal offenses, civil liability, data privacy violations, banking fraud, identity theft, cybercrime, extortion, blackmail, money laundering, or violations involving intimate images. The proper response depends on the facts, the amount involved, the evidence available, and whether the scammer is known, anonymous, foreign-based, or using another person’s identity.

This article explains how romance scams may be reported in the Philippines, what laws may apply, what evidence should be preserved, which agencies may be approached, and what practical steps victims should take.


II. What Is a Romance Scam?

A romance scam usually involves deception through a fake romantic relationship. The scammer builds emotional attachment and then asks for money or favors. Common stories include:

The scammer claims to be an overseas worker, soldier, engineer, doctor, seafarer, foreign national, businessperson, widower, or someone supposedly stranded abroad. They may say they need money for hospital bills, travel documents, customs fees, visa processing, emergency surgery, investment opportunities, frozen bank accounts, package delivery fees, or business problems.

Some scams involve “love bombing,” where the scammer quickly expresses intense affection, proposes marriage, or promises a future together. Others involve gradual manipulation over weeks or months. In more serious cases, the scammer obtains private photos or videos and later threatens to expose them unless the victim pays money. This may become sextortion or online blackmail.

A romance scam may be committed by one person, but many are operated by organized groups. The person chatting with the victim may not be the same person appearing in the profile photos. The account may use stolen pictures, fake names, mule bank accounts, prepaid SIM cards, fake IDs, and cryptocurrency wallets.


III. Common Warning Signs

A romance scam may be suspected when the person:

  1. Refuses video calls or gives repeated excuses.
  2. Quickly declares love despite never meeting in person.
  3. Asks for money, gift cards, cryptocurrency, bank transfers, e-wallet transfers, or mobile load.
  4. Claims an emergency and pressures the victim to act immediately.
  5. Requests secrecy from family or friends.
  6. Gives inconsistent personal details.
  7. Uses overly dramatic stories involving illness, death, detention, customs, immigration, or travel problems.
  8. Sends photos that appear too polished, stolen, or inconsistent.
  9. Claims to have sent a package but asks the victim to pay “customs,” “clearance,” or “delivery” fees.
  10. Introduces a third person, such as a “lawyer,” “customs officer,” “doctor,” “courier,” or “bank manager,” who also demands payment.
  11. Asks the victim to receive money in their bank account and send it elsewhere.
  12. Threatens to expose private photos, conversations, or videos.

Being emotionally involved does not make the victim at fault. Romance scams are designed to exploit trust, loneliness, affection, and vulnerability.


IV. Possible Crimes Under Philippine Law

The exact charge depends on the conduct. A romance scam may involve one or more of the following legal issues.

A. Estafa Under the Revised Penal Code

The most common criminal concept is estafa, or swindling. Estafa generally involves deceit or abuse of confidence that causes damage to another person. In a romance scam, deceit may consist of false identity, false promises, fake emergencies, fake business opportunities, fabricated travel problems, or fraudulent representations that induce the victim to give money or property.

The key elements usually include:

  1. The offender used deceit or fraudulent means.
  2. The victim relied on the deceit.
  3. The victim gave money, property, or another benefit.
  4. The victim suffered damage.

Estafa may apply even if the scam happened through online messages, provided the evidence can show fraud and damage.

B. Cybercrime-Related Estafa

If the scam was committed through the internet, social media, electronic messages, online banking, e-wallets, or digital platforms, the act may fall under the Cybercrime Prevention Act. A traditional crime such as estafa may carry cybercrime implications when committed using information and communications technology.

This is important because most romance scams involve online communication, fake accounts, digital transfers, or electronic evidence.

C. Identity Theft

If the scammer used another person’s name, photos, documents, or profile to deceive the victim, the conduct may involve identity theft or related cybercrime offenses. This may also affect the real person whose identity or photos were stolen.

D. Computer-Related Fraud

Where the scam involves unauthorized manipulation of online accounts, fake online transactions, phishing links, account takeover, or fraudulent use of digital systems, computer-related fraud may be relevant.

E. Threats, Coercion, or Grave Coercion

If the scammer threatens harm, exposure, harassment, humiliation, or other pressure to force payment, possible offenses involving threats or coercion may arise.

