How to Report Grave Threats Sent Through WhatsApp in the Philippines

A Legal Article in the Philippine Context

I. Introduction

Threats sent through WhatsApp can be legally serious in the Philippines. A message saying “I will kill you,” “I will burn your house,” “I will hurt your family,” “I will expose you unless you pay,” or “You will regret this tonight” may not be treated as mere online drama if the words, context, sender, and surrounding circumstances show a real threat of harm.

When a threat is made through WhatsApp, the case may involve both traditional criminal law and cyber-related rules. The platform used does not make the threat harmless. A threat sent by private chat, voice note, image, video, call, group chat, disappearing message, or forwarded media can still be evidence.

The practical question is: how does a victim report grave threats sent through WhatsApp in the Philippines?

The general answer is:

Preserve the evidence, secure personal safety, document the sender’s identity, report the threat to the appropriate law enforcement or prosecutor’s office, consider cybercrime reporting if digital evidence or online means are involved, and seek protective remedies if there is continuing danger.

This article explains the legal nature of grave threats, how WhatsApp messages may be treated as evidence, where and how to report, what documents to prepare, what remedies may be available, what mistakes to avoid, and how to protect oneself while a complaint is being prepared.


II. Meaning of Grave Threats

Grave threats generally refer to threats to commit a wrong amounting to a crime against a person, honor, or property. The threat may involve death, physical harm, kidnapping, burning of property, destruction, sexual violence, exposure of damaging material, or other serious unlawful acts.

In ordinary language, a grave threat is a serious warning that the offender intends to cause harm unless the victim acts, refrains from acting, pays money, apologizes, leaves, returns property, withdraws a complaint, or submits to the offender’s demand.

Examples may include:

  • “I will kill you.”
  • “I will shoot you when I see you.”
  • “I will burn your house.”
  • “I will hurt your child.”
  • “I will destroy your car.”
  • “I will send people to attack you.”
  • “Withdraw the case or I will kill your family.”
  • “Pay me or I will expose your private videos.”
  • “Do not go to work tomorrow; I will be waiting.”
  • “I know where you live. You are dead.”

A threat may be grave even if no physical attack has yet happened, depending on its seriousness, credibility, and context.


III. Grave Threats vs. Light Threats vs. Other Offenses

Not every angry or insulting message is necessarily grave threats. The classification depends on what was threatened and how it was communicated.

A. Grave Threats

Grave threats usually involve a threat to commit a serious wrong or crime. Death threats, threats of serious injury, threats to burn a house, or threats to harm family members may fall here.

B. Light Threats

Light threats may involve less serious threats or threats connected to minor wrongs, depending on the circumstances.

C. Other Possible Offenses

A WhatsApp threat may also involve:

  • unjust vexation;
  • grave coercion;
  • light coercion;
  • cyber harassment;
  • stalking-like conduct;
  • blackmail or extortion;
  • robbery or extortion-related offenses;
  • cyber libel, if defamatory statements are also made;
  • violence against women and children, if the sender is an intimate partner or former partner and the victim is covered;
  • child abuse or threats against minors;
  • data privacy violations;
  • anti-photo and video voyeurism issues;
  • illegal access or hacking, if the threat involves hacked data.

The proper charge depends on the exact words, surrounding facts, relationship of the parties, and evidence.


IV. Why WhatsApp Threats Are Legally Important

WhatsApp is a private messaging application, but messages sent through it can still be used as evidence if properly preserved and authenticated.

Threats may be sent through:

  • text messages;
  • voice notes;
  • photos with captions;
  • videos;
  • documents;
  • stickers;
  • group chat messages;
  • disappearing messages;
  • calls;
  • forwarded messages;
  • screenshots;
  • status posts;
  • contact cards;
  • location pins.

The fact that WhatsApp uses encryption does not mean messages cannot be reported. The victim’s copy of the messages, screenshots, exports, device records, witness testimony, and related evidence may still be relevant.


V. First Priority: Safety

Before thinking about paperwork, the victim should assess immediate danger.

If the threat is urgent or specific, such as “I am outside your house,” “I will kill you tonight,” or “I am coming with a gun,” the victim should prioritize safety.

Possible immediate steps:

  • move to a safe place;
  • call local emergency assistance;
  • inform trusted family or friends;
  • notify building security, barangay, or police;
  • avoid meeting the sender alone;
  • do not go to the threatened location;
  • keep doors and gates secured;
  • preserve CCTV if available;
  • ask someone trustworthy to accompany you;
  • prepare identification documents and evidence;
  • seek medical attention if there has been prior violence.

A legal complaint can follow, but immediate safety comes first.


VI. Do Not Delete the WhatsApp Messages

The most common mistake is deleting messages out of fear or anger. The victim should preserve the original WhatsApp conversation.

Do not delete:

  • chat thread;
  • sender’s profile;
  • voice notes;
  • videos;
  • photos;
  • contact information;
  • timestamps;
  • call logs;
  • missed calls;
  • group chat messages;
  • replies;
  • context before and after the threat;
  • sender’s phone number;
  • profile picture;
  • disappearing message notices;
  • exported chat file.

Screenshots are useful, but the original messages on the phone are better.


VII. Preserve Evidence Properly

A victim should preserve evidence in several ways.

1. Take Screenshots

Screenshots should show:

  • sender’s name or number;
  • exact message;
  • date and time;
  • full context;
  • profile photo or number, if visible;
  • earlier and later messages;
  • any replies;
  • group name, if in a group chat.

Avoid cropping too much. A full screenshot is more credible than a cropped excerpt.

2. Export the Chat

WhatsApp has a chat export function. Exporting the chat may preserve text and media depending on settings.

The exported file should be saved securely, emailed to oneself, backed up, or stored in a secure drive.

3. Save Media

Save:

  • voice notes;
  • images;
  • videos;
  • documents;
  • contact cards;
  • location pins;
  • screenshots;
  • call logs.

4. Record Context

Write a timeline:

  • when the threats started;
  • why they began;
  • who the sender is;
  • relationship with sender;
  • previous incidents;
  • witnesses;
  • whether threats were repeated;
  • whether the sender knows your address;
  • whether the sender has weapons;
  • whether there was prior violence;
  • whether the sender demanded money or action.

5. Preserve the Device

The phone containing the original WhatsApp messages may be important. Do not factory reset it. Do not uninstall WhatsApp before evidence is secured.


VIII. Preserve the Sender’s Identity

The complaint will be stronger if the sender can be identified.

Evidence of identity may include:

  • phone number;
  • WhatsApp profile name;
  • profile photo;
  • contact saved in phone;
  • prior conversations showing identity;
  • admissions by sender;
  • screenshots where sender mentions personal facts;
  • call recordings, if lawfully obtained;
  • remittance or payment records;
  • social media profiles linked to the number;
  • SIM registration information, if later obtained through lawful process;
  • witnesses who know the number belongs to the sender;
  • previous messages from the same number;
  • business cards, emails, or documents showing the number;
  • group chat members who can identify the sender.

If the sender uses an unknown number, the victim should still report. Authorities may use legal processes to identify the user, depending on available information.


