A Philippine legal guide
Harassing text messages are not merely irritating. In the Philippines, they can cross into unlawful conduct depending on their content, frequency, purpose, and effects on the victim. A person who keeps sending abusive, threatening, obscene, fraudulent, or intimidating SMS messages may expose himself or herself to administrative action, criminal investigation, or both. The proper response is not only to block the sender, but to preserve evidence and bring the matter to the correct authorities.
This article explains, in Philippine legal context, how to report harassing text messages to the National Telecommunications Commission (NTC) and the Philippine National Police Anti-Cybercrime Group (PNP ACG), what each agency can and cannot do, what evidence matters most, what laws may apply, and what practical steps complainants should take from the first message onward.
I. What counts as a “harassing text message” in Philippine practice
There is no single all-purpose Philippine statute titled “harassing text messages law.” Instead, liability depends on the nature of the messages and the surrounding facts.
Text messages may qualify as actionable harassment when they involve:
- repeated abusive or insulting messages meant to annoy, alarm, humiliate, or terrorize;
- threats of violence, injury, death, exposure, or fabricated accusations;
- obscene or sexually offensive messages;
- stalking-like conduct through repeated unwanted communications;
- extortion or demands for money under threat;
- scams, phishing, impersonation, or fraudulent inducement;
- defamatory statements sent to the victim or circulated to others;
- anonymous messaging designed to intimidate or coerce;
- continued messaging after a clear demand to stop, especially where fear or distress is caused.
A single text can already be serious if it contains a clear threat, extortion demand, or obscene content. Repetition, however, often strengthens a harassment complaint because it shows intent and pattern.
II. Why the NTC and the PNP ACG are both relevant
A victim usually thinks in simple terms: “I received harassing texts. Where do I report?” In practice, the answer depends on the remedy sought.
1. NTC
The NTC is the telecommunications regulator. In complaints involving SMS, the NTC’s role is generally administrative and regulatory. It deals with matters involving telecommunications service providers, subscriber issues, network misuse, and regulatory coordination with telcos. It is important when the complainant wants regulatory intervention, assistance involving the mobile number, or action involving telecommunications rules and providers.
The NTC is not a trial court and is not the agency that files criminal charges in the ordinary course. Its main value is in the regulatory side of the problem.
2. PNP Anti-Cybercrime Group
The PNP ACG handles investigation and law-enforcement action involving cyber-enabled and technology-facilitated offenses. Even when the conduct uses ordinary SMS rather than social media, the use of electronic communications can bring the matter within cybercrime-related investigative work, especially where threats, fraud, identity misuse, extortion, or similar offenses are involved.
The PNP ACG is the proper law-enforcement entry point when the complainant wants criminal investigation, case build-up, digital evidence handling, and referral for inquest or prosecutor filing.
3. Why many victims should report to both
The two are not interchangeable. A strong response often involves:
- reporting to the PNP ACG for investigation and possible criminal case; and
- reporting to the NTC for telecommunications-regulatory assistance and telco-related issues.
That dual-track approach is often more effective than choosing only one.
III. The main Philippine laws that may apply
Whether a harassing text message becomes a criminal case depends on the facts. The most commonly relevant legal sources are these.
1. Revised Penal Code
Several offenses under the Revised Penal Code may become relevant depending on the wording of the messages.
Grave threats
If the sender threatens to kill, injure, burn property, kidnap, ruin reputation, or commit another wrong, especially to force the victim to do something or give something, grave threats may be implicated.
Light threats
Less serious threats may still be punishable.
Unjust vexation
Where the messages are sent primarily to annoy, irritate, torment, or disturb, unjust vexation is often considered. This is especially common in harassment situations where the texts are abusive or relentless but may not contain explicit threats.
Oral defamation or libel-related concerns
If the text messages contain imputations that dishonor or discredit a person, a defamation theory may arise. If publication to third parties occurs through electronic transmission, cyber libel issues may also be explored depending on the facts.
Grave coercion
If the messages attempt to compel someone to do something against his or her will through intimidation, coercion may be examined.
