Introduction
Scams are a serious and growing problem in the Philippines. They may involve fake online sellers, investment fraud, romance scams, phishing links, identity theft, fake job offers, loan app harassment, cryptocurrency schemes, fake charities, SIM-related fraud, bank account takeovers, and impersonation of government agencies or private companies.
Reporting a scammer is not only a way to seek justice for the victim. It also helps authorities trace criminal networks, preserve evidence, freeze funds when possible, warn the public, and prevent the same scammer from victimizing others.
This article explains the Philippine legal framework, the agencies that may receive complaints, the evidence needed, and the practical steps a victim can take.
I. What Is a Scam Under Philippine Law?
The word “scam” is commonly used, but Philippine law may classify the act under different crimes depending on how it was committed.
A scam may fall under one or more of the following offenses:
1. Estafa or Swindling
The main criminal offense for fraud is usually estafa, punished under the Revised Penal Code.
Estafa generally involves deceit, abuse of confidence, or fraudulent means that causes another person to part with money, property, or something of value.
Examples include:
- A fake seller accepting payment but never delivering the item.
- A person pretending to be authorized to sell property.
- A fake investment promoter promising impossible returns.
- A borrower who obtains money through false pretenses.
- A person misrepresenting facts to induce payment.
The penalty depends on the amount involved and the circumstances of the fraud.
2. Cybercrime-Related Fraud
If the scam was committed through the internet, mobile apps, messaging platforms, email, social media, online banking, e-wallets, or similar digital means, it may fall under the Cybercrime Prevention Act of 2012.
Cyber-related scams may involve:
- Online estafa.
- Phishing.
- Hacking or unauthorized access.
- Identity theft.
- Computer-related fraud.
- Illegal access to accounts.
- Misuse of personal information.
- Fraud through fake websites, fake social media pages, or spoofed messages.
When a traditional crime such as estafa is committed through information and communications technology, the cybercrime law may increase the seriousness of the offense.
3. Identity Theft
A scammer may commit identity theft by using another person’s name, photo, account, ID, documents, or personal information without authority.
This can happen when scammers:
- Use stolen photos to create fake profiles.
- Pretend to be a real business owner.
- Impersonate a government employee.
- Use another person’s ID to receive money.
- Open accounts using stolen personal data.
Identity theft may be prosecuted under cybercrime and data privacy-related laws, depending on the facts.
4. Phishing and Account Takeover
Phishing scams involve tricking victims into giving passwords, one-time PINs, account numbers, personal details, or banking credentials.
Common methods include:
- Fake bank text messages.
- Fake delivery links.
- Fake e-wallet verification pages.
- Fake government aid registration links.
- Spoofed emails.
- Fake customer support accounts.
If the scammer uses those details to access or steal from an account, the act may involve cybercrime, theft, fraud, identity theft, and other offenses.
5. Investment Scams
Investment scams may involve fake promises of high returns, guaranteed profits, cryptocurrency schemes, Ponzi schemes, foreign exchange schemes, fake cooperatives, fake lending programs, or unauthorized solicitation of investments.
These may violate laws enforced by the Securities and Exchange Commission, especially when persons or entities solicit investments from the public without proper registration or license.
Warning signs include:
- Guaranteed high returns.
- “Double your money” promises.
- Recruitment commissions.
- Pressure to invest immediately.
- No clear business model.
- No SEC registration for investment solicitation.
- Use of influencers or fake testimonials.
- Refusal to provide written contracts or official receipts.
6. Consumer Scams
Some scams involve defective goods, fake products, false advertising, undelivered purchases, unauthorized charges, or misleading online sales.
These may be reported to consumer protection agencies, especially when the matter involves a registered business, seller, platform, or commercial transaction.
7. Data Privacy Violations
A scam may also involve misuse of personal information. This includes unauthorized collection, processing, sharing, selling, or disclosure of personal data.
