This article is written for victims, families, compliance officers, and platform trust & safety teams operating in or with connections to the Philippines and the United States. It’s general information, not legal advice.
Quick primer: what counts as a “romance scam”?
A romance scam is a confidence fraud where an offender—often using a fake persona online—cultivates affection or trust to extract money, property, intimate images, or account access. Tactics include emergency-money stories, investment “coaching” (e.g., crypto or FX), sextortion, imposter claims (soldier/engineer abroad), and “money mule” recruitment.
International cases typically involve:
- Cross-border communications (apps, email, social media).
- Cross-border money movement (remittances, wire, crypto, gift cards).
- Identity, device, or platform accounts in different jurisdictions.
Snapshot of the legal landscape
Philippines (core laws frequently invoked)
- Revised Penal Code – Estafa (Swindling): Classic fraud for deceitful schemes to obtain money/property. Penalties scale with the amount (updated by RA 10951).
- RA 10175 – Cybercrime Prevention Act of 2012: Adds cyber-related offenses and qualifying circumstances when crimes are committed through ICT; includes computer-related fraud and expands jurisdiction/venue for online acts.
- RA 10173 – Data Privacy Act of 2012: Unlawful processing, unauthorized disclosure, and data breaches (useful where personal data was harvested or misused).
- RA 8484 – Access Devices Regulation Act: Fraud involving credit/debit/ATM cards, OTPs, or account “takeover.”
- RA 8792 – E-Commerce Act: Recognizes electronic documents/signatures; relevant for proving online agreements, receipts, and logs.
- RA 9995 – Anti-Photo and Video Voyeurism Act and related provisions under RA 10175 (cyber-libel, cyber-sex, etc.): Often used in sextortion cases.
- RA 11930 – Anti-OSAEC and Anti-CSAEM Act (2022): If minors are involved (directly or via coercion), this specialized law applies.
- RA 9160 – Anti-Money Laundering Act (as amended): Banks/e-money issuers must report suspicious transactions; useful for freezing/ tracing proceeds.
- RA 11765 – Financial Consumer Protection Act: Complaints and redress against regulated financial service providers for security lapses or mishandled disputes.
Jurisdiction & venue (PH): Cybercrime acts may be filed where any element occurred, where a computer system or data was used or accessed, or where the offended party resides, easing filing for online offenses.
United States (commonly charged statutes)
- 18 U.S.C. §1343 (Wire Fraud) and §1341 (Mail Fraud): Deceit using electronic communications or postal services.
- 18 U.S.C. §1030 (Computer Fraud and Abuse): Unauthorized access or damage involving protected computers.
- 18 U.S.C. §1028 & §1028A (Identity Theft / Aggravated Identity Theft).
- 18 U.S.C. §1956 / §1957 (Money Laundering) and 18 U.S.C. §371 (Conspiracy).
- State consumer-fraud and theft laws may also apply (venue depends on victims, accounts, or devices in that state).
Extraterritorial angles: U.S. prosecutors can assert jurisdiction when U.S. victims, U.S. financial systems, or U.S. platforms are involved. The Philippines recognizes mutual legal assistance and extradition mechanisms with the U.S., enabling evidence-sharing and arrests where appropriate.
Reporting pathways (step-by-step)
A. If you are in the Philippines (Filipino or foreign victim)
Preserve evidence (do this first)
- Stop chatting; do not delete anything.
- Take full-screen screenshots of profiles, chat histories, call logs, and account settings (showing handles/IDs and timestamps).
- Export platform data if available (e.g., “Download your data”), keep original files.
- Keep receipts: bank/GCash/PayMaya/e-wallet statements, remittance slips, gift card numbers, crypto transaction hashes, courier receipts.
- Note device details (phone/PC model, numbers/email addresses used, SIM/IMEI if relevant).
Report to Philippine law enforcement
- PNP Anti-Cybercrime Group (ACG) – for complaints, in-person or via regional units.
- NBI Cybercrime Division – accepts walk-ins and e-complaints.
- Ask for a Receiving/Reference Number. Provide digital media on a labeled USB with a simple index.
