I. Introduction
Scams in the Philippines may be committed through text messages, social media, online marketplaces, investment schemes, dating platforms, fake job offers, phishing emails, fake government pages, identity theft, or direct personal transactions. A scam is not merely a private inconvenience. Depending on the facts, it may amount to a criminal offense, a civil wrong, an administrative violation, or all three.
Reporting a scammer properly matters because different government agencies handle different kinds of fraud. A complaint involving online banking fraud may require coordination with the bank, the Philippine National Police Anti-Cybercrime Group, the National Bureau of Investigation Cybercrime Division, and possibly the Bangko Sentral ng Pilipinas. A fake investment scheme may involve the Securities and Exchange Commission. A deceptive online seller may involve the Department of Trade and Industry. A hacked e-wallet or unauthorized digital transaction may involve the wallet provider, bank, police, and regulators.
This article explains the legal framework, reporting channels, evidence preparation, complaint process, and practical considerations for scam victims in the Philippines.
II. What Is a Scam Under Philippine Law?
There is no single offense called “scamming” that covers every situation. In Philippine legal practice, the conduct may fall under several laws depending on how the scam was committed.
A. Estafa under the Revised Penal Code
Many scams are prosecuted as estafa, or swindling, under Article 315 of the Revised Penal Code. Estafa generally involves defrauding another person through abuse of confidence, deceit, false pretenses, fraudulent acts, or similar means.
Common examples include:
- Pretending to sell an item online and disappearing after receiving payment.
- Borrowing money using false representations.
- Receiving money for a promised service and never intending to perform.
- Misrepresenting one’s identity, authority, business, or capacity to induce payment.
- Using fake receipts, fake screenshots, fake tracking numbers, or forged proof of payment.
The heart of estafa is deceit or fraud that causes damage to another.
B. Cybercrime if Committed Through Technology
If the scam was committed through a computer system, internet platform, mobile phone, email, messaging app, social media account, online wallet, or similar digital channel, the case may involve the Cybercrime Prevention Act of 2012, Republic Act No. 10175.
Under this law, certain crimes under the Revised Penal Code may be treated as cybercrimes when committed through information and communications technology. Online estafa, identity theft, phishing, hacking, account takeover, and fraudulent online schemes may fall within the cybercrime framework.
A scam committed through Facebook, Messenger, Instagram, TikTok, Shopee, Lazada, Viber, Telegram, WhatsApp, email, SMS, or an e-wallet platform may therefore be reported as a cybercrime-related complaint.
C. Identity Theft
If the scammer used another person’s name, photo, account, company identity, government logo, or personal information, the matter may involve identity theft under cybercrime law or related offenses.
Examples include:
- Fake profiles using someone else’s photos.
- Fake pages pretending to be banks, government offices, courier services, or legitimate companies.
- Use of stolen IDs to open accounts.
- Use of a victim’s name to borrow money or solicit funds.
- Account takeovers used to message friends or relatives for money.
D. Phishing and Unauthorized Access
Phishing involves tricking a person into giving sensitive information such as passwords, OTPs, PINs, card details, e-wallet credentials, or banking information. Depending on the facts, it may involve computer-related fraud, identity theft, unauthorized access, misuse of devices, or other cybercrime violations.
Victims should act quickly because stolen credentials may lead to further unauthorized transactions.
E. Investment Scams
Investment scams may involve promises of guaranteed income, unusually high returns, referral commissions, cryptocurrency profits, forex trading, “double your money” schemes, fake cooperatives, fake lending platforms, fake crowdfunding, or unauthorized solicitation of investments.
These may involve violations of securities laws, including unauthorized sale or solicitation of securities, depending on the structure of the scheme. The Securities and Exchange Commission is usually the relevant agency for suspected illegal investment-taking activities.
F. Online Selling and Consumer Fraud
If the scam involves defective goods, non-delivery of paid items, misleading advertisements, false promotions, deceptive sales practices, or online marketplace fraud, it may involve consumer protection laws and may be reported to the Department of Trade and Industry, in addition to law enforcement when criminal fraud is present.
G. E-Wallet, Bank, and Payment Fraud
Scams involving bank transfers, credit cards, debit cards, QR codes, online banking, GCash, Maya, Coins.ph, GrabPay, or other payment platforms may involve financial consumer protection rules, cybercrime, estafa, identity theft, or unauthorized transactions.
The victim should immediately report the transaction to the bank or wallet provider and request account freezing, transaction tracing, chargeback review, dispute handling, or preservation of records.
III. First Steps After Discovering the Scam
Time is important. The first few hours can affect whether funds can be frozen, accounts can be traced, or digital evidence can be preserved.