Examples include:
- A lending app accessing contacts and harassing them.
- A fake employer collecting IDs and personal data.
- A scammer publishing private information.
- A business exposing customer data.
- A person using someone’s documents to commit fraud.
These acts may involve violations of the Data Privacy Act of 2012.
II. Immediate Steps After Discovering the Scam
A victim should act quickly. Delay may make it harder to trace the scammer, preserve evidence, or recover money.
1. Stop All Communication and Payments
Do not send additional money, even if the scammer claims:
- The payment is needed to release your funds.
- There is a processing fee.
- You must pay tax, insurance, or customs charges.
- You will be sued if you do not pay.
- Your account will be frozen unless you pay.
- Your previous payment can be recovered only after another payment.
Many scammers use repeated pressure to extract more money from victims.
2. Preserve Evidence
Do not delete messages, emails, transaction records, call logs, screenshots, profiles, links, receipts, or account numbers.
Save the following:
- Full name or alias used by the scammer.
- Social media profile links.
- Chat conversations.
- Email headers, if available.
- Phone numbers.
- Bank account names and numbers.
- E-wallet numbers.
- Cryptocurrency wallet addresses.
- Receipts and proof of payment.
- Tracking numbers.
- Product listings.
- Website links.
- Screenshots of advertisements.
- Voice recordings, if lawfully obtained.
- Delivery details.
- Copies of IDs or documents sent by the scammer.
- Any promises, guarantees, contracts, or written representations.
Screenshots should show the date, time, username, profile URL, and full conversation where possible.
3. Contact the Bank, E-Wallet, or Payment Platform
Immediately report the transaction to the bank, e-wallet, remittance center, or payment platform used.
Request the following:
- Blocking or freezing of the recipient account, if possible.
- Reversal or dispute processing, if available.
- Transaction investigation.
- Official transaction history.
- Reference number for the complaint.
Acting quickly is important because funds may be withdrawn, transferred, or converted immediately.
4. Secure Your Accounts
If the scam involved phishing or account compromise:
- Change passwords immediately.
- Enable two-factor authentication.
- Log out of all devices.
- Remove unknown recovery emails or phone numbers.
- Contact your bank or e-wallet provider.
- Check for unauthorized transactions.
- Report compromised SIM cards or mobile numbers.
- Replace compromised cards, if necessary.
5. Warn Close Contacts
If your account was hacked or impersonated, warn friends, relatives, coworkers, and contacts not to send money or click links from the compromised account.
III. Where to Report a Scammer in the Philippines
The proper reporting office depends on the nature of the scam.
1. Philippine National Police Anti-Cybercrime Group
For online scams, phishing, fake accounts, hacking, cyber fraud, identity theft, and scams committed through digital platforms, the victim may report to the PNP Anti-Cybercrime Group or the nearest police station.
This is commonly appropriate for:
- Facebook Marketplace scams.
- Shopee, Lazada, or online seller fraud.
- Fake investment pages.
- GCash or Maya scams.
- Phishing links.
- Hacked accounts.
- Romance scams.
- Fake job offers online.
- Sextortion or blackmail through online means.
- Impersonation through social media.
Victims should bring printed and digital copies of evidence.
2. National Bureau of Investigation Cybercrime Division
The NBI Cybercrime Division may investigate cyber-related scams, hacking, online fraud, identity theft, phishing, and other internet-based offenses.
This is especially useful when:
- The scam involves multiple victims.
- The scammer uses fake online identities.
- The fraud involves organized cyber activity.
- The case requires digital forensics.
- The victim needs a formal complaint for cybercrime investigation.
3. Local Police Station
A victim may report to the local police station, especially if the scammer is known, located nearby, or the transaction happened locally.
The police may assist with:
- Blotter reports.
- Initial complaint documentation.
- Referral to a cybercrime unit.
- Coordination with prosecutors.
- Investigation of known suspects.