2. Cybercrime Prevention Act of 2012 (Republic Act No. 10175)
Where the unlawful act is committed by, through, or with the use of information and communications technologies, cybercrime implications arise. Not every harassing SMS automatically becomes a standalone cybercrime offense, but the law is often relevant when the text messaging is part of threats, fraud, identity misuse, libel, or other electronically facilitated wrongdoing.
This law is important because it shapes digital investigation, preservation, and prosecution.
3. Safe Spaces Act (Republic Act No. 11313)
If the text messages are gender-based, sexually degrading, misogynistic, lewd, or part of technology-facilitated sexual harassment, the Safe Spaces Act may be highly relevant. Harassing messages with sexual content, repeated unwanted sexual advances, demands for sexual favors, or threats involving sexual images should be evaluated under this law.
4. Anti-Photo and Video Voyeurism Act (Republic Act No. 9995)
If the sender threatens to send, publish, or distribute intimate images or videos, or uses such images to harass the victim, this law may apply.
5. SIM Registration Act (Republic Act No. 11934)
The SIM Registration Act matters because mobile numbers are tied to registration requirements, which can aid lawful identification and investigation. It does not mean private citizens can directly obtain subscriber identity on demand, but it strengthens the legal framework for tracing numbers through lawful processes.
6. Data Privacy Act (Republic Act No. 10173)
If the harassment involves misuse of personal data, unlawful disclosure of sensitive information, doxxing-like conduct, or unauthorized processing of personal information, privacy law issues may also arise.
7. Special laws on violence against women and children
If the sender is a current or former intimate partner, or the messages form part of psychological violence, intimidation, harassment, or abuse directed at a woman or child, the Anti-Violence Against Women and Their Children Act (Republic Act No. 9262) may become central. This is especially important if the messages are not isolated, but part of a broader pattern of controlling or abusive behavior.
IV. NTC complaint versus PNP ACG complaint: the practical difference
A complainant should understand the distinction clearly.
1. An NTC complaint is usually best for:
- nuisance or abusive SMS involving telecom service use;
- complaints involving mobile numbers and telco services;
- regulatory assistance with telecom providers;
- situations where the complainant wants the issue elevated through telecommunications oversight;
- coordination involving the source number and subscriber information through lawful channels.
2. A PNP ACG complaint is usually best for:
- threats, extortion, blackmail, scams, sexual harassment, stalking-like messaging, and identity misuse;
- cases where the sender’s acts may amount to a crime;
- evidence gathering and digital forensics;
- preparation of a criminal complaint;
- referral to prosecutors and coordination with other law-enforcement units.
3. When urgency is high
If the messages contain threats of immediate harm, kidnapping, suicide baiting, extortion, or dissemination of intimate images, the victim should treat the matter as urgent and go straight to the nearest police station or the PNP ACG, and not wait for a regulatory complaint to move first.
V. The first rule: preserve evidence before blocking or deleting anything
The biggest mistake victims make is deleting the messages too early.
For Philippine complaint practice, evidence preservation is critical. Before blocking the number, changing the SIM, or resetting the device, preserve the evidence carefully.
What to save immediately
1. Full screenshots
Capture screenshots showing:
- the phone number or sender ID;
- the date and time of each message;
- the complete content;
- the thread context;
- any contact name used by your phone, if applicable.
Where possible, capture both the individual message view and the conversation thread.
2. Screen recording
A short screen recording that scrolls through the message thread can help rebut claims that the screenshots were selectively cropped.
3. Original device
Do not dispose of the phone. The original handset may become important evidence.
4. SIM card details
Keep the SIM, subscriber details, and proof that the number belongs to you.
5. Notes about surrounding events
Write down:
- when the first message was received;
- how often messages arrived;
- whether the sender is known or unknown;
- whether there was a prior dispute;
- whether the sender called as well;
- whether there are witnesses who saw the messages;
- whether you replied, demanded the sender stop, or warned that you would report.