IX. Do Not Respond With Counter-Threats

Victims often feel tempted to reply angrily. Avoid sending counter-threats such as:

  • “I will kill you first.”
  • “I will send people after you.”
  • “I will destroy your life.”
  • “I will post your secrets.”
  • “You will pay for this.”

Counter-threats can weaken the complaint and expose the victim to countercharges.

A safe response, if any, may be short and clear:

“Do not threaten or contact me again. I am preserving these messages and will report them to the authorities.”

In serious cases, it may be better not to respond at all.


X. Where to Report Grave Threats Sent Through WhatsApp

A victim may report to several possible offices, depending on urgency and location.

A. Local Police Station

The victim may go to the nearest police station to report the threat. This is especially appropriate when there is immediate danger, the sender is nearby, or the victim needs quick assistance.

The police may record the complaint, prepare a blotter, assist in safety measures, and advise on filing a criminal complaint.

B. Women and Children Protection Desk

If the victim is a woman or child and the threat involves a spouse, former partner, dating partner, sexual violence, domestic abuse, or child-related harm, the Women and Children Protection Desk may be appropriate.

C. Anti-Cybercrime or Cybercrime Unit

Because the threats were sent through WhatsApp, a cybercrime unit may assist with digital evidence, preservation, and cyber-related aspects.

D. National Bureau of Investigation Cybercrime Division

For serious online threats, hacking, extortion, anonymous accounts, coordinated harassment, or threats involving digital evidence, a complaint may be brought to the NBI cybercrime office.

E. Prosecutor’s Office

A criminal complaint may be filed with the Office of the City or Provincial Prosecutor. The complaint should include a complaint-affidavit and supporting evidence.

F. Barangay

Barangay reporting may help document the incident, especially if the parties are in the same locality. However, grave threats or urgent safety situations should not be treated as merely a barangay misunderstanding if criminal danger exists.

Barangay conciliation may apply to some disputes, but serious threats, violence, or offenses outside barangay authority may require police or prosecutor involvement.


XI. Police Blotter vs. Criminal Complaint

A police blotter is a record of an incident. It is useful, but it is not the same as a full criminal case.

Police Blotter

A blotter entry documents that the victim reported the threat. It may include:

  • date and time of report;
  • victim’s name;
  • suspect’s name or number;
  • brief facts;
  • evidence shown;
  • officer who recorded the incident.

Criminal Complaint

A criminal complaint is a formal accusation supported by affidavits and evidence, usually filed for preliminary investigation or inquest, depending on the case.

A victim should not assume that a blotter automatically files a criminal case. Follow-up may be needed.


XII. What to Bring When Reporting

The victim should prepare:

  • valid government ID;
  • phone containing original WhatsApp messages;
  • screenshots of threats;
  • exported WhatsApp chat;
  • printed copies of screenshots;
  • sender’s phone number and profile;
  • timeline of events;
  • names and contact details of witnesses;
  • prior police or barangay blotters;
  • medical records, if prior violence occurred;
  • photos of damage, if any;
  • CCTV footage, if relevant;
  • proof of relationship with sender;
  • evidence of demands for money or action;
  • evidence of previous threats;
  • evidence showing the sender knows the victim’s address or location;
  • copies of related social media posts, if any.

Bring both digital and printed copies if possible.


XIII. How to Make a Complaint-Affidavit

A complaint-affidavit is a sworn statement narrating the facts and attaching evidence.

It should include:

  1. complainant’s name, age, address, and contact details;
  2. respondent’s name, address, phone number, or identifying information;
  3. relationship between complainant and respondent;
  4. date and time of threats;
  5. exact words used;
  6. platform used, such as WhatsApp;
  7. phone number or account used by sender;
  8. context of the threat;
  9. why the threat caused fear or alarm;
  10. whether the sender has means or history to carry it out;
  11. actions taken by complainant;
  12. attached screenshots and chat export;
  13. request for appropriate criminal action;
  14. oath and signature.

The affidavit should be truthful, specific, and chronological.


XIV. Importance of Quoting the Exact Threat

The exact words matter. A complaint should not merely say “he threatened me.” It should state the actual message.

Examples:

  • “On 10 May 2026 at around 8:15 p.m., the respondent sent me a WhatsApp message saying: ‘Papatayin kita pag nakita kita bukas.’”
  • “On 11 May 2026, he sent a voice note saying: ‘Susunugin ko bahay mo kung hindi mo ibabalik ang pera.’”
  • “He sent a photo of a gun with the message: ‘Ikaw ang susunod.’”

The exact wording helps determine whether the threat is grave, conditional, coercive, extortionate, or part of another offense.


XV. Conditional and Unconditional Threats

A threat may be conditional or unconditional.

Conditional Threat

A conditional threat demands something:

  • “Pay me ₱50,000 or I will kill you.”
  • “Withdraw the complaint or I will hurt your family.”
  • “Come with me or I will expose your photos.”
  • “Return the item or I will burn your house.”

Unconditional Threat

An unconditional threat does not demand an act:

  • “I will kill you.”
  • “I will shoot you tomorrow.”
  • “Your house will burn tonight.”

Both can be serious. The legal classification may differ depending on whether the threat includes a condition, demand, or extortion.


XVI. Threats Against Family Members

Threats against family members may be reported by the person threatened or by the person who received the message, depending on facts.

Examples:

  • “I will kill your mother.”
  • “I will hurt your child.”
  • “I know where your wife works.”
  • “Your family will suffer.”

If family members are at risk, they should also be informed and may consider filing their own reports, especially if they were directly threatened.


XVII. Threats in Group Chats

If grave threats are sent in a WhatsApp group chat, preserve:

  • group name;
  • list of members, if visible;
  • sender’s number;
  • complete message thread;
  • reactions or replies;
  • date and time;
  • any later deletions;
  • witnesses who saw the message.

Group chat threats may be easier to prove because other members can confirm the message.


XVIII. Voice Notes and WhatsApp Calls

Threats may be made through voice notes or calls.

Voice Notes

Save the voice note. Do not delete the chat. Export the media if possible.

Evidence may include:

  • original voice note;
  • transcript prepared by complainant;
  • screenshots showing sender and timestamp;
  • witnesses who heard it;
  • voice identification evidence.

Calls

WhatsApp calls may be harder to prove if not recorded. Preserve call logs and screenshots. If the threat was made during a call, write down immediately:

  • date and time;
  • duration;
  • exact words;
  • caller’s number;
  • whether someone else heard it;
  • what happened before and after.

Recording calls raises legal and evidentiary issues, so victims should be cautious and seek advice where possible.


XIX. Disappearing Messages

WhatsApp disappearing messages create evidence problems. If the sender uses disappearing messages, take screenshots immediately and export the chat if possible.

Preserve:

  • screenshot of disappearing message setting;
  • screenshot of the threat before it disappears;
  • notice that messages are disappearing;
  • any backups;
  • witness screenshots if someone else received it.

The fact that the sender used disappearing messages may support an inference that the sender wanted to hide evidence, depending on context.


XX. Deleted Messages

If the sender deletes a message for everyone, preserve:

  • screenshots taken before deletion;
  • notification showing message was deleted;
  • replies quoting the message;
  • exported chat if available;
  • witness screenshots;
  • phone backup, if available.

