How to Report a Scammer to the Police in the Philippines

I. Introduction

Scams in the Philippines have evolved from face-to-face fraud schemes to online fraud, investment scams, phishing, identity theft, romance scams, marketplace scams, fake job offers, e-wallet fraud, bank account takeovers, cryptocurrency schemes, and social media impersonation. Because many scams now involve digital communications and online transfers, victims often wonder whether they should report to the local police, the Philippine National Police Anti-Cybercrime Group, the National Bureau of Investigation Cybercrime Division, the bank, the e-wallet provider, or another government agency.

In the Philippine context, reporting a scam is not only about telling the police what happened. A proper report should preserve evidence, identify the correct offense, establish jurisdiction, help authorities trace the scammer, and create a formal record that may support criminal prosecution, bank disputes, insurance claims, platform takedowns, or civil recovery.

This article explains how scam victims in the Philippines may report scammers to the police, what evidence to prepare, which agencies may be involved, what laws may apply, and what practical steps should be taken before and after filing a report.

This is general legal information based on Philippine law and practice up to my knowledge cutoff. Laws, agency procedures, and online complaint portals may change.


II. What Is a Scam Under Philippine Law?

The word “scam” is a general term. Philippine law usually treats scams under more specific criminal offenses depending on how the fraud was committed.

Common legal classifications include:

1. Estafa or Swindling

Many scams fall under estafa, also known as swindling, under the Revised Penal Code. Estafa generally involves deceit, abuse of confidence, false pretenses, fraudulent acts, or misappropriation that causes damage to another person.

Examples may include:

  • Pretending to sell an item online and disappearing after payment.
  • Soliciting money for a fake investment.
  • Borrowing or receiving money under false promises.
  • Using fake identities or false representations to obtain property.
  • Receiving funds for a specific purpose and converting them for personal use.

Estafa is often the central criminal charge in fraud cases.

2. Cybercrime-Related Fraud

If the scam was committed through the internet, social media, email, messaging apps, online banking, e-wallets, websites, or other computer systems, the case may involve the Cybercrime Prevention Act of 2012, Republic Act No. 10175.

Cyber-related offenses may include:

  • Online estafa.
  • Computer-related fraud.
  • Identity theft.
  • Illegal access.
  • Misuse of devices.
  • Cyber libel, if defamatory content is also involved.
  • Phishing or account takeover activity.

When fraud is committed using information and communications technology, penalties may be affected by cybercrime law.

3. Identity Theft

A scammer who uses another person’s name, photo, account, identification card, business name, or online profile may also be involved in identity theft or impersonation-related offenses.

Examples include:

  • Creating a fake Facebook account using another person’s photos.
  • Pretending to be a company representative.
  • Using fake IDs to open bank or e-wallet accounts.
  • Posing as a relative, friend, government employee, courier, bank officer, or police officer.

4. Illegal Investment Solicitation

Investment scams may also involve securities law violations, particularly if the scammer solicits investments from the public without proper registration or authority.

Examples include:

  • Ponzi schemes.
  • “Double your money” schemes.
  • Fake trading platforms.
  • Unauthorized crypto-investment schemes.
  • Cooperative, lending, or investment groups promising guaranteed high returns.

These cases may require coordination with agencies such as the Securities and Exchange Commission, depending on the nature of the scheme.

5. Other Possible Offenses

Depending on the facts, a scam may also involve:

  • Falsification of documents.
  • Use of fake IDs.
  • Data privacy violations.
  • Money laundering.
  • Threats or coercion.
  • Illegal recruitment.
  • Qualified theft.
  • Access device fraud.
  • Violation of banking, lending, securities, or consumer protection laws.

The exact charge is usually determined after law enforcement, prosecutors, or lawyers examine the evidence.


III. Immediate Steps Before Reporting to the Police

Before going to the police, a victim should preserve evidence and prevent further loss. Scammers often delete accounts, erase messages, block victims, change usernames, or move funds quickly.

1. Stop Sending Money

Do not send additional payments, “processing fees,” “taxes,” “clearance fees,” “unlocking fees,” or “refund fees.” Many scammers continue extracting money by claiming that the victim must pay more before the money can be released or refunded.

2. Preserve All Evidence

Take screenshots and keep original copies of all communications and transactions. Do not rely only on screenshots if original messages, emails, receipts, or app records are still available.