A police blotter is not the same as a criminal case, but it is useful as an official record of the incident.
4. Office of the City or Provincial Prosecutor
A criminal complaint for estafa, cybercrime, identity theft, or other offenses may be filed before the Office of the City Prosecutor or Office of the Provincial Prosecutor.
The prosecutor determines whether there is probable cause to file a criminal case in court.
The complaint usually includes:
- Complaint-affidavit.
- Affidavits of witnesses.
- Documentary evidence.
- Screenshots and transaction records.
- Police or NBI reports, if available.
- Identification of the respondent, if known.
If the scammer’s true identity is unknown, law enforcement investigation may be needed first.
5. Securities and Exchange Commission
Investment scams, Ponzi schemes, unauthorized investment solicitation, fake corporations, and entities promising profits to the public may be reported to the Securities and Exchange Commission.
This applies when the scam involves:
- Investment contracts.
- Public solicitation of funds.
- Fake corporations.
- Unlicensed investment schemes.
- Guaranteed profits.
- Cryptocurrency investment groups.
- Online trading schemes.
- Referral-based investment programs.
The SEC may issue advisories, revoke registrations, investigate entities, and coordinate with law enforcement.
A company’s registration with the SEC as a corporation does not automatically authorize it to solicit investments from the public. Authority to solicit investments requires proper registration or license for securities offerings.
6. Department of Trade and Industry
For consumer complaints involving sellers, merchants, defective products, misleading advertising, or non-delivery of goods by businesses, the victim may report to the Department of Trade and Industry.
This is more appropriate when the issue is a consumer transaction with a business rather than a purely criminal fraud by an unknown scammer.
Examples include:
- Online seller refuses refund.
- Merchant misrepresents products.
- Business fails to deliver goods.
- False advertising.
- Warranty issues.
- Deceptive sales practices.
7. National Privacy Commission
If the scam involves misuse, unauthorized processing, disclosure, or abuse of personal data, a complaint may be filed with the National Privacy Commission.
Examples include:
- Lending apps shaming borrowers using contact lists.
- Unauthorized publication of personal information.
- Use of stolen IDs.
- Data breach leading to scams.
- Unauthorized use of personal information for fake accounts.
- Collection of excessive personal data by a suspicious entity.
8. Bangko Sentral ng Pilipinas and Financial Institutions
If the scam involves banks, e-wallets, remittance centers, credit cards, payment providers, or unauthorized financial transactions, the victim should immediately report to the financial institution involved.
The Bangko Sentral ng Pilipinas may also receive complaints involving BSP-supervised financial institutions.
However, the first urgent step is usually to contact the bank, e-wallet, or payment provider directly because they may be able to block accounts, flag suspicious activity, or initiate internal dispute procedures.
9. E-Commerce Platforms and Social Media Platforms
Victims should also report the scammer to the platform used.
Examples:
- Facebook or Instagram for fake profiles and marketplace scams.
- TikTok for fraudulent sellers or fake investment promotions.
- Shopee or Lazada for marketplace fraud.
- GCash, Maya, PayPal, or banks for payment fraud.
- Telegram, Viber, WhatsApp, or Messenger for scam accounts.
Platform reports may help suspend scam accounts, preserve information, and prevent further victims.
IV. Evidence Needed to Report a Scammer
A strong complaint depends heavily on evidence.
The victim should prepare a clear evidence file containing the following:
1. Identity of the Scammer
Include all available details:
- Name used.
- Account username.
- Profile link.
- Phone number.
- Email address.
- Bank account name.
- Bank account number.
- E-wallet number.
- Address, if known.
- Photos used.
- Business name.
- Page name.
- Website domain.
- Government ID shown by the scammer, if any.
Even fake identities may help investigators trace the scammer.
2. Proof of Deceit or False Representation
This is important for estafa and fraud complaints.
Examples:
- Promise to deliver an item.
- Promise of investment returns.
- False claim of authority.
