How to Report Online Scams to the PNP Anti-Cybercrime Group

I. Introduction

Online scams have become one of the most common forms of cybercrime in the Philippines. Victims may be deceived through fake online shops, investment schemes, phishing links, romance scams, job scams, e-wallet fraud, social media impersonation, cryptocurrency schemes, parcel delivery scams, fake bank alerts, and other internet-based methods of fraud.

In the Philippine setting, one of the primary law enforcement offices that handles cybercrime complaints is the Philippine National Police Anti-Cybercrime Group, commonly called the PNP ACG. It investigates cybercrime offenses, receives complaints, assists victims in preserving evidence, and coordinates with prosecutors, courts, banks, platforms, and other government agencies when necessary.

Reporting an online scam is not merely a practical step. It is also a legal act that may lead to criminal investigation, preservation of electronic evidence, identification of suspects, freezing or tracing of funds, and eventual prosecution.


II. What Is an Online Scam Under Philippine Law?

An online scam is generally a fraudulent act committed through the internet, digital communications, or electronic systems. It usually involves deception for the purpose of obtaining money, property, personal information, access credentials, or some other benefit.

In Philippine law, online scams may fall under several legal categories depending on how the act was committed.

1. Cybercrime under the Cybercrime Prevention Act

The principal law is Republic Act No. 10175, or the Cybercrime Prevention Act of 2012. This law punishes offenses committed through or involving computer systems, information and communications technology, or digital networks.

Online scams may involve cybercrime when fraud is committed using computers, mobile devices, social media platforms, websites, messaging apps, email, e-wallets, online banking, or other electronic systems.

Relevant cybercrime-related offenses may include:

Computer-related fraud — where a person uses a computer system or digital platform to defraud another.

Computer-related identity theft — where a person wrongfully obtains, uses, or misuses identifying information belonging to another person.

Illegal access — where a person gains unauthorized access to an account, device, system, or network.

Misuse of devices — where tools, credentials, or software are used for committing cybercrime.

Cyber-squatting or impersonation-related acts — where fake websites, pages, or accounts are used to deceive the public.

2. Estafa under the Revised Penal Code

Many online scams also constitute estafa under the Revised Penal Code, especially where the offender deceives the victim and causes damage or prejudice.

Estafa may exist where there is:

  1. deceit or fraudulent representation;
  2. reliance by the victim on that deceit;
  3. delivery of money, goods, property, or value; and
  4. damage or prejudice to the victim.

Common examples include fake sellers, fake investment recruiters, false job offers requiring payment, fake loan processors, and persons who pretend to be someone else to obtain money.

If estafa is committed through information and communications technology, the penalties may be affected by cybercrime laws.

3. Identity theft and account takeover

If the scammer uses another person’s name, photograph, account, SIM, e-wallet, bank account, or digital identity, the act may involve identity theft. This is especially common in social media impersonation, fake marketplace accounts, fake business pages, and phishing attacks.

4. Data privacy violations

Some online scams involve the unlawful collection, processing, disclosure, or misuse of personal information. In such cases, the Data Privacy Act of 2012 may also be relevant, especially if personal data, IDs, contact numbers, account credentials, or private records were obtained or misused.

5. Access device fraud

Where the scam involves credit cards, debit cards, ATM cards, account numbers, online banking credentials, OTPs, or access devices, the Access Devices Regulation Act may also apply.

6. Securities or investment fraud

If the scam involves investment contracts, pooled funds, trading schemes, cryptocurrency promises, guaranteed returns, or unauthorized solicitation of investments, the matter may also fall within the concern of the Securities and Exchange Commission and may involve securities laws.


III. Role of the PNP Anti-Cybercrime Group

The PNP Anti-Cybercrime Group is the specialized unit of the Philippine National Police tasked with addressing cybercrime. Its functions include receiving cybercrime complaints, investigating online offenses, identifying suspects, preserving digital evidence, coordinating with online platforms and financial institutions, and assisting in the preparation of criminal complaints.

The PNP ACG is not a court. It does not itself convict the offender or award damages. Its role is investigative and law enforcement in nature. After investigation, the matter may be referred to the prosecutor for preliminary investigation and possible filing of criminal charges in court.