Important evidence may include:

  • Name used by the scammer.
  • Username, profile link, page link, group link, website, email address, and phone number.
  • Screenshots of chats, posts, listings, ads, comments, or calls.
  • Transaction receipts from banks, GCash, Maya, remittance centers, crypto exchanges, or payment apps.
  • Account numbers, wallet numbers, QR codes, reference numbers, transaction IDs, and timestamps.
  • Delivery details, tracking numbers, invoices, order confirmations, or receipts.
  • IDs, business permits, contracts, or documents sent by the scammer.
  • Voice messages, call logs, videos, or recorded communications.
  • IP logs, login alerts, or suspicious account activity, where available.
  • Proof that the scammer received the money or property.
  • Proof of the victim’s loss.

Screenshots should show the date, time, sender, recipient, and full context whenever possible.

3. Do Not Delete Conversations

Deleting chats may weaken the case. Keep the conversation intact on the original platform. If the scammer blocks you, preserve what remains visible and download your account data where possible.

4. Report to the Bank, E-Wallet, or Payment Provider Immediately

Police reporting is important, but financial institutions may act faster to freeze, flag, or investigate suspicious transactions.

Victims should immediately contact:

  • Their bank.
  • The receiving bank, if known.
  • GCash, Maya, Coins.ph, or other e-wallet providers.
  • Remittance centers.
  • Credit card issuers.
  • Crypto exchanges.
  • Payment processors.
  • Online marketplace platforms.

Ask for a reference number or case number. Save all replies.

5. Secure Your Accounts

If the scam involved phishing, suspicious links, hacked accounts, or OTP sharing, immediately:

  • Change passwords.
  • Enable two-factor authentication.
  • Log out of all devices.
  • Contact the bank or e-wallet provider.
  • Report unauthorized transactions.
  • Notify contacts if your account was used to scam others.
  • Scan devices for malware.
  • Avoid clicking links sent by the scammer.

IV. Where to Report a Scammer in the Philippines

Victims may report scams to different authorities depending on the nature of the scam.

1. Local Police Station

A victim may go to the nearest police station to file a blotter report or complaint. This is often the first step for documenting the incident.

The local police may:

  • Record the complaint.
  • Prepare a police blotter entry.
  • Assist in identifying the proper unit.
  • Refer the matter to an investigator.
  • Coordinate with cybercrime or anti-fraud units.
  • Help prepare documents for filing before the prosecutor’s office.

A police blotter is useful as a formal record but is not always the same as a full criminal complaint. Victims should ask what further steps are needed after blotter entry.

2. Philippine National Police Anti-Cybercrime Group

For online scams, cyber fraud, phishing, hacked accounts, fake online sellers, social media scams, e-wallet fraud, and similar cases, the PNP Anti-Cybercrime Group is often relevant.

The PNP ACG handles cybercrime investigations and may assist with:

  • Online estafa.
  • Account takeovers.
  • Phishing.
  • Cyber identity theft.
  • Online threats.
  • Fake accounts.
  • Digital evidence preservation.
  • Coordination with online platforms and financial institutions.

Victims should prepare both printed and digital copies of evidence.

3. National Bureau of Investigation Cybercrime Division

The NBI Cybercrime Division also investigates cybercrime and online fraud. Victims may consider reporting to the NBI especially where the scam is complex, involves multiple victims, crosses regional boundaries, involves organized groups, or requires specialized digital investigation.

4. Prosecutor’s Office

Criminal cases in the Philippines generally proceed through preliminary investigation before the Office of the City or Provincial Prosecutor when required by law.

A victim may eventually need to file a complaint-affidavit with supporting evidence. The police or NBI may assist in building the case, but the prosecutor determines whether there is probable cause to file a criminal case in court.

5. Securities and Exchange Commission

If the scam involves investment solicitation, securities, shares, pooled funds, “trading,” crypto investment schemes, or guaranteed high returns, the Securities and Exchange Commission may be relevant.

The SEC can issue advisories, investigate unauthorized investment-taking, and coordinate enforcement action.

6. Department of Trade and Industry

If the matter involves consumer transactions, defective goods, non-delivery, misleading sales practices, or business-to-consumer complaints, the Department of Trade and Industry may be relevant. However, a simple non-delivery case can become criminal if there is fraudulent intent from the beginning.

7. National Privacy Commission

If the scam involves misuse of personal information, unauthorized processing of personal data, identity theft, leaked personal documents, or doxxing, the National Privacy Commission may be relevant.

8. Bureau of Immigration, Department of Justice, or Other Agencies

Some scams involve foreign nationals, trafficking, illegal recruitment, or international criminal networks. These may require coordination with specialized agencies.


