How to Report International Romance Scams: U.S. and Philippine Laws That Apply

This article is written for victims, families, compliance officers, and platform trust & safety teams operating in or with connections to the Philippines and the United States. It’s general information, not legal advice.


Quick primer: what counts as a “romance scam”?

A romance scam is a confidence fraud where an offender—often using a fake persona online—cultivates affection or trust to extract money, property, intimate images, or account access. Tactics include emergency-money stories, investment “coaching” (e.g., crypto or FX), sextortion, imposter claims (soldier/engineer abroad), and “money mule” recruitment.

International cases typically involve:

  • Cross-border communications (apps, email, social media).
  • Cross-border money movement (remittances, wire, crypto, gift cards).
  • Identity, device, or platform accounts in different jurisdictions.

Snapshot of the legal landscape

Philippines (core laws frequently invoked)

  • Revised Penal Code – Estafa (Swindling): Classic fraud for deceitful schemes to obtain money/property. Penalties scale with the amount (updated by RA 10951).
  • RA 10175 – Cybercrime Prevention Act of 2012: Adds cyber-related offenses and qualifying circumstances when crimes are committed through ICT; includes computer-related fraud and expands jurisdiction/venue for online acts.
  • RA 10173 – Data Privacy Act of 2012: Unlawful processing, unauthorized disclosure, and data breaches (useful where personal data was harvested or misused).
  • RA 8484 – Access Devices Regulation Act: Fraud involving credit/debit/ATM cards, OTPs, or account “takeover.”
  • RA 8792 – E-Commerce Act: Recognizes electronic documents/signatures; relevant for proving online agreements, receipts, and logs.
  • RA 9995 – Anti-Photo and Video Voyeurism Act and related provisions under RA 10175 (cyber-libel, cyber-sex, etc.): Often used in sextortion cases.
  • RA 11930 – Anti-OSAEC and Anti-CSAEM Act (2022): If minors are involved (directly or via coercion), this specialized law applies.
  • RA 9160 – Anti-Money Laundering Act (as amended): Banks/e-money issuers must report suspicious transactions; useful for freezing/ tracing proceeds.
  • RA 11765 – Financial Consumer Protection Act: Complaints and redress against regulated financial service providers for security lapses or mishandled disputes.

Jurisdiction & venue (PH): Cybercrime acts may be filed where any element occurred, where a computer system or data was used or accessed, or where the offended party resides, easing filing for online offenses.

United States (commonly charged statutes)

  • 18 U.S.C. §1343 (Wire Fraud) and §1341 (Mail Fraud): Deceit using electronic communications or postal services.
  • 18 U.S.C. §1030 (Computer Fraud and Abuse): Unauthorized access or damage involving protected computers.
  • 18 U.S.C. §1028 & §1028A (Identity Theft / Aggravated Identity Theft).
  • 18 U.S.C. §1956 / §1957 (Money Laundering) and 18 U.S.C. §371 (Conspiracy).
  • State consumer-fraud and theft laws may also apply (venue depends on victims, accounts, or devices in that state).

Extraterritorial angles: U.S. prosecutors can assert jurisdiction when U.S. victims, U.S. financial systems, or U.S. platforms are involved. The Philippines recognizes mutual legal assistance and extradition mechanisms with the U.S., enabling evidence-sharing and arrests where appropriate.


Reporting pathways (step-by-step)

A. If you are in the Philippines (Filipino or foreign victim)

  1. Preserve evidence (do this first)

    • Stop chatting; do not delete anything.
    • Take full-screen screenshots of profiles, chat histories, call logs, and account settings (showing handles/IDs and timestamps).
    • Export platform data if available (e.g., “Download your data”), keep original files.
    • Keep receipts: bank/GCash/PayMaya/e-wallet statements, remittance slips, gift card numbers, crypto transaction hashes, courier receipts.
    • Note device details (phone/PC model, numbers/email addresses used, SIM/IMEI if relevant).
  2. Report to Philippine law enforcement

    • PNP Anti-Cybercrime Group (ACG) – for complaints, in-person or via regional units.
    • NBI Cybercrime Division – accepts walk-ins and e-complaints.
    • Ask for a Receiving/Reference Number. Provide digital media on a labeled USB with a simple index.
  3. Notify financial channels