A. Stop Further Communication or Payments
Do not send additional money, IDs, OTPs, passwords, selfies, bank information, or documents. Scammers often pressure victims with false claims such as “processing fees,” “tax clearance,” “unlocking fees,” “courier fees,” “anti-money laundering fees,” or “final payment.”
B. Preserve Evidence Immediately
Do not delete chats, transaction records, emails, SMS messages, call logs, account profiles, or payment confirmations. Screenshots are useful, but original records are better.
Preserve:
- Full name or alias used by the scammer.
- Profile links and usernames.
- Phone numbers.
- Email addresses.
- Bank account names and numbers.
- E-wallet numbers and account names.
- QR codes.
- Receipts and proof of transfer.
- Screenshots of conversations.
- URLs of fake websites or pages.
- Tracking numbers, invoices, or fake documents.
- IDs or documents sent by the scammer.
- Dates and times of all communications.
- Names of witnesses.
- Delivery records, order confirmations, or marketplace transaction IDs.
- IP logs or login alerts, if available.
- Platform reports or ticket numbers.
For digital evidence, take screenshots that show the date, time, account name, profile URL, and full conversation context. Avoid cropped screenshots when possible.
C. Notify the Bank, E-Wallet, or Payment Provider
Immediately report the transaction to the financial institution used. Request urgent assistance, including:
- Freezing or holding the recipient account, if still possible.
- Reversal or dispute processing, if available.
- Preservation of transaction records.
- Issuance of a complaint reference number.
- Written confirmation of the report.
- Instructions for filing a formal dispute.
Banks and e-wallet providers may have internal rules and deadlines. Delay may reduce the chance of recovery.
D. Report the Account to the Platform
Report the scammer’s account, page, listing, store, or post to the relevant platform, such as Facebook, Instagram, TikTok, X, Telegram, Shopee, Lazada, Carousell, Marketplace, or email service provider.
However, reporting to a platform is not the same as filing a criminal complaint. Platform reporting may remove content, but law enforcement reporting is usually needed for investigation and prosecution.
E. Avoid Publicly Posting Accusations Without Care
Victims often want to warn others. That is understandable, but public posts naming a person as a scammer may expose the victim to defamation, cyberlibel, privacy, or harassment allegations if the post is excessive, inaccurate, or unsupported.
A safer approach is to report to authorities first, preserve evidence, and phrase public warnings carefully if needed.
IV. Where to Report a Scammer in the Philippines
The correct reporting office depends on the nature of the scam.
A. Philippine National Police Anti-Cybercrime Group
The PNP Anti-Cybercrime Group handles cybercrime-related complaints, including online scams, phishing, hacking, fake accounts, identity theft, online extortion, unauthorized access, and online estafa.
Report here when the scam involved:
- Social media.
- Messaging apps.
- Email.
- Online marketplaces.
- Online banking.
- E-wallets.
- Fake websites.
- Phishing links.
- Digital impersonation.
- Online investment schemes.
Victims may usually file a complaint at a PNP cybercrime office or through official cybercrime reporting channels. A personal appearance may be required for affidavit execution and evidence submission.
B. National Bureau of Investigation Cybercrime Division
The NBI Cybercrime Division also handles cybercrime complaints. Victims may report online fraud, identity theft, phishing, hacking, fake accounts, unauthorized access, and other computer-related offenses.
The NBI may require:
- A written complaint.
- Valid government ID.
- Evidence printouts.
- Digital copies of evidence.
- Affidavit of complaint.
- Transaction records.
- Contact details of the complainant.
- Details identifying the suspect, if known.
The NBI and PNP have separate investigative structures. A victim may choose one, and in some situations may coordinate with both, but duplicative filings should be managed carefully to avoid confusion.
C. Barangay, Police Station, or Prosecutor’s Office
For scams not involving technology, a complaint may be filed with the local police or directly with the prosecutor’s office. Examples include face-to-face fraud, fake business deals, personal borrowing scams, fake employment placement, forged documents, or physical delivery fraud.
If the scam is between individuals residing in the same city or municipality and involves certain disputes, barangay conciliation may sometimes be considered. However, criminal cases punishable above certain thresholds or cases involving parties from different localities may proceed outside barangay conciliation. Cybercrime and complex fraud matters are usually better directed to law enforcement or the prosecutor.
D. Department of Justice Office of Cybercrime
The DOJ Office of Cybercrime is involved in cybercrime policy, coordination, and certain cybercrime-related functions. Individual victims are often directed to investigative agencies such as the PNP Anti-Cybercrime Group or NBI Cybercrime Division for complaint intake and investigation.