V. Police Blotter vs. Criminal Complaint

Victims often confuse a police blotter with the filing of a criminal case.

Police Blotter

A police blotter is an official police record of an incident. It documents that a person reported an event to the police on a certain date and time.

A blotter may include:

  • Name of complainant.
  • Date and time of report.
  • Brief narration of events.
  • Names or aliases of suspects.
  • Amount lost.
  • Evidence presented.
  • Initial police action.

A blotter is useful but does not automatically mean that a criminal case has been filed in court.

Criminal Complaint

A criminal complaint is a formal accusation supported by evidence, usually submitted to the prosecutor or appropriate investigative authority. It may require:

  • Complaint-affidavit.
  • Witness affidavits.
  • Documentary evidence.
  • Screenshots and receipts.
  • Certification or authentication of digital evidence, when necessary.
  • Police or NBI investigation report.

A criminal complaint is the step that may lead to preliminary investigation, filing of an Information in court, issuance of warrants, trial, and judgment.


VI. Evidence Needed When Reporting a Scam

A strong complaint should clearly show: who did what, when, where, how, and what damage resulted.

1. Identity of the Victim

Prepare valid identification and personal details, such as:

  • Government-issued ID.
  • Address.
  • Contact number.
  • Email address.
  • Relationship to the transaction.

If reporting on behalf of a company, bring proof of authority, company documents, and authorization.

2. Identity of the Scammer

Even if the real identity is unknown, provide all available identifiers:

  • Full name or alias used.
  • Social media account.
  • Phone number.
  • Email address.
  • Bank account name and number.
  • E-wallet number and registered name.
  • Website or domain.
  • Business name.
  • Address given.
  • Photos, IDs, or documents sent.
  • Vehicle plate number, if relevant.
  • Delivery address, pickup address, or shipping details.

Scammers often use fake identities, but these details can still help investigators.

3. Timeline of Events

Prepare a chronological narrative. Include:

  • Date first contacted.
  • Platform used.
  • What was promised.
  • Amount requested.
  • When payment was made.
  • What happened after payment.
  • When the scam was discovered.
  • Attempts to demand refund.
  • Whether the scammer blocked, threatened, or ignored the victim.

A clear timeline helps police and prosecutors understand the fraud.

4. Proof of Deceit

Evidence should show that the scammer made false statements, used deception, or induced the victim to part with money or property.

Examples:

  • Fake product listing.
  • Fake investment promise.
  • Misrepresentation of identity.
  • False claim of authority.
  • Fake screenshots of profits.
  • Fake receipts or permits.
  • False promise to deliver.
  • False urgency or pressure tactics.
  • Fake “customer testimonials.”

5. Proof of Payment or Loss

Provide evidence of actual damage:

  • Bank transfer receipt.
  • E-wallet transaction history.
  • Remittance slip.
  • Deposit slip.
  • Credit card statement.
  • Crypto transaction hash.
  • Delivery or shipping receipt.
  • Invoice or contract.
  • Proof of property delivered.

6. Proof Linking the Scammer to the Transaction

It is not enough to show that money was lost. The evidence should connect the suspect or account to the fraudulent act.

Useful proof includes:

  • Chat where the scammer gave payment instructions.
  • Receipt showing payment to the same account.
  • Confirmation from scammer that payment was received.
  • Account name matching identity used.
  • Screenshots of the listing and payment demand.
  • Phone number used for both communication and payment.
  • E-wallet or bank account name provided by scammer.

VII. How to File a Police Report

The process may vary depending on the police station or cybercrime office, but the general steps are as follows.

Step 1: Organize the Evidence

Prepare:

  • Printed screenshots.
  • Digital copies on a USB drive or phone.
  • Transaction receipts.
  • Valid ID.
  • Written timeline.
  • Names of possible witnesses.
  • Contact details of platforms or financial institutions already contacted.

Label the evidence clearly.

Step 2: Go to the Appropriate Police Office

For ordinary fraud, go to the nearest police station or the police station with jurisdiction over the place where the victim resides, where the transaction occurred, where the payment was made, or where the offender may be located.

For online scams, consider reporting directly to a cybercrime unit such as the PNP Anti-Cybercrime Group or NBI Cybercrime Division.

Step 3: Narrate the Incident Clearly

When speaking with the police, explain:

  • What was promised.
  • Why you believed the scammer.
  • How much was lost.
  • How payment was made.
  • What happened after payment.
  • Why you believe the act was fraudulent.
  • What evidence you have.

Avoid exaggeration. Stick to facts that can be supported.

