How to Report Cyber Harassment and Online Threats to the Authorities

A Philippine Legal Article

Cyber harassment and online threats are no longer treated as mere “internet drama.” In the Philippines, they can amount to criminal, civil, administrative, and child-protection violations depending on the facts. A person who is threatened, stalked, shamed, extorted, impersonated, sexually exploited, doxxed, or repeatedly harassed online may seek help not only from the social media platform involved, but also from law enforcement, prosecutors, courts, schools, employers, and government agencies.

This article explains, in Philippine legal context, how to report cyber harassment and online threats to the authorities, what laws may apply, what evidence to gather, where to file complaints, what remedies are available, and what practical steps victims should take immediately.


I. What counts as cyber harassment or online threats?

There is no single Philippine law titled “Cyber Harassment Act” that covers every form of abusive online behavior. Instead, online abuse is addressed through a combination of criminal laws, special statutes, administrative rules, and platform processes.

Cyber harassment may include:

  • repeated abusive messages, comments, emails, or posts
  • threats of violence, death, rape, kidnapping, or destruction of property
  • stalking, monitoring, persistent unwanted contact, or intimidation through digital means
  • non-consensual sharing of private images, videos, or personal information
  • fake accounts, impersonation, and identity-based attacks
  • blackmail, sextortion, and extortion using intimate content
  • public shaming, humiliation, and defamatory accusations posted online
  • hacking, account takeovers, unauthorized access, or data theft used to harass
  • gender-based online sexual harassment
  • child-targeted online exploitation, grooming, or sexual abuse materials
  • coordinated trolling that crosses into threats, coercion, or unlawful conduct

Not every rude or offensive statement is automatically a crime. But when the conduct includes a threat, unlawful intrusion, sexual harassment, extortion, defamation, privacy violations, or repeated intimidation, legal remedies may arise.


II. Main Philippine laws that may apply

The first step in reporting is understanding that the legal label depends on the act committed. A single incident may violate several laws at once.

1. Cybercrime Prevention Act of 2012

Republic Act No. 10175

This is the central law for crimes committed through information and communications technologies. It covers, among others:

  • illegal access
  • illegal interception
  • data interference
  • system interference
  • misuse of devices
  • cybersquatting
  • computer-related forgery, fraud, identity theft
  • cybersex
  • child pornography committed through a computer system
  • unsolicited commercial communications
  • online libel

Where the abusive conduct is done online, this law often becomes part of the case theory. It also allows law enforcement and prosecutors to treat traditional offenses committed through digital means as cyber-enabled or cyber-related.

2. Revised Penal Code

The Revised Penal Code may still apply even when the act happened online. Relevant offenses may include:

  • grave threats
  • light threats
  • grave coercion
  • unjust vexation
  • alarms and scandals, in limited contexts
  • oral defamation or related offenses, depending on medium and facts
  • other crimes involving intimidation or coercion

If a person says online, “I will kill you,” “I will burn your house,” or “I know where your child studies and I will get him,” the issue is not just impoliteness. It may be a prosecutable threat if the circumstances show a serious intent to intimidate.

3. Safe Spaces Act

Republic Act No. 11313

This is especially important for gender-based online abuse. It penalizes gender-based online sexual harassment, which may include:

  • unwanted sexual remarks
  • misogynistic, transphobic, homophobic, or sexist statements
  • persistent sexual advances online
  • threats to release sexual content
  • cyberstalking with sexual or gender-based elements
  • unauthorized sharing of intimate images
  • online conduct causing fear for safety because of sex, gender, or sexual orientation

This law is one of the strongest tools for victims of gendered abuse online.

4. Anti-Photo and Video Voyeurism Act of 2009

Republic Act No. 9995

This applies when intimate images or videos are recorded, copied, shared, sold, published, or broadcast without consent, especially where there was an expectation of privacy. It is highly relevant to revenge porn and image-based sexual abuse.

5. Data Privacy Act of 2012

Republic Act No. 10173

If the harasser unlawfully discloses personal information, publishes private details, doxxes someone, leaks IDs or addresses, or misuses personal data, the Data Privacy Act may apply. It can also be relevant when entities such as schools, employers, or websites mishandle personal information.

6. Anti-Child Pornography Act of 2009

Republic Act No. 9775

7. Anti-Online Sexual Abuse or Exploitation of Children / child-protection laws

Where the victim is a child, the case becomes much more serious. Online grooming, sexual exploitation, coercion involving explicit images, and circulation of child sexual abuse material can trigger multiple statutes, including special child-protection laws.

