How to report online identity theft and the use of personal photos for scams

1) What the problem looks like in real life

Online identity theft happens when someone uses your identifying information—name, photos, voice, accounts, IDs, contact details, biographical facts, or other “identifiers”—to pretend to be you or to create the appearance of being connected to you. In practice, identity theft and photo misuse often show up as:

  • Impersonation profiles on Facebook/Instagram/TikTok/X, dating apps, Telegram/Viber/WhatsApp, or email.
  • Romance scams using your photos and a made-up life story.
  • “Relative in trouble” scams using your name/photo (or a cloned account) to message your contacts.
  • Job/loan/investment scams using your photo to appear legitimate.
  • Sextortion (threats to publish intimate photos—real or fabricated—unless paid).
  • Deepfake misuse (your face inserted into images/videos) to scam, harass, or extort.

There are usually two sets of victims:

  1. You (your identity, photos, reputation, privacy are harmed), and
  2. Third parties (people tricked into sending money believing the scammer is you).

A good report package anticipates both.


2) The Philippine laws that commonly apply

Multiple laws can apply at the same time. Cases are often filed as a combination of cybercrime + fraud + privacy + harassment offenses, depending on what happened.

A. Cybercrime Prevention Act of 2012 (RA 10175)

This is the backbone law for many online identity theft cases.

Commonly relevant categories include:

  • Computer-related identity theft (using/possessing/transferring another person’s identifying information without right, often to commit fraud).
  • Computer-related fraud (deceit through computer systems to cause loss or obtain benefit).
  • Cyber libel (if the impersonation includes defamatory posts or messages that damage your reputation).
  • Other cyber offenses may apply if there was hacking or interference (e.g., illegal access, data interference).

Why RA 10175 matters: it frames the conduct as a cybercrime and supports lawful processes to identify suspects and obtain digital evidence from service providers (subject to proper legal procedures).

B. Data Privacy Act of 2012 (RA 10173)

If your personal information (including photos, contact details, IDs, or any information that identifies you) was collected, disclosed, or used without a lawful basis, RA 10173 may apply.

This is especially relevant when:

  • Your photos were scraped and republished for a scam profile;
  • Someone posted your personal data (phone number, address, employer, IDs);
  • A breach exposed your data (e.g., from an organization), and it’s now being exploited.

RA 10173 can lead to:

  • Administrative complaints (often filed with the National Privacy Commission), and
  • Potential criminal liability for certain prohibited acts, depending on circumstances.

C. Anti-Photo and Video Voyeurism Act (RA 9995)

If the scam involves intimate images or videos (recorded or shared without consent), RA 9995 is central. It addresses recording and/or sharing private sexual content without consent, and related acts.

D. Safe Spaces Act (RA 11313)

If the conduct amounts to online sexual harassment, stalking-like behavior, threats, repeated unwanted contact, or gender-based harassment using your image, RA 11313 may be relevant—particularly when the misuse is harassing, sexualized, or meant to intimidate.

E. Revised Penal Code (RPC) offenses (often paired with cyber allegations)

Depending on facts, prosecutors may consider:

  • Estafa (fraud) when money is obtained through deceit.
  • Grave threats / light threats if threats are made to coerce you (including extortion threats).
  • Unjust vexation / coercion in harassment-type patterns.
  • Libel (and when committed online, it is commonly pursued as cyber libel under RA 10175).
  • Falsification-related theories can arise when IDs/documents are fabricated or used to deceive (facts matter a lot here).

F. Intellectual Property Code (RA 8293) — a practical “takedown lever”

A personal photo is usually protected by copyright (often owned by the photographer/creator, sometimes by assignment). Even when criminal prosecution is hard or slow, asserting copyright can be an effective route to demand removal—particularly for reposted photos used in scam profiles or fake ads.

G. Child protection laws (if a minor’s image is involved)

If the photos involve a minor—especially sexualized or exploitative content—special laws and stronger enforcement pathways may apply (and reporting should be escalated immediately).


3) First response: what to do immediately (before filing)

A. Preserve evidence (do this early)

Online content disappears quickly once reported. Preserve before you trigger takedowns.

Collect:

  • Screenshots showing the full screen (include profile URL, username, timestamps if visible).
  • Direct links/URLs to profiles, posts, chats, marketplaces, and payment instructions.
  • Chat logs (export where possible).
  • Transaction details (GCash/bank reference numbers, wallet addresses, receipts).
  • Images used (download copies; keep originals you own to show authorship).
  • Witness statements from people contacted/scammed by the impersonator.