- Fake receipts.
- Fake tracking numbers.
- Fake business registration.
- False job offer.
- False claim of emergency.
- False claim that money is needed for processing, customs, tax, or release.
The evidence should show what the scammer said to convince the victim to pay.
3. Proof of Payment or Loss
Include:
- Bank transfer receipt.
- E-wallet receipt.
- Remittance slip.
- Credit card statement.
- Payment confirmation.
- Transaction reference number.
- Amount sent.
- Date and time of payment.
- Name of recipient account.
- Account number or mobile number.
4. Proof of Non-Delivery or Damage
For online selling scams, include:
- Seller’s refusal to deliver.
- Failure to provide tracking.
- Fake delivery details.
- Wrong item received.
- Seller blocking the victim.
- Seller deleting account or listing.
- Seller changing names or pages.
5. Screenshots and Digital Records
Screenshots should be organized chronologically.
Better evidence includes:
- Full conversation exports.
- URLs visible in screenshots.
- Profile pages showing usernames.
- Page transparency details, where available.
- Email headers.
- IP-related data, if lawfully obtained.
- Platform-generated reports.
6. Affidavit
For formal complaints, the victim usually needs a complaint-affidavit.
It should state:
- Personal details of the complainant.
- How the scammer contacted the victim.
- What the scammer promised or represented.
- Why the victim believed the scammer.
- How much was paid.
- When and how payment was made.
- What happened after payment.
- Evidence attached.
- Relief sought.
The affidavit must be truthful, clear, and based on personal knowledge.
V. How to File a Criminal Complaint
The usual process is as follows:
Step 1: Gather and Preserve Evidence
Collect all documents, screenshots, receipts, and records. Keep both digital and printed copies.
Step 2: Report to Law Enforcement
For cyber scams, report to the PNP Anti-Cybercrime Group or NBI Cybercrime Division. For local or known scammers, a local police station may also assist.
Step 3: Execute an Affidavit
Prepare a complaint-affidavit narrating the facts. Attach evidence as annexes.
Step 4: File Before the Prosecutor
The complaint may be filed with the city or provincial prosecutor’s office with jurisdiction over the offense.
Jurisdiction may depend on:
- Where the victim was deceived.
- Where the payment was made.
- Where the scammer received the money.
- Where the online act produced effects.
- Where the accused resides or may be found.
Cybercrime cases may involve more complex venue considerations.
Step 5: Preliminary Investigation
If the offense requires preliminary investigation, the prosecutor may require the respondent to file a counter-affidavit.
The prosecutor evaluates whether probable cause exists.
Step 6: Filing in Court
If probable cause is found, the prosecutor files the information in court. The criminal case proceeds through arraignment, pre-trial, trial, and judgment.
VI. Can the Victim Recover the Money?
Reporting a scammer does not automatically guarantee recovery of money. Recovery depends on whether the funds can be traced, frozen, returned, or awarded through legal proceedings.
Possible recovery routes include:
1. Bank or E-Wallet Reversal
This is possible only in limited circumstances. It depends on the payment provider’s rules, timing, fraud investigation, and whether the money is still available.
2. Freezing or Holding of Funds
In some cases, accounts may be flagged or frozen. Immediate reporting increases the chance that funds have not yet been withdrawn.
3. Restitution in Criminal Case
If the accused is convicted, the court may order payment of civil liability, including the amount defrauded, damages, interest, and costs, depending on the case.
4. Civil Action
The victim may file a separate civil case to recover money or damages, especially when the facts support breach of contract, fraud, unjust enrichment, or other civil claims.
5. Settlement
Some cases are settled, but victims should be careful. Settlement should be documented properly. Accepting partial payment does not automatically erase criminal liability unless the law and circumstances allow compromise effects.
VII. Common Types of Scams in the Philippines
1. Online Selling Scams
These involve fake sellers who accept payment but do not deliver goods.