8. Anti-Violence Against Women and Their Children Act

Republic Act No. 9262

If the offender is a current or former intimate partner and the harassment forms part of psychological violence, threats, stalking, coercive control, or abuse against a woman or her child, this law may apply even when the abuse occurs through digital channels.

9. Anti-Wiretapping and privacy-related laws

If there are secret recordings, unlawful interceptions, hacked conversations, or unauthorized capture of communications, other privacy and criminal laws may also be relevant.

10. Civil Code provisions on damages

Even if prosecutors do not file a criminal case, a victim may still have a civil claim for:

  • actual damages
  • moral damages
  • exemplary damages
  • attorney’s fees, in proper cases

This is important where the harm includes reputational injury, emotional distress, anxiety, lost income, or invasion of privacy.


III. When should you report immediately?

A victim should report to authorities as soon as possible where any of the following is present:

  • a threat to kill, rape, maim, abduct, or physically harm
  • threats against children, family members, pets, or property
  • disclosure of home address, school, workplace, live location, or routines
  • blackmail or sextortion
  • hacked accounts or stolen private files
  • fake accounts actively impersonating the victim
  • circulation of nude or intimate images
  • a stalker appears to know real-world whereabouts
  • coordinated harassment causing fear for safety
  • harassment by an ex-partner with a history of abuse
  • the victim is a minor
  • the abuser possesses intimate images of a child
  • the conduct appears to be escalating from words to real-world action

In those situations, this is no longer merely a platform moderation issue. It becomes a safety and law-enforcement matter.


IV. What to do immediately before filing a report

Victims often make one of two mistakes: they either delete everything out of panic, or they keep engaging with the offender. The better approach is structured preservation and safety planning.

1. Preserve the evidence

Before blocking or deleting, preserve as much as possible.

Take screenshots showing:

  • full username or account handle
  • profile URL or account link
  • date and time
  • the complete message, post, or comment thread
  • surrounding conversation for context
  • group name, server name, chat room, or page title
  • visible reactions, shares, tags, or reposts
  • any attached images, videos, or voice notes

Also save:

  • links or URLs
  • email headers, if by email
  • phone numbers, if by SMS or messaging apps
  • transaction records, if extortion or blackmail is involved
  • copies of intimate content being used to threaten
  • logs of calls, missed calls, or repeated contacts
  • witness statements from people who saw the threats
  • device backups where the messages originally appeared

Where possible, download the content in native format, not just screenshots.

2. Create an incident log

Make a simple chronological record containing:

  • date and time of each incident
  • platform used
  • exact words of threat or harassment
  • account names involved
  • how the incident affected you
  • whether the offender knows your real location, family, or workplace
  • any prior relationship with the offender

This log helps police, prosecutors, and lawyers understand the pattern.

3. Do not edit or alter the evidence

Avoid cropping screenshots too tightly or modifying image files. Preserve originals. If you later submit evidence, authenticity matters.

4. Strengthen account security

Change passwords, enable two-factor authentication, review active sessions, and update recovery emails and phone numbers.

5. Limit further exposure

Report and remove content through the platform where possible, but only after preserving evidence. Restrict privacy settings and review who can tag, message, or mention you.

6. Prioritize physical safety

If the threat is specific and credible, inform household members, school, employer, or building security. Consider changing routines temporarily.


V. Where to report in the Philippines

The correct authority depends on the facts, but several channels may be used at the same time.

1. Philippine National Police Anti-Cybercrime Group (PNP-ACG)

This is one of the main law-enforcement bodies for cyber-related complaints. Victims may approach:

  • the PNP Anti-Cybercrime Group
  • local police stations, which may refer or coordinate with cybercrime units
  • Women and Children Protection Desks, where applicable
  • specialized investigators in cyber-enabled threats, exploitation, fraud, or account crimes

This is often the first practical stop for online threats, fake accounts, hacking, extortion, and digital evidence intake.

2. National Bureau of Investigation Cybercrime Division (NBI Cybercrime)

The NBI is another primary authority for cybercrime complaints, especially where the case is serious, technically complex, involves anonymous actors, or requires digital forensic work.

Victims frequently choose the NBI for:

  • online threats
  • doxxing
  • impersonation
  • sextortion
  • non-consensual intimate image sharing
  • account hacking
  • online libel
  • identity theft
  • child exploitation cases

3. Prosecutor’s Office

Criminal complaints are ultimately brought before the prosecutor for preliminary investigation, unless a warrantless arrest or other special situation applies. Some complainants first go to police or NBI for case build-up; others, with counsel, may proceed more directly to the prosecutor.