E. Securities and Exchange Commission
Report to the SEC when the scam involves:
- Investment solicitation.
- Promised profits or guaranteed returns.
- Ponzi-style recruitment.
- Crypto investment pools.
- Forex or trading schemes.
- Sale of shares, tokens, units, packages, or investment contracts.
- Unregistered corporations soliciting funds.
- Fake lending or financing companies.
- Unauthorized entities using corporate names.
The SEC may issue advisories, investigate violations, revoke registrations, impose sanctions, and refer matters for criminal prosecution.
F. Department of Trade and Industry
Report to the DTI when the issue involves consumer transactions, deceptive sales practices, non-delivery of goods, misleading advertisements, unfair trade practices, or disputes with registered businesses.
DTI may be appropriate when:
- A seller is a legitimate business but violated consumer rights.
- The dispute involves a defective product or misleading advertising.
- An online seller failed to deliver goods.
- A business refused refund, repair, replacement, or proper remedy.
- The transaction is commercial and consumer-related.
If the seller never intended to deliver and used fake identity or false pretenses, law enforcement reporting may also be appropriate.
G. Bangko Sentral ng Pilipinas
The BSP handles complaints against BSP-supervised financial institutions, such as banks, e-money issuers, and other regulated financial entities.
Report to BSP when:
- The bank or e-wallet provider failed to act on a complaint.
- There is an unresolved unauthorized transaction.
- The financial institution failed to follow dispute procedures.
- The issue concerns consumer protection obligations of a regulated financial institution.
Usually, the victim should first file a complaint with the bank or e-wallet provider before escalating to BSP.
H. National Privacy Commission
Report to the National Privacy Commission when the scam involves misuse, unauthorized processing, or breach of personal data.
Examples include:
- Use of stolen ID documents.
- Unauthorized disclosure of personal information.
- Data breach leading to fraud.
- A company mishandling personal data.
- Personal information used to open accounts or commit fraud.
The NPC is not primarily a scam recovery agency, but it may address privacy violations connected to the scam.
I. Cybercrime Investigation and Coordinating Center
The Cybercrime Investigation and Coordinating Center is a government body involved in cybercrime coordination and public reporting mechanisms. It may be relevant for certain cybercrime reports, especially those involving online threats, phishing, malicious links, and digital fraud.
J. Online Platform, Marketplace, or Telco
A platform report is useful for account takedown, content preservation, internal investigation, and possible account suspension.
Report to:
- Social media platforms for fake profiles and scam pages.
- Online marketplaces for fraudulent sellers.
- Telcos for scam text messages or SIM-related complaints.
- Email providers for phishing emails.
- Web hosts or domain registrars for fake websites.
- Courier companies for fake delivery scams.
Platform reporting should supplement, not replace, law enforcement reporting.
V. Evidence Needed to Report a Scammer
A strong complaint is evidence-driven. The more organized the evidence, the easier it is for authorities to understand what happened.
A. Personal Information of the Complainant
Prepare:
- Full name.
- Address.
- Contact number.
- Email address.
- Valid government ID.
- Relationship to the transaction.
- Bank or e-wallet account used, if relevant.
B. Identity of the Suspect
Provide all known details:
- Name used.
- Real name, if known.
- Alias.
- Phone number.
- Email address.
- Social media profile.
- Marketplace store name.
- Bank or e-wallet recipient details.
- Address, if known.
- Photos or IDs sent by the suspect.
- Business registration details, if any.
- Vehicle plate number, if relevant.
- Courier details, if relevant.
Even partial identifiers can help.
C. Transaction Records
Include:
- Bank transfer receipts.
- E-wallet receipts.
- Reference numbers.
- Account names.
- Account numbers.
- QR payment details.
- Dates and times.
- Amounts sent.
- Payment channel used.
- Deposit slips.
- Remittance receipts.
- Crypto wallet addresses, if any.
D. Communications
Preserve:
- Full chat history.
- SMS logs.
- Emails with headers, if possible.
- Voice messages.
- Call logs.
- Screenshots of posts and listings.
- Profile pages.
- Group chat messages.
- Links sent by the scammer.
- Deleted message notices.
For chat screenshots, include the account name, profile picture, date, time, and sequence of conversation.
E. Digital Evidence Preservation
Good digital evidence should be:
- Complete.
- Authentic.
- Chronological.
- Traceable.
- Unaltered.
- Supported by original files when available.
Avoid editing screenshots beyond redacting sensitive information for public sharing. For authorities, provide complete copies.
F. Written Timeline
Prepare a clear timeline:
- When contact began.
- What the scammer promised.