Deleted messages can still be reported if there is proof they existed.


XXI. Screenshots as Evidence

Screenshots are commonly used but may be challenged. To make them stronger:

  • include sender’s number and profile;
  • include date and time;
  • include full conversation context;
  • avoid editing;
  • keep original file;
  • do not crop excessively;
  • print copies;
  • save digital copies;
  • back up to email or cloud;
  • if possible, have another person witness the messages on the phone;
  • consider executing an affidavit explaining how screenshots were taken.

The original phone remains important.


XXII. Printed Screenshots

When filing a complaint, printed screenshots should be arranged clearly.

Each printout should show:

  • exhibit label;
  • date of message;
  • sender;
  • recipient;
  • translation if in dialect or mixed language;
  • relevance to complaint.

If the message is in Tagalog, Cebuano, Ilocano, another Philippine language, or mixed English, provide a clear English translation if needed.


XXIII. Translation of Threats

Threats may be in Filipino, regional languages, slang, or coded language.

Examples:

  • “Papatayin kita.”
  • “Ipapahamak kita.”
  • “May mangyayari sa’yo.”
  • “Alam ko saan ka nakatira.”
  • “Ipapahanap kita sa mga tao ko.”
  • “Sunod ka na.”
  • “Uubusin ko pamilya mo.”

A translation should convey the meaning accurately. If slang or local context matters, explain it in the affidavit.


XXIV. Context Matters

A message that looks vague may become serious when viewed with context.

Example:

“Mag-ingat ka mamaya” may be vague. But if sent after repeated death threats and with a photo of the victim’s house, it becomes more alarming.

Relevant context includes:

  • prior violence;
  • prior threats;
  • possession of weapons;
  • stalking;
  • knowledge of victim’s address;
  • sending photos of the victim’s location;
  • threats made after a dispute;
  • threats tied to money or coercion;
  • threats against children;
  • previous attempts to carry out harm;
  • sender’s criminal history, if known.

The complaint should explain context.


XXV. Threats With Weapons Photos

If the sender sends a photo of a gun, knife, gasoline, or weapon with threatening words, preserve the photo and message.

Examples:

  • gun photo plus “Ikaw ang susunod”;
  • knife photo plus “Hihintayin kita”;
  • gasoline container plus “Susunugin ko bahay mo”;
  • photo outside victim’s house plus “Lumabas ka.”

These facts may strengthen the complaint and urgency.


XXVI. Threats With Location Information

If the sender shares the victim’s address, workplace, school, or live location, preserve it.

Examples:

  • “Nasa labas ako ng bahay mo.”
  • “Alam ko kung saan pumapasok anak mo.”
  • “Andito ako sa building mo.”
  • sender sends a photo of victim’s gate;
  • sender shares a location pin near victim’s home.

This may show the threat is credible and immediate.


XXVII. Threats Combined With Extortion

If the threat demands money or property, the matter may involve extortion or robbery-related issues, depending on facts.

Examples:

  • “Send ₱20,000 or I will kill you.”
  • “Pay me or I will expose your photos.”
  • “Transfer money or I will destroy your business.”
  • “Give me your car or I will hurt your family.”

Preserve:

  • demand messages;
  • bank or e-wallet details;
  • account names;
  • QR codes;
  • payment instructions;
  • deadlines;
  • proof of payment, if any;
  • threats after payment.

Do not pay without considering safety and legal advice, especially in blackmail or sextortion cases.


XXVIII. Threats Combined With Defamation

The sender may threaten and also post false accusations.

Examples:

  • “I will tell everyone you are a thief.”
  • “I will post that you are a scammer unless you pay.”
  • “I will ruin your name.”
  • actual posts accusing the victim of crimes.

This may involve both threats and defamation-related remedies. The victim should preserve both private messages and public posts.


XXIX. Threats Combined With Hacking

The sender may threaten using hacked data.

Examples:

  • “I have your private messages.”
  • “I opened your email.”
  • “I downloaded your photos.”
  • “I will leak your files.”
  • “I changed your password.”
  • “I have access to your WhatsApp backup.”

This may involve illegal access, data privacy issues, and threats. The victim should immediately secure accounts and report the hacking aspect.


XXX. Threats Combined With Intimate Images

If the threat involves intimate photos or videos, the matter is especially serious.

Examples:

  • “I will send your nude photos to your family.”
  • “I will upload our private video.”
  • “Meet me or I will expose you.”
  • “Pay me or I will leak everything.”

The victim should preserve evidence, avoid giving in to repeated demands, report urgently, and consider protective remedies. If the victim is a minor, immediate reporting is critical.


XXXI. Threats in Domestic Relationships

Threats through WhatsApp are common in domestic or intimate partner conflicts.

If the sender is a spouse, former spouse, live-in partner, dating partner, ex-boyfriend, ex-girlfriend, or someone with whom the victim has or had a sexual or dating relationship, other protective laws may apply depending on the victim and facts.

Examples:

  • threats after breakup;
  • threats to hurt the victim for leaving;
  • threats to expose intimate content;
  • threats to take children;
  • threats to financially destroy the victim;
  • repeated psychological abuse through messages;
  • stalking and monitoring.

The victim may report to the Women and Children Protection Desk if applicable and may seek protection orders where appropriate.


XXXII. Threats Against Children

If threats are directed at a child or involve child abuse, the complaint should be treated with urgency.

Examples:

  • “I will kidnap your child.”
  • “I will hurt your daughter.”
  • threatening a minor through WhatsApp;
  • sending threatening or sexual messages to a minor;
  • coercing a child with threats.

Parents or guardians should preserve evidence and report to appropriate police, child protection, or prosecutor authorities.


XXXIII. Threats From a Co-Worker or Employer

If the threat comes from a co-worker, supervisor, employer, client, or employee, the victim may have both criminal and workplace remedies.

Possible steps:

  • preserve WhatsApp messages;
  • report to HR or management, if safe;
  • file police or prosecutor complaint;
  • request workplace protection or reassignment;
  • document retaliation;
  • preserve employment records;
  • file labor or administrative complaint if connected to employment rights.

A workplace threat should not be dismissed as mere office conflict if it involves serious harm.


XXXIV. Threats From a Landlord, Tenant, Neighbor, or Business Partner

WhatsApp threats may arise from property, debt, lease, or business disputes.

Examples:

  • landlord threatens tenant with violence;
  • tenant threatens landlord;
  • neighbor threatens to burn property;
  • business partner threatens harm unless paid;
  • creditor threatens family.

Civil disputes do not justify threats. The victim may still report grave threats.


XXXV. Threats From Unknown Numbers

If the sender is unknown:

  • preserve the number;
  • do not block immediately until evidence is saved;
  • screenshot profile and messages;
  • check whether number appears in other apps;
  • ask trusted contacts if they recognize the number;
  • avoid engaging;
  • report to police or cybercrime authorities;
  • include the phone number in complaint;
  • preserve call logs.

Authorities may require legal process to identify the subscriber or user.


XXXVI. Blocking the Sender

Blocking may help safety and mental peace, but preserve evidence first.