4. Barangay

Barangay intervention may be useful in limited cases where:

  • the offender is known personally
  • both parties are in the same locality
  • the issue includes neighbor, school-community, or local interpersonal conflict

But barangay settlement is not the final or proper route for serious cyber threats, sexual exploitation, child abuse, or grave criminal conduct. It may also be inappropriate where there is danger, power imbalance, or a gender-based violence dimension.

5. Commission on Human Rights, school authorities, employers, and professional regulators

These may not be the main criminal authorities, but they can matter when:

  • the abuse is discrimination-based
  • the offender is a teacher, public official, lawyer, doctor, or licensed professional
  • the harassment occurs in a school or workplace setting
  • administrative sanctions are possible

6. National Privacy Commission

If the issue involves unlawful disclosure of personal data, doxxing by an organization, improper data processing, or privacy breaches, the National Privacy Commission may be relevant alongside criminal or civil remedies.

7. Department of Information and Communications Technology / inter-agency referrals

For certain cyber incidents, complaints may be routed or referred among agencies depending on the platform, child safety issues, or technical aspects.


VI. Police report or NBI complaint: what to bring

Bring both digital and printed copies if possible.

Prepare:

  • government-issued ID
  • screenshots and electronic files
  • URLs and usernames
  • devices containing the original messages, if available
  • affidavit or written narrative of facts
  • any witness statements
  • proof of relationship, where relevant, such as in VAWC cases
  • proof that the victim is a minor, where applicable
  • medical or psychological records, if harm has escalated
  • school or workplace notices, if connected to the harassment
  • chronology of incidents

A clear folder often helps investigators more than a large but disorganized dump of screenshots.


VII. How to write the complaint narrative

A good complaint states facts, not outrage alone. It should identify:

  1. Who committed the act Include full name if known, plus username, aliases, phone number, email, account link, and any identifying details.

  2. What exactly was done Quote the threat or harassment as accurately as possible.

  3. When it happened State dates and times.

  4. Where it happened Specify platform, group, page, app, website, or email service.

  5. How it affected you Fear, emotional distress, damage to reputation, inability to work, concern for family safety, disruption of schooling, and similar impacts matter.

  6. Why you believe the threat is real or serious Mention prior abuse, access to your address, prior stalking, possession of photos, shared acquaintances, or prior attempts to contact you offline.


VIII. Affidavit and evidence standards

In Philippine practice, the complaint often needs to be supported by a sworn affidavit. This affidavit should be detailed, chronological, and internally consistent.

Important points:

  • Use exact words when quoting threats.
  • Identify attached screenshots as annexes.
  • State whether the screenshots were taken by you and from which device.
  • State whether the messages are still visible online or have been deleted.
  • Mention any report made to the platform.
  • Avoid exaggeration. Precision is more persuasive.

If the case becomes criminal, digital evidence may be tested for authenticity, relevance, chain of custody, and probative value. Native files, metadata, and device access can become important.


IX. Are screenshots enough?

Screenshots are useful, but not always enough by themselves.

They are strongest when supported by:

  • direct access to the account or message thread
  • URL links
  • email headers
  • server logs or platform records
  • testimony from the person who captured them
  • forensic extraction from the device
  • witness corroboration
  • admissions by the offender
  • context showing the account belongs to the offender

For that reason, preserve everything. Do not rely on one screenshot alone where the case is serious.


X. Anonymous accounts and fake profiles

A common problem is: the abuser used a dummy account.

Victims should still report. Anonymous online conduct is not immune from investigation. Authorities may try to identify the actor through:

  • linked emails or phone numbers
  • IP-related information, subject to legal processes
  • platform disclosures
  • connected accounts
  • reused usernames
  • payment records
  • device traces
  • witness testimony
  • admissions and circumstantial evidence

The victim does not need to solve the anonymity problem before filing. Report what is known.


XI. Reporting online libel versus threats

Victims often confuse defamation with threats. They may overlap, but they are different.

Online libel

This involves a defamatory imputation published online that tends to dishonor, discredit, or cause contempt toward a person. The statement must be more than insult; it must allege or imply something injurious to reputation.

Online threats

This involves intimidation through threatened harm. The focus is fear and coercion, not merely reputation.

A post saying, “She is a thief” may raise a libel issue. A message saying, “I will kill you tomorrow” raises a threats issue. A post saying, “Send money or I will release your nudes” may involve extortion, voyeurism-related laws, Safe Spaces Act issues, and cybercrime dimensions.

Correct legal characterization matters, but the victim should still report even if unsure of the exact offense.


XII. Gender-based online sexual harassment

In the Philippines, many online abuse cases involving women and LGBTQ+ persons are not just generic harassment. They may fall under the Safe Spaces Act when the conduct is sexual, sexist, misogynistic, or gender-based.