- What representations were made.
- Why the victim believed the scammer.
- When payment was made.
- What happened after payment.
- Attempts to contact the scammer.
- Losses suffered.
- Reports already made.
- Reference numbers from banks, platforms, or agencies.
A timeline helps show deceit, reliance, payment, and damage.
VI. How to Draft a Complaint-Affidavit
A complaint-affidavit is often required in criminal complaints. It is a sworn written statement narrating the facts and attaching evidence.
A basic structure may include:
A. Caption
Identify the complainant, respondent, and offense, if known.
Example:
Complaint-Affidavit for Estafa, Online Estafa, Identity Theft, and Other Applicable Offenses
B. Personal Circumstances
State the complainant’s name, age, citizenship, civil status, address, and capacity to file the complaint.
C. Narrative of Facts
Describe the events in chronological order. Avoid emotional exaggeration. Stick to facts.
Include:
- How the complainant met or contacted the suspect.
- What the suspect represented.
- What the complainant relied upon.
- What payment or action was made.
- What happened afterward.
- Why the complainant believes there was fraud.
- Total damage suffered.
D. Evidence References
Label attachments clearly:
- Annex “A” — screenshot of profile.
- Annex “B” — chat conversation.
- Annex “C” — proof of bank transfer.
- Annex “D” — demand message.
- Annex “E” — platform report.
- Annex “F” — bank complaint reference.
E. Prayer or Request
Ask the investigating authority to investigate and prosecute the respondent for the appropriate offenses.
F. Signature and Jurat
The affidavit must be signed and sworn before a prosecutor, notary public, or authorized officer, depending on the filing procedure.
VII. Sample Complaint-Affidavit Format
Republic of the Philippines City/Municipality of ________
COMPLAINT-AFFIDAVIT
I, [Name], of legal age, Filipino, residing at [address], after being duly sworn, state:
I am the complainant in this case.
On or about [date], I came across [name/profile/page/listing] offering [item/service/investment/job/etc.] through [platform].
The person using the name [name/alias] represented that [state promise or false representation].
Relying on these representations, I sent the amount of PHP [amount] through [bank/e-wallet/remittance] to [recipient account name and number] on [date and time], with reference number [reference number].
After receiving payment, the said person [blocked me/stopped replying/failed to deliver/sent fake proof/made additional demands/etc.].
I later discovered that [state facts showing fraud, such as fake account, repeated complaints, false identity, fake receipt, non-existent business, etc.].
I suffered damage in the amount of PHP [amount], aside from inconvenience, expenses, and other losses.
Attached are copies of the relevant evidence:
- Annex “A” — screenshots of the profile/listing;
- Annex “B” — screenshots of our conversation;
- Annex “C” — proof of payment;
- Annex “D” — bank/e-wallet complaint reference;
- Annex “E” — other supporting documents.
I am executing this affidavit to request the investigation and prosecution of [name/alias/unknown person] for estafa, cybercrime-related offenses, identity theft, and such other offenses as may be warranted by the evidence.
IN WITNESS WHEREOF, I have signed this affidavit this ___ day of ______, 20, in ________, Philippines.
[Signature] [Name of Complainant]
SUBSCRIBED AND SWORN to before me this ___ day of ______, 20, affiant exhibiting competent proof of identity: [ID details].
VIII. Reporting Online Scams: Step-by-Step
Step 1: Secure Accounts
Immediately change passwords for email, banking, e-wallets, and social media accounts. Enable two-factor authentication. Log out unknown devices. Revoke suspicious app permissions.
Step 2: Report to Payment Provider
Contact the bank, e-wallet, remittance center, or card issuer. Ask for urgent fraud handling. Record the ticket number.
Step 3: Preserve Digital Evidence
Save screenshots, download conversations, copy URLs, export emails, and keep receipts. Do not delete the account or conversation.
Step 4: Prepare a Timeline and Complaint
Write a concise timeline and draft a complaint-affidavit. Organize attachments.
Step 5: File with Cybercrime Authorities
For online scams, file with the PNP Anti-Cybercrime Group or NBI Cybercrime Division.
Step 6: File with Specialized Agencies
Depending on the case, also report to:
- SEC for investment scams.
- DTI for consumer transactions.
- BSP for bank or e-wallet complaint escalation.
- NPC for personal data misuse.
- Platform or telco for takedown and account action.
Step 7: Follow Up
Keep reference numbers. Ask for the status of investigation, required additional documents, or prosecutor referral.
