How to Report Cybercrime and Online Scams in the Philippines

I. Introduction

Cybercrime and online scams have become among the most common legal problems faced by Filipinos. These offenses may involve hacked accounts, phishing links, fake online sellers, investment scams, romance scams, identity theft, unauthorized bank transfers, cyberlibel, online threats, extortion, sextortion, and misuse of personal data.

In the Philippines, cybercrime is not treated as a minor internet dispute. Depending on the facts, it may give rise to criminal liability, civil liability, administrative complaints, data privacy violations, banking complaints, consumer complaints, and requests for takedown or account recovery.

The key to an effective report is speed, preservation of evidence, and filing with the proper agency.


II. Main Laws Governing Cybercrime and Online Scams in the Philippines

1. Cybercrime Prevention Act of 2012

The principal law is Republic Act No. 10175, or the Cybercrime Prevention Act of 2012. It punishes crimes committed through or involving computer systems, digital platforms, electronic communications, or information and communications technology.

Cybercrimes under this law include:

  • Illegal access or hacking
  • Illegal interception of communications
  • Data interference
  • System interference
  • Misuse of devices
  • Cyber-squatting
  • Computer-related forgery
  • Computer-related fraud
  • Computer-related identity theft
  • Cybersex
  • Child pornography through computer systems
  • Unsolicited commercial communications, subject to legal qualifications
  • Cyberlibel
  • Other crimes under the Revised Penal Code and special laws committed through ICT

A traditional crime may become a cybercrime when committed through computers, phones, messaging apps, websites, social media, online platforms, or digital payment systems.

2. Revised Penal Code

Many online scams are still prosecuted under the Revised Penal Code, especially:

  • Estafa or swindling
  • Theft
  • Threats
  • Grave coercion
  • Unjust vexation
  • Libel
  • Falsification
  • Usurpation of authority
  • Other fraud-related offenses

When the internet is used as the means to commit these acts, the Cybercrime Prevention Act may also apply.

3. Data Privacy Act of 2012

Republic Act No. 10173, or the Data Privacy Act of 2012, applies when personal information is collected, used, disclosed, sold, leaked, or processed without lawful basis.

This is relevant in cases involving:

  • Doxxing
  • Unauthorized posting of private information
  • Leaked IDs
  • Misuse of personal photos
  • Identity theft
  • Unauthorized account creation using another person’s information
  • Data breaches
  • Unauthorized disclosure by companies, schools, employers, or platforms

Complaints involving misuse of personal data may be brought before the National Privacy Commission.

4. E-Commerce Act

Republic Act No. 8792, or the Electronic Commerce Act, recognizes electronic documents, electronic signatures, and electronic evidence. It is important because screenshots, emails, chat logs, transaction records, and digital receipts may become relevant evidence.

5. Consumer Protection Laws

Online selling scams, defective goods, fake stores, misleading advertisements, and non-delivery of purchased items may also involve consumer protection rules enforced by the Department of Trade and Industry, especially when the seller is a business, online shop, or merchant.

6. Financial and Banking Regulations

Online bank fraud, unauthorized transfers, e-wallet scams, credit card fraud, phishing, and account takeovers may involve the bank, e-wallet provider, payment platform, or the Bangko Sentral ng Pilipinas complaint channels.


III. Common Forms of Cybercrime and Online Scams

1. Phishing

Phishing occurs when a scammer tricks a person into giving passwords, OTPs, PINs, bank details, e-wallet credentials, or personal information through fake links, fake websites, emails, text messages, or calls.

Common examples include:

  • Fake bank login pages
  • Fake GCash, Maya, Shopee, Lazada, or delivery links
  • Fake “account verification” messages
  • Fake government aid or prize links
  • Fake job application forms collecting personal data

2. Online Selling Scams

This happens when a seller receives payment but fails to deliver the goods, sends a fake item, blocks the buyer, or uses a fake identity.