Examples include:

  • unsolicited sexual comments and repeated requests
  • threats to leak sexual content
  • “slut-shaming” and sexual humiliation campaigns
  • sexualized stalking
  • posting edited sexual images
  • public comments degrading someone because of sex, gender identity, or orientation
  • coercive sending of explicit content demands

Victims should mention in the complaint that the abuse is gender-based, because that changes the legal frame and may open additional remedies.


XIII. Threats from a spouse, ex, or partner

Where cyber harassment is committed by a husband, former husband, boyfriend, former boyfriend, live-in partner, or person with whom the victim has or had a sexual or dating relationship, VAWC may be relevant if the victim is a woman or her child.

Digital acts that may fit include:

  • repeated threatening messages
  • controlling or coercive surveillance
  • humiliation through intimate content
  • harassment intended to cause mental or emotional suffering
  • threats involving children
  • social media smear campaigns tied to relationship abuse

This is important because many victims wrongly treat ex-partner digital abuse as “private drama” when it may be a punishable form of psychological violence.


XIV. Child victims: special urgency

If the victim is below 18, the matter should be treated urgently. Child-related online threats and harassment may involve:

  • grooming
  • sexual coercion
  • threats to leak intimate images
  • requests for sexual content
  • blackmail
  • impersonation
  • circulation of child sexual abuse material

Parents, guardians, schools, police, NBI, and child-protection authorities should be informed immediately. Delay can worsen dissemination and trauma.


XV. Can the platform report replace a police complaint?

No.

Reporting to Facebook, Instagram, TikTok, X, YouTube, Discord, Telegram, email providers, or messaging apps may help remove content or suspend an account, but it is not the same as reporting to Philippine authorities.

Platform reporting is useful for:

  • rapid removal
  • account takedown
  • preservation requests in some cases
  • reducing further spread

But it does not automatically produce criminal accountability.


XVI. Can you file both criminal and civil actions?

Yes, depending on the offense and procedural posture.

A victim may pursue:

  • criminal complaint for prosecution
  • civil action for damages
  • administrative complaint if the offender is a public employee, professional, teacher, or regulated person
  • protective relief where applicable, such as in VAWC contexts

Some remedies may be joined or implied depending on the criminal case; others may be separately filed. Legal strategy matters.


XVII. Protection orders and immediate court relief

In some situations, especially involving intimate partners or gender-based violence, the victim may seek protection from further contact or abuse.

Possible legal tools may include:

  • barangay protection mechanisms in proper cases
  • temporary or permanent protection orders under applicable special laws
  • court-issued relief in relation to VAWC or child-protection concerns
  • restraining remedies in connected civil actions, where legally available

This is highly fact-specific, but victims should know that the law does not always require them to wait for a full criminal conviction before seeking protective relief.


XVIII. What if the harasser lives abroad?

Jurisdiction becomes more complex, but reporting is still worthwhile.

Issues may include:

  • where the act was committed
  • where the victim received the threat
  • where the harmful content was published or accessed
  • nationality of parties
  • location of servers and platform records

Philippine authorities may still act where there is a sufficient jurisdictional basis. Cyber cases often involve cross-border elements.


XIX. Common mistakes victims should avoid

1. Deleting the messages immediately

This destroys evidence.

2. Replying with threats of your own

This can complicate the case.

3. Posting all evidence publicly before reporting

That may worsen harassment and compromise strategy.

4. Sending edited screenshots only

Keep originals.

5. Assuming fake accounts cannot be traced

They sometimes can.

6. Waiting too long

Delays can result in deleted content, lost metadata, and weaker evidence.

7. Treating every abusive statement as the same offense

Threats, libel, voyeurism, privacy violations, and sexual harassment have different legal elements.

8. Ignoring personal safety

A digital threat can become an offline incident.


XX. What authorities may do after a report

After receiving the complaint, authorities may:

  • interview the complainant
  • review and preserve evidence
  • request an affidavit
  • coordinate with cyber investigators
  • identify additional legal violations
  • prepare a complaint for inquest or preliminary investigation
  • refer the case to the prosecutor
  • seek disclosure or technical tracing through lawful processes
  • coordinate with other agencies where the victim is a child or where privacy issues are involved

Not every report becomes an immediate arrest. Many cases proceed first through investigation and prosecutorial review.


XXI. Standard of proof at different stages

Victims should understand that “I was harmed” is not the only question. The legal system asks different questions at different stages.

  • Reporting stage: Is there enough basis to investigate?
  • Prosecutor stage: Is there probable cause to charge?
  • Trial stage: Can guilt be proven beyond reasonable doubt?