Step 4: Request a Police Blotter or Incident Report

Ask for a copy or reference details of the blotter entry or incident report. This may be needed for:

  • Bank investigation.
  • E-wallet dispute.
  • Insurance claim.
  • Platform complaint.
  • Prosecutor filing.
  • Future follow-up.

Step 5: Ask About the Next Step

The police may advise you to:

  • Submit additional documents.
  • Execute an affidavit.
  • File a formal complaint.
  • Coordinate with a cybercrime investigator.
  • Go to the prosecutor’s office.
  • Report to another agency.
  • Wait for subpoena, investigation, or case evaluation.

Write down the name, rank, station, and contact details of the handling officer.


VIII. Filing With the PNP Anti-Cybercrime Group or NBI Cybercrime Division

For online scams, digital evidence is crucial. Cybercrime investigators may need complete and unaltered evidence.

Prepare the following:

  • Screenshots of online conversations.
  • URLs or links to profiles, posts, groups, pages, websites, and listings.
  • Email headers, if available.
  • Phone numbers and SIM details, if known.
  • Payment records.
  • Device used.
  • Account login alerts.
  • IP logs, if available.
  • Copies of suspicious links.
  • Screenshots showing the scammer’s account before deletion.
  • Proof that the account was active and used in the transaction.

Do not edit screenshots except to make readable copies. Keep the originals.


IX. Complaint-Affidavit

A complaint-affidavit is often required when the matter proceeds to formal criminal complaint.

It should generally contain:

  1. Personal details of the complainant.
  2. Identity or description of the respondent.
  3. Jurisdictional facts.
  4. Chronological narration.
  5. Specific fraudulent representations.
  6. Amount or property lost.
  7. Evidence attached as annexes.
  8. Statement that the facts are true and based on personal knowledge.
  9. Prayer that the respondent be charged with the proper offense.

Attachments may be marked as Annexes “A,” “B,” “C,” and so on.

A lawyer is not always required to report to the police, but legal assistance can be valuable when drafting a complaint-affidavit, organizing evidence, identifying charges, or pursuing recovery.


X. Common Types of Scams and How They Are Reported

1. Online Selling Scam

This usually involves a seller who accepts payment but never delivers the product.

Evidence:

  • Product listing.
  • Seller profile.
  • Chat history.
  • Payment receipt.
  • Delivery promises.
  • Proof of non-delivery.
  • Demand for refund.

Possible action:

  • Report to police or cybercrime unit.
  • Report to the platform.
  • Report to the bank or e-wallet.
  • File estafa or cyber-related complaint where facts support fraud.

2. Fake Buyer Scam

A fake buyer may send a false payment confirmation, overpayment scam, fake courier link, or phishing link.

Evidence:

  • Fake receipt.
  • Courier link.
  • Email headers.
  • Chat history.
  • Bank or e-wallet records.
  • Account access alerts.

Possible action:

  • Report to cybercrime authorities.
  • Secure accounts immediately.
  • Report phishing links to the platform or financial institution.

3. Investment Scam

Investment scams often promise unusually high, guaranteed, or risk-free returns.

Warning signs:

  • Guaranteed profits.
  • Pressure to recruit others.
  • No legitimate registration.
  • No clear business model.
  • Returns paid from new investors.
  • Use of influencers or fake testimonials.
  • Refusal to provide proper documents.
  • “Limited slots” pressure.

Possible action:

  • Report to police or NBI.
  • Report to SEC if investment solicitation is involved.
  • Gather group evidence from other victims.
  • Preserve promotional materials, chats, receipts, and payout promises.

4. Romance Scam

A scammer builds emotional trust and then asks for money for emergencies, travel, medical bills, customs fees, or business problems.

Evidence:

  • Chat history.
  • Photos and profile details.
  • Payment records.
  • Requests for money.
  • Fake IDs or documents.
  • Travel or parcel claims.

Possible action:

  • Report to police or cybercrime unit.
  • Report profile to platform.
  • Warn financial institutions if transfers continue.

5. Phishing and Bank Account Scam

The victim is tricked into giving OTPs, passwords, card details, or login credentials.

Evidence:

  • SMS or email.
  • Suspicious link.
  • Bank alerts.
  • Unauthorized transaction records.
  • Call logs.
  • Account login alerts.

Possible action:

  • Call bank immediately.
  • Freeze account or card.
  • Change passwords.
  • Report to cybercrime authorities.
  • Preserve phishing message and link.

6. Job Scam

A fake employer asks for processing fees, training fees, equipment fees, medical fees, visa fees, or “task” deposits.