A practical sequence:

  1. screenshot and export chat;
  2. save media;
  3. back up evidence;
  4. report to WhatsApp, if appropriate;
  5. block sender if continued contact is harmful;
  6. report to authorities.

If ongoing threats are needed for evidence, do not put yourself in danger merely to collect more messages.


XXXVII. Reporting the Contact to WhatsApp

WhatsApp allows reporting of abusive contacts or groups. Reporting may send recent messages to WhatsApp for review and may lead to account action.

However, platform reporting is not the same as filing a police or criminal complaint. It may help stop abuse but may not preserve evidence for Philippine authorities.

Before reporting or blocking, preserve your own copy.


XXXVIII. Barangay Protection and Documentation

The barangay may be useful when:

  • the sender lives nearby;
  • the victim needs local documentation;
  • the threat involves neighbors or family;
  • the victim wants a blotter;
  • immediate local intervention may prevent conflict;
  • parties are within barangay jurisdiction.

However, barangay officials should not pressure a victim to “settle” serious threats if the victim wants criminal remedies or protection.


XXXIX. Barangay Conciliation and Grave Threats

Some disputes between persons in the same city or municipality may normally pass through barangay conciliation before court action. But grave threats and serious safety concerns may require direct reporting to police or prosecutor.

The victim should explain if there is immediate danger or if the offense is serious. Barangay conciliation should not delay urgent safety measures.


XL. Filing With the Prosecutor

A formal criminal complaint may be filed with the city or provincial prosecutor.

The complaint package may include:

  • complaint-affidavit;
  • witness affidavits;
  • screenshots;
  • exported chat;
  • device screenshots;
  • printed WhatsApp profile and number;
  • police blotter;
  • barangay blotter, if any;
  • medical records, if any;
  • other supporting documents.

The prosecutor evaluates whether there is probable cause to file the case in court.


XLI. Preliminary Investigation

For offenses requiring preliminary investigation, the prosecutor may require both sides to submit affidavits and counter-affidavits.

The respondent may deny sending the messages, claim the account was hacked, claim the words were jokes, or claim the messages were taken out of context.

The complainant should be ready to show:

  • the original chat;
  • identification of sender;
  • context;
  • seriousness of threat;
  • fear caused;
  • corroborating evidence;
  • prior incidents.

XLII. Possible Defenses by the Sender

The sender may claim:

  1. “I did not send it.”
  2. “My phone was stolen.”
  3. “My WhatsApp was hacked.”
  4. “It was a joke.”
  5. “I was angry but did not mean it.”
  6. “The screenshots are fake.”
  7. “The victim provoked me.”
  8. “The message was not a threat.”
  9. “It was only an expression.”
  10. “The victim edited the conversation.”
  11. “The number is not mine.”
  12. “It was a private argument.”

The complainant’s evidence should anticipate these defenses.


XLIII. How to Strengthen the Case Against Denial

To strengthen identity and authenticity:

  • keep the original phone;
  • show prior normal conversations with the sender;
  • show the sender’s number saved under their name;
  • provide witnesses who know the number;
  • show the sender referred to personal facts only they would know;
  • preserve voice notes;
  • preserve payment records linked to the sender;
  • show the sender’s profile photo;
  • show the same number used in other communications;
  • show the sender admitted the messages;
  • provide screenshots from other recipients, if group chat.

XLIV. Notarized Affidavit of Screenshots

A complainant may execute an affidavit explaining:

  • ownership of the phone;
  • how the messages were received;
  • how screenshots were taken;
  • that screenshots are true and accurate copies;
  • that the original messages remain on the phone;
  • date and time of capture;
  • how the sender is known.

This may help authenticate digital evidence.


XLV. Cybercrime Angle

Because the threat was sent through an electronic communication platform, cybercrime-related rules may be relevant. The use of information and communications technology can affect how evidence is handled and what offices investigate the matter.

However, the fact that WhatsApp was used does not automatically mean every case becomes a separate cybercrime offense. The specific law violated depends on the nature of the message and conduct.

If the threat includes hacking, identity theft, cyber libel, online extortion, or data interference, cybercrime authorities may be more directly involved.


XLVI. Electronic Evidence

WhatsApp messages are electronic evidence. Courts may require authentication.

Authentication may be done through:

  • testimony of the recipient;
  • presentation of the device;
  • screenshots and exported chat;
  • metadata, where available;
  • corroborating witnesses;
  • admissions by sender;
  • consistency with other records;
  • forensic examination, if necessary.

The key is to show that the messages are what the complainant claims they are.


XLVII. Chain of Custody for Digital Evidence

For ordinary complainants, chain of custody means showing that the evidence was preserved without alteration.

Practical steps:

  • keep original phone;
  • do not edit screenshots;
  • save original files;
  • back up copies;
  • label evidence by date;
  • avoid transferring through apps that compress or alter files unnecessarily;
  • keep printed and digital versions;
  • document who handled the phone;
  • give copies, not the only original, unless required;
  • follow instructions if authorities conduct forensic copying.

XLVIII. Should the Phone Be Surrendered?

Authorities may ask to inspect or copy the phone. Before surrendering a phone, the victim should ask:

  • Is a full surrender necessary?
  • Will the data be forensically copied?
  • Will a receipt be issued?
  • How long will the phone be kept?
  • What data will be accessed?
  • Can specific chats be extracted?
  • How will privacy of unrelated data be protected?

The victim should cooperate but should also protect unrelated private information.


XLIX. Privacy Concerns When Reporting

WhatsApp conversations may contain private information. When submitting evidence, include what is relevant to the threat and context.

Avoid unnecessarily exposing unrelated personal conversations, intimate content, bank details, passwords, or other private data unless legally necessary.

If intimate content is involved, ask authorities how it will be handled confidentially.


L. If the Threat Is Ongoing

If the sender continues threatening after the report:

  • preserve new messages;
  • update the police or prosecutor;
  • file supplemental affidavit if needed;
  • avoid direct confrontation;
  • consider protection order if applicable;
  • inform trusted persons;
  • secure home and workplace;
  • document sightings or stalking;
  • keep emergency contacts ready.

Continued threats after notice or report may strengthen the case.


LI. Protection Orders

If threats arise from domestic violence or intimate partner violence, protection orders may be available depending on facts.

A protection order may prohibit:

  • contact;
  • harassment;
  • threats;
  • stalking;
  • approaching the victim;
  • approaching the victim’s home, workplace, or school;
  • contacting the victim’s family;
  • possessing firearms, where applicable;
  • other harmful acts.

If children are involved, custody and support measures may also be included.


LII. Restraining Orders and Injunctions

In some situations, civil court remedies may be available to prevent further harassment, disclosure, or harmful conduct.

These are separate from criminal prosecution. They may be relevant if the sender threatens to publish private information, damage property, or continue harassment.


LIII. If the Threat Includes “I Will File a Case Against You”

A statement like “I will sue you” is not usually a grave threat if the person merely intends to use lawful legal remedies.

However, it may become threatening if combined with unlawful harm:

  • “I will file a fake case unless you pay.”
  • “I will plant evidence.”
  • “I will have you arrested illegally.”
  • “I will ruin your name with false accusations.”