That is why detailed evidence and a strong affidavit matter.


XXII. Prescription and timing concerns

Some offenses must be filed within particular periods. Because different statutes may apply, delay can be risky. A person who waits too long may face evidentiary and procedural problems. Prompt consultation and filing are therefore important, especially for online defamation, threats, or image-based abuse.


XXIII. What about school or workplace harassment?

Online abuse may also violate school rules, workplace policies, labor standards, anti-sexual harassment policies, and codes of conduct.

A victim may report simultaneously to:

  • school administrators
  • HR or management
  • compliance offices
  • professional regulatory bodies
  • government employers’ disciplinary channels

This does not replace criminal filing, but it can create faster interim protection.


XXIV. Doxxing and publication of personal information

Doxxing is the release of personal identifying information to expose a person to harassment, fear, or attack. In Philippine context, it may trigger:

  • Data Privacy Act concerns
  • threats or coercion issues
  • Safe Spaces Act concerns where gender-based
  • child-protection implications where minors are targeted
  • civil damages for invasion of privacy and emotional harm

Victims should preserve the original post, comments, shares, and resulting harassment.


XXV. Sextortion and blackmail

A common online threat is: “Send money,” “send more photos,” or “meet me,” or else private images will be released.

This may involve:

  • extortion or coercion
  • Anti-Photo and Video Voyeurism Act
  • Safe Spaces Act
  • cybercrime-related offenses
  • child-protection laws if the victim is a minor
  • VAWC, in proper intimate-partner contexts

This is a high-priority report. Victims should not negotiate beyond what is necessary for evidence preservation and immediate safety.


XXVI. Can a victim remain anonymous?

In platform reporting, sometimes yes. In formal criminal proceedings, complete anonymity is generally difficult because due process requires identification of parties and evidence. However, in sensitive cases, especially involving sexual abuse or minors, privacy protections may apply and identities may be handled with greater confidentiality.


XXVII. Is a lawyer necessary?

A victim can report directly to police, NBI, or prosecutors without first hiring a private lawyer. But legal assistance is very helpful when:

  • multiple laws may apply
  • the evidence is technically complex
  • the offender is anonymous
  • the case involves intimate images
  • the victim is a minor
  • the offender is influential or institutionally protected
  • civil damages are being considered
  • there is overlap with VAWC, workplace, or school proceedings

Public legal assistance options may also exist for qualified complainants.


XXVIII. Practical model for reporting

A sound reporting sequence often looks like this:

Step 1: Secure yourself

Change passwords, lock down accounts, inform trusted persons, and evaluate physical danger.

Step 2: Preserve evidence

Screenshots, links, files, logs, and chronology.

Step 3: Report to the platform

Seek takedown, restriction, or preservation where possible.

Step 4: Report to authorities

Go to PNP-ACG, NBI Cybercrime, or local police; then proceed as required to prosecutor processes.

Step 5: Execute affidavits properly

Organized, detailed, sworn, and annexed.

Step 6: Consider parallel remedies

School, workplace, privacy, child-protection, VAWC, and civil damages.


XXIX. Suggested contents of a complaint packet

A well-prepared complaint packet may contain:

  • cover page with your name and contact details
  • one-page summary of what happened
  • full affidavit
  • chronology table
  • screenshot annexes labeled Annex A, B, C, and so on
  • list of URLs
  • identity information of offender, if known
  • proof of emotional or practical harm
  • copy of valid ID
  • USB drive or digital folder of original files

This makes it easier for investigators to receive and act on the case.


XXX. Final legal perspective

In the Philippine setting, cyber harassment and online threats are legally significant not because the internet created a brand-new category of harm, but because digital tools now amplify intimidation, sexual abuse, privacy invasion, and reputational attacks at scale and with permanence. Philippine law addresses these acts through an interlocking framework: the Cybercrime Prevention Act, the Revised Penal Code, the Safe Spaces Act, the Anti-Photo and Video Voyeurism Act, the Data Privacy Act, child-protection laws, VAWC, and civil remedies.

The most important rule for victims is this: preserve first, report promptly, and frame the complaint according to the actual harm. A threat is not merely a rude post. Doxxing is not merely gossip. Sextortion is not merely a private dispute. Image-based abuse is not merely embarrassment. When online conduct causes fear, coercion, sexual humiliation, exposure, stalking, or danger, Philippine law may treat it as actionable and punishable.

A person facing cyber harassment or online threats should therefore think in four tracks at once: safety, evidence, law enforcement, and legal classification. That is how a scattered online incident becomes a credible legal case.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.