Evidence:

  • Job post.
  • Offer letter.
  • Company name used.
  • Chat or email.
  • Payment request.
  • Receipts.
  • Fake documents.

Possible action:

  • Report to police or cybercrime unit.
  • Report to the job platform.
  • For overseas work scams, report to appropriate labor or recruitment authorities.

7. Parcel, Customs, or Delivery Scam

The scammer claims a parcel is held and requires payment for tax, customs, storage, or release.

Evidence:

  • Tracking number.
  • Courier name used.
  • Payment demand.
  • Sender details.
  • Chat history.
  • Receipts.
  • Fake customs documents.

Possible action:

  • Verify directly with the legitimate courier or government agency.
  • Report to cybercrime authorities.
  • Report account or page impersonating courier or agency.

8. Government Impersonation Scam

The scammer pretends to be from the police, court, BIR, customs, immigration, local government, or other agency.

Evidence:

  • Caller number.
  • Messages.
  • Fake documents.
  • Payment instructions.
  • Threats or demands.
  • Name and position used.

Possible action:

  • Report immediately to police or NBI.
  • Verify with the agency through official channels.
  • Do not pay fines or fees through personal bank accounts or e-wallets.

XI. Jurisdiction: Where Should the Case Be Filed?

Jurisdiction can be complicated in online scams because the victim, scammer, platform, bank, and server may be in different places.

Possible places connected to the case include:

  • Where the victim was located when deceived.
  • Where payment was sent.
  • Where the bank or e-wallet transaction occurred.
  • Where the scammer resides or operates.
  • Where the fraudulent communication was received.
  • Where the damage occurred.
  • Where the cybercrime unit accepts complaints.

For practical purposes, victims may start with the nearest police station, PNP cybercrime office, or NBI cybercrime office. Authorities can determine whether referral or coordination is needed.


XII. Can the Police Freeze the Scammer’s Bank or E-Wallet Account?

Victims often ask whether the police can immediately freeze a bank account or e-wallet. In practice, freezing accounts usually requires legal and institutional procedures. Banks and e-wallet providers may temporarily restrict suspicious accounts under their own fraud protocols, but formal freezing may involve court orders, anti-money laundering procedures, or coordination with competent authorities.

The victim should immediately notify the financial institution and provide:

  • Transaction reference number.
  • Date and time.
  • Amount.
  • Receiving account details.
  • Police report or blotter, if available.
  • Proof of fraud.

Speed matters. Funds may be withdrawn or transferred quickly.


XIII. Can the Victim Recover the Money?

Reporting to the police may help identify and prosecute the scammer, but recovery of money is not guaranteed.

Possible recovery routes include:

1. Bank or E-Wallet Reversal

A reversal may be possible in limited circumstances, especially if reported quickly. However, successful reversal depends on the provider’s rules, transaction status, recipient account status, and evidence.

2. Criminal Restitution

If a criminal case succeeds, the court may address civil liability arising from the offense. The offender may be ordered to pay restitution, damages, or indemnity.

3. Civil Case

A victim may file a civil action to recover money or damages. This may be useful when the scammer’s identity and assets are known.

4. Settlement

Some accused persons return money to avoid or mitigate legal consequences. However, settlement does not always automatically erase criminal liability, especially in public offenses.

5. Small Claims

If the matter is primarily a money claim and the defendant is identifiable, small claims procedure may be considered for certain civil claims. However, scams involving fraud may also require criminal action.


XIV. Demand Letter Before or After Reporting

A demand letter may be useful in some cases, especially where the scammer’s identity or address is known. It may show that the victim demanded return of money and that the other party refused.

A demand letter may include:

  • Amount paid.
  • Date of transaction.
  • Basis of obligation.
  • Demand for refund or delivery.
  • Deadline to comply.
  • Warning that legal action may follow.

However, in fast-moving online scams, waiting too long before reporting may allow the scammer to disappear. A demand letter should not delay urgent reporting to banks, e-wallets, platforms, or cybercrime authorities.


XV. What Not to Do After Being Scammed

Victims should avoid actions that could harm their case or expose them to legal liability.

Do not:

  • Threaten the scammer with violence.
  • Post unverified personal information of suspected individuals.
  • Harass relatives of the suspect.
  • Hack the scammer’s account.
  • Create fake accounts to entrap without legal guidance.
  • Fabricate evidence.
  • Edit screenshots in a misleading way.
  • Send more money.
  • Publicly accuse someone without sufficient basis.
  • Delete original conversations.
  • Share OTPs, passwords, or bank credentials.
  • Pay “recovery agents” who promise to retrieve funds for a fee.