IV. When Should You Report an Online Scam?

A victim should report as soon as possible. Time matters because digital evidence can disappear quickly. Scammers may delete accounts, deactivate numbers, withdraw funds, transfer money through multiple wallets, or erase online traces.

You should report immediately if:

You sent money to a fake seller, fake recruiter, fake lender, or fake investment agent.

Your e-wallet, bank account, or online account was accessed without authority.

You were tricked into giving an OTP, password, PIN, card number, or account details.

Someone is using your name, photos, business name, or identity to scam others.

You were blackmailed, threatened, or extorted online.

You clicked a phishing link and later lost money or account access.

You were deceived through Facebook Marketplace, Instagram, TikTok, Telegram, WhatsApp, Viber, email, SMS, or another digital platform.

You discovered unauthorized transactions from your bank or e-wallet account.

You are being used as a “mule” account or your account was used to receive scam proceeds.


V. Immediate Steps Before Reporting

Before going to the PNP ACG, the victim should preserve evidence and reduce further damage.

1. Do not delete conversations

Do not delete chat threads, emails, SMS messages, transaction confirmations, links, screenshots, call logs, or account details. Even if the scammer blocks you, the existing conversation may still be useful.

2. Take screenshots

Take clear screenshots showing:

the scammer’s name or username; profile page or account page; chat messages; payment instructions; bank or e-wallet details; transaction receipts; order confirmations; tracking numbers, if any; links or websites used; phone numbers and email addresses; dates and times of communications; posts, advertisements, or listings that induced you to pay.

Screenshots should be complete and readable. Include the date, time, URL, username, account handle, and other identifying details whenever possible.

3. Save original files

Aside from screenshots, save original files where possible. Download emails, invoices, receipts, photos, videos, PDFs, fake IDs, QR codes, and other files sent by the scammer.

4. Record transaction details

Prepare a list of financial transactions, including:

date and time of payment; amount sent; bank, e-wallet, remittance center, or payment channel used; sender account; recipient account name; recipient account number or mobile number; reference number; screenshots of receipts; any confirmation messages.

5. Contact the bank or e-wallet provider immediately

If money was transferred through a bank, e-wallet, payment app, or remittance service, report the incident to that provider immediately. Request account review, transaction tracing, freezing, reversal if possible, and preservation of records.

This should be done separately from the police report. Reporting to the bank does not automatically create a criminal complaint with law enforcement.

6. Change passwords and secure accounts

If the scam involves phishing, identity theft, hacking, or unauthorized access, immediately change passwords, revoke logged-in devices, enable two-factor authentication, secure email accounts, contact mobile providers if the SIM may be compromised, and notify platforms of impersonation or takeover.


VI. Where to File a Complaint

A complaint may generally be filed with the PNP Anti-Cybercrime Group, including its main office or regional/unit offices. Victims may also report to the nearest police station, but cybercrime-specific complaints are best referred to or coordinated with the PNP ACG because of the technical nature of digital evidence.

Depending on the facts, a victim may also approach:

the National Bureau of Investigation Cybercrime Division; the prosecutor’s office for filing of a criminal complaint; the Securities and Exchange Commission for investment scams; the Bangko Sentral ng Pilipinas or the concerned bank/e-wallet provider for financial account concerns; the National Privacy Commission for personal data misuse; the relevant online platform for account takedown, impersonation, or fraud reporting.

The PNP ACG and NBI Cybercrime Division are both law enforcement bodies. A complainant should avoid filing duplicative complaints in a way that causes confusion, but reporting to banks, platforms, and regulators may still be necessary for separate remedial purposes.


VII. How to Report to the PNP Anti-Cybercrime Group

The process may vary depending on the office, location, and nature of the case, but the usual steps are as follows.

1. Prepare a written complaint or incident narrative

The complainant should prepare a clear written statement narrating what happened. It should include:

full name and contact information of the complainant; date and time of the incident; platform or website used; how the scammer contacted the complainant; representations made by the scammer; amount of money lost; payment method used; account names and numbers involved; links, usernames, phone numbers, and email addresses used by the suspect; steps already taken with the bank, e-wallet, or platform; relief or action requested.

The narrative should be factual, chronological, and specific. Avoid exaggeration or speculation. State what you personally know and attach evidence for the rest.