Lawful assertion of rights is different from threats of unlawful harm.


LIV. If the Threat Is “I Will Post About You”

A threat to post truthful criticism may not always be grave threats. But if the sender threatens to post false accusations, private information, intimate images, hacked data, or defamatory content, other offenses may be involved.

Examples:

  • “I will post your nude photos.”
  • “I will tell your employer you are a thief even if it is not true.”
  • “I will leak your private chats.”
  • “I will expose your medical records.”

These should be documented and reported if serious.


LV. If the Threat Is a Joke

The sender may later claim the message was a joke. The complaint should explain why it was not perceived as a joke.

Relevant facts:

  • serious wording;
  • prior conflict;
  • prior violence;
  • repeated messages;
  • weapons photos;
  • specific time or place;
  • sender’s anger;
  • victim’s actual fear;
  • sender’s ability to carry out threat;
  • messages before and after.

A “joke” defense is weaker when the message is specific and alarming.


LVI. If the Threat Was Sent While Drunk or Angry

Being drunk or angry does not automatically excuse a threat. It may explain behavior but does not erase the victim’s fear or the legal seriousness of the message.

Preserve evidence and report if the threat is serious.


LVII. If the Threat Was Sent by a Fake Account or Spoofed Identity

If the sender claims someone else used their number, authorities may need to investigate.

The complainant should provide:

  • full number;
  • previous conversations;
  • profile details;
  • timing;
  • context;
  • any admissions;
  • other linked accounts;
  • witnesses;
  • evidence showing motive.

Do not assume identity if uncertain. State facts accurately.


LVIII. If the Sender Is Abroad

A person abroad can still threaten someone in the Philippines through WhatsApp. Reporting is still possible, though enforcement may be more complicated.

Relevant evidence:

  • sender’s foreign number;
  • identity and location, if known;
  • relationship;
  • threat messages;
  • whether sender has contacts in the Philippines;
  • whether sender threatens to send others;
  • whether sender plans to return;
  • whether threats involve online publication or extortion.

Authorities may assess jurisdiction and available remedies.


LIX. If the Victim Is Abroad and Sender Is in the Philippines

A Filipino abroad who receives threats from someone in the Philippines may report through:

  • Philippine police or prosecutor through representative;
  • NBI cybercrime office;
  • Philippine embassy or consulate for guidance;
  • local authorities abroad, if danger exists there;
  • counsel in the Philippines.

A special power of attorney may help a representative file or coordinate, but the victim’s affidavit may still be needed.


LX. Special Power of Attorney for Reporting

If the victim cannot personally appear, a representative may assist, but criminal complaints usually require the victim’s sworn statement.

A special power of attorney may authorize a representative to:

  • obtain documents;
  • coordinate with police;
  • file supporting documents;
  • receive notices;
  • engage counsel.

The victim may still need to execute a complaint-affidavit.


LXI. Reporting Through Counsel

A lawyer can help:

  • evaluate proper offense;
  • prepare complaint-affidavit;
  • organize evidence;
  • file before prosecutor;
  • coordinate with police or NBI;
  • request protection remedies;
  • avoid procedural mistakes;
  • respond to counterclaims;
  • draft cease and desist or preservation letters, if appropriate.

For serious threats, legal assistance can be valuable.


LXII. Medical and Psychological Effects

If the threat caused anxiety, panic, insomnia, trauma, or medical issues, the victim may seek medical or psychological help.

Records may support civil damages or show the seriousness of the harm.

Possible evidence:

  • medical certificate;
  • psychological evaluation;
  • counseling records;
  • prescription records;
  • work absence records;
  • testimony from family members.

LXIII. Civil Action for Damages

Apart from criminal reporting, a victim may seek civil damages if the threats caused injury.

Possible damages may include:

  • moral damages;
  • actual damages;
  • attorney’s fees;
  • expenses for security, relocation, or medical care;
  • business or employment losses, if proven.

Civil claims may be included with or separate from criminal proceedings depending on procedure.


LXIV. Employer or School Notification

If the threat affects workplace or school safety, notify the relevant institution.

Examples:

  • sender threatens to come to workplace;
  • sender threatens a student;
  • sender is a co-worker;
  • sender knows the victim’s schedule;
  • sender threatens to harm classmates or colleagues.

Provide only necessary information and evidence. Avoid public accusations beyond what is needed for safety.


LXV. Home and Personal Security Measures

While the complaint is pending, consider:

  • informing household members;
  • changing routines if necessary;
  • saving emergency numbers;
  • securing doors and windows;
  • informing building guards;
  • preserving CCTV;
  • avoiding isolated meetings;
  • using ride-sharing safety features;
  • not posting live location;
  • turning off public social media location tags;
  • reviewing privacy settings.

Legal reporting and personal safety should work together.


LXVI. Digital Security Measures

If threats are connected to online stalking or hacking:

  • enable two-factor authentication;
  • change passwords;
  • check WhatsApp linked devices;
  • review email recovery settings;
  • update phone software;
  • scan for spyware;
  • revoke suspicious app access;
  • secure cloud backups;
  • restrict profile visibility;
  • avoid clicking links sent by the offender;
  • warn contacts about impersonation;
  • keep backups of evidence.

In WhatsApp, check linked devices to ensure no unauthorized device is connected.


LXVII. WhatsApp Linked Devices

WhatsApp can be linked to computers or other devices. If someone has access to your WhatsApp through a linked device, they may view messages.

Check:

  • WhatsApp settings;
  • linked devices;
  • unknown browsers or computers;
  • last active times.

If suspicious, log out of all linked devices and secure your phone and account.


LXVIII. SIM and Phone Number Security

Because WhatsApp is linked to a phone number, secure your SIM.

Steps:

  • protect SIM with PIN, if available;
  • beware of SIM swap scams;
  • contact mobile provider if SIM is lost;
  • update account recovery details;
  • do not share verification codes;
  • beware of messages asking for WhatsApp codes;
  • report stolen phone immediately.

If the offender gains access to your number, they may attempt account takeover.


LXIX. If the Threat Includes a Demand to Meet

Do not meet alone. If meeting is necessary for lawful reasons, arrange through counsel, barangay, police, or a safe public setting with witnesses.

If the message says:

  • “Meet me or else.”
  • “Come alone.”
  • “Do not tell police.”
  • “Bring money.”

Treat it as high risk. Report and preserve the message.


LXX. If the Threat Includes a Deadline

A deadline may make the threat more urgent.

Examples:

  • “You have until midnight.”
  • “If you do not pay by Friday, I will kill you.”
  • “I will go to your house tonight.”

Report promptly. Tell the police or authorities about the deadline.


LXXI. If the Threat Is Against Property

Threats to burn, destroy, damage, steal, or vandalize property may still be serious.

Examples:

  • “I will burn your house.”
  • “I will destroy your car.”
  • “I will break your store.”
  • “I will throw stones at your windows.”

Preserve evidence and consider security measures for the property, such as CCTV, guards, and police or barangay notice.