Publicly warning others may be understandable, but victims should be careful to state only verifiable facts and avoid defamatory statements.


XVI. Reporting Fake Accounts, Pages, and Websites

Aside from police reporting, victims should report the scammer’s account or page to the platform.

For social media scams, report:

  • Fake profile.
  • Marketplace listing.
  • Fraudulent page.
  • Impersonation account.
  • Fake business page.
  • Scam group.
  • Paid advertisement.

For websites, preserve:

  • URL.
  • Domain name.
  • Screenshots.
  • WHOIS information, if available.
  • Payment page.
  • Terms, contact page, and fake credentials.

Platform reports may help take down fraudulent accounts, but victims should preserve evidence before reporting because accounts may be deleted.


XVII. Multiple Victims and Group Complaints

Many scams involve multiple victims. A group complaint may strengthen the case by showing a pattern of fraudulent activity.

Victims should collect:

  • Individual affidavits.
  • Separate transaction receipts.
  • Common scammer account details.
  • Shared promotional materials.
  • Group chat records.
  • Total amount lost.
  • Timeline of the scheme.
  • Names of recruiters or agents.

However, each victim should still clearly document their own loss. One person’s evidence may not automatically prove another person’s claim.


XVIII. Overseas or Foreign-Based Scammers

If the scammer appears to be abroad, reporting is still possible. Philippine authorities may coordinate through appropriate channels, but investigation and recovery can be more difficult.

Evidence remains important because it may support:

  • Local cybercrime investigation.
  • International coordination.
  • Bank or e-wallet tracing.
  • Platform takedown.
  • Immigration or trafficking investigation, if applicable.
  • Identification of local money mules.

Many foreign-linked scams use Philippine-based bank accounts, e-wallets, SIM cards, recruiters, or money mules. Local evidence may still lead to suspects in the Philippines.


XIX. Money Mules and Recipient Accounts

Sometimes the account receiving the money belongs to a “money mule,” not the main scammer. A money mule is a person whose bank or e-wallet account is used to receive or transfer scam proceeds.

The account holder may claim they were also deceived, paid a commission, or unaware of the scam. Investigators will examine the facts.

Victims should report recipient account details even if they believe the account holder is only a mule. The account may provide an investigative lead.


XX. SIM Registration and Phone Numbers

Because the Philippines has SIM registration laws, phone numbers used in scams may potentially help investigations. However, scammers may use stolen identities, fake registration details, borrowed SIMs, or mule accounts.

Victims should preserve:

  • Phone number.
  • Call logs.
  • SMS.
  • Messaging app account.
  • Screenshots showing number and messages.
  • Dates and times of calls.
  • Any voice recordings lawfully obtained.

XXI. Digital Evidence and Admissibility

Digital evidence may be used in legal proceedings, but it should be preserved properly.

Good practices include:

  • Keep original files.
  • Save screenshots in chronological order.
  • Include visible timestamps.
  • Export conversations where possible.
  • Keep transaction receipts in original PDF or app format.
  • Do not alter metadata.
  • Store backup copies.
  • Record URLs.
  • Preserve emails with headers when possible.

Courts and investigators may require authentication of electronic evidence. The person presenting the evidence may need to explain how it was obtained and confirm that it is accurate.


XXII. Sample Checklist Before Going to the Police

Bring the following:

  • Valid government ID.
  • Printed complaint narrative or timeline.
  • Screenshots of conversations.
  • Links to profiles, pages, websites, or posts.
  • Payment receipts.
  • Bank or e-wallet transaction records.
  • Account numbers, wallet numbers, or QR codes used.
  • Phone numbers and email addresses.
  • Proof of demand for refund, if any.
  • Platform complaint reference numbers.
  • Bank or e-wallet complaint reference numbers.
  • Names of witnesses or other victims.
  • USB drive or device containing original files.
  • Copy of any demand letter.
  • Any contract, invoice, order form, or document involved.

XXIII. Sample Incident Narrative Format

A simple written narrative may follow this structure:

Name of complainant: Address: Contact number: Email: Name or alias of suspect: Platform used: Amount lost: Date of transaction: Payment method: Recipient account details:

Narrative:

On or about [date], I saw/contacted/was contacted by [name or account] through [platform]. The person represented that [state false promise or representation]. Relying on this representation, I sent the amount of [amount] through [bank/e-wallet/remittance] to [account name and number] on [date and time].