F. Robbery by Intimidation or Extortion-Type Conduct

Where money is obtained through threats or intimidation, the facts may support offenses beyond ordinary fraud. In common language, this is often called extortion. The formal legal characterization depends on the circumstances.

G. Anti-Photo and Video Voyeurism Issues

If the scam involves intimate photos, videos, screenshots, or recordings, and the scammer threatens to publish them or actually distributes them, laws concerning voyeurism, privacy, and online sexual abuse may apply. The victim should preserve evidence and avoid giving in to repeated demands, because payment often leads to more demands.

H. Violence Against Women and Children

If the victim is a woman and the offender is a current or former romantic partner, sexual partner, dating partner, or someone with whom the victim had or was led to believe she had a romantic relationship, certain forms of harassment, threats, psychological abuse, sexual humiliation, or economic abuse may potentially fall under laws protecting women and children. This depends on the relationship and facts.

I. Data Privacy Violations

If personal information, IDs, addresses, phone numbers, photos, financial data, or private messages were unlawfully collected, used, shared, or exposed, data privacy concerns may arise. This is especially relevant when the scammer impersonates the victim, leaks personal information, or uses private data to harass the victim.

J. Money Laundering and Mule Account Issues

Some victims are asked to receive funds and transfer them to another person. This can be dangerous. A victim who receives money from unknown sources and forwards it may be used as a money mule. Even if the person was deceived, their bank account may be flagged, frozen, or investigated.

Anyone who has been asked by a romance contact to receive or move funds should stop immediately, preserve messages, notify the bank, and seek legal advice.


V. Immediate Steps After Discovering the Scam

1. Stop Sending Money

The first step is to stop all payments. Scammers often promise repayment, claim that one final payment will solve the problem, or threaten consequences if the victim stops paying. Continued payment usually increases the loss.

2. Do Not Delete Conversations

Do not delete chats, call logs, emails, transaction receipts, social media profiles, phone numbers, account names, bank details, e-wallet numbers, wallet addresses, or photos. These may be needed as evidence.

3. Take Screenshots and Export Chats

Preserve the full conversation, not only selected parts. Screenshots should show:

  1. The scammer’s name or username.
  2. Profile URL or account link.
  3. Dates and times.
  4. Messages asking for money.
  5. Promises, threats, excuses, or fake claims.
  6. Bank account numbers, GCash or Maya numbers, crypto wallet addresses, or remittance details.
  7. Proof that the victim sent money.
  8. Any admissions or inconsistent statements.

Where possible, export chat histories from the platform. Screenshots should be backed up in cloud storage, a USB drive, or another secure device.

4. Preserve Transaction Records

Collect:

  1. Bank deposit slips.
  2. Online transfer receipts.
  3. GCash, Maya, or other e-wallet receipts.
  4. Remittance center receipts.
  5. Cryptocurrency transaction hashes.
  6. Emails from banks or platforms.
  7. Account names and account numbers.
  8. Dates, amounts, and reference numbers.
  9. Names of intermediaries or supposed agents.

5. Report to the Bank or E-Wallet Provider Immediately

Contact the bank, e-wallet provider, remittance center, or cryptocurrency platform used. Ask whether the transaction can be reversed, held, traced, or flagged. Provide the reference number and explain that the transfer was induced by fraud.

Speed matters. Recovery is more difficult once funds are withdrawn or moved.

6. Secure Accounts

Change passwords for email, social media, banking, and e-wallet accounts. Enable two-factor authentication. Log out of unknown devices. Check whether the scammer has access to email, cloud storage, or social media.

7. Warn Trusted Family or Friends

Victims are often isolated by scammers. A trusted person can help preserve evidence, avoid further payment, and accompany the victim to authorities.


VI. Where to Report a Romance Scam in the Philippines

A victim may report to several offices, depending on the facts.

A. Philippine National Police Anti-Cybercrime Group

The PNP Anti-Cybercrime Group is one of the primary agencies for cybercrime complaints. A romance scam conducted through Facebook, dating apps, Messenger, Telegram, WhatsApp, Viber, email, text, online banking, e-wallets, or other digital means may be reported there.