6. Related digital evidence
Preserve linked evidence such as:
- call logs;
- voicemails;
- GCash or banking requests;
- screenshots from Messenger, Viber, Telegram, WhatsApp, or email if the same harassment continued there;
- social media posts related to the threats;
- CCTV if someone also physically approached you.
7. Backups and printouts
Back up the screenshots to cloud storage or another device, and print them as supporting annexes. Printed copies are not a substitute for the original phone, but they help organize the complaint.
VI. Should the victim reply to the harasser?
Usually, one clear, calm message telling the sender to stop may help demonstrate lack of consent to continued contact. But after that, repeated engagement is usually unhelpful.
A useful approach is one brief message such as:
“Stop sending me messages. I do not consent to further contact. Your messages are being documented and will be reported to the authorities.”
That said, there are exceptions. If the sender is dangerous, manipulative, or escalating, even one reply may be unwise. In such cases, preserve the messages and proceed directly to the authorities.
Never provoke the sender, trade insults, or make retaliatory threats. That can complicate the case.
VII. How to prepare a complaint for the NTC
Because the NTC’s role is regulatory, the complaint should be written with clarity and supporting details.
What to include in an NTC complaint
A well-prepared complaint should contain:
- your full name and contact details;
- your mobile number;
- the harassing number or sender ID;
- dates and times of the messages;
- a concise narration of events;
- an explanation of how the messages are harassing, threatening, obscene, fraudulent, or abusive;
- copies of screenshots and any printouts;
- a request for assistance, investigation, and coordination with the concerned telecommunications provider;
- a statement that the number be traced or acted upon through lawful means;
- a copy of your valid ID;
- any affidavit or sworn statement, if available.
Suggested structure of the complaint
A. Caption or subject
“Complaint regarding harassing text messages” is enough.
B. Factual narration
State the facts chronologically, without exaggeration.
C. Supporting evidence
List annexes:
- Annex A – screenshots of SMS thread
- Annex B – screenshot of number details
- Annex C – valid ID
- Annex D – affidavit
- Annex E – proof of subscription or SIM ownership, if available
D. Relief sought
Request regulatory assistance and appropriate action in coordination with the concerned telco.
What the NTC may realistically do
The NTC may receive and process the complaint, require or coordinate with the telco, and act within its regulatory authority. It can be a useful official channel for number-related or telco-related intervention. But the NTC is not a substitute for criminal investigation where threats, extortion, or serious harassment exist.
VIII. How to prepare a complaint for the PNP Anti-Cybercrime Group
A complaint to the PNP ACG should be more evidence-centered because it may lead to investigation and criminal proceedings.
What to bring
Bring as many of the following as possible:
- the phone containing the messages;
- screenshots and printouts;
- a government-issued ID;
- an affidavit or written complaint;
- any proof identifying the sender;
- any proof of prior relationship, if relevant;
- any related screenshots from other platforms;
- a chronology of incidents;
- names of witnesses, if any.
What the sworn statement should say
A sworn statement should include:
- who you are;
- that you are the owner or user of the number that received the messages;
- the exact dates and times;
- the content and nature of the messages;
- why they caused fear, alarm, humiliation, or distress;
- whether you know or suspect the sender;
- what steps you took after receiving them;
- what evidence you are submitting.
Attach the screenshots to the affidavit as annexes and identify them one by one.
Why the original device matters
The PNP ACG may need to inspect the original device or at least verify the authenticity of the message thread. The closer your evidence is to the original source, the stronger the complaint.
IX. Step-by-step reporting process
A. Reporting to the NTC
Step 1: Organize the evidence
Arrange the messages in date order. Label screenshots clearly.
Step 2: Write a concise complaint letter
Focus on facts, dates, numbers, and the effect on you.
Step 3: Attach identification and supporting documents
Include ID and, where available, proof connecting the receiving number to you.
Step 4: File the complaint through the NTC’s complaint channels
Use the NTC’s available complaint intake channels or office filing procedures. Because complaint channels, email addresses, and online forms may change, use the currently published NTC channels at the time of filing.