After payment, [state what happened: no delivery, blocked, ignored, asked for more money, account disappeared, etc.]. I later discovered that [state basis for believing it was a scam]. I attempted to contact the person and demand refund, but [state response].

Attached are screenshots of our conversation, proof of payment, profile information, transaction receipts, and other supporting documents.


XXIV. Sample Evidence Index

Victims may organize evidence this way:

  • Annex A: Screenshot of seller/scammer profile.
  • Annex B: Screenshot of product listing or investment offer.
  • Annex C: Chat where scammer made representations.
  • Annex D: Chat where scammer gave payment details.
  • Annex E: Bank or e-wallet receipt.
  • Annex F: Proof of follow-up and demand for refund.
  • Annex G: Screenshot showing account deletion, blocking, or refusal.
  • Annex H: Complaint reference number from bank/e-wallet/platform.
  • Annex I: Statements from other victims, if available.

XXV. Time Limits and Prescription

Criminal offenses have prescriptive periods, meaning legal action must be filed within a certain period. The applicable period depends on the offense and penalty. Victims should report as soon as possible and avoid delay.

Even when prescription is not immediately an issue, delay can make investigation harder because:

  • Accounts may be deleted.
  • Funds may be withdrawn.
  • SIM cards may be discarded.
  • CCTV footage may be erased.
  • Witnesses may forget details.
  • Platform data may become harder to obtain.

XXVI. Role of a Lawyer

A victim may report a scam without a lawyer. However, a lawyer may help when:

  • The amount is substantial.
  • The scam involves multiple victims.
  • The suspect is known and has assets.
  • The case involves investment solicitation.
  • The evidence is complex.
  • The victim needs a complaint-affidavit.
  • Civil recovery is being considered.
  • The suspect threatens a counterclaim.
  • The victim is a company or organization.
  • The scam crosses jurisdictions.

A lawyer can help identify the proper charges, draft affidavits, organize evidence, and coordinate criminal and civil remedies.


XXVII. Common Problems in Scam Reports

1. “I Only Know the Scammer’s Username”

This is common. Report anyway. Usernames, links, phone numbers, bank accounts, e-wallets, and transaction records may still help investigators.

2. “The Bank Account Name May Be Fake”

Report anyway. Even fake or mule accounts may generate leads.

3. “The Amount Is Small”

Small amounts can still be reported. Many scammers rely on victims not reporting small losses. Multiple small transactions may reveal a larger scheme.

4. “The Police Said It Is a Civil Matter”

Some disputes are genuinely civil, especially where there was a real transaction that merely failed. But if there was deceit from the beginning, false identity, fake listing, fake investment, or intentional misrepresentation, criminal fraud may be involved.

The distinction often depends on evidence of fraudulent intent.

5. “The Scammer Returned Part of the Money”

Partial payment does not automatically erase the scam. It may affect civil liability or settlement, but the facts still matter.

6. “The Scammer Is Threatening Me”

Preserve the threats and report them. Threats, harassment, extortion, or blackmail may create additional offenses.


XXVIII. Difference Between Failed Transaction and Scam

Not every failed transaction is automatically a crime. A seller may have supply problems, delivery delays, or business failure. A borrower may be unable to pay. A contractor may perform poorly. These may be civil matters unless fraud is shown.

A case is more likely to be treated as a scam when there is evidence of:

  • Fake identity.
  • False representation from the beginning.
  • No intention to deliver.
  • Pattern of victimizing others.
  • Immediate blocking after payment.
  • Use of fake documents.
  • Misappropriation of funds.
  • False investment promises.
  • Use of multiple accounts.
  • Concealment of real identity.
  • Repeated demands for additional fees.

The key issue is usually fraudulent intent.


XXIX. Coordination With Financial Institutions

When reporting to a bank or e-wallet, provide a concise fraud report:

  • “I was defrauded into transferring funds.”
  • Amount.
  • Date and time.
  • Recipient account.
  • Reference number.
  • Brief explanation.
  • Police report or blotter number, if available.
  • Request to preserve records and investigate.

Ask whether the institution can:

  • Flag the receiving account.
  • Temporarily hold remaining funds.
  • Provide a case number.
  • Preserve transaction records.
  • Advise on documentary requirements.
  • Coordinate with law enforcement upon proper request.

Banks and e-wallets may not disclose recipient details directly to the victim due to privacy and banking rules, but they may cooperate with authorities through proper legal process.