A complainant should bring:

  1. Valid government ID.
  2. Printed screenshots.
  3. Digital copies of evidence.
  4. Transaction receipts.
  5. URLs, usernames, phone numbers, and email addresses.
  6. A written timeline of events.
  7. Names of banks, e-wallets, or remittance centers involved.

The victim may be asked to execute a sworn statement or complaint-affidavit.

B. National Bureau of Investigation Cybercrime Division

The NBI Cybercrime Division may also receive reports involving online scams, hacking, identity theft, sextortion, blackmail, and other cyber-enabled offenses.

The NBI may be appropriate when the scam involves sophisticated cyber activity, multiple victims, foreign elements, impersonation, fake documents, or large amounts of money.

C. Local Police Station

A victim may report to the nearest police station, especially if there are threats, harassment, extortion, stalking, or an identifiable suspect nearby. The local police may refer the matter to a cybercrime unit if needed.

D. Office of the City or Provincial Prosecutor

A criminal complaint may be filed with the prosecutor’s office. Usually, the complaint must be supported by:

  1. Complaint-affidavit.
  2. Witness affidavits, if any.
  3. Evidence of deceit.
  4. Evidence of payment or loss.
  5. Screenshots and electronic records.
  6. Identification of the respondent, if known.

The prosecutor evaluates whether there is probable cause to file a criminal case in court.

E. Barangay

Barangay proceedings may be relevant only when the offender is known and both parties fall under barangay conciliation rules. However, many romance scams involve anonymous, foreign, or distant offenders, making barangay conciliation impractical or inapplicable.

Barangay reporting may still be useful for documentation, especially where harassment, threats, or local persons are involved.

F. Bank, E-Wallet, or Remittance Provider

Banks and e-wallets should be notified immediately. Provide the fraud report, reference numbers, transaction receipts, and recipient account details. Ask that the receiving account be flagged.

The financial institution may require a police report or affidavit before acting on certain requests.

G. Social Media or Dating Platform

Report the fake profile, messages, and scam account to the platform. Use the platform’s in-app reporting tools. However, do not rely only on platform reporting, because the account may disappear and evidence may be lost. Preserve evidence first before reporting the account.

H. National Privacy Commission

Where the scam involves misuse, exposure, or unauthorized processing of personal data, the victim may consider reporting privacy-related concerns to the National Privacy Commission. This may be especially relevant when personal information or intimate materials are shared without consent.

I. Inter-Agency Council Against Trafficking or Other Agencies

Some online romance scams overlap with forced labor, trafficking, organized scam hubs, or exploitation. If the facts suggest human trafficking, forced participation in scam operations, or recruitment into suspicious overseas work, other specialized agencies may become relevant.


VII. How to Prepare a Complaint

A strong complaint is organized, factual, and supported by documents.

A. Prepare a Timeline

The timeline should include:

  1. Date the victim first met the scammer online.
  2. Platform used.
  3. Name, username, phone number, or profile link of the scammer.
  4. Major conversations.
  5. First request for money.
  6. Each payment made.
  7. Method of payment.
  8. Recipient account details.
  9. Promises made by the scammer.
  10. Discovery of the scam.
  11. Threats or harassment, if any.
  12. Steps already taken, such as bank reports or platform reports.

B. Prepare a Summary of Losses

Make a table with:

Date Amount Method Recipient Name Account Number / Wallet Reference Number Reason Given
Example PHP 10,000 GCash Juan D. 09xx xxx xxxx 123456 Hospital bill

Include all transfers, even small ones. Small repeated payments can show a pattern of fraud.

C. Identify the Deceit

The complaint should clearly explain what false statements caused the victim to send money. Examples:

  1. The scammer claimed to be in love and promised marriage.
  2. The scammer claimed to need money for a visa or flight.
  3. The scammer claimed a package was held by customs.
  4. The scammer pretended to be a doctor, soldier, engineer, or foreigner.
  5. The scammer used fake photos or a fake identity.
  6. The scammer promised repayment or investment returns.
  7. The scammer threatened to expose private images unless paid.

The complaint should not merely say “I was scammed.” It should explain how the scam happened.