Evidence usually includes:

  • Chat history
  • Product listing
  • Proof of payment
  • Seller’s profile
  • Delivery details
  • Bank or e-wallet account used
  • Screenshots of being blocked
  • Other victims’ posts or complaints

3. Investment Scams

Investment scams often promise unusually high returns, guaranteed income, referral bonuses, or passive income with little risk.

Warning signs include:

  • “Double your money”
  • “Guaranteed profit”
  • “No risk”
  • “Limited slots”
  • “Invite to earn”
  • “Trading bot”
  • “Crypto mining”
  • “Tasking platform”
  • “Ponzi-style commissions”
  • “Pay first before withdrawal”

These cases may involve estafa, syndicated estafa, securities violations, cybercrime, or money laundering issues depending on the facts.

4. Romance Scams

A scammer pretends to be romantically interested in the victim, builds trust, then asks for money, gifts, load, bank transfers, travel funds, medical expenses, or emergency assistance.

These cases become more serious when the scammer obtains intimate photos or videos and later uses them for blackmail.

5. Sextortion

Sextortion involves threats to release intimate photos, videos, chats, or personal information unless the victim pays money, sends more images, or complies with demands.

This may involve:

  • Grave threats
  • Coercion
  • Robbery or extortion
  • Cybercrime
  • Data privacy violations
  • Anti-photo and video voyeurism laws
  • Child protection laws if the victim is a minor

Victims should avoid negotiating further, preserve evidence, report immediately, and block only after evidence is secured.

6. Identity Theft

Computer-related identity theft occurs when someone uses another person’s name, image, account, ID, credentials, or personal data online without authority.

Examples include:

  • Fake Facebook or Instagram accounts
  • Use of another person’s photos to scam others
  • Fake marketplace profiles
  • SIM or e-wallet registration using another person’s ID
  • Unauthorized use of personal documents
  • Impersonation in messages or emails

7. Hacking and Unauthorized Access

This includes logging into someone’s account, email, device, cloud storage, social media, or bank account without permission.

Unauthorized access may be committed even if the offender does not steal money. Accessing a system or account without authority is already legally significant.

8. Cyberlibel

Cyberlibel involves defamatory statements published online. It may arise from posts, comments, messages, blogs, videos, or other digital publications.

However, not every negative post is cyberlibel. The statement must generally involve an imputation that dishonors, discredits, or damages a person’s reputation, must be published, must identify the person, and must be malicious or presumed malicious unless legally privileged.

9. Online Threats and Harassment

Threats, harassment, blackmail, stalking, repeated abusive messages, and intimidation through online platforms may be reported as criminal offenses depending on the content and circumstances.

10. Unauthorized Bank or E-Wallet Transactions

These include:

  • Unauthorized fund transfers
  • Account takeover
  • SIM swap-related fraud
  • OTP phishing
  • Card-not-present transactions
  • Unauthorized purchases
  • Fake customer service representatives
  • QR code scams

Immediate reporting to the bank or e-wallet provider is critical because internal fraud investigation, account freezing, chargeback, or reversal may depend on prompt notice.


IV. Where to Report Cybercrime and Online Scams in the Philippines

1. Philippine National Police Anti-Cybercrime Group

The PNP Anti-Cybercrime Group investigates cybercrime complaints and assists victims in documenting cyber-related offenses.

Victims may report matters such as:

  • Hacking
  • Online scams
  • Cyberlibel
  • Online threats
  • Sextortion
  • Identity theft
  • Phishing
  • Online harassment
  • Fake accounts used for fraud
  • Unauthorized access

The complainant should bring valid identification and all available evidence.

2. National Bureau of Investigation Cybercrime Division

The NBI Cybercrime Division also investigates cybercrime offenses. It may assist in cases involving online fraud, hacking, identity theft, cyberlibel, online extortion, and other digital crimes.

For serious cases, victims often consider filing with the NBI or PNP cybercrime units, especially when tracing, forensic preservation, or coordination with platforms may be needed.

3. Local Police Station

A victim may also go to the nearest police station to report the incident. The local police may prepare a blotter entry, initial report, or referral to the appropriate cybercrime unit.