Common examples:
- Gadgets.
- Concert tickets.
- Shoes.
- Bags.
- Vehicles.
- Appliances.
- Pets.
- Rental properties.
- Travel packages.
Red flags:
- Price is far below market value.
- Seller refuses cash on delivery.
- Seller pressures immediate payment.
- Seller has newly created account.
- Seller refuses video call or meet-up.
- Seller uses stolen photos.
- Seller sends fake IDs or fake receipts.
2. Investment Scams
These scams promise quick or guaranteed profit.
Red flags:
- “Guaranteed income.”
- “No risk.”
- “Double your money.”
- “Limited slots.”
- “Earn daily.”
- “Passive income forever.”
- “Invite more people to earn more.”
- “SEC registered” used misleadingly.
- No audited financial statements.
- No legitimate business activity.
3. Romance Scams
A scammer builds a fake romantic relationship and later asks for money.
Common excuses:
- Medical emergency.
- Travel expenses.
- Customs fees.
- Business problem.
- Military deployment issue.
- Family emergency.
- Frozen bank account.
4. Job Offer Scams
These involve fake employers or recruiters who ask applicants to pay fees.
Common warning signs:
- Payment for training, uniform, processing, medical, visa, or placement.
- Fake work-from-home tasks requiring deposits.
- Salary too high for the job.
- No real interview.
- Use of personal messaging apps only.
- Collection of IDs and bank details before verification.
5. Loan Scams
Scammers offer easy loans but demand advance fees.
Common signs:
- Guaranteed approval.
- No credit check.
- Processing fee before release.
- Request for OTP.
- Harassment of contacts.
- Threats of public shaming.
- Fake lending app.
6. Phishing Scams
These imitate banks, e-wallets, delivery companies, government agencies, or telcos.
Common signs:
- Urgent warning.
- Suspicious link.
- Request for OTP.
- Threat of account closure.
- Incorrect grammar.
- Sender uses unknown number.
- Website URL is slightly misspelled.
7. Fake Government Assistance Scams
Scammers claim to offer ayuda, cash aid, grants, scholarships, benefits, or government payouts.
They may ask for:
- Registration fee.
- Personal information.
- Bank details.
- OTP.
- Processing payment.
- Copies of IDs.
Government benefits generally should be verified through official government channels.
8. Cryptocurrency and Trading Scams
These may involve fake trading platforms, fake profits, fake account dashboards, or fake brokers.
Common signs:
- Withdrawal blocked unless more money is paid.
- Fake trading app.
- Screenshots of fake profits.
- Group chats with fake testimonials.
- “Mentor” or “agent” controls the account.
- Guaranteed daily earnings.
- Refusal to disclose legal registration.
VIII. Legal Remedies Available to Victims
A victim may pursue several remedies depending on the facts.
1. Criminal Complaint
This seeks prosecution and punishment of the offender.
Possible charges may include:
- Estafa.
- Cybercrime-related estafa.
- Identity theft.
- Computer-related fraud.
- Illegal access.
- Threats or coercion.
- Falsification.
- Use of falsified documents.
- Data privacy violations.
- Other related offenses.
2. Civil Claim
This seeks return of money and damages.
Possible civil bases include:
- Fraud.
- Breach of contract.
- Quasi-delict.
- Unjust enrichment.
- Damages under the Civil Code.
3. Administrative Complaint
This may apply when the scam involves a regulated business or professional.
Examples:
- SEC complaint for investment solicitation.
- DTI complaint for consumer issues.
- NPC complaint for data privacy violations.
- BSP-related complaint for financial institutions.
- Professional regulatory complaint, where applicable.
4. Platform-Based Complaint
This may not be a legal case by itself, but it can help:
- Suspend fraudulent accounts.
- Prevent further scams.
- Preserve records.
- Trigger internal investigations.
- Support refund or dispute processes.
IX. Jurisdiction and Venue
Determining where to file can be complicated in scam cases, especially online scams.