Step 5: Keep proof of filing
Save your email transmittal, receiving copy, reference number, or acknowledgment.
Step 6: Follow up formally
Keep your follow-up professional and written.
B. Reporting to the PNP ACG
Step 1: Prepare a written complaint and affidavit
Even if the desk officer helps draft one, coming prepared helps.
Step 2: Bring the original phone and SIM information
This makes the complaint more credible and easier to process.
Step 3: Go to the PNP ACG or nearest police station
If the nearest police station receives the complaint first, it can coordinate or refer the matter. If the case is digital in nature, request proper endorsement to the Anti-Cybercrime unit when needed.
Step 4: Submit evidence and explain the pattern
Do not summarize vaguely. Show the messages in order.
Step 5: Ask for the exact offense being evaluated
This matters. A complaint framed as “harassment” alone is too broad. The officer may classify the matter under threats, unjust vexation, sexual harassment, cyber-related offense, extortion, or another offense.
Step 6: Secure the blotter, complaint, or reference details
Record the complaint number, investigator name, and unit.
Step 7: Cooperate with subpoenas or follow-up verification
You may later be asked to execute a more detailed affidavit or confirm annexes.
X. What if the sender uses a fake name, burner number, or anonymous SIM
Anonymous messaging does not make the case hopeless.
A sender may:
- use a newly activated SIM;
- use spoofed sender IDs;
- message through gateways;
- use a friend’s phone;
- rely on a prepaid number registered under another person’s name.
These issues complicate identification, but they do not eliminate the value of reporting. Lawful tracing, telco coordination, device-level investigation, witness statements, and surrounding evidence may still build the case.
The victim should not attempt “self-tracing” through illegal means. Do not pay private fixers, hack accounts, or buy unauthorized subscriber data.
XI. Can the victim ask the telco directly for the sender’s identity?
Usually, no. Subscriber information is not something a private complainant can simply demand from a telco on informal request. Disclosure is typically controlled by law, process, and agency coordination. That is one reason a formal complaint with the proper authorities matters.
XII. How to make the complaint stronger
1. Preserve metadata context
Even if SMS itself does not display deep metadata to the user, consistency in screenshots, timestamps, thread continuity, and device presentation helps.
2. Show emotional and practical effects
If the messages caused fear, loss of sleep, missed work, panic, family distress, or need for relocation or security measures, state that clearly. The effect on the victim can matter.
3. Show repetition and escalation
A table like this can help:
| Date | Time | Number | Message Type | Summary |
|---|---|---|---|---|
| April 1 | 9:14 PM | 09XXXXXXXXX | Threat | Said victim would be harmed |
| April 2 | 12:02 AM | 09XXXXXXXXX | Abuse | Repeated insults |
| April 2 | 8:11 AM | 09XXXXXXXXX | Coercion | Demanded money |
4. Avoid editing screenshots
Do not annotate over the original image. If explanation is needed, use separate notes.
5. Keep a chain of custody mindset
Know where the evidence came from, who handled it, and whether the original remains available.
XIII. Common scenarios and how the law may treat them
Scenario 1: Repeated insults and late-night abusive texts
This may support unjust vexation, and in some cases a broader harassment theory depending on context.
Scenario 2: “I will kill you” or “I know where you live”
Threat-related offenses become a central issue. This should be reported promptly to the police or PNP ACG.
Scenario 3: Sexually explicit texts after being told to stop
The Safe Spaces Act may be relevant, especially if the messages are degrading, unwanted, and gender-based.
Scenario 4: “Send money or I will post your photos”
This raises extortion, grave threats, cyber-related offenses, and possibly anti-voyeurism concerns.
Scenario 5: Fake debt collector-style texts meant to shame or terrorize
This may involve unlawful harassment, threats, privacy concerns, or unfair debt collection practices depending on who sent them and what the messages say.
Scenario 6: Messages from an ex-partner causing fear and mental distress
The case may overlap with psychological violence under laws protecting women and children, depending on the relationship and victim.