A police blotter is not the same as a criminal complaint, but it may help establish that the incident was reported promptly.

4. Office of the City or Provincial Prosecutor

For criminal prosecution, a complaint may eventually be filed before the Office of the Prosecutor for preliminary investigation, especially when the suspect is identified.

The prosecutor determines whether probable cause exists to file a criminal case in court.

5. National Privacy Commission

The National Privacy Commission handles complaints involving personal data misuse, unauthorized processing, data breaches, unauthorized disclosure, identity-related data abuse, or violations of data privacy rights.

This is relevant when a person’s ID, address, phone number, photos, personal documents, or sensitive personal information has been collected, posted, shared, or used without lawful basis.

6. Department of Trade and Industry

The Department of Trade and Industry may be relevant for online consumer complaints involving businesses, online sellers, defective products, misleading advertisements, non-delivery, or unfair trade practices.

However, if the matter is clearly fraudulent or criminal, the victim should also consider reporting to cybercrime authorities.

7. Bank, E-Wallet, or Payment Provider

For unauthorized financial transactions, the victim should immediately report to the relevant bank, e-wallet, remittance service, credit card issuer, or payment platform.

This report should request:

  • Account blocking or freezing
  • Transaction investigation
  • Reference number
  • Written confirmation of complaint
  • Preservation of logs
  • Reversal or chargeback, when applicable
  • Details needed for police or NBI complaint

8. Social Media Platform or Online Marketplace

Victims should also report the offending account, listing, page, or post to the platform involved.

This may include:

  • Facebook
  • Messenger
  • Instagram
  • TikTok
  • X
  • YouTube
  • Telegram
  • Viber
  • WhatsApp
  • Shopee
  • Lazada
  • Carousell
  • Online job platforms
  • Dating apps
  • Crypto platforms

Platform reporting does not replace a criminal complaint, but it may help remove harmful content, suspend accounts, or preserve platform records.


V. Immediate Steps After Discovering a Cybercrime or Online Scam

Step 1: Do Not Delete Anything

Victims often delete messages, posts, or accounts out of fear or embarrassment. This can weaken the case.

Preserve:

  • Chats
  • Emails
  • SMS
  • Call logs
  • Account names
  • URLs
  • Usernames
  • Profile links
  • Transaction receipts
  • Bank transfer records
  • E-wallet reference numbers
  • Screenshots
  • Photos and videos
  • Delivery tracking records
  • Marketplace listings
  • IP-related notices, if available
  • Threats and demands

Step 2: Take Clear Screenshots

Screenshots should show:

  • Full conversation
  • Date and time
  • Username or account name
  • Profile URL or link
  • Phone number or email address
  • Payment instructions
  • Amount paid
  • Confirmation of payment
  • Threats or admissions
  • Blocking or deletion notices

Where possible, use screen recording to capture scrolling conversations and profile pages.

Step 3: Save URLs and Account Identifiers

A screenshot of a profile photo alone is often insufficient. Save the actual profile link, username, page URL, email header, phone number, bank account name, e-wallet number, QR code, transaction ID, and other identifiers.

Step 4: Secure Your Accounts

Change passwords immediately for affected accounts. Use strong, unique passwords and enable two-factor authentication.

Also log out unknown sessions, remove unfamiliar devices, revoke suspicious app permissions, and check account recovery email addresses and phone numbers.

Step 5: Notify the Bank or E-Wallet Provider

For financial scams, contact the financial institution immediately. Time matters.

Request a reference number and ask whether funds can still be held, reversed, investigated, or traced.

Step 6: Report to the Proper Authorities

Prepare a written narrative and supporting evidence before going to the PNP, NBI, prosecutor, or other agency.

Step 7: Avoid Further Contact With the Scammer

After preserving evidence, avoid further engagement. Do not send more money. Do not negotiate with extortionists. Do not click links sent by the scammer.