2. Bring valid identification

The complainant should bring at least one government-issued ID. If acting for a company, the representative should bring proof of authority, such as a secretary’s certificate, board resolution, authorization letter, company ID, or other corporate documents.

3. Bring all evidence

Bring both printed and digital copies if possible. Useful evidence includes:

screenshots of conversations; screenshots of social media profiles; transaction receipts; bank statements or e-wallet records; emails and headers, if available; SMS messages; call logs; URLs and website screenshots; fake ads or marketplace posts; delivery records; photos or videos sent by the scammer; IDs or documents sent by the scammer; platform reports already submitted; bank incident reports or ticket numbers.

Digital evidence should preferably be saved in its original form, not only as edited screenshots.

4. Execute a complaint-affidavit if required

For criminal prosecution, the complainant may eventually need to execute a complaint-affidavit. This is a sworn statement setting out the facts of the offense and attaching supporting evidence.

A complaint-affidavit usually contains:

identity of the complainant; identity of the respondent, if known; facts showing deceit, fraud, unauthorized access, identity theft, or other unlawful acts; details of the damage suffered; evidence attached as annexes; statement that the allegations are true based on personal knowledge and authentic records.

The affidavit must usually be notarized or subscribed before an authorized officer.

5. Cooperate with investigation

The investigator may ask follow-up questions, request additional documents, advise preservation of evidence, coordinate with financial institutions, or recommend further action.

The complainant may be asked to provide the device used in the transaction for examination, especially in cases of hacking, phishing, malware, account takeover, or extortion. Where device examination is necessary, chain of custody and proper handling of digital evidence become important.

6. Obtain a police report, complaint reference, or contact details

The complainant should ask for a reference number, copy of the report if available, name of the investigator, office contact details, and instructions for follow-up.


VIII. Evidence Needed in Online Scam Complaints

Evidence is the foundation of a cybercrime complaint. The stronger and more organized the evidence, the better the chance of identifying the suspect and establishing probable cause.

1. Identity evidence

This refers to information that may identify the scammer:

name used; account username; profile URL; phone number; email address; bank account name; e-wallet number; IP-related records, if later obtained through lawful process; photos or videos; business page; website domain; advertisement page; delivery address; recipient details.

Victims should remember that scammers often use fake names, stolen photos, mule accounts, or third-party accounts. Still, these details remain important leads.

2. Communication evidence

This includes the actual messages that show the deceit or fraudulent representation:

chat logs; SMS messages; emails; voice notes; video calls; recorded calls, where lawfully obtained; social media comments; marketplace messages.

The best evidence shows the scammer’s promise, the victim’s reliance, payment instructions, and the scammer’s failure or refusal to perform.

3. Payment evidence

This proves the loss suffered:

deposit slips; bank transfer receipts; e-wallet receipts; remittance receipts; QR payment records; transaction reference numbers; bank statements; confirmation emails or SMS; merchant or platform records.

4. Platform evidence

This shows where and how the scam occurred:

Facebook, Instagram, TikTok, Telegram, Viber, WhatsApp, Shopee, Lazada, marketplace pages, websites, domain names, ads, posts, and listings.

Include URLs, page names, handles, screenshots, and timestamps.

5. Damage evidence

This may include the amount lost, business damage, reputational harm, unauthorized transactions, or identity misuse. For companies, include accounting records, customer complaints, or reports from affected clients.


IX. Sample Incident Narrative

A simple narrative may follow this structure:

I am filing this complaint for an online scam committed against me through Facebook Marketplace. On 10 April 2026, I saw a listing for a mobile phone posted by an account using the name “ABC Gadgets.” I sent a message to the seller through Messenger. The seller represented that the item was authentic and available for delivery upon payment of a reservation fee.

Relying on these representations, I transferred PHP 8,000 on 11 April 2026 through GCash to mobile number 09XXXXXXXXX under the account name Juan D. After payment, the seller promised to ship the item but later stopped replying. The Facebook account blocked me, and the listing was deleted.

Attached are screenshots of the listing, chat messages, the seller’s profile, payment instructions, and the GCash receipt showing reference number XXXXXXX. I am requesting investigation for online scam, computer-related fraud, and other applicable offenses.