Possible places include:
- Where the victim was located when deceived.
- Where payment was sent.
- Where the scammer received the money.
- Where the bank or e-wallet account is maintained.
- Where the online act caused damage.
- Where the accused resides or may be found.
For practical purposes, victims often begin by reporting to the nearest police station, PNP cybercrime unit, NBI cybercrime office, or prosecutor’s office. Authorities can advise on proper venue after reviewing the facts.
X. What to Include in a Complaint-Affidavit
A complaint-affidavit should be organized and factual.
A simple structure is:
1. Introduction
State your name, age, address, and that you are filing a complaint for scam, estafa, cybercrime, or related offenses.
2. Identification of the Respondent
State the scammer’s name, alias, account, phone number, bank details, or any identifying information.
3. Facts of the Scam
Narrate what happened in chronological order:
- When and how the scammer contacted you.
- What the scammer offered or promised.
- What representations were made.
- Why you believed the scammer.
- How much you paid.
- How you paid.
- What happened after payment.
- How the scammer failed to deliver, disappeared, blocked you, or made further demands.
4. Evidence
Mention attached evidence:
- Screenshots.
- Receipts.
- Transaction confirmations.
- Bank records.
- Links.
- IDs.
- Messages.
- Reports.
5. Damage
State the amount lost and other harm suffered, such as emotional distress, reputational harm, account compromise, or additional expenses.
6. Prayer
Request investigation and prosecution for the appropriate offenses.
XI. Sample Complaint-Affidavit Outline
Republic of the Philippines City/Province of __________ Office of the City/Provincial Prosecutor
Complaint-Affidavit
I, [Name], of legal age, Filipino, and residing at [address], after being duly sworn, state:
I am the complainant in this case.
I am filing this complaint against [name/alias/account/number] for acts constituting estafa, cybercrime-related fraud, and other offenses that may be found applicable.
On [date], I saw/responded to [advertisement/message/post] regarding [item/investment/service/job/loan].
The respondent represented that [state the promise or false representation].
Because of these representations, I was induced to send the amount of ₱[amount] through [bank/e-wallet/remittance] to [recipient account name and number] on [date and time].
After receiving payment, the respondent [failed to deliver/blocked me/deleted the account/demanded more money/sent fake proof].
Attached are copies of the following evidence:
- Screenshots of conversations;
- Proof of payment;
- Profile or page of respondent;
- Transaction records;
- Other relevant documents.
I suffered damage in the amount of ₱[amount], excluding other damages and expenses.
I respectfully request that this complaint be investigated and that the respondent be prosecuted for the appropriate offenses.
IN WITNESS WHEREOF, I have signed this affidavit on [date] at [place].
[Signature] [Name]
Subscribed and sworn to before me this [date].
XII. Practical Tips When Reporting
1. Be Organized
Prepare a folder with all files labeled clearly:
- “01 Conversation with Scammer”
- “02 Proof of Payment”
- “03 Scammer Profile”
- “04 Bank Report”
- “05 Platform Report”
This helps investigators and prosecutors understand the case faster.
2. Print Important Evidence
Bring printed copies, but also keep digital copies on a USB drive, phone, or cloud storage.
3. Do Not Edit Screenshots
Avoid cropping or editing screenshots in a way that removes dates, usernames, URLs, or context.
4. Record the Timeline
Make a written timeline with dates, times, amounts, and events.
5. Report Quickly
Time matters. Banks, e-wallets, and platforms may have limited windows for action.
6. Do Not Harass or Threaten the Scammer
Victims should avoid making threats, posting private information unlawfully, or engaging in conduct that could expose them to legal liability.
7. Be Careful With Public Posting
Public warnings may help others, but accusations should be truthful, evidence-based, and carefully worded. False or reckless public accusations may expose the poster to defamation or cyberlibel complaints.