VI. Evidence Needed When Reporting

A strong complaint usually includes the following:

1. Personal Information of the Complainant

  • Full name
  • Address
  • Contact number
  • Email address
  • Valid government ID
  • Relationship to the incident

2. Narrative of Events

The narrative should answer:

  • What happened?
  • When did it happen?
  • Where did the online interaction occur?
  • Who was involved?
  • How much money was lost?
  • What platform was used?
  • What accounts, numbers, or links were involved?
  • What actions did the suspect take?
  • What actions did the victim take after discovery?

3. Digital Evidence

Useful evidence includes:

  • Screenshots
  • Screen recordings
  • Chat exports
  • Email files
  • URLs
  • Profile links
  • Transaction receipts
  • Bank statements
  • E-wallet transaction history
  • Delivery records
  • Marketplace order details
  • Photos of goods, if any
  • Copies of IDs used or misused
  • Threat messages
  • Voice recordings, subject to legal admissibility rules
  • Names of witnesses or other victims

4. Financial Records

For scams involving money, include:

  • Amount sent
  • Date and time of transaction
  • Sending bank or wallet
  • Receiving bank or wallet
  • Account name
  • Account number or mobile number
  • Reference number
  • QR code or payment link
  • Confirmation receipt
  • Any refund promises

5. Platform Information

Include:

  • Username
  • Display name
  • Profile URL
  • Page URL
  • Group link
  • Listing link
  • Email address
  • Phone number
  • Device or login alerts
  • Any platform case number after reporting

VII. How to Draft a Cybercrime Complaint Narrative

A complaint narrative should be clear, chronological, and factual. Avoid speculation unless clearly identified as belief or suspicion.

Suggested Format

1. Introduction

State your name, address, and purpose of the complaint.

2. Background

Describe how you encountered the suspect, account, advertisement, or message.

3. Transaction or Incident

Describe what was promised, what you were asked to do, what you paid or disclosed, and what happened afterward.

4. Discovery of Fraud or Harm

Explain when and how you realized the incident was a scam or cybercrime.

5. Evidence

List the evidence attached to the complaint.

6. Relief Requested

State that you are requesting investigation, identification of the offender, preservation of records, and filing of appropriate charges.

Sample Complaint Narrative

I am filing this complaint for online scam and possible cybercrime. On or about [date], I saw a post on [platform] by an account using the name [account name] offering [item/service/investment]. I contacted the account through [Messenger/Viber/Telegram/etc.]. The person instructed me to pay [amount] to [bank/e-wallet/account name and number].

After I paid, the person promised to deliver the item or return the money. However, the person stopped responding, blocked me, and deleted or changed the account details. Attached are screenshots of the conversation, the profile page, the payment receipt, and the transaction reference number.

I respectfully request an investigation and the filing of appropriate charges under applicable Philippine laws.


VIII. Reporting Online Selling Scams

For online selling scams, gather:

  • Seller profile
  • Product listing
  • Chat messages
  • Proof of payment
  • Delivery promise
  • Tracking number, if any
  • Proof of non-delivery
  • Other victims’ complaints, if available

Possible legal remedies include:

  • Criminal complaint for estafa or computer-related fraud
  • Cybercrime complaint
  • Consumer complaint, if the seller is a business
  • Platform report
  • Bank or e-wallet complaint

A single failed delivery is not always automatically criminal. The key issue is fraudulent intent. Evidence of fake identity, repeated victims, immediate blocking after payment, false tracking numbers, or use of multiple accounts may help show fraud.


IX. Reporting Phishing and Unauthorized Transfers

For phishing or unauthorized transactions, act immediately.

What to do first

  1. Call or message the official bank or e-wallet support channel.
  2. Ask for account blocking or transaction hold.
  3. Change passwords and PINs.
  4. Revoke device access.
  5. Preserve phishing messages and links.
  6. File a report with cybercrime authorities.
  7. Request written confirmation from the bank or e-wallet provider.

Evidence to keep

  • Phishing SMS or email
  • Fake website URL
  • Sender number or email
  • Date and time link was clicked
  • Unauthorized transaction receipts
  • OTP messages, if any
  • Bank or wallet alerts
  • Customer service reference number

Victims should never share OTPs, MPINs, passwords, recovery codes, or authentication prompts. A person claiming to be from a bank, e-wallet, delivery company, government agency, or platform who asks for these details is likely a scammer.