X. Legal Theories Commonly Involved

1. Computer-related fraud

This applies when the fraudulent act is committed using a computer system or digital platform. A fake online seller, investment recruiter, or phishing operator may be investigated under this theory if ICT was used to deceive the victim and obtain money or property.

2. Estafa

Estafa focuses on deceit and damage. In online scams, the key question is whether the suspect made false representations that caused the victim to part with money or property.

3. Identity theft

This applies where the suspect used someone else’s identity, photos, personal information, account, or credentials without authority.

4. Unauthorized access

This applies when the scammer hacked or accessed an account, email, bank profile, e-wallet, social media page, or system without permission.

5. Aiding, abetting, or conspiracy

In many scams, the person who chats with the victim may not be the same person who owns the receiving account. Philippine criminal law may still consider the participation of accomplices, conspirators, account mules, recruiters, or facilitators depending on evidence.


XI. What Happens After Filing the Report?

After a report is filed, the PNP ACG may evaluate the complaint, interview the complainant, preserve evidence, identify possible suspects, coordinate with financial institutions or digital platforms, and prepare the case for further legal action.

Possible next steps include:

issuance of a police report; case evaluation by a cybercrime investigator; request for additional evidence; coordination with banks or e-wallet providers; request for preservation of computer data; technical examination of devices; referral to prosecutors; filing of a complaint-affidavit; preliminary investigation; filing of criminal information in court, if probable cause is found.

The timeline may vary depending on the complexity of the case, amount involved, availability of evidence, responsiveness of banks or platforms, and whether the suspect can be identified.


XII. Can the PNP ACG Recover the Money?

The PNP ACG may assist in investigation and coordination, but recovery of money is not guaranteed. Online scam proceeds are often transferred quickly to other accounts, withdrawn in cash, converted to cryptocurrency, or moved through multiple layers.

Victims should act quickly by reporting to:

the bank or e-wallet provider; the receiving financial institution, if known; the PNP ACG; the online platform used; other regulators, where applicable.

A criminal case may punish the offender, but restitution or recovery may require court action, settlement, freezing mechanisms, or separate civil remedies depending on the facts.


XIII. Reporting to Banks, E-Wallets, and Platforms

A police report is important, but it is not enough by itself. Victims should also report to the service providers involved.

Banks and e-wallets

Immediately request:

transaction review; temporary hold or freeze, if legally and operationally possible; account investigation; preservation of transaction records; fraud ticket or case number; written confirmation of report.

Social media platforms

Report:

fake accounts; impersonation; fraudulent pages; marketplace listings; phishing links; stolen photos; ads used for scams.

Telcos

If a mobile number was used, report the number to the telco and preserve the messages. If your own SIM was compromised, request immediate assistance.

Online marketplaces

If the scam happened through an online marketplace, file a platform complaint and preserve order details, seller profile, chat logs, and payment information.


XIV. Importance of Electronic Evidence Preservation

Electronic evidence is fragile. It can be deleted, altered, or made inaccessible. Philippine cybercrime procedure recognizes the importance of preserving computer data.

Victims should preserve:

original screenshots; message exports; email headers; URLs; device logs; transaction records; account information; metadata where available.

Do not fabricate, alter, crop deceptively, or manipulate evidence. Edited or incomplete evidence may weaken the complaint. It is acceptable to create printed copies for convenience, but original digital files should be retained.


XV. Special Types of Online Scams

1. Fake online selling

This involves sellers who accept payment but do not deliver goods. Common platforms include Facebook Marketplace, Instagram, TikTok shops, messaging apps, and informal buy-and-sell groups.

Evidence should show the listing, item description, payment agreement, payment proof, and failure to deliver.

2. Investment scams

These involve promises of high returns, guaranteed profits, fast earnings, trading pools, crypto schemes, referral bonuses, or “double your money” offers.

Victims should preserve investment proposals, payment records, group chat messages, promised returns, names of recruiters, and evidence of solicitation.

Investment scams may involve both criminal fraud and regulatory violations.

3. Phishing

Phishing involves fake links, fake login pages, fake bank messages, fake delivery notices, or fake customer support pages designed to steal credentials.

Evidence should include the phishing message, link, website screenshot, unauthorized transactions, and account security notices.