IX. Common Types of Scams and Where to Report Them
| Type of Scam | Possible Offense or Issue | Where to Report |
|---|---|---|
| Online seller disappears after payment | Estafa, online fraud | PNP ACG, NBI Cybercrime, platform, DTI if consumer-related |
| Phishing link steals bank details | Cybercrime, identity theft, unauthorized transaction | Bank/e-wallet, PNP ACG, NBI Cybercrime |
| Fake investment scheme | Securities violation, estafa | SEC, PNP/NBI |
| Fake job offer requiring fees | Estafa, illegal recruitment if overseas or employment-related | PNP/NBI, DMW/DOLE if applicable |
| Romance scam | Estafa, cybercrime | PNP ACG, NBI Cybercrime |
| Fake government assistance page | Identity theft, cybercrime, fraud | PNP ACG, NBI Cybercrime, concerned agency |
| SIM text scam | Fraud, cybercrime, possible telco/SIM issue | Telco, PNP ACG, NBI Cybercrime |
| Unauthorized e-wallet transfer | Financial fraud, cybercrime | E-wallet provider, PNP/NBI, BSP escalation |
| Fake lending app harassment | Data privacy, harassment, unfair collection | NPC, SEC if lending entity, PNP/NBI |
| Crypto investment scam | Estafa, securities issue, cybercrime | SEC, PNP/NBI, exchange/platform |
X. Special Issues in Scam Reporting
A. What If the Scammer Is Unknown?
A complaint may still be filed against an unknown person identified by alias, username, phone number, email address, wallet address, bank account, or profile URL. Authorities may seek records from platforms or financial institutions through lawful processes.
B. What If the Scammer Used a Fake Name?
Use all available identifiers. A fake name does not prevent investigation. Bank records, SIM registration details, IP logs, device data, account recovery information, and platform records may help identify the person, subject to legal procedures.
C. What If the Bank Account Name Is Different?
Include the recipient bank account name and number. The named account holder may be investigated as the direct recipient, mule account holder, or possible participant. However, some account holders may also be victims of identity theft or account misuse, so evidence is important.
D. What If the Scammer Is Abroad?
Cross-border scams are more difficult but still reportable. Provide all digital identifiers, platform links, payment trails, and foreign contact information. Authorities may coordinate through proper channels, but recovery and prosecution may be more complex.
E. What If the Amount Is Small?
Small-value scams may still be reported. Repeated small scams can establish a pattern. Victims should preserve evidence and report, especially if the same account has defrauded multiple people.
F. What If There Are Multiple Victims?
Multiple victims may file separate complaints or coordinate evidence. Group complaints can show pattern, intent, and repeated fraud. Each victim should still provide personal proof of payment and communications.
G. What If the Scammer Offers to Refund?
A refund may affect the civil aspect of the case but does not automatically erase criminal liability if a crime was committed. Any settlement should be documented in writing. Be cautious of fake refund schemes requiring more payment.
H. What If the Scammer Threatens the Victim?
Threats, blackmail, doxxing, harassment, or extortion should be reported separately. Preserve all threatening messages. If there is immediate danger, contact local police or emergency assistance.
XI. Legal Remedies Available to Victims
A. Criminal Complaint
A criminal complaint seeks investigation and prosecution. The goal is punishment of the offender and, in some cases, restitution or civil liability arising from the offense.
Possible offenses include:
- Estafa.
- Cybercrime-related estafa.
- Identity theft.
- Computer-related fraud.
- Unauthorized access.
- Falsification.
- Use of fictitious name.
- Illegal recruitment.
- Securities violations.
- Data privacy violations.
- Other crimes depending on facts.
B. Civil Action
A victim may also pursue a civil action to recover money or damages. In some cases, the civil action is deemed included in the criminal action unless reserved or separately filed, depending on procedure.
Civil remedies may include:
- Recovery of the amount lost.
- Actual damages.
- Moral damages in proper cases.
- Attorney’s fees in proper cases.
- Costs of suit.
- Other damages allowed by law.
C. Small Claims
If the issue is primarily recovery of money and the amount falls within the jurisdictional threshold for small claims, a victim may consider a small claims case. Small claims procedures are designed to be faster and do not require lawyers. However, small claims are civil in nature and do not result in criminal punishment.
Small claims may be useful when the identity and address of the respondent are known. It is less useful when the scammer is anonymous, overseas, or using fake details.
D. Administrative Complaint
Administrative remedies may be available before agencies such as SEC, DTI, BSP, NPC, DOLE, DMW, or other regulators, depending on the scam.
Administrative proceedings may result in sanctions, warnings, takedowns, revocation, penalties, or regulatory enforcement.
XII. Reporting Investment Scams
Investment scams are common in the Philippines and often use attractive phrases such as:
- Guaranteed income.