LXXII. If the Threat Is Against Business

Threats may target a business:

  • “I will destroy your shop.”
  • “I will send people to attack your staff.”
  • “I will burn your warehouse.”
  • “I will hack your page.”
  • “I will post fake complaints unless you pay.”

A business owner may report criminal threats and take civil or cybersecurity action.


LXXIII. If Threats Are Repeated

Repeated threats strengthen the need for reporting.

Document each incident:

Date Time Message Evidence
May 1 8:00 p.m. Death threat Screenshot A
May 2 10:15 p.m. Threat to house Screenshot B
May 3 6:30 a.m. Threat to child Screenshot C

A pattern may show harassment, persistence, and credibility of danger.


LXXIV. If Threats Are Sent to Third Parties

Sometimes the sender threatens the victim through friends or family.

Examples:

  • sender messages victim’s sister: “Tell him I will kill him.”
  • sender tells co-worker: “Your friend is dead when I see him.”
  • sender posts in group chat: “I will hurt her.”

The third party should preserve messages and may execute a witness affidavit.


LXXV. Witness Affidavits

Witnesses may include:

  • persons who saw the messages;
  • group chat members;
  • people who know the sender’s number;
  • persons who heard the voice note;
  • persons who witnessed prior violence;
  • family members who saw the victim’s fear;
  • security guards who saw the sender nearby.

Witness affidavits should be specific and factual.


LXXVI. If the Sender Apologizes

An apology may be useful evidence. Preserve it.

However, an apology does not automatically erase criminal liability, especially if the threat was serious.

Settlement may be possible in some disputes, but the victim should consider safety and legal advice.


LXXVII. If the Sender Offers Settlement

If the sender offers settlement, avoid informal agreements that do not protect safety.

A settlement should consider:

  • written undertaking not to contact or threaten;
  • admission or acknowledgment, if appropriate;
  • apology;
  • deletion or non-publication of harmful content;
  • return of property;
  • payment of damages, if any;
  • barangay or formal documentation;
  • consequences of breach.

Do not sign a waiver under pressure.


LXXVIII. If the Victim Wants Only Documentation

Some victims initially want only to document the threat without filing a full case. A police or barangay blotter may help.

However, if the threat is serious, documentation alone may not be enough. Ask the officer what further steps are needed to file a criminal complaint.


LXXIX. If Authorities Dismiss It as “Just Online”

A victim should calmly explain:

  • the exact threat;
  • why it is serious;
  • sender’s identity;
  • prior history;
  • specific time or place;
  • weapons or location details;
  • fear caused;
  • risk to family or property.

Request that the incident be recorded and ask what office can handle cyber or criminal threats.


LXXX. If the Sender Is a Police Officer, Soldier, Public Official, or Security Personnel

If the sender has access to weapons or authority, the threat may be especially serious.

The victim may consider reporting to:

  • local police or another police office;
  • internal affairs or administrative authority;
  • prosecutor;
  • relevant agency;
  • human rights or oversight office, depending on facts;
  • court for protective relief if applicable.

Preserve evidence carefully. Consider legal assistance.


LXXXI. If the Sender Has a Firearm

If the sender owns or displays a firearm and sends threats, mention this in the report.

Attach:

  • photo or video of firearm, if sent;
  • prior knowledge of firearm ownership;
  • license information, if known;
  • prior incidents involving firearm;
  • witnesses.

Authorities may consider firearm-related risk and protective steps.


LXXXII. If the Threat Is Related to Debt Collection

Creditors or collectors may not use threats of violence.

Examples:

  • “Pay or we will hurt you.”
  • “We will go to your house and shame you.”
  • “We will post your face.”
  • “We will harm your family.”

Debt disputes should be resolved legally. Threats may be reported separately.


LXXXIII. If the Threat Is Related to Online Selling or Business Transaction

Online marketplace disputes sometimes escalate to threats.

Preserve:

  • transaction records;
  • payment receipts;
  • chat history;
  • delivery details;
  • product listings;
  • identity of buyer or seller;
  • threat messages.

The business dispute is separate from the threat.


LXXXIV. If the Threat Is Political or Public Commentary

Strong criticism is not necessarily a criminal threat. But statements threatening harm may be reportable.

Example:

  • “I disagree with you” is not a threat.
  • “You should be ashamed” may be insult or opinion.
  • “I will kill you at the rally” may be a grave threat.

Context, exact wording, and credibility matter.


LXXXV. If the Threat Is Against a Journalist, Activist, Lawyer, or Public Figure

Threats against persons engaged in public work should be documented carefully.

Relevant evidence:

  • public post or article that triggered threat;
  • sender’s message;
  • pattern of threats;
  • political or professional context;
  • doxxing or location information;
  • threats to family or office;
  • public calls for violence.

Additional institutional support may be available depending on the person’s role.


LXXXVI. If the Threat Is Anonymous But Specific

Even anonymous threats should be taken seriously if specific.

Example:

  • “I will shoot you at 7 p.m. at your office.”
  • “Your child at [school] will be taken.”
  • “Your house at [address] will burn tonight.”

Report immediately, even if identity is unknown.


LXXXVII. If the Threat Appears Automated or Scam-Related

Some messages are scams using threats, such as fake claims that the sender has hacked the victim or recorded private videos.

Even if likely a scam, preserve the message and avoid clicking links or paying. Report to the platform and authorities if serious or repeated.


LXXXVIII. If the Threat Involves Ransomware or Data Leak

If the message says the sender hacked files and demands payment, this may be cyber extortion.

Steps:

  • disconnect affected devices if necessary;
  • preserve the ransom message;
  • do not delete files;
  • contact cybersecurity help;
  • report to cybercrime authorities;
  • preserve logs;
  • avoid paying without advice;
  • notify affected persons if required by privacy obligations.

LXXXIX. Timeline for Reporting

Report as soon as possible. Delay can weaken urgency and evidence.

A quick report helps:

  • document fear;
  • preserve evidence;
  • prevent harm;
  • allow authorities to act;
  • show seriousness;
  • establish timeline.

If delayed, explain why, such as fear, trauma, attempts to preserve evidence, or lack of knowledge of remedies.


XC. Can a Threat Be Reported Even If No Harm Occurred?

Yes. A threat may be reportable even if the threatened harm has not yet happened. The purpose of reporting is to prevent harm and hold the offender accountable.

The victim does not have to wait to be attacked.


XCI. Can a Victim Report If They Do Not Know the Sender’s Address?

Yes. Provide whatever details are available:

  • name;
  • phone number;
  • WhatsApp number;
  • profile photo;
  • workplace;
  • social media links;
  • relatives;
  • last known address;
  • email;
  • bank details;
  • vehicle details;
  • screenshots;
  • witnesses.

Authorities may assist in identifying further details.


XCII. Can a Victim Report If the Message Was Deleted?

Yes, if there is other proof:

  • screenshot before deletion;
  • exported chat;
  • witness copy;
  • quoted replies;
  • notification;
  • backup;
  • sender admission.

Explain the deletion in the complaint.


XCIII. Can a Victim Report If the Threat Was Sent Once?

Yes. A single serious death threat may be enough to report. Repetition is not always required.

However, repeated threats may strengthen the case.