X. Reporting Sextortion and Intimate Image Abuse

Sextortion should be treated urgently.

Immediate steps

  • Preserve the threats and messages.
  • Save the account links and usernames.
  • Do not send more photos, videos, or money.
  • Report to cybercrime authorities.
  • Report the account to the platform.
  • Inform a trusted person if personal safety is at risk.
  • If the victim is a minor, report immediately to authorities and child protection channels.

Relevant laws may include cybercrime law, grave threats, coercion, robbery or extortion, data privacy law, anti-photo and video voyeurism law, and child protection laws where minors are involved.

Victims should not be blamed for being deceived or coerced. The offender is legally responsible for threats, extortion, unauthorized sharing, and exploitation.


XI. Reporting Identity Theft and Fake Accounts

For fake accounts or impersonation, gather:

  • Link to fake account
  • Screenshots of profile
  • Posts, messages, or scams made using the fake identity
  • Proof of your real identity
  • Reports from people contacted by the fake account
  • Evidence that the account used your name, photo, ID, or personal information

Report the fake account to the platform and to cybercrime authorities if it is used to scam, harass, defame, threaten, or impersonate you.

If personal information was used without consent, a complaint with the National Privacy Commission may also be appropriate.


XII. Reporting Cyberlibel

Cyberlibel complaints require careful evaluation because they involve both criminal law and freedom of expression.

Evidence should include:

  • Full post or comment
  • URL
  • Date and time of publication
  • Identity of the poster, if known
  • Screenshots showing the account and content
  • Explanation of why the statement is defamatory
  • Proof that the complainant is identifiable
  • Evidence of harm, if available

Not all insults, opinions, criticisms, or negative reviews are cyberlibel. The legal assessment depends on the exact words used, context, identifiability, publication, malice, and defenses such as truth, fair comment, privilege, or public interest.


XIII. Reporting Data Privacy Violations

A data privacy complaint may be proper when personal data is:

  • Collected without lawful basis
  • Posted online without consent
  • Sold or shared without authority
  • Used for identity theft
  • Used for harassment
  • Leaked by an organization
  • Processed beyond the purpose for which it was collected
  • Used to create fake accounts or fraudulent applications

The complainant should gather:

  • Screenshots of the disclosure
  • URLs
  • Copies of messages
  • Proof of identity
  • Proof that the information belongs to the complainant
  • Evidence of harm
  • Prior request for takedown or correction, if any

The National Privacy Commission may require details about the personal information controller or processor involved, especially if the complaint is against a company, school, employer, platform, or organization.


XIV. What Happens After Reporting

1. Initial Assessment

The receiving office reviews the complaint, evidence, and legal classification of the act.

2. Investigation

Investigators may examine digital evidence, request additional documents, identify accounts, coordinate with platforms, or refer the matter to another agency.

3. Identification of Suspect

If the suspect is unknown, investigators may need records from platforms, telecoms, banks, e-wallets, or service providers. Some information may require legal process.

4. Referral for Prosecutorial Action

If there is sufficient basis, the complaint may proceed to the prosecutor’s office for preliminary investigation.

5. Preliminary Investigation

The prosecutor evaluates whether probable cause exists. The respondent may be required to submit a counter-affidavit.

6. Filing in Court

If probable cause is found, an information may be filed in court. The case then proceeds as a criminal case.


XV. Jurisdiction and Venue

Cybercrimes often involve victims, suspects, servers, platforms, banks, and transactions in different places. In the Philippines, the place where the victim accessed the communication, where the damage occurred, where the transaction happened, or where elements of the offense occurred may become relevant.

For practical purposes, victims usually report to:

  • The cybercrime unit nearest them
  • The place where they reside
  • The place where the transaction occurred
  • The place where the offender is located, if known
  • The appropriate national cybercrime unit

Jurisdiction can be complex when suspects are abroad. Even then, a report may still be useful for documentation, account recovery, platform takedown, bank investigation, and possible coordination with foreign entities.