Practical tip: Create a folder with subfolders like Profiles / Messages / Transactions / Victim Statements / IDs & Proof of Identity and label files with dates.

B. Secure your accounts and identity footprint

  • Change passwords (email first, then social media, banking/e-wallets).
  • Enable two-factor authentication (authenticator app where possible).
  • Check for forwarding rules and unknown devices in email/security settings.
  • Warn contacts using a clean channel (“I am being impersonated; do not send money.”).

C. Reduce ongoing harm

  • Report impersonation to the platform (but only after evidence capture).
  • Ask close contacts to mass-report the impersonation profile—platforms often act faster when many reports match the same issue.
  • If your mobile number is being used, report to your telco and document your report reference.

4) Where to report in the Philippines (and what each route is for)

A. The platform/website/app (fastest for takedown)

Most platforms have reporting categories like:

  • Impersonation
  • Scam/Fraud
  • Non-consensual intimate imagery
  • Harassment
  • Intellectual property infringement

Prepare to submit:

  • A government ID (platform-specific; redact sensitive fields if permitted),
  • A selfie/verification step (some platforms require it),
  • Links to the fake profile and your real profile.

Goal: removal and prevention of re-uploads (varies by platform).

B. PNP Anti-Cybercrime Group (PNP-ACG) and NBI Cybercrime units

These are primary law-enforcement entry points for:

  • Identifying suspects,
  • Building criminal complaints,
  • Coordinating preservation and lawful requests for data.

Bring:

  • Printed complaint narrative,
  • USB drive or cloud link containing evidence,
  • Copies of IDs,
  • Affidavits (yours and witnesses, if available),
  • Proof that the account is impersonating you (your real profile, prior posts, friends’ confirmations).

C. Cybercrime Investigation and Coordinating Center (CICC)

CICC coordinates cybercrime efforts and can be a reporting/coordination channel depending on the case type and current reporting systems. It is particularly relevant when a case spans multiple agencies or needs centralized routing.

D. National Privacy Commission (NPC)

NPC is relevant when:

  • Your personal data is being processed/disclosed without a lawful basis,
  • The misuse involves sensitive personal information,
  • The issue traces back to an organization’s handling of data (possible data breach),
  • You want a privacy-focused enforcement pathway (including orders that can help stop processing and address accountability).

E. Office of the City/Provincial Prosecutor (formal criminal complaint)

Ultimately, criminal prosecution usually requires filing a complaint for preliminary investigation with the prosecutor’s office (or through law-enforcement assistance).

This pathway is essential when:

  • Money was stolen from victims using your identity,
  • There’s ongoing extortion,
  • The harm is severe (reputation, threats, repeated conduct),
  • You want a case that can proceed to court.

F. Civil remedies and special court remedies

Civil and special remedies may matter when you need:

  • Damages for reputational/financial harm,
  • Court orders to compel deletion/correction or restrain processing (fact-dependent),
  • A remedy focused on privacy and data in information systems.

5) Building a strong report: the “complaint package” that works

A good Philippine cybercrime complaint is evidence-driven and organized.

A. Your narrative (1–3 pages)

Write a clear timeline:

  1. When you discovered the impersonation
  2. What was copied (photos, name, bio, number)
  3. How it was used (romance scam, loan scam, selling items)
  4. Who was contacted and what losses occurred
  5. Steps you took (platform reports, warnings, account security)
  6. The harm to you (reputation, threats, emotional distress, employment impact)

B. Annexes (label everything)

  • Annex “A”: Screenshot of fake profile + URL
  • Annex “B”: Screenshot of your real profile
  • Annex “C”: Messages showing solicitation of money
  • Annex “D”: Proof of your ownership/authorship of photos (original uploads, camera originals, prior posts)
  • Annex “E”: Victim statements/receipts (if third parties paid money)
  • Annex “F”: Your ID copies and identity proof

C. Witnesses and third-party victims

If someone was scammed by the impersonator, ask them (if willing) for:

  • A short affidavit or signed statement,
  • Copies of their chat logs and payment proof.

This is powerful because it demonstrates fraud and damages, not just impersonation.

D. Preserve “where” it happened

Jurisdiction in cyber cases can hinge on:

  • Where you were when you received messages,
  • Where victims sent money,
  • Where accounts were accessed/used,
  • Where the effects (harm) were felt.

Include your city/province details and those of any victims.