    • Your bank/e-wallet/remittance center: request transaction recall, chargeback (for cards), account freeze/flag on recipient accounts, and filing of a Suspicious Transaction Report.
    • For crypto, file an abuse report with the exchange and chain-analytics tipline if available; provide TxIDs and wallet addresses.
    • Document the case/claim numbers.
  4. Report to platforms

    • Dating apps, social media, email provider, and messaging apps: use impersonation/scam categories; request account preservation for law enforcement (platforms can lock logs for 90–180 days on request).
    • If intimate images were shared under coercion, use the platform’s sextortion or non-consensual intimate imagery pathway.
  5. Data privacy & harassment

    • If your data was misused or images threatened, consider a complaint to the National Privacy Commission (NPC) (unlawful processing/unauthorized disclosure).
    • For persistent threats or doxxing, add a grave threats/unjust vexation angle under the RPC and RA 10175 (cyber components).
  6. Civil remedies

    • File for damages (fraud, deceit, privacy violations).
    • Apply for protection orders if the offender is an intimate partner (RA 9262—VAWC—can cover online abuse by a current/former partner).

B. If you are in the U.S. (or a U.S. person abroad), or the scam touched U.S. systems

  1. File with federal channels (do all that apply)

    • IC3.gov (FBI Internet Crime Complaint Center) – primary portal for online fraud.
    • ReportFraud.ftc.gov (FTC) – consumer fraud reporting; helps de-dupe victims and trend detection.
    • IdentityTheft.gov (FTC) – if identity documents, accounts, or SSN were compromised (generates recovery plans/letters).
  2. State & local

    • File with your state Attorney General and local police for incident numbers (often needed by banks/insurers).
  3. Financial institutions

    • Bank/wire: request wire recall/ACH/Fedwire reversal where feasible; open Reg E (for unauthorized electronic transfers) or Reg Z (credit card) disputes as applicable.
    • Crypto: notify the exchange and provide TxIDs; ask for KYT/chain-analysis escalation and account freeze.
    • Gift cards: contact the issuer’s fraud desk immediately with numbers and receipts.
  4. Platforms

    • Report profiles and request evidence preservation. Provide the IC3 complaint number if you have it.

Building a strong case file

Core packet (same for PH and U.S.):

  • Narrative: Who approached whom, where (app/URL), when; the money path; specific misrepresentations; threats (if any).
  • Timeline with UTC+8 (Philippine Time) or local time clearly labeled.
  • Screenshots and exports with filenames that include date_time_platform.
  • Transaction table (date, channel, amount, sender/recipient names, account numbers, reference/TxIDs).
  • List of all usernames, phone numbers (with country codes), and email addresses used.
  • Any witness statements (friends/family who saw chats/phone calls).

For crypto: include TxIDs, wallets, and blockchain explorers links (printed to PDF). For card/wire: include SWIFT/IBAN, Fed reference numbers, ARNs (for card chargebacks), and bank case numbers. For sextortion: capture threats, payment demands, image/video hashes, and report numbers from platforms.


How prosecutors frame these cases

  • Estafa + RA 10175 qualifying circumstances (PH) where deceit is executed via ICT.
  • Access device fraud if OTPs, cards, or online banking credentials were solicited.
  • Data privacy violations if personal data was unlawfully processed or disclosed.
  • Money laundering for handlers of proceeds or “mules,” including local receivers who “just withdrew cash.”
  • U.S. wire fraud / money laundering / identity theft when victims or money rails touch the U.S.

A note on “money mules”: Even victims who were recruited to “receive and forward funds” can face exposure. Early self-reporting, cooperation, and cessation of activity are critical to mitigate risk.


Cross-border cooperation

  • Mutual Legal Assistance enables evidence requests (subscriber data, logs, bank records) across PH–U.S. and other partners.
  • Extradition is plausible for high-value or organized schemes.
  • Budapest-aligned cybercrime procedures support expedited preservation and disclosure requests (e.g., 90-day data holds).

Practically, cases often start with domestic complaints (ACG/NBI or IC3/FTC) and escalate to joint operations when there are multiple victims, high values, or organized groups.