XVI. Time Limits and Prescription

Cybercrime and fraud-related cases may be subject to prescriptive periods. The applicable period depends on the offense charged and the penalty imposed by law.

Victims should report as soon as possible. Delay can cause:

  • Loss of digital evidence
  • Deleted accounts
  • Closed bank or e-wallet accounts
  • Unavailable transaction logs
  • Weaker recollection of events
  • Difficulty identifying suspects

Prompt reporting strengthens the case.


XVII. Admissibility of Digital Evidence

Digital evidence may be admissible in Philippine proceedings if properly authenticated and relevant.

Useful practices include:

  • Preserve original files when possible.
  • Do not alter screenshots.
  • Keep original devices.
  • Save emails in original format.
  • Export chats where possible.
  • Record URLs and timestamps.
  • Back up evidence securely.
  • Prepare affidavits explaining how evidence was obtained.
  • Avoid editing, cropping, or manipulating screenshots in a way that may raise questions.

Courts and investigators may require proof that the evidence is genuine, complete, and connected to the person or account involved.


XVIII. Role of Barangay Proceedings

Barangay conciliation generally applies to certain disputes between individuals residing in the same city or municipality, subject to legal exceptions. However, many cybercrime cases, offenses punishable by higher penalties, cases involving public officers, parties in different cities, urgent criminal matters, or cases requiring immediate law enforcement action may not be suitable for barangay settlement.

Victims should not rely solely on barangay proceedings when the matter involves cybercrime, online fraud, extortion, hacking, unauthorized bank transactions, or threats requiring investigation.


XIX. Civil Remedies

Aside from criminal complaints, victims may also pursue civil remedies when appropriate.

Possible civil claims include:

  • Recovery of money
  • Damages
  • Injunction
  • Takedown-related relief
  • Compensation for reputational harm
  • Moral damages
  • Exemplary damages
  • Attorney’s fees, where legally proper

Civil recovery may be pursued within a criminal case or through a separate civil action depending on the circumstances.


XX. Administrative and Regulatory Remedies

Some cases are not purely criminal. They may also involve administrative complaints.

Examples:

  • A company mishandles personal data: National Privacy Commission
  • A registered business scams consumers: DTI
  • A bank or e-wallet mishandles an unauthorized transaction complaint: bank/e-wallet internal complaint and possible BSP escalation
  • A lending app harasses borrowers or contacts third parties: NPC, SEC, law enforcement, or other regulators depending on the entity and conduct
  • A platform seller violates marketplace rules: platform complaint and consumer complaint

The best remedy may involve filing in more than one forum, as long as the complaints are truthful and based on the same documented facts.


XXI. Special Issues in Online Lending Harassment

Some online lending apps engage in harassment, public shaming, unauthorized contact with phonebook contacts, threats, or misuse of personal data.

Possible legal issues include:

  • Unfair debt collection practices
  • Data privacy violations
  • Grave threats
  • Cyberlibel
  • Unjust vexation
  • Unauthorized disclosure of personal information
  • Harassment

Evidence should include:

  • Loan app name
  • Screenshots of threats
  • Messages sent to contacts
  • Proof of unauthorized contact access
  • Harassing posts or group messages
  • Call logs
  • Loan agreement
  • Payment records
  • App permissions, if available

XXII. Scams Involving Minors

Cases involving minors require special urgency.

Examples include:

  • Grooming
  • Sextortion
  • Child sexual abuse or exploitation material
  • Online enticement
  • Threats involving intimate images
  • Fake accounts targeting minors
  • Exploitation through games or social media

These cases should be reported immediately to law enforcement and child protection authorities. Evidence should be preserved, but victims and parents should avoid distributing or forwarding explicit material involving minors except as required by authorities.