XIV. What not to do
A victim should avoid these common mistakes:
- deleting the messages;
- replying with threats or insults;
- posting everything online immediately before filing;
- publicly accusing the suspected sender without proof;
- surrendering the original phone to unauthorized persons;
- relying only on verbal complaints without written evidence;
- assuming the NTC alone will handle the criminal side;
- assuming the police can act effectively without screenshots, dates, and a sworn statement.
XV. Is a notarized affidavit necessary?
It is highly useful, and often expected in practice, although the exact intake process may vary. A sworn affidavit gives the complaint formal shape and helps investigators and regulators understand the facts quickly. It also forces the complainant to set out the timeline in a careful, admissible form.
XVI. Can a lawyer help even before filing?
Yes. While many victims file directly, legal assistance is valuable where the messages involve:
- serious threats;
- reputational harm;
- blackmail;
- disclosure of intimate material;
- domestic abuse;
- child-related concerns;
- business extortion;
- coordinated or anonymous attacks.
A lawyer can help identify the best offense, draft the affidavit, preserve evidence properly, and avoid procedural mistakes.
XVII. Interaction with barangay procedures
Some victims ask whether they must go first to the barangay. For serious threats, cyber-related misconduct, sexual harassment, extortion, or crimes involving digital evidence, going directly to law enforcement is often more appropriate. Barangay conciliation is not the right first step for every case, especially where there is danger, urgency, or a penal offense requiring immediate investigation.
XVIII. Can the victim also seek civil damages?
Potentially, yes. Separate from the criminal aspect, a victim may pursue damages when the harassment causes actual injury, moral suffering, reputational damage, or expenses. This usually requires case-specific legal assessment.
XIX. Special note on minors and vulnerable victims
When the victim is a minor, the matter should be handled with greater urgency and care. Preserve the messages, avoid direct confrontation with the sender, and report promptly to law enforcement. If sexual content or grooming behavior is involved, the case becomes far more serious and should be escalated immediately.
XX. A model complaint outline
Below is a simple structure a complainant may adapt.
Complaint Letter Outline
Subject: Complaint regarding harassing text messages
I, [full name], of legal age, residing at [address], state:
- I am the user/owner of mobile number [your number].
- Beginning on [date], I received a series of harassing text messages from mobile number [sender number].
- The messages were received on the following dates and times: [list].
- The messages contained [threats / obscene language / repeated abuse / demands for money / sexual content / defamatory statements].
- Because of these messages, I experienced [fear, anxiety, humiliation, disturbance, inability to sleep, concern for my safety].
- Attached are screenshots and supporting documents marked as Annexes “A” to “[ ]”.
- I respectfully request appropriate action, investigation, and coordination with the concerned telecommunications provider / law-enforcement unit, as the case may be.
Signature Name Date
For the PNP ACG version, the same structure works, but it should be under oath and more detailed.
XXI. What outcomes can a complainant realistically expect
A complainant should be practical.
Possible outcomes include:
- formal recording of the complaint;
- law-enforcement investigation;
- identification efforts through lawful channels;
- coordination with the telco;
- preparation of a criminal complaint;
- filing before the prosecutor;
- regulatory action within the NTC’s authority;
- in serious cases, protective and immediate police response.
Not every case leads quickly to prosecution, especially if the number is difficult to trace or the evidence is thin. But well-preserved evidence substantially improves the odds.
XXII. Final legal assessment
In Philippine law, harassing text messages are not treated as trivial simply because they arrive through SMS. Their legal significance depends on content and context. Threats may be prosecuted as threats. Repeated torment may amount to unjust vexation. Sexualized messages may fall under the Safe Spaces Act. Messages tied to blackmail, voyeurism, identity misuse, or domestic abuse can trigger more serious charges. The NTC plays an important regulatory role in the telecommunications aspect, while the PNP Anti-Cybercrime Group is central when criminal investigation is needed.
The most important legal principle is this: document first, report early, and report to the proper authority. In SMS harassment cases, the phone in your hand is often the first and best piece of evidence.