D. Attach Evidence Properly

Evidence may include:

  1. Screenshots of chats.
  2. Exported chat files.
  3. Profile screenshots.
  4. Account URLs.
  5. Photos used by the scammer.
  6. Payment receipts.
  7. Bank statements.
  8. E-wallet transaction history.
  9. Emails.
  10. Call logs.
  11. Voice notes.
  12. Threat messages.
  13. Reports made to banks or platforms.
  14. Copies of valid ID of the complainant.

For electronic evidence, it is helpful to preserve original files and metadata where possible.


VIII. Sample Complaint-Affidavit Structure

A complaint-affidavit usually contains:

  1. Name, age, civil status, nationality, address, and contact details of the complainant.
  2. Statement that the complainant is executing the affidavit to file a complaint.
  3. Identification of the respondent, if known.
  4. Facts of how the complainant met the respondent.
  5. Description of the romantic or deceptive relationship.
  6. Specific false representations made.
  7. Amounts sent and transaction details.
  8. Explanation of how the complainant discovered the fraud.
  9. Threats, blackmail, or continued harassment, if any.
  10. List of attached evidence.
  11. Request that the respondent be investigated and charged.
  12. Signature before a notary public or authorized officer.

The affidavit must be truthful. Exaggerations, assumptions stated as facts, or fabricated details can damage the case.


IX. Electronic Evidence: Why Preservation Matters

Romance scam cases often depend heavily on electronic evidence. Philippine authorities and courts may require proof that screenshots and digital records are authentic, complete, and connected to the accused.

Important preservation practices include:

  1. Keep the original device if possible.
  2. Do not edit screenshots.
  3. Do not crop out dates, times, usernames, or URLs.
  4. Save files in their original format.
  5. Back up evidence.
  6. Record profile links before accounts are deleted.
  7. Capture the full conversation context.
  8. Preserve payment confirmations.
  9. Avoid communicating further except as advised by authorities.

If the scammer deletes the account, earlier screenshots and URLs may still help investigators.


X. What If the Scammer Is Abroad?

Many romance scams involve foreign accounts or persons claiming to be abroad. Reporting is still possible. Philippine cybercrime authorities may coordinate with platforms, banks, foreign counterparts, or international channels depending on the case.

However, cross-border cases can be difficult. The victim should manage expectations. Recovery of money is not guaranteed, especially if funds were sent abroad, withdrawn in cash, converted to cryptocurrency, or transferred through mule accounts.

Even so, reporting remains important because:

  1. It creates an official record.
  2. It may help freeze accounts.
  3. It may connect the complaint to other victims.
  4. It may help identify local accomplices.
  5. It may prevent further victimization.
  6. It may support insurance, bank, or platform claims where applicable.

XI. What If the Victim Knows the Scammer Personally?

If the scammer is known, such as a former partner, online boyfriend or girlfriend, acquaintance, coworker, neighbor, or local resident, the complaint may be more direct. The victim may identify the respondent by name and address and may file a complaint with law enforcement or the prosecutor.

If both parties are in the same city or municipality, barangay conciliation may be raised in some disputes. However, criminal offenses punishable by higher penalties, cybercrime, violence, threats, or urgent protection concerns may fall outside ordinary barangay settlement procedures. Legal advice is recommended where the suspect is personally known.


XII. What If the Victim Sent Intimate Photos or Videos?

If the scam involves intimate images, the victim should act quickly.

Steps include:

  1. Stop paying.
  2. Preserve threats and messages.
  3. Screenshot the profile and account links.
  4. Report to law enforcement.
  5. Report the account to the platform.
  6. Use platform tools to remove or prevent sharing of intimate images.
  7. Tell a trusted person.
  8. Avoid negotiating endlessly with the blackmailer.

Victims often pay because they fear shame. Scammers exploit that fear. Payment does not guarantee deletion. In many cases, payment increases the pressure because the scammer sees that threats work.

If the victim is a minor, the matter becomes more serious and should be reported immediately to appropriate law enforcement and child protection authorities.


XIII. What If the Victim Gave IDs, Passwords, or Bank Details?

If the victim sent identification documents, passwords, one-time passwords, bank details, selfies with ID, or account recovery information, they should:

  1. Change passwords immediately.
  2. Enable two-factor authentication.
  3. Notify banks and e-wallet providers.
  4. Monitor accounts for unauthorized activity.
  5. Report possible identity theft.
  6. Consider replacing compromised IDs where appropriate.
  7. Watch for loan applications, SIM registration misuse, or fake accounts.
  8. Report fake profiles using their name or photos.