4. Romance scams

The scammer builds emotional trust, then asks for money due to emergencies, travel issues, customs fees, medical needs, or investment opportunities.

Victims should preserve conversations, photos, video call records, payment receipts, and identity claims.

5. Job scams

The scammer offers employment but demands payment for processing fees, training kits, medical tests, equipment, visa processing, or placement.

Evidence should include the job post, recruiter identity, offer letters, payment requests, and receipts.

6. Loan scams

The scammer offers quick loans but requires advance fees, insurance payments, processing fees, or account verification payments.

Evidence should include loan advertisements, application forms, payment instructions, and chat logs.

7. Sextortion and blackmail

The scammer threatens to release private images, videos, or conversations unless money is paid.

This should be reported urgently. Victims should preserve threats, account details, payment demands, and avoid sending more money.

8. Business impersonation

Scammers create fake pages imitating legitimate businesses, banks, government agencies, or delivery companies.

Evidence should include the fake page URL, screenshots, messages, logos used, payment details, and proof of the legitimate identity being misused.


XVI. What Not to Do After Being Scammed

Do not delete the conversation.

Do not threaten the scammer in a way that may compromise the investigation.

Do not post private personal data of suspected scammers online without legal advice, especially if identity is uncertain.

Do not send more money to “recover” the first payment.

Do not trust persons claiming they can retrieve funds for a fee.

Do not alter screenshots or fabricate evidence.

Do not delay reporting to the bank or e-wallet provider.

Do not assume that a real account name automatically means that person is the mastermind; mule accounts and identity misuse are common.


XVII. Rights of the Complainant

A complainant has the right to report a crime, submit evidence, receive reasonable assistance from law enforcement, be informed of case requirements, and pursue criminal, civil, and administrative remedies where appropriate.

Victims should also be treated with dignity and should not be blamed for being deceived. Online scams are often sophisticated, organized, and psychologically manipulative.


XVIII. Rights of the Accused or Respondent

Even in cybercrime cases, the constitutional rights of the accused remain protected. A person suspected of online fraud has the right to due process, presumption of innocence, counsel, protection against unreasonable searches and seizures, and protection against self-incrimination.

This matters because cybercrime investigations must be properly conducted. Evidence obtained unlawfully may be challenged.


XIX. Jurisdiction and Venue

Online scams often involve victims, suspects, servers, banks, and platforms located in different places. In the Philippines, cybercrime jurisdiction may be based on where the offense was committed, where its effects were felt, where the victim resides, where the transaction occurred, or where computer systems were accessed, depending on the facts and applicable procedural rules.

Because cybercrime is borderless, the PNP ACG may coordinate with other agencies, financial institutions, platforms, and, in some cases, foreign counterparts.


XX. Filing a Criminal Complaint with the Prosecutor

After police investigation, or even independently in some cases, a complainant may file a criminal complaint before the Office of the City or Provincial Prosecutor.

The complaint usually requires:

complaint-affidavit; supporting affidavits; documentary evidence; digital evidence; proof of payment; screenshots; identification of respondent, if known; certification or verification requirements, depending on the office.

The prosecutor determines whether there is probable cause to charge the respondent in court.


XXI. Civil Remedies

A victim may also pursue civil remedies to recover money or damages. Civil liability may be included in the criminal case, unless separately waived, reserved, or filed independently, depending on procedural circumstances.

Possible civil claims include recovery of the amount lost, actual damages, moral damages in proper cases, exemplary damages in proper cases, attorney’s fees, and costs.

For smaller amounts, the victim may consider small claims proceedings if the matter fits the rules, although online scam cases involving fraud may still require careful legal evaluation.


XXII. Administrative and Regulatory Remedies

Depending on the scam, other agencies may have a role.

Securities and Exchange Commission

For investment scams, unauthorized solicitation of investments, Ponzi schemes, fake corporations, and unregistered securities offerings.

National Privacy Commission

For misuse, unauthorized disclosure, or unlawful processing of personal information.

Bangko Sentral ng Pilipinas

For concerns involving supervised financial institutions, banks, e-money issuers, and financial consumer protection channels.

Department of Trade and Industry

For consumer complaints involving online sellers or businesses, especially if the seller is identifiable and operating as a business.