6) Choosing the right legal theory (quick decision guide)

Scenario 1: Fake profile uses your photos to scam money from others

Most common combination:

  • RA 10175 computer-related identity theft
  • RA 10175 computer-related fraud
  • RPC estafa (often paired in substance with the fraud theory)
  • RA 10173 if personal data processing is central and provable

Scenario 2: Your account was hacked and used to message friends for money

Add:

  • Illegal access / hacking-related provisions (fact-dependent)
  • Evidence of account takeover (security alerts, login notifications, device logs)

Scenario 3: Intimate photos used to extort you (“pay or I’ll post”)

Commonly triggers:

  • RA 9995 (if intimate content is involved)
  • Threats/extortion theories under the RPC
  • Potential cybercrime framing depending on conduct channels

Scenario 4: Photos used to harass, sexualize, or repeatedly target you

Consider:

  • RA 11313 Safe Spaces Act (online harassment)
  • Cyber libel if defamatory statements are posted
  • Privacy theories if personal data is posted

Scenario 5: Your face is used in deepfakes to scam or harass

Even without a “deepfake-specific” statute, conduct may still fit:

  • Identity theft / fraud (if used to deceive for gain)
  • Harassment frameworks
  • Privacy frameworks
  • Voyeurism frameworks if sexualized content is involved

7) What happens after you report (realistic process map)

A. Takedown happens first; identification takes longer

Platforms can remove content quickly, but identifying the person behind it may require:

  • Preservation of evidence,
  • Lawful requests/orders for subscriber info and logs,
  • Coordination with service providers (some outside the Philippines).

B. Preliminary investigation

If you file with the prosecutor:

  • You submit your complaint-affidavit and annexes.
  • The respondent may be required to answer.
  • The prosecutor determines probable cause.

C. The digital evidence angle

Philippine cases rely heavily on:

  • Properly documented screenshots and chat exports,
  • Authentication of electronic evidence (how you got it, where it came from),
  • Consistency and completeness (URLs, timestamps, account handles).

If evidence is messy, cases stall—even when the scam is obvious.


8) Takedown and “stop the spread” strategy (practical and legal)

A. Impersonation reporting

Use the platform’s impersonation workflow and attach:

  • Your government ID (as required),
  • Your authentic profile link,
  • Side-by-side comparisons (bio/photo reuse),
  • A short statement that the account is used for scams.

B. Copyright-based takedowns for photos

If impersonation reporting is slow, copyright reporting can be effective because:

  • Platforms often respond faster to IP claims,
  • Your original photo files and earliest postings help establish authorship/ownership.

Be careful: copyright ownership can be nuanced if someone else took the photo, but you may still have strong grounds depending on circumstances and permissions.

C. Search engine and re-upload control

Scammers re-upload. Maintain a running list of:

  • Variations of the fake name,
  • Reverse-image-search matches (where possible),
  • New accounts using the same photos.

Document each reappearance as a new annex for follow-on reports.


9) Special high-risk situations (handle with urgency)

A. When minors are involved

If a minor’s photos are involved—especially sexualized or exploitative content—treat it as an emergency escalation. Preserve evidence, report to platforms immediately under child safety categories, and escalate to law enforcement.

B. Sextortion

When dealing with extortion threats:

  • Preserve the threat messages and the payment demands.
  • Avoid sending more compromising content.
  • Document all payment channels demanded (wallet numbers, accounts).
  • Rapid reporting can prevent distribution and supports identification.

C. Employment and reputation harm

If the scammer is contacting your employer, clients, or professional network:

  • Preserve emails/messages,
  • Consider a written notice to relevant stakeholders that an impersonation scam is ongoing,
  • Keep proof of when and how you notified people (to limit reputational and contractual fallout).

10) Common mistakes that weaken cases

  • Reporting before preserving evidence (posts disappear; links change).
  • Only submitting cropped screenshots without URLs or account handles.
  • Failing to separate “what I know” vs “what I suspect.”
  • Not including victim loss documentation (if others sent money).
  • Not securing your own accounts first (scammer escalates).
  • Posting the scammer’s personal info publicly in a retaliatory way (can create legal exposure and distract from your case).

11) Reference list of Philippine legal bases commonly cited in these cases

  • RA 10175 – Cybercrime Prevention Act of 2012
  • RA 10173 – Data Privacy Act of 2012
  • RA 8792 – E-Commerce Act of 2000
  • RA 9995 – Anti-Photo and Video Voyeurism Act of 2009
  • RA 11313 – Safe Spaces Act
  • RA 8293 – Intellectual Property Code of the Philippines
  • Revised Penal Code – fraud/estafa, threats, coercion, libel, and related offenses depending on facts

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.