- No risk.
- Double your money.
- Passive income.
- Daily payout.
- Referral bonus.
- Crypto mining.
- AI trading.
- Forex bot.
- Paluwagan-style investment.
- Franchise package.
- Cooperative investment.
- Staking pool.
- Trading signals.
- Pre-selling token or coin.
A. Warning Signs
A scheme may be suspicious if it:
- Promises unusually high returns.
- Requires recruitment to earn.
- Has no clear product or legitimate business.
- Refuses to show SEC registration or authority to solicit investments.
- Uses celebrity photos or fake endorsements.
- Pressures immediate payment.
- Claims limited slots.
- Offers guaranteed profits from volatile markets.
- Uses vague terms like “trading,” “arbitrage,” or “AI bot” without proof.
- Pays early investors using money from new investors.
B. How to Report
Prepare:
- Name of entity.
- Names of promoters.
- Websites and social media pages.
- Investment contracts or receipts.
- Screenshots of promises.
- Proof of payment.
- Referral structure.
- SEC registration claims.
- Group chat records.
- Promotional materials.
Report to the SEC and, where fraud is present, to PNP or NBI.
XIII. Reporting Online Shopping Scams
Online shopping scams may involve fake sellers, fake payment confirmations, bogus buyers, empty parcels, wrong items, counterfeit goods, or non-delivery.
A. Evidence to Gather
- Product listing.
- Seller profile.
- Conversation.
- Proof of payment.
- Delivery tracking.
- Photos or video of parcel opening.
- Order number.
- Platform complaint ticket.
- Seller’s name and contact details.
B. Platform Remedies
If the transaction occurred inside a marketplace with escrow or buyer protection, use the platform’s dispute process immediately. Do not click “order received” if the item was not received or was defective.
C. Legal Reporting
For deliberate fraud, report to cybercrime authorities. For consumer disputes with identifiable businesses, report to DTI. For courier-related issues, preserve waybill and delivery evidence.
XIV. Reporting Bank, Card, and E-Wallet Scams
A. Immediate Actions
- Lock the card or account.
- Change passwords and PINs.
- Call the official hotline.
- File a fraud dispute.
- Ask for written acknowledgment.
- Report unauthorized transactions.
- Preserve SMS and email alerts.
- Do not share OTPs or credentials.
B. Documents to Prepare
- Account name.
- Account number or wallet number.
- Transaction reference number.
- Amount.
- Date and time.
- Merchant or recipient details.
- Screenshot of unauthorized transaction.
- Complaint ticket number.
- Police or cybercrime report, if available.
C. Escalation
If the financial institution does not address the complaint properly, escalation to BSP may be considered after going through the provider’s complaint process.
XV. Reporting Text Scams and SIM-Related Fraud
Text scams may involve fake delivery notices, bank alerts, government aid, job offers, raffle prizes, casino links, phishing links, fake loan offers, or impersonation.
A. What to Preserve
- Sender number or sender ID.
- Full message.
- Date and time received.
- Link included.
- Screenshots.
- Any resulting loss or unauthorized transaction.
B. Where to Report
Report to the telco, cybercrime authorities, and involved financial institution if money was lost.
Do not click suspicious links. Do not reply with personal information. Do not provide OTPs.
XVI. Reporting Fake Lending Apps and Harassment
Some lending app scams involve excessive interest, unauthorized access to contacts, public shaming, threats, fake legal notices, and abusive collection.
Possible reporting channels include:
- SEC, for lending or financing company violations.
- NPC, for misuse of contacts, photos, IDs, or personal data.
- PNP/NBI, for threats, harassment, extortion, or cybercrime.
- App store platform, for abusive app behavior.
Preserve screenshots of threats, call logs, contact-shaming messages, privacy permissions, loan terms, and proof of payment.
XVII. Reporting Job and Recruitment Scams
Fake job scams may ask for processing fees, training fees, medical fees, visa fees, uniform fees, placement fees, or document fees. Some use fake company names or fake overseas employers.
A. Domestic Job Scams
Report to police or NBI if there is fraud. If a legitimate employer or agency violates labor rules, DOLE may be relevant.
B. Overseas Job Scams
For overseas employment scams, report to the appropriate labor or migrant worker authorities and law enforcement. Illegal recruitment may be a serious criminal offense, especially if committed by a syndicate or in large scale.
C. Evidence
- Job advertisement.
- Recruiter profile.
- Company name used.
- Receipts.
- Contracts.
- Chat messages.
- Fake deployment documents.
- Passport or ID copies sent.
- Names of other victims.