XIII. Reporting When the Scammer Is Unknown
Many scammers use fake names, fake IDs, disposable SIM cards, mule bank accounts, or hacked profiles.
Even if the scammer’s real identity is unknown, a report may still be filed using available identifiers:
- Phone number.
- E-wallet number.
- Bank account.
- Username.
- Profile URL.
- IP-related records, if available through lawful process.
- Email address.
- Website domain.
- Cryptocurrency wallet address.
Law enforcement may request information from platforms, banks, telcos, or service providers through proper legal procedures.
XIV. What Are Mule Accounts?
A mule account is a bank, e-wallet, or payment account used to receive or transfer scam proceeds. Sometimes the account holder is part of the scam. Sometimes the account holder claims to have merely lent, sold, rented, or allowed use of the account.
Victims should still report mule account details because these may help trace the flow of funds.
Account holders who allow their accounts to be used for scams may face legal consequences depending on their knowledge and participation.
XV. SIM Registration and Scam Reports
Because SIM cards in the Philippines are subject to registration requirements, phone numbers used in scams may provide investigative leads.
Victims should include:
- The scammer’s mobile number.
- Screenshots of calls or messages.
- Dates and times of communication.
- Telco provider, if known.
However, SIM registration does not guarantee immediate identification of the scammer because criminals may use stolen identities, fake documents, registered mule SIMs, or foreign numbers.
XVI. Online Seller Scam: Special Considerations
For fake online sellers, the complaint should prove:
- The seller offered an item or service.
- The seller made representations that induced payment.
- The buyer paid.
- The seller failed to deliver or delivered something materially different.
- The seller acted fraudulently.
Mere failure to deliver is not always automatically estafa. The key issue is whether there was fraud or deceit at the beginning or during the transaction.
Evidence of fraud may include:
- Fake identity.
- Fake tracking number.
- Repeated excuses.
- Multiple victims.
- Blocking after payment.
- Deleting the account.
- Same item sold repeatedly to different people.
- Use of stolen photos.
- No intention to deliver.
XVII. Investment Scam: Special Considerations
For investment scams, victims should preserve:
- Investment pitch.
- Promised returns.
- Contracts or receipts.
- Group chat messages.
- Payment records.
- Names of recruiters.
- SEC registration claims.
- Promotional materials.
- Screenshots of dashboards or fake earnings.
- Withdrawal requests and refusals.
- Proof of recruitment commissions.
Victims should report both the entity and individual promoters or recruiters when their identities are known.
XVIII. Phishing Scam: Special Considerations
For phishing, victims should immediately:
- Change passwords.
- Contact the bank or e-wallet.
- Request account blocking or transaction dispute.
- Report unauthorized transactions.
- Preserve the phishing message or email.
- Avoid clicking the link again.
- Scan devices for malware.
- Report the phishing URL or account.
Evidence should include:
- The phishing text or email.
- Sender number or address.
- Link URL.
- Time received.
- Unauthorized transaction records.
- Device notifications.
- Bank or e-wallet alerts.
XIX. Romance Scam: Special Considerations
Romance scam victims may feel embarrassed, but reporting is important. These scams are often operated by organized groups.
Useful evidence includes:
- Chat history.
- Profile link.
- Photos used.
- Money transfer records.
- Voice or video call records, if any.
- Promises of repayment.
- Emergency stories used.
- Names and accounts of third-party recipients.
Victims should avoid sending more money to “recover” previous payments. Recovery scams often target people who have already been scammed.
XX. What Not to Do After Being Scammed
Avoid these common mistakes:
- Deleting conversations out of anger or embarrassment.
- Paying more money to recover previous funds.
- Hiring “hackers” to trace or recover money.
- Posting accusations without preserving evidence.
- Threatening the scammer.
- Sending personal documents to strangers claiming to help.
- Trusting recovery agents who demand upfront fees.
- Waiting too long to report to banks or e-wallets.