Notify financial channels
- Your bank/e-wallet/remittance center: request transaction recall, chargeback (for cards), account freeze/flag on recipient accounts, and filing of a Suspicious Transaction Report.
- For crypto, file an abuse report with the exchange and chain-analytics tipline if available; provide TxIDs and wallet addresses.
- Document the case/claim numbers.
Report to platforms
- Dating apps, social media, email provider, and messaging apps: use impersonation/scam categories; request account preservation for law enforcement (platforms can lock logs for 90–180 days on request).
- If intimate images were shared under coercion, use the platform’s sextortion or non-consensual intimate imagery pathway.
Data privacy & harassment
- If your data was misused or images threatened, consider a complaint to the National Privacy Commission (NPC) (unlawful processing/unauthorized disclosure).
- For persistent threats or doxxing, add a grave threats/unjust vexation angle under the RPC and RA 10175 (cyber components).
Civil remedies
- File for damages (fraud, deceit, privacy violations).
- Apply for protection orders if the offender is an intimate partner (RA 9262—VAWC—can cover online abuse by a current/former partner).
B. If you are in the U.S. (or a U.S. person abroad), or the scam touched U.S. systems
File with federal channels (do all that apply)
- IC3.gov (FBI Internet Crime Complaint Center) – primary portal for online fraud.
- ReportFraud.ftc.gov (FTC) – consumer fraud reporting; helps de-dupe victims and trend detection.
- IdentityTheft.gov (FTC) – if identity documents, accounts, or SSN were compromised (generates recovery plans/letters).
State & local
- File with your state Attorney General and local police for incident numbers (often needed by banks/insurers).
Financial institutions
- Bank/wire: request wire recall/ACH/Fedwire reversal where feasible; open Reg E (for unauthorized electronic transfers) or Reg Z (credit card) disputes as applicable.
- Crypto: notify the exchange and provide TxIDs; ask for KYT/chain-analysis escalation and account freeze.
- Gift cards: contact the issuer’s fraud desk immediately with numbers and receipts.
Platforms
- Report profiles and request evidence preservation. Provide the IC3 complaint number if you have it.
Building a strong case file
Core packet (same for PH and U.S.):
- Narrative: Who approached whom, where (app/URL), when; the money path; specific misrepresentations; threats (if any).
- Timeline with UTC+8 (Philippine Time) or local time clearly labeled.
- Screenshots and exports with filenames that include date_time_platform.
- Transaction table (date, channel, amount, sender/recipient names, account numbers, reference/TxIDs).
- List of all usernames, phone numbers (with country codes), and email addresses used.
- Any witness statements (friends/family who saw chats/phone calls).
For crypto: include TxIDs, wallets, and blockchain explorers links (printed to PDF). For card/wire: include SWIFT/IBAN, Fed reference numbers, ARNs (for card chargebacks), and bank case numbers. For sextortion: capture threats, payment demands, image/video hashes, and report numbers from platforms.
How prosecutors frame these cases
- Estafa + RA 10175 qualifying circumstances (PH) where deceit is executed via ICT.
- Access device fraud if OTPs, cards, or online banking credentials were solicited.
- Data privacy violations if personal data was unlawfully processed or disclosed.
- Money laundering for handlers of proceeds or “mules,” including local receivers who “just withdrew cash.”
- U.S. wire fraud / money laundering / identity theft when victims or money rails touch the U.S.
A note on “money mules”: Even victims who were recruited to “receive and forward funds” can face exposure. Early self-reporting, cooperation, and cessation of activity are critical to mitigate risk.
Cross-border cooperation
- Mutual Legal Assistance enables evidence requests (subscriber data, logs, bank records) across PH–U.S. and other partners.
- Extradition is plausible for high-value or organized schemes.
- Budapest-aligned cybercrime procedures support expedited preservation and disclosure requests (e.g., 90-day data holds).
Practically, cases often start with domestic complaints (ACG/NBI or IC3/FTC) and escalate to joint operations when there are multiple victims, high values, or organized groups.
Evidence tips that actually move the needle
- Prefer original files over cropped images. Export chats in platform-native formats (JSON, HTML, or PDF) plus screenshots.