XVIII. Reporting Romance Scams
Romance scams usually involve emotional manipulation, fake emergencies, medical expenses, customs fees, business problems, travel funds, or fake parcel charges.
A. Red Flags
- Rapid declaration of love.
- Refusal to video call.
- Claim of being abroad, military, seafarer, doctor, or businessman.
- Sudden emergency.
- Request for money through remittance, bank, e-wallet, or crypto.
- Use of stolen photos.
- Claims that a package is held by customs.
- Threats after refusal.
B. Reporting
Report to PNP ACG or NBI Cybercrime if online. Also report to the platform and payment provider.
XIX. Reporting Blackmail, Sextortion, and Online Extortion
Some scammers threaten to release private photos, videos, conversations, or false accusations unless the victim pays.
A. Immediate Steps
- Do not pay.
- Preserve all messages.
- Screenshot profiles and threats.
- Report to platform.
- Report to cybercrime authorities.
- Tell trusted persons if safety is at risk.
- Lock social media privacy settings.
- Do not negotiate further.
B. Legal Issues
Depending on the facts, offenses may include grave threats, unjust vexation, coercion, robbery/extortion, cybercrime, voyeurism-related offenses, child protection offenses if minors are involved, or data privacy violations.
If the victim is a minor, the matter is especially serious and should be reported immediately to authorities.
XX. What Happens After Filing a Report?
A. Complaint Intake
The agency receives the complaint, examines evidence, and may ask clarifying questions.
B. Investigation
Investigators may:
- Review documents.
- Trace accounts.
- Coordinate with banks or platforms.
- Request subscriber information through legal channels.
- Conduct interviews.
- Identify suspects.
- Refer the matter for inquest or preliminary investigation where appropriate.
C. Preliminary Investigation
For offenses requiring preliminary investigation, the prosecutor evaluates whether probable cause exists. The complainant may need to submit affidavits, evidence, and supplemental documents.
D. Filing in Court
If probable cause is found, an information may be filed in court. The criminal case proceeds through arraignment, pre-trial, trial, and judgment.
E. Recovery of Money
Reporting does not guarantee recovery. Recovery depends on whether funds remain traceable, whether accounts can be frozen, whether the suspect has assets, and whether the court orders restitution or damages.
XXI. Practical Tips for a Stronger Report
- Be chronological.
- Keep emotions out of the affidavit.
- Attach proof for every major claim.
- Label evidence clearly.
- Provide both screenshots and original files when available.
- Include reference numbers from bank, e-wallet, platform, or telco reports.
- Identify all accounts used by the scammer.
- State the exact amount lost.
- Do not exaggerate facts.
- Do not submit edited or misleading evidence.
- Keep copies of everything filed.
- Follow up politely and consistently.
- Coordinate with other victims if there are many.
- Avoid paying “recovery agents” who promise guaranteed retrieval of funds.
- Beware of secondary scams targeting scam victims.
XXII. Common Mistakes Victims Make
A. Deleting Evidence
Deleting chats, profiles, emails, or transaction records weakens the complaint.
B. Sending More Money
Scammers often invent new fees after the first payment. Stop paying immediately.
C. Reporting Only to Social Media
Platform reporting may remove the account but may not start a criminal investigation.
D. Posting Without Evidence
Public accusations can create legal risk. Evidence should be preserved and submitted to authorities.
E. Waiting Too Long
Delays may allow funds to be withdrawn, accounts to be closed, or evidence to disappear.
F. Relying on Screenshots Alone
Screenshots are useful, but original records, URLs, transaction numbers, and platform data are stronger.
G. Filing in the Wrong Office Only
A DTI complaint may not be enough for criminal fraud. A police report may not address SEC violations. Multiple channels may be needed.
XXIII. Demand Letters: Are They Required?
A demand letter is not always required, but it can be useful in some cases, especially where the transaction might be framed as a debt, failed delivery, or contractual obligation. In estafa cases, demand and failure to pay or deliver may help show misappropriation or fraudulent intent in certain factual settings.
A demand letter should state:
- The transaction.
- Amount paid.
- Obligation promised.
- Failure to comply.
- Deadline for refund or delivery.
- Warning that legal remedies may be pursued.
- Contact details.
Do not threaten illegal action. Do not use abusive language.
XXIV. Sample Demand Letter
[Date]
[Name of Recipient] [Address / Email / Contact Information]
Subject: Demand for Refund / Compliance
Dear [Name],
On [date], I paid you the amount of PHP [amount] through [payment method] for [item/service/purpose]. You represented that [state promise].
Despite payment, you failed to [deliver the item/render the service/return the money]. Attached are copies of the relevant proof of payment and communications.