Never send OTPs, passwords, account recovery codes, or banking credentials to anyone claiming to be a romantic partner, bank employee, courier, customs officer, or police officer.


XIV. What If the Victim Borrowed Money to Pay the Scammer?

Some victims borrow from relatives, friends, online lending apps, banks, or loan sharks to satisfy the scammer’s demands. The fact that the victim was scammed does not automatically cancel debts owed to legitimate lenders. However, if the lender engaged in harassment, threats, data shaming, or unlawful collection practices, separate legal remedies may exist.

The victim should document all debts incurred because of the scam, but the criminal complaint against the scammer is separate from repayment obligations to lenders.


XV. Can the Victim Recover the Money?

Recovery depends on how quickly the victim acts and where the money went.

Possible recovery routes include:

  1. Reversal or hold by a bank or e-wallet provider.
  2. Freezing or flagging of recipient accounts.
  3. Restitution as part of a criminal case.
  4. Civil action for damages or collection.
  5. Settlement, if the offender is identified and willing to return money.
  6. Asset tracing in larger cases.

In practice, recovery can be difficult. Scammers often withdraw funds quickly, use mule accounts, convert money to cryptocurrency, or transfer funds through several layers. Prompt reporting improves the chance of recovery.


XVI. Civil Remedies

Aside from criminal complaints, a victim may consider civil remedies. These may include actions to recover money, claim damages, or seek compensation for fraud, emotional distress, reputational harm, or other losses.

Civil action may be practical when the scammer is identifiable, has assets, and is within reach of Philippine courts. If the scammer is anonymous or abroad, civil recovery may be harder.

A criminal case may also include civil liability arising from the offense, depending on how the case proceeds.


XVII. Avoiding Common Mistakes

Victims should avoid the following:

  1. Deleting the conversation out of embarrassment.
  2. Sending more money to “unlock” a refund.
  3. Paying a supposed “recovery agent” who promises to get the money back.
  4. Posting accusations publicly without legal advice.
  5. Threatening the scammer in a way that may create legal issues.
  6. Sending fake documents or retaliatory messages.
  7. Letting the scammer use their bank account.
  8. Ignoring bank notices or law enforcement calls.
  9. Assuming that a good-looking profile or video call proves identity.
  10. Waiting too long before reporting.

“Recovery scams” are common. After a romance scam, another person may contact the victim claiming to be a hacker, lawyer, police officer, bank insider, or investigator who can recover the money for a fee. This is often another scam.


XVIII. Special Situation: Package or Customs Romance Scam

A common romance scam involves a supposed foreign lover sending a package containing gifts, cash, jewelry, phones, or documents. A fake courier or customs officer then contacts the victim and demands payment for customs clearance, anti-money laundering certification, insurance, taxes, or penalties.

Warning signs include:

  1. The victim never ordered anything.
  2. The supposed courier uses a personal bank account or e-wallet.
  3. Payment is demanded urgently.
  4. The package allegedly contains large cash amounts.
  5. The supposed customs officer uses unofficial email or messaging apps.
  6. Multiple fees appear one after another.

Victims should not pay. They should preserve all messages and report the scam.


XIX. Special Situation: Investment Romance Scam

Some romance scams evolve into investment fraud. The scammer may introduce cryptocurrency, forex trading, online casino profits, fake business ventures, or investment platforms. This is sometimes called “pig butchering,” where the scammer builds trust before inducing larger investments.

The victim may first be allowed to withdraw a small “profit,” then encouraged to invest more. Later, the platform demands tax, verification fees, withdrawal fees, or account unlocking charges.

Victims should preserve:

  1. Platform links.
  2. Wallet addresses.
  3. Deposit records.
  4. Screenshots of account balances.
  5. Chat messages from the romantic contact.
  6. Names of supposed account managers.
  7. Withdrawal refusal messages.

These cases may involve fraud, cybercrime, securities issues, and money laundering concerns.