XCIV. Can a Victim Report If the Sender Is a Relative?

Yes. Family relationship does not legalize threats. However, family cases may also involve barangay, protection orders, domestic violence laws, or family court issues depending on facts.


XCV. Can a Victim Report If They Also Owe Money to the Sender?

Yes. A debt does not give anyone the right to threaten violence. The sender may pursue lawful collection remedies, not threats.


XCVI. Can a Victim Report If They Replied Angrily?

Yes, but the victim should disclose relevant context truthfully. If the victim also sent threats, there may be counter-allegations.

The victim should stop further hostile exchanges and preserve the full conversation.


XCVII. Can a Victim Use a Cease and Desist Letter?

A cease and desist letter may be useful when the threat is serious but not immediately dangerous, or when the victim wants to formally demand that the sender stop.

However, if there is immediate danger, reporting to authorities should not be delayed.

A cease and desist letter may demand that the sender:

  • stop threatening;
  • stop contacting the victim;
  • stop contacting family or workplace;
  • preserve evidence;
  • remove harmful posts;
  • stop using hacked data;
  • communicate only through counsel.

XCVIII. Sample Police Report Narrative

A victim may narrate:

I am reporting grave threats sent to me through WhatsApp by [name/number]. On [date] at around [time], I received a message from [number] saying, “[exact words].” I know this number belongs to [name] because [reason]. Prior to this, we had a dispute about [brief context]. I felt afraid because [reason, such as prior violence, sender knows my address, specific threat]. I have preserved the messages on my phone and printed screenshots. I request that this incident be recorded and investigated, and I am willing to execute a complaint-affidavit.


XCIX. Sample Complaint-Affidavit Paragraph

A complaint-affidavit may state:

On or about [date], at around [time], I received a WhatsApp message from respondent [name], using mobile number [number], stating: “[exact threatening message].” A screenshot of the message is attached as Annex “A.” The message caused me fear for my safety because respondent knows where I live and had previously threatened me on [date]. I did not consent to receiving such threats and I am filing this complaint to seek appropriate legal action.


C. Sample Evidence Index

Annex Description
A Screenshot of WhatsApp threat dated [date]
B Screenshot showing sender’s number and profile
C Exported WhatsApp chat printout
D Screenshot of prior threat
E Police or barangay blotter
F Witness affidavit of [name]
G Photo of respondent outside complainant’s house
H Medical certificate or psychological record, if any

An organized evidence index helps authorities understand the case.


CI. Practical Step-by-Step Guide

Step 1: Ensure immediate safety

Leave dangerous locations, contact trusted persons, and call for help if urgent.

Step 2: Preserve the WhatsApp evidence

Take screenshots, export chat, save media, and keep the original phone.

Step 3: Identify the sender

Collect the number, profile, prior messages, and evidence linking the number to the person.

Step 4: Make a written timeline

List dates, times, exact words, and surrounding events.

Step 5: Report to police or cybercrime authorities

Go to the nearest police station, cybercrime unit, NBI cybercrime office, or prosecutor’s office depending on urgency and complexity.

Step 6: Execute a complaint-affidavit

Prepare a sworn statement and attach evidence.

Step 7: Follow up

Ask for reference numbers, copies of blotters, case status, and next steps.

Step 8: Consider protection remedies

If threats continue or involve domestic violence, seek protective orders or additional legal measures.

Step 9: Continue documenting

Preserve new messages, sightings, calls, and violations.

Step 10: Avoid retaliation

Do not threaten back, hack back, post private information, or engage in public attacks.


CII. What Happens After Reporting

After reporting, possible outcomes include:

  • police blotter entry;
  • referral to investigator;
  • assistance in preparing complaint;
  • cybercrime evidence preservation;
  • filing with prosecutor;
  • preliminary investigation;
  • issuance of subpoena to respondent;
  • filing of case in court if probable cause is found;
  • dismissal if evidence is insufficient;
  • settlement in appropriate cases;
  • protective measures if applicable.

The victim should ask what the next step is and when to follow up.


CIII. Following Up With Authorities

When following up, keep:

  • blotter number;
  • investigator’s name;
  • office contact;
  • copies of submitted documents;
  • dates of submission;
  • receiving stamps;
  • prosecutor docket number, if any;
  • hearing or submission deadlines.

Always keep personal copies of everything submitted.


CIV. Common Mistakes by Victims

Common mistakes include:

  • deleting messages;
  • sending counter-threats;
  • relying only on memory;
  • failing to screenshot sender’s number;
  • cropping screenshots too much;
  • not saving voice notes;
  • blocking before preserving evidence;
  • posting the dispute publicly;
  • submitting fake or edited screenshots;
  • delaying report despite urgent threat;
  • failing to identify the sender;
  • assuming a blotter is already a criminal case;
  • not following up;
  • giving the only copy of evidence without backup.

CV. Common Mistakes by Respondents

Respondents accused of threats often worsen their situation by:

  • sending more threats after report;
  • deleting messages after notice;
  • pressuring the victim to withdraw;
  • contacting victim’s family;
  • posting about the case online;
  • claiming hacking without evidence;
  • fabricating counter-screenshots;
  • intimidating witnesses;
  • violating protection orders.

Continued misconduct may strengthen the complainant’s case.


CVI. Practical Tips for Stronger Evidence

To strengthen the complaint:

  • preserve original chat;
  • take full-screen screenshots;
  • show phone number and timestamp;
  • keep exported chat;
  • include exact wording;
  • prepare a timeline;
  • identify the sender clearly;
  • include prior incidents;
  • attach witness affidavits;
  • preserve voice notes;
  • include translations;
  • avoid editing evidence;
  • report promptly.

CVII. Practical Tips for Personal Safety

While the case is pending:

  • avoid meeting sender;
  • inform family and security;
  • vary routines if needed;
  • keep evidence accessible;
  • save emergency contacts;
  • avoid posting live location;
  • secure social media privacy;
  • install or preserve CCTV where possible;
  • coordinate with barangay or building security;
  • report any approach or stalking.

CVIII. Special Concern: Retaliation After Reporting

Some offenders retaliate after learning of a report. If retaliation occurs:

  • preserve new messages;
  • report immediately;
  • file supplemental affidavit;
  • consider protection order;
  • inform investigator;
  • do not confront the offender;
  • tell trusted people about the situation.

A pattern of retaliation may show bad faith and continuing danger.


CIX. Sample Message to Trusted Contacts

A victim may discreetly inform trusted contacts:

I received serious threats through WhatsApp from [name/number]. I have reported/will report the matter. Please do not engage with the person if contacted. Save any messages they send you and inform me immediately. If there is an emergency, please contact [emergency contact].

This helps preserve third-party evidence.


CX. Sample Preservation Note for Yourself

Create a private evidence log:

Evidence Log: WhatsApp Threats Device: [phone model] Number used by sender: [number] First threat: [date/time] Screenshots saved to: [folder/email] Chat exported on: [date/time] Printed copies made on: [date] Reported to: [office/person] Blotter/case number: [number]

This helps maintain organization.