- Turn on email headers and save .eml files for phishing components.
- Collect KYC screenshots from the exchange/account that received funds (public profile pages, if visible).
- For WhatsApp/Telegram/Signal, backup chats and export media; capture phone numbers with country codes.
- Keep a running log of all report/complaint numbers, dates, and officers/agents spoken to.
What to expect after you report
- Triage & preservation: Law enforcement requests data holds from platforms/banks.
- Financial tracing: Banks/exchanges attempt recalls/freezes; success depends on speed and whether funds have been cashed out.
- Interviews & affidavits: You may be asked to execute affidavits/complaints and identify chats/screenshots.
- Possible parallel civil actions: For recovery or injunctions (especially in sextortion and impersonation cases).
If you sent money: recovery playbook (time-sensitive)
- Bank wire: Contact your bank’s fraud desk immediately; ask for a SWIFT recall. Provide the case number to local police/NBI/PNP.
- Cards: File a chargeback (merchant fraud/unauthorized).
- E-wallets: Request a freeze on recipient accounts; provide IDs and transaction references.
- Crypto: Notify both the sending wallet provider and any known receiving exchange; share TxIDs and police report numbers.
- Gift cards: Contact issuers; some can void unused balances if reported fast.
Special scenario: sextortion
- Do not pay. Payment rarely stops the threats.
- Report to law enforcement and platforms immediately.
- Collect evidence discreetly (avoid alerting the offender you’re collecting).
- For minors: Treat as an urgent OSAEC/CSAEM matter and escalate to specialized units.
- For adults: RA 9995 and RA 10175 are key; in the U.S., extortion and identity offenses may apply. Civil remedies (injunctions) can compel takedowns.
Compliance & platform teams (operating in PH/serving PH users)
- Implement KYC + enhanced due diligence for unusual romantic-context payments.
- Calibrate transaction monitoring for patterns: rapid first-time high-value international transfers, crypto off-ramps to local mules, gift-card purchases following messaging-app referrals.
- Maintain a lawful interception & evidence preservation SOP (time-stamped, hash-verified exports).
- Ensure Financial Consumer Protection complaint channels and AML STR workflows are clear to front-line staff.
Frequently asked practical questions
Can I file in both countries? Yes. File where you reside and where the financial rails or platforms are based. Parallel filings help cross-border coordination.
Do I need a lawyer? Not to report, but counsel helps with civil recovery, injunctions, and dealing with cross-border discovery.
What if I was tricked into acting as a “money mule”? Stop immediately, preserve evidence, and self-report. Cooperation can significantly affect outcomes.
What if the scammer used deepfakes or AI voices? Preserve files in original formats. These cases are still prosecuted under existing fraud/extortion laws; technical analysis can detect manipulation.
Template: Initial Incident Report (you can copy/paste)
Victim: Full name, nationality, address, contact details Where reported: (e.g., PNP-ACG Station ___ / NBI-CCD) – Date/Time Platforms used: App/site names and profile links/IDs First contact: Date/time, method, username/handle Development of relationship: Key milestones showing trust-building Misrepresentations: Specific claims (job, location, emergencies, investments) Demands/Threats: Nature, frequency, evidence references Money transfers: Table with date, channel, amount, recipient details, references/TxIDs Other victims known: Yes/No (details if any) Evidence index: File list with short descriptions and timestamps Harm suffered: Financial, emotional, reputational; any workplace or family impacts Relief sought: Criminal complaint, data preservation, account takedown, fund recall/freeze, protection order (if applicable)
Final pointers
- Speed matters for recalling funds and preserving data.
- Specifics win cases: Concrete dates, handles, and transaction references.
- Don’t engage further with the scammer once you begin reporting.
- Take care of yourself: Consider counseling; romance fraud is engineered to cause shame and isolation.
Where this leaves you
Use the step-by-step section that fits your situation (PH, U.S., or both), duplicate the template, and start compiling your evidence packet. If you’d like, tell me which channels you used (bank/e-wallet/crypto, which platform), and I can tailor a precise recovery checklist for that stack.