XX. Special Situation: Money Mule Recruitment

A scammer may ask the victim to receive money from “clients,” “relatives,” “business partners,” or “investors” and forward it to another account. This may expose the victim to investigation.

Warning signs include:

  1. The victim is asked to use their personal bank or e-wallet account.
  2. The money comes from strangers.
  3. The victim is allowed to keep a commission.
  4. The scammer says it is for business, charity, crypto, or remittance.
  5. The victim is told to split transfers into smaller amounts.

A person in this situation should stop immediately, preserve evidence, notify the bank, and seek legal advice. Continuing to receive and forward suspicious funds can create serious legal risk.


XXI. Reporting Checklist

Before going to the police, NBI, or prosecutor, prepare the following:

  1. Valid government ID.
  2. Printed complaint narrative or timeline.
  3. Full name and contact details of the complainant.
  4. Scammer’s name, username, phone number, email, and profile links.
  5. Screenshots of profile and messages.
  6. Exported chats, if available.
  7. Payment receipts.
  8. Bank or e-wallet statements.
  9. Recipient account details.
  10. URLs of fake websites or platforms.
  11. Cryptocurrency wallet addresses, if any.
  12. Threats or blackmail messages.
  13. Copies of reports made to banks or platforms.
  14. Names and affidavits of witnesses, if any.
  15. Summary table of losses.

Bring both printed and digital copies. Digital copies may be placed on a USB drive or stored securely online.


XXII. Sample Incident Timeline

A simple timeline may look like this:

January 5, 2026 – I received a friend request from a person using the name “Michael Anderson” on Facebook.

January 7, 2026 – We began chatting on Messenger. He claimed to be a widower and an engineer working abroad.

January 20, 2026 – He said he wanted to marry me and visit the Philippines.

February 2, 2026 – He claimed his bank account was frozen and asked me to send PHP 15,000.

February 3, 2026 – I sent PHP 15,000 via GCash to the number he provided.

February 10, 2026 – A person claiming to be a courier contacted me and said a package from him was held for customs clearance.

February 11, 2026 – I sent PHP 25,000 to the provided bank account.

February 15, 2026 – I was asked for another PHP 40,000. I became suspicious and searched the photos he used. I discovered that the photos belonged to another person.

February 16, 2026 – I stopped communicating, preserved screenshots, reported the transactions to my bank and e-wallet provider, and prepared this complaint.


XXIII. Sample Report Narrative

A report narrative may be written in plain language:

I respectfully report that I was deceived by a person I met online who pretended to have romantic intentions toward me. The person used the name __________ and contacted me through __________. Through repeated messages, the person gained my trust and represented that __________. Because of these representations, I sent money on several occasions through __________ in the total amount of PHP __________. Later, I discovered that the representations were false because __________. I have attached screenshots of our conversations, the profile used, and proof of the money transfers. I request that this matter be investigated for estafa, cybercrime-related offenses, and other applicable violations of Philippine law.

The narrative should be adjusted to the actual facts.


XXIV. Practical Notes on Proof

A romance scam complaint is stronger when it shows not only that money was sent, but that money was sent because of deception. Authorities will look for the link between the false statements and the victim’s loss.

Helpful evidence includes messages where the scammer:

  1. Asked for money.
  2. Explained the fake emergency.
  3. Gave account details.
  4. Promised repayment.
  5. Claimed a romantic relationship.
  6. Used a false identity.
  7. Threatened the victim.
  8. Admitted receiving money.
  9. Introduced fake third parties.
  10. Pressured the victim not to tell anyone.

The victim’s own testimony is important, but documentary evidence makes the complaint more credible.


XXV. Privacy and Safety Concerns

Victims may fear embarrassment, exposure, or judgment. Authorities should treat complaints seriously, especially where cybercrime, extortion, or intimate images are involved.

Victims should also consider personal safety:

  1. Block the scammer after preserving evidence.
  2. Tighten social media privacy settings.
  3. Warn family members if the scammer has their contacts.
  4. Avoid meeting the scammer alone.
  5. Report threats immediately.
  6. Do not send additional personal documents.
  7. Monitor fake accounts using the victim’s identity.

Where there is risk of physical harm, stalking, or domestic violence, urgent police assistance may be necessary.