- Assuming a police blotter alone is enough to prosecute.
- Filing an incomplete complaint without proof of payment.
XXI. Difference Between a Police Blotter and a Formal Complaint
A police blotter is an official record that an incident was reported. It does not automatically mean a criminal case has been filed in court.
A formal criminal complaint usually requires affidavits and evidence submitted to law enforcement or the prosecutor.
A victim who wants prosecution should ask what additional steps are needed after the blotter entry.
XXII. Can a Group of Victims File Together?
Yes. Multiple victims may coordinate, especially in investment scams, online selling scams, or organized fraud schemes.
Group reporting may help show:
- Pattern of fraud.
- Common scheme.
- Multiple complainants.
- Larger amount of damage.
- Organized activity.
- Use of the same accounts, scripts, or methods.
Each victim should still prepare individual proof of payment and individual narration of what happened.
XXIII. Prescriptive Periods
Criminal and civil actions are subject to prescriptive periods. The applicable period depends on the offense, penalty, amount involved, and legal classification.
Victims should avoid delay. Even when the prescriptive period has not yet expired, evidence may disappear, accounts may be deleted, and money may be moved.
XXIV. Role of Lawyers
A lawyer can help by:
- Evaluating the correct charges.
- Drafting the complaint-affidavit.
- Organizing evidence.
- Representing the victim during preliminary investigation.
- Filing civil claims.
- Coordinating with banks, platforms, and authorities.
- Advising on settlement.
- Avoiding defamatory or legally risky public statements.
For small claims or consumer matters, some victims may proceed without a lawyer, but criminal complaints involving cybercrime, large losses, multiple accused, or complex evidence are best handled with legal assistance.
XXV. Data Privacy and Defamation Caution
Victims often want to expose scammers online. While warning the public may be understandable, Philippine law also protects reputation and personal data.
Before posting publicly, victims should consider:
- Is the information true and supported by evidence?
- Is the person correctly identified?
- Are private details unnecessarily exposed?
- Is the post written as a factual warning rather than an insult?
- Could the post affect an innocent person whose identity was stolen?
- Could the scammer have used a mule account or fake identity?
A safer public warning usually focuses on the modus, account names, page links, and documented facts, while avoiding unnecessary insults or unsupported accusations.
XXVI. Checklist for Reporting a Scammer
Before going to the police, NBI, PNP cybercrime office, prosecutor, or agency, prepare:
- Government ID of the complainant.
- Written timeline.
- Complaint-affidavit draft, if available.
- Screenshots of conversations.
- Links to profiles, pages, listings, or websites.
- Proof of payment.
- Bank or e-wallet reference numbers.
- Recipient account name and number.
- Phone numbers and email addresses used.
- Platform complaint reference numbers.
- Names of witnesses.
- Copies of contracts, receipts, advertisements, or promises.
- Digital copies of all evidence.
XXVII. Legal Article Summary
Reporting a scammer in the Philippines requires both speed and documentation. The victim should preserve evidence, immediately notify the bank or payment provider, secure compromised accounts, and report to the proper authority depending on the type of scam.
For online fraud, the PNP Anti-Cybercrime Group and NBI Cybercrime Division are commonly involved. For criminal prosecution, a complaint may be brought before the prosecutor. For investment scams, the SEC may be involved. For consumer disputes, the DTI may be appropriate. For misuse of personal data, the National Privacy Commission may act. For bank, e-wallet, and payment issues, the financial institution must be notified immediately.
A scam may be prosecuted as estafa, cybercrime-related fraud, identity theft, falsification, data privacy violation, or another offense depending on the facts. The strength of the case depends on proof of deceit, proof of payment, proof of damage, and identification of the scammer or accounts used.
The most important rule is to act quickly, preserve everything, and report through the proper channels. Scammers rely on confusion, shame, delay, and incomplete evidence. A well-documented report gives victims the best chance of investigation, prosecution, and possible recovery.