CXI. Should the Victim Publicly Post the Threats?

Posting the threat publicly may warn others, but it can also create risks:

  • escalation;
  • defamation counterclaims;
  • privacy issues;
  • contamination of evidence;
  • harassment by others;
  • prejudice to investigation;
  • exposure of private details.

If safety requires warning others, limit the disclosure to necessary persons such as family, workplace security, school, or authorities.


CXII. Can the Victim Share Screenshots With Police or Lawyer?

Yes. Sharing with police, prosecutor, lawyer, or proper authorities is generally appropriate for legal reporting.

Avoid sending sensitive evidence to unnecessary persons.


CXIII. Can the Victim Ask WhatsApp for Sender Details?

Ordinary users generally cannot directly obtain private account or subscriber data from WhatsApp. Law enforcement or legal processes may be needed.

The victim should preserve the phone number and messages and report through proper channels.


CXIV. Role of SIM Registration

If the threat comes from a Philippine mobile number, SIM registration may help authorities identify the registered user through proper legal process.

However, the registered user may claim the SIM was stolen, borrowed, or used by another person. Additional evidence linking the sender to the messages remains important.


CXV. If the Sender Uses a Foreign Number

Foreign numbers may be harder to trace. Still preserve:

  • country code;
  • full number;
  • WhatsApp profile;
  • messages;
  • payment or identity links;
  • social media connections;
  • evidence of relationship.

If the sender is known, identity evidence may be enough even without telecom records.


CXVI. Importance of Consistency

The victim’s statements should be consistent across:

  • police report;
  • barangay blotter;
  • complaint-affidavit;
  • prosecutor submissions;
  • court testimony;
  • messages to authorities.

Inconsistencies can be explained, but avoid exaggeration.


CXVII. What If the Victim Exaggerates?

Exaggeration can damage credibility. If the message says “I will embarrass you,” do not report it as “I will kill you” unless those words were actually used.

State facts accurately. Let authorities determine the proper legal classification.


CXVIII. What If the Threat Is Mixed With Insults?

Insults alone may not be grave threats, but threats mixed with insults can still be reportable.

Example:

  • “You are worthless” is insult.
  • “You are worthless and I will kill you tomorrow” includes a threat.

Preserve the full message.


CXIX. What If the Threat Is in Emoji, Sticker, or Image Form?

Threats can be conveyed through images, emojis, or stickers if context shows threatening meaning.

Examples:

  • gun emoji after “You are next”;
  • coffin emoji with victim’s name;
  • photo of victim’s house with fire emoji;
  • knife sticker after a dispute;
  • edited image showing victim dead.

The affidavit should explain why the symbol was threatening in context.


CXX. What If the Sender Uses Code Words?

Some threats use coded language.

Examples:

  • “Ipapahanap kita.”
  • “May mangyayari sa’yo.”
  • “Tapos ka na.”
  • “Pasasabugin kita.”
  • “May kalalagyan ka.”
  • “Hindi ka aabot ng bukas.”

Explain the meaning based on context, prior messages, and local understanding.


CXXI. Reporting If the Victim Is a Company or Organization

A company receiving threats through WhatsApp should preserve:

  • company phone;
  • message thread;
  • identity of sender;
  • employee who received it;
  • business context;
  • threat to officers, staff, or property;
  • CCTV or security logs;
  • prior disputes.

The complaint may be filed through an authorized representative, but individual employees directly threatened may also provide affidavits.


CXXII. Reporting If the Victim Is a Public Official

A public official threatened through WhatsApp may report like any citizen. If the threat relates to official duties, additional security or administrative protocols may apply.

Evidence and personal safety remain central.


CXXIII. Reporting If the Victim Is a Lawyer or Witness

Threats against a lawyer, witness, complainant, or party to a case may involve obstruction, intimidation, or retaliation issues depending on facts.

The victim should inform counsel, court, prosecutor, or investigating authority if the threat is connected to a pending case.


CXXIV. Reporting If the Threat Demands Withdrawal of a Case

A message saying “Withdraw your complaint or I will kill you” is serious. It may show intimidation of a complainant or witness.

Preserve it and inform the authority handling the existing case immediately.


CXXV. Reporting If the Threat Involves Elections or Public Activity

Threats related to voting, campaigning, public assemblies, or political expression may have additional implications. Preserve evidence and report promptly to appropriate authorities.


CXXVI. What to Ask the Police or Investigator

Useful questions:

  • Will this be recorded in the blotter?
  • What offense is being considered?
  • Do I need to execute a complaint-affidavit?
  • Should this be referred to cybercrime investigators?
  • Should I file directly with the prosecutor?
  • What evidence should I print?
  • Should my phone be examined?
  • How do I follow up?
  • What is the case reference number?
  • What can I do if threats continue?

Write down the answers.


CXXVII. What to Ask a Lawyer

Useful questions:

  • Is this grave threats or another offense?
  • Should I report to police, NBI, or prosecutor?
  • Is barangay conciliation required?
  • Is a protection order available?
  • Should I send a cease and desist letter?
  • How should I authenticate WhatsApp messages?
  • What risks of counterclaim exist?
  • Should I include civil damages?
  • How do I handle evidence from voice notes?
  • What should I avoid doing?

CXXVIII. Sample Checklist for Reporting

Before going to report, prepare:

  • valid ID;
  • phone with original WhatsApp messages;
  • printed screenshots;
  • digital backup;
  • exported chat;
  • sender’s number;
  • sender’s full name, if known;
  • sender’s address or workplace, if known;
  • timeline;
  • witness list;
  • prior incident records;
  • evidence of fear or danger;
  • police/barangay blotters, if any;
  • written draft of narrative.

CXXIX. Sample Timeline Format

Date Time Event Evidence
May 1 7:30 p.m. Argument about debt WhatsApp chat
May 1 8:10 p.m. Sender threatened to kill me Screenshot 1
May 1 8:15 p.m. Sender sent photo of my gate Screenshot 2
May 2 9:00 a.m. I reported to barangay Blotter
May 3 10:00 p.m. Sender threatened family Screenshot 3

A timeline helps investigators understand the case quickly.


CXXX. Conclusion

Grave threats sent through WhatsApp in the Philippines should be taken seriously. A threat does not become harmless simply because it was typed, recorded, or sent through an app. If the message threatens death, injury, property destruction, harm to family, exposure of private material, or other serious unlawful acts, the victim may report it to police, cybercrime authorities, the NBI, the prosecutor, or other appropriate offices.

The strongest response begins with safety and evidence preservation. The victim should keep the original WhatsApp messages, take screenshots, export the chat, save voice notes and media, identify the sender, document the timeline, avoid counter-threats, and report promptly. A police blotter is useful, but a formal criminal complaint may require a sworn complaint-affidavit and supporting evidence.

Because WhatsApp messages are electronic evidence, authenticity matters. Full screenshots, original device records, exported chats, witness affidavits, and proof linking the number to the sender can strengthen the case. If the threat is urgent, specific, repeated, connected to domestic violence, accompanied by weapons, or directed at children or family members, the victim should seek immediate protection and not wait for the threat to be carried out.

The law does not require a person to endure serious threats in silence. A properly documented report can help prevent harm, preserve rights, and hold the offender accountable through lawful processes.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.