XXVI. Reporting When the Victim Is a Minor

If the victim is below 18, the matter should be treated with urgency, especially if intimate images, grooming, sexual exploitation, coercion, or threats are involved. Parents, guardians, school officials, social workers, and law enforcement may need to act promptly.

A minor should not be blamed or shamed. Online offenders often manipulate minors through affection, secrecy, fear, and threats.


XXVII. Role of Lawyers

A lawyer can help:

  1. Evaluate possible charges.
  2. Draft a complaint-affidavit.
  3. Organize evidence.
  4. Represent the victim before investigators or prosecutors.
  5. Coordinate with banks or platforms.
  6. Assess civil recovery options.
  7. Protect the victim from counterclaims.
  8. Advise on privacy, media exposure, and online posts.

Legal assistance is especially useful when the amount is large, the suspect is known, intimate images are involved, the victim may have been used as a money mule, or there are multiple victims.


XXVIII. Frequently Asked Questions

1. Is a romance scam a crime in the Philippines?

Yes. Depending on the facts, it may involve estafa, cybercrime-related offenses, identity theft, threats, extortion, privacy violations, or other crimes.

2. Can I report even if I willingly sent the money?

Yes. Voluntarily sending money does not prevent a complaint if the money was obtained through deceit, false pretenses, manipulation, threats, or fraudulent representations.

3. What if I am embarrassed?

Embarrassment is common, but it should not prevent reporting. Romance scams are intentional fraud schemes. The victim is not at fault for being deceived.

4. What if I only know the scammer’s Facebook name?

You may still report. Provide the profile link, screenshots, usernames, phone numbers, bank accounts, e-wallet numbers, and any other identifiers.

5. Should I block the scammer immediately?

Preserve evidence first. After screenshots, exports, and account details are saved, blocking may be appropriate for safety.

6. Can the bank reverse the transfer?

Sometimes, but not always. The chance is better if the report is made quickly before the money is withdrawn or transferred.

7. Can I post the scammer online?

Public posting may create legal risks, especially if the identity is uncertain or the profile uses stolen photos. It is safer to report to authorities and platforms.

8. What if the scammer threatens to leak my private photos?

Preserve the threats, stop paying, report immediately, and secure your accounts. Payment does not guarantee that the images will not be leaked.

9. What if the scammer used another person’s photos?

That may indicate identity theft or impersonation. Include the stolen-photo evidence in the report, but avoid accusing the real person in the photos unless there is proof they are involved.

10. Is it worth reporting if the amount is small?

Yes. Small losses may be part of a larger pattern involving many victims. Reporting can help authorities identify accounts and prevent further scams.


XXIX. Suggested Format for Evidence Folder

Organize evidence in folders like this:

Folder 1 – Identity of Scammer

  • Profile screenshots
  • Profile URLs
  • Photos used
  • Usernames
  • Phone numbers
  • Email addresses

Folder 2 – Conversations

  • Full chat exports
  • Screenshots by date
  • Threat messages
  • Voice notes

Folder 3 – Payments

  • Bank receipts
  • GCash or Maya receipts
  • Remittance slips
  • Crypto transaction records
  • Summary table of losses

Folder 4 – Reports Made

  • Bank report
  • E-wallet report
  • Platform report
  • Police blotter
  • NBI or PNP acknowledgment

Folder 5 – Personal Statement

  • Timeline
  • Complaint-affidavit draft
  • Witness statements

This organization helps investigators understand the case faster.


XXX. Conclusion

A romance scam in the Philippines is not merely a failed online relationship. It may be a criminal act involving fraud, cybercrime, identity theft, extortion, privacy violations, or money laundering schemes. Victims should stop sending money, preserve all evidence, report immediately to banks or e-wallet providers, and file a complaint with appropriate law enforcement agencies such as the PNP Anti-Cybercrime Group, NBI Cybercrime Division, local police, or the prosecutor’s office.

The most important evidence is the connection between the scammer’s deception and the victim’s loss. Screenshots, chat exports, transaction records, account numbers, profile links, and a clear timeline are essential. The sooner the victim reports, the better the chance of tracing accounts, preventing further harm, and supporting a criminal or civil case.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.