Evidence tips that actually move the needle

  • Prefer original files over cropped images. Export chats in platform-native formats (JSON, HTML, or PDF) plus screenshots.
  • Turn on email headers and save .eml files for phishing components.
  • Collect KYC screenshots from the exchange/account that received funds (public profile pages, if visible).
  • For WhatsApp/Telegram/Signal, backup chats and export media; capture phone numbers with country codes.
  • Keep a running log of all report/complaint numbers, dates, and officers/agents spoken to.

What to expect after you report

  • Triage & preservation: Law enforcement requests data holds from platforms/banks.
  • Financial tracing: Banks/exchanges attempt recalls/freezes; success depends on speed and whether funds have been cashed out.
  • Interviews & affidavits: You may be asked to execute affidavits/complaints and identify chats/screenshots.
  • Possible parallel civil actions: For recovery or injunctions (especially in sextortion and impersonation cases).

If you sent money: recovery playbook (time-sensitive)

  • Bank wire: Contact your bank’s fraud desk immediately; ask for a SWIFT recall. Provide the case number to local police/NBI/PNP.
  • Cards: File a chargeback (merchant fraud/unauthorized).
  • E-wallets: Request a freeze on recipient accounts; provide IDs and transaction references.
  • Crypto: Notify both the sending wallet provider and any known receiving exchange; share TxIDs and police report numbers.
  • Gift cards: Contact issuers; some can void unused balances if reported fast.

Special scenario: sextortion

  • Do not pay. Payment rarely stops the threats.
  • Report to law enforcement and platforms immediately.
  • Collect evidence discreetly (avoid alerting the offender you’re collecting).
  • For minors: Treat as an urgent OSAEC/CSAEM matter and escalate to specialized units.
  • For adults: RA 9995 and RA 10175 are key; in the U.S., extortion and identity offenses may apply. Civil remedies (injunctions) can compel takedowns.

Compliance & platform teams (operating in PH/serving PH users)

  • Implement KYC + enhanced due diligence for unusual romantic-context payments.
  • Calibrate transaction monitoring for patterns: rapid first-time high-value international transfers, crypto off-ramps to local mules, gift-card purchases following messaging-app referrals.
  • Maintain a lawful interception & evidence preservation SOP (time-stamped, hash-verified exports).
  • Ensure Financial Consumer Protection complaint channels and AML STR workflows are clear to front-line staff.

Frequently asked practical questions

Can I file in both countries? Yes. File where you reside and where the financial rails or platforms are based. Parallel filings help cross-border coordination.

Do I need a lawyer? Not to report, but counsel helps with civil recovery, injunctions, and dealing with cross-border discovery.

What if I was tricked into acting as a “money mule”? Stop immediately, preserve evidence, and self-report. Cooperation can significantly affect outcomes.

What if the scammer used deepfakes or AI voices? Preserve files in original formats. These cases are still prosecuted under existing fraud/extortion laws; technical analysis can detect manipulation.


Template: Initial Incident Report (you can copy/paste)

Victim: Full name, nationality, address, contact details Where reported: (e.g., PNP-ACG Station ___ / NBI-CCD) – Date/Time Platforms used: App/site names and profile links/IDs First contact: Date/time, method, username/handle Development of relationship: Key milestones showing trust-building Misrepresentations: Specific claims (job, location, emergencies, investments) Demands/Threats: Nature, frequency, evidence references Money transfers: Table with date, channel, amount, recipient details, references/TxIDs Other victims known: Yes/No (details if any) Evidence index: File list with short descriptions and timestamps Harm suffered: Financial, emotional, reputational; any workplace or family impacts Relief sought: Criminal complaint, data preservation, account takedown, fund recall/freeze, protection order (if applicable)


Final pointers

  • Speed matters for recalling funds and preserving data.
  • Specifics win cases: Concrete dates, handles, and transaction references.
  • Don’t engage further with the scammer once you begin reporting.
  • Take care of yourself: Consider counseling; romance fraud is engineered to cause shame and isolation.

Where this leaves you

Use the step-by-step section that fits your situation (PH, U.S., or both), duplicate the template, and start compiling your evidence packet. If you’d like, tell me which channels you used (bank/e-wallet/crypto, which platform), and I can tailor a precise recovery checklist for that stack.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.