I demand that you refund the amount of PHP [amount] or fully comply with your obligation within [number] days from receipt of this letter.
Failure to do so will leave me constrained to pursue appropriate legal remedies before the proper authorities.
Sincerely, [Name]
XXV. Can a Victim Recover the Money?
Recovery is possible but not guaranteed.
A. Possible Recovery Channels
- Bank or e-wallet freeze.
- Chargeback or dispute process.
- Marketplace buyer protection.
- Voluntary refund.
- Settlement.
- Restitution in criminal case.
- Civil judgment.
- Small claims judgment.
- Asset recovery after conviction.
B. Factors Affecting Recovery
- Speed of reporting.
- Whether funds remain in the account.
- Accuracy of recipient details.
- Cooperation of financial institutions.
- Identity of the scammer.
- Whether the scammer has assets.
- Strength of evidence.
- Whether the transaction was authorized by the victim.
- Whether the payment platform has buyer protection.
- Whether the scam is local or cross-border.
XXVI. What Not to Do
- Do not hack the scammer.
- Do not threaten violence.
- Do not impersonate authorities.
- Do not publish private information recklessly.
- Do not fabricate evidence.
- Do not pay recovery scammers.
- Do not send more fees to “unlock” refunds.
- Do not share OTPs, PINs, passwords, or recovery codes.
- Do not ignore bank or platform deadlines.
- Do not assume a police blotter alone is enough for prosecution.
XXVII. Difference Between Police Blotter and Formal Complaint
A police blotter is an official record that an incident was reported. It may be useful as documentation, but it is not always equivalent to a full criminal complaint.
A formal complaint usually requires a sworn statement, evidence, and submission to the appropriate investigative or prosecutorial office. For cybercrime, specialized units are often more appropriate than a general blotter entry.
XXVIII. Prescription Periods and Delay
Criminal and civil claims are subject to prescriptive periods. The applicable period depends on the offense, penalty, and nature of the action. Victims should report promptly rather than waiting. Delay may also weaken evidence and reduce the chance of fund recovery.
XXIX. Data Privacy and Personal Information
Scams often involve personal data. Victims should consider whether the scammer obtained:
- Government IDs.
- Selfies.
- Signatures.
- Bank statements.
- Birthdate.
- Address.
- Contact list.
- Employment details.
- Passwords.
- OTPs.
- Account recovery details.
If personal data was compromised:
- Notify banks and e-wallets.
- Change passwords.
- Enable two-factor authentication.
- Monitor accounts.
- Report identity theft.
- Consider reporting privacy violations to the NPC.
- Be alert for loans or accounts opened in the victim’s name.
XXX. Checklist Before Filing
Before going to authorities, prepare:
- Valid government ID.
- Printed complaint-affidavit or written narrative.
- Digital and printed evidence.
- Screenshots of conversations.
- Profile links and URLs.
- Proof of payment.
- Bank or e-wallet transaction records.
- Platform complaint reference numbers.
- Timeline of events.
- List of witnesses.
- Contact details of the suspect.
- Total amount lost.
- Copies of demand letters, if any.
- USB drive or digital storage containing files, if accepted.
- Copies for receiving stamp or acknowledgment.
XXXI. Sample Evidence Index
Complainant: [Name] Respondent: [Name/Alias/Unknown] Amount Lost: PHP [amount] Platform Used: [Facebook/Messenger/etc.]
| Annex | Description | Date |
|---|---|---|
| A | Screenshot of scammer profile | [date] |
| B | Screenshot of product/investment/job post | [date] |
| C | Chat conversation showing promise | [date] |
| D | Proof of payment | [date] |
| E | Recipient bank/e-wallet account details | [date] |
| F | Follow-up messages and non-response | [date] |
| G | Bank/e-wallet complaint acknowledgment | [date] |
| H | Platform report acknowledgment | [date] |
| I | Demand letter, if any | [date] |
| J | Other victims’ statements, if any | [date] |
XXXII. Legal Caution
This article provides general legal information in the Philippine context. The correct remedy depends on the facts, documents, amount involved, location of parties, platform used, and identity of the suspect. Legal rules and agency procedures may change, and serious cases should be assessed by a lawyer or the appropriate government office.
Conclusion
Reporting a scammer in the Philippines requires more than naming the suspect. A victim should preserve evidence, secure accounts, report promptly to the payment provider, file with the proper law enforcement agency, and use specialized regulators when the scam involves investments, consumer transactions, financial institutions, personal data, telcos, or employment. The strongest complaints are organized, factual, chronological, and supported by clear proof of deceit, payment, damage, and the suspect’s digital or financial identifiers.