XXIII. What Not to Do

Victims should avoid the following:

  • Do not delete messages before saving evidence.
  • Do not send more money to recover previous payments.
  • Do not threaten the scammer unlawfully.
  • Do not publicly accuse someone without sufficient basis.
  • Do not post sensitive personal information online.
  • Do not share intimate images further.
  • Do not click additional links from the scammer.
  • Do not rely on unofficial “recovery agents.”
  • Do not pay hackers claiming they can retrieve funds.
  • Do not give passwords, OTPs, or PINs to anyone.
  • Do not delay reporting financial fraud.

XXIV. Red Flags of Online Scams

Common red flags include:

  • Guaranteed high returns
  • Pressure to act immediately
  • Requests for OTPs or passwords
  • Too-good-to-be-true prices
  • Newly created accounts
  • No verifiable business identity
  • Refusal to meet or do cash-on-delivery
  • Fake IDs or inconsistent names
  • Payment to personal accounts instead of business accounts
  • Requests to move conversation outside the platform
  • Poor grammar in official-looking messages
  • Fake websites with slightly misspelled domains
  • Threats after refusal to pay
  • Advance fees for jobs, loans, prizes, or withdrawals

XXV. Preventive Measures

For Individuals

  • Use strong passwords.
  • Enable two-factor authentication.
  • Never share OTPs.
  • Verify URLs before logging in.
  • Avoid public Wi-Fi for banking.
  • Use official apps only.
  • Check seller reviews carefully.
  • Confirm business registration where relevant.
  • Avoid sending IDs unless necessary.
  • Watermark ID copies when submitting online.
  • Monitor bank and e-wallet alerts.
  • Be cautious with investment offers.
  • Keep software updated.

For Businesses

  • Maintain cybersecurity policies.
  • Train employees on phishing.
  • Use secure payment systems.
  • Protect customer data.
  • Have a breach response plan.
  • Keep access controls limited.
  • Report data breaches when required.
  • Preserve logs.
  • Use official communication channels.
  • Respond promptly to fraud reports.

XXVI. Practical Checklist Before Going to Authorities

Bring or prepare the following:

  • Valid government ID
  • Written complaint narrative
  • Printed screenshots
  • Digital copies of evidence
  • URLs and usernames
  • Phone numbers and email addresses involved
  • Proof of payment
  • Bank or e-wallet records
  • Platform report reference numbers
  • Names of witnesses
  • Timeline of events
  • Device used, if relevant
  • Prior reports to bank, platform, or barangay
  • Any response from the suspect

It is helpful to arrange evidence chronologically and label attachments clearly.

Example:

  • Annex A: Screenshot of seller profile
  • Annex B: Product listing
  • Annex C: Conversation
  • Annex D: Payment receipt
  • Annex E: Proof of blocking
  • Annex F: Bank complaint reference

XXVII. Sample Evidence Log

Date Event Evidence
January 5 Saw online listing Screenshot of post
January 5 Contacted seller Messenger chat
January 6 Paid ₱5,000 E-wallet receipt
January 7 Seller promised delivery Chat screenshot
January 10 Seller stopped replying Chat screenshot
January 11 Account blocked complainant Profile screenshot
January 12 Reported to bank/e-wallet Case reference number

XXVIII. Sample Affidavit-Style Statement

Republic of the Philippines [City/Municipality]

AFFIDAVIT OF COMPLAINT

I, [Name], of legal age, Filipino, and residing at [Address], after being duly sworn, state:

  1. I am the complainant in this case involving an online scam/cybercrime committed through [platform].

  2. On [date], I encountered an account using the name [account name] with the profile link [URL].

  3. The account offered [item/service/investment] and represented that [state representation].

  4. Relying on such representation, I sent the amount of [amount] on [date] through [bank/e-wallet] to [account name/account number/mobile number].

  5. After receiving payment, the said account [failed to deliver/blocked me/deleted the listing/refused refund/threatened me].

  6. Attached to this affidavit are screenshots of the conversation, the profile link, the payment receipt, and other relevant documents.

  7. I am executing this affidavit to request investigation and the filing of appropriate charges under Philippine law.

IN WITNESS WHEREOF, I have signed this affidavit on [date] at [place].