XXX. Privacy, Defamation, and Public Posting

Victims often want to post the scammer’s name and photos online. This can warn others, but it carries legal risks if the accusation is inaccurate, excessive, or unsupported.

Safer public warnings usually focus on verifiable facts:

  • Account name used.
  • Username.
  • Transaction method.
  • Modus.
  • Screenshots of public posts.
  • Advice to verify before transacting.

Avoid posting sensitive personal information, private addresses, family details, unrelated photos, or unverified allegations. Let authorities investigate identity and liability.


XXXI. Reporting Checklist by Scam Type

Scam Type Main Evidence Suggested Reporting Route
Online seller scam Listing, chats, payment receipt Police, PNP ACG/NBI Cybercrime, platform, bank/e-wallet
Phishing SMS/email/link, unauthorized transaction Bank/e-wallet immediately, PNP ACG/NBI Cybercrime
Investment scam Promos, contracts, receipts, payout promises Police/NBI, SEC, bank/e-wallet
Romance scam Chats, profile, money requests, receipts Police, cybercrime unit, platform
Job scam Job post, offer letter, payment demand Police/cybercrime, job platform, labor/recruitment agency if applicable
Fake courier/customs Messages, fake tracking, payment demand Police/cybercrime, courier/platform
Identity theft Fake profile, stolen photos/docs Cybercrime unit, platform, NPC if personal data involved
Hacked account scam Login alerts, unauthorized posts/messages Cybercrime unit, platform, bank/e-wallet

XXXII. Practical Tips for a Stronger Report

A strong report is specific, organized, and evidence-based.

Helpful practices:

  • Use a timeline.
  • Number the pages of evidence.
  • Highlight transaction reference numbers.
  • Print important screenshots clearly.
  • Save digital originals.
  • Bring both hard and soft copies.
  • List all accounts used by the scammer.
  • Include platform links, not just screenshots.
  • Provide exact amounts and dates.
  • Avoid emotional exaggeration.
  • State facts in chronological order.
  • Follow up with the assigned investigator.
  • Keep copies of everything submitted.

XXXIII. After Filing the Report

After reporting, victims should:

  1. Secure a copy or reference number of the police blotter or report.
  2. Submit additional evidence requested.
  3. Follow up with the investigator.
  4. Coordinate with the bank or e-wallet.
  5. Monitor accounts for further unauthorized activity.
  6. Preserve new communications from the scammer.
  7. Avoid direct confrontation.
  8. Inform other victims to file their own reports.
  9. Prepare for affidavit execution or prosecutor proceedings.
  10. Keep records of all follow-ups.

XXXIV. Possible Outcomes

A scam report may lead to:

  • Police blotter only.
  • Further investigation.
  • Referral to cybercrime unit.
  • Subpoena or request for records.
  • Identification of suspect.
  • Filing of complaint before prosecutor.
  • Preliminary investigation.
  • Filing of criminal case in court.
  • Arrest, warrant, or inquest, depending on circumstances.
  • Settlement or restitution.
  • Dismissal for insufficient evidence.
  • Referral to another agency.

Not all reports result in immediate arrest or recovery. Fraud investigations often require documentation, tracing, subpoenas, institutional cooperation, and time.


XXXV. Preventive Measures

To reduce the risk of being scammed:

  • Verify seller identity.
  • Avoid paying large amounts upfront.
  • Use cash-on-delivery or escrow where available.
  • Check business registration but do not rely on registration alone.
  • Be skeptical of guaranteed investment returns.
  • Do not share OTPs or passwords.
  • Verify job offers through official company channels.
  • Avoid clicking suspicious links.
  • Check page history, reviews, and account age.
  • Be cautious with newly created accounts.
  • Confirm bank or e-wallet account names.
  • Use official apps and websites.
  • Report suspicious accounts early.

XXXVI. Conclusion

Reporting a scammer to the police in the Philippines requires more than simply saying that money was lost. The victim should preserve evidence, document the timeline, report quickly to financial institutions and platforms, and file a proper report with the police, PNP Anti-Cybercrime Group, NBI Cybercrime Division, or other relevant agency.

The strongest scam reports clearly establish deceit, payment, damage, and the link between the scammer and the transaction. A police blotter creates an official record, while a criminal complaint supported by affidavits and evidence may lead to prosecution. For online scams, digital evidence must be preserved carefully because usernames, phone numbers, payment trails, links, and transaction records may be the key to identifying the offender.

In all cases, speed and documentation matter. The sooner a victim reports and preserves evidence, the better the chances of investigation, account tracing, platform action, and possible recovery.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.