[Signature] [Name]


XXIX. Frequently Asked Questions

1. Can I report a scam even if I lost only a small amount?

Yes. Small-value scams may still be criminal, especially if the offender victimizes many people.

2. Can I report if I only know the scammer’s username?

Yes. Provide the username, profile link, chat logs, payment details, and any connected accounts. Authorities may use these details during investigation.

3. Is a screenshot enough?

A screenshot helps, but stronger evidence includes URLs, transaction records, account numbers, email headers, chat exports, screen recordings, and original files.

4. Should I post the scammer online?

Public warnings may expose the victim to defamation or privacy issues if not carefully handled. It is safer to report to authorities and platforms using documented evidence.

5. Can money be recovered?

Recovery depends on speed, traceability, whether the funds remain in the account, bank or e-wallet rules, and the outcome of legal proceedings. Immediate reporting improves the chances.

6. What if the scammer is abroad?

Report locally anyway. The complaint may still help with documentation, platform action, account recovery, financial investigation, or possible cross-border coordination.

7. What if the bank says the transaction was authorized because I gave the OTP?

The victim may still report the matter. However, sharing OTPs may complicate reimbursement. The scammer may still be criminally liable for deception, phishing, or fraud.

8. Can I file both a cybercrime complaint and a bank complaint?

Yes. These remedies serve different purposes. A bank complaint seeks financial investigation or possible reversal, while a cybercrime complaint seeks law enforcement action.

9. Can I file with both PNP and NBI?

A complainant should avoid duplicative confusion, but serious cases may involve coordination. It is best to disclose prior reports when approaching another agency.

10. Do I need a lawyer?

A lawyer is not always required to report cybercrime, but legal assistance is helpful for serious cases, large financial loss, cyberlibel, sextortion, business fraud, or cases requiring affidavits and prosecutor filings.


XXX. Legal Strategy Considerations

A good cybercrime complaint should identify the correct legal theory. The same facts may support multiple legal angles.

Example:

An online seller uses a fake Facebook account, receives payment through an e-wallet, blocks the buyer, and uses another person’s ID.

Possible issues:

  • Estafa
  • Computer-related fraud
  • Identity theft
  • Data privacy violation
  • Platform policy violation
  • E-wallet fraud investigation

Another example:

A person hacks an account, downloads private photos, and threatens to release them unless paid.

Possible issues:

  • Illegal access
  • Data interference or misuse
  • Grave threats
  • Extortion
  • Data privacy violation
  • Anti-photo and video voyeurism violation
  • Cybercrime aggravation or related cyber offenses

The complaint should not merely say “I was scammed.” It should describe the acts clearly enough for investigators or prosecutors to classify the offense.


XXXI. Importance of Timeliness

Cybercrime investigations are time-sensitive because digital evidence can disappear quickly.

Platforms may delete logs. Scammers may change usernames. SIM cards may be discarded. Bank accounts may be emptied. Marketplace listings may be removed. Chat accounts may be deactivated.

The safest approach is:

  1. Preserve evidence immediately.
  2. Report to the financial institution immediately.
  3. Report to the platform.
  4. Report to cybercrime authorities.
  5. Prepare a complete complaint packet.

XXXII. Conclusion

Reporting cybercrime and online scams in the Philippines requires more than simply telling authorities that a scam occurred. The victim must preserve evidence, document the transaction or incident, identify the platforms and accounts involved, report promptly to banks or e-wallets when money is involved, and file with the proper government agency.

The main remedies may involve the PNP Anti-Cybercrime Group, NBI Cybercrime Division, local police, prosecutor’s office, National Privacy Commission, Department of Trade and Industry, financial institutions, and online platforms. The proper route depends on the nature of the act: fraud, hacking, identity theft, cyberlibel, sextortion, data privacy violation, online selling scam, investment scam, or unauthorized financial transaction.

The strongest complaints are factual, chronological, supported by evidence, and filed quickly. In cybercrime cases, screenshots matter, but complete records matter more. URLs, account identifiers, payment references, timestamps, transaction receipts, and preserved conversations can make the difference between a weak report and an actionable complaint.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.