Telcos and SIM registration-related concerns

Where mobile numbers are used in scams, telco reporting may help with account action and preservation, subject to law.


XXIII. Practical Checklist Before Going to the PNP ACG

Bring or prepare the following:

valid government-issued ID; written incident narrative; screenshots of all conversations; screenshots of scammer profile or page; URLs and usernames; phone numbers and email addresses used; payment receipts; bank or e-wallet transaction records; reference numbers; proof of account ownership; copies of reports made to banks, e-wallets, or platforms; device used in the transaction, if relevant; USB drive or digital folder containing evidence; printed copies of important evidence; authorization documents, if representing a company or another person.


XXIV. Suggested Format for Evidence Folder

Organize evidence clearly. For example:

Folder 1 — Complaint Narrative Written statement and timeline.

Folder 2 — Identity of Scammer Profile screenshots, account URLs, phone numbers, email addresses.

Folder 3 — Conversations Chat screenshots, SMS, emails, voice messages.

Folder 4 — Payment Evidence Receipts, transaction references, bank or e-wallet statements.

Folder 5 — Platform Evidence Listings, ads, posts, fake pages, phishing websites.

Folder 6 — Reports Already Made Bank ticket, platform report, telco report, prior police blotter.

Folder 7 — Other Supporting Evidence Witness statements, delivery records, business documents, screenshots from other victims if lawfully obtained.


XXV. Sample Complaint-Affidavit Structure

A formal complaint-affidavit may be arranged as follows:

Republic of the Philippines City/Province of ________ S.S.

Complaint-Affidavit

I, [Name], of legal age, Filipino, residing at [address], after being duly sworn, state:

  1. I am the complainant in this case.
  2. I am filing this complaint against [name, if known], using the account name/number [details], for online scam, computer-related fraud, estafa, identity theft, and other applicable offenses.
  3. On [date], I encountered [post/message/website/account].
  4. The respondent represented that [false representation].
  5. Because of said representation, I sent [amount] through [bank/e-wallet] to [recipient details].
  6. After payment, respondent [blocked me/failed to deliver/deleted account/refused refund].
  7. Attached are copies of the relevant screenshots, receipts, transaction records, and account details.
  8. I suffered damage in the amount of [amount], aside from inconvenience and other consequences.
  9. I am executing this affidavit to attest to the truth of the foregoing and to support the filing of criminal charges.

Affiant [Signature] [Name]

Subscribed and sworn to before me this ___ day of _______.


XXVI. Common Mistakes That Weaken a Complaint

Many complaints become difficult to pursue because of missing or disorganized evidence. Common mistakes include:

only providing the scammer’s display name without URL or account link; failing to save payment receipts; deleting chats after being blocked; submitting cropped screenshots without dates or usernames; waiting too long before reporting; not reporting to the bank or e-wallet immediately; failing to identify the platform used; submitting hearsay instead of direct evidence; confusing suspicion with proof; not preparing a clear timeline.


XXVII. Time Is Critical

The first hours and days after an online scam are important. Funds can move quickly. Accounts can disappear. Digital evidence can be deleted. Banks and platforms may require prompt reporting before they can take meaningful action.

A victim should report to the bank or e-wallet immediately, preserve evidence, then proceed to the PNP ACG or appropriate cybercrime unit as soon as possible.


XXVIII. Corporate Victims and Business Impersonation

Businesses may also be victims of online scams. A company may suffer losses when scammers create fake pages, fake customer support accounts, fake payment channels, or fake websites using the company’s name.

A company reporting to the PNP ACG should prepare:

authorization of the representative; business registration documents; proof of ownership of brand, page, domain, or account; screenshots of fake pages or accounts; customer complaints; payment details used by scammers; records showing confusion or damage; platform takedown reports.

Business impersonation may involve cybercrime, trademark issues, unfair competition, data privacy concerns, and fraud.


XXIX. Minors, Elderly Victims, and Vulnerable Persons

If the victim is a minor, elderly person, or otherwise vulnerable individual, a parent, guardian, relative, or authorized representative may assist in reporting. Additional protective laws may apply depending on the facts, especially where exploitation, sexual content, coercion, or abuse is involved.

For sextortion, child sexual abuse or exploitation material, or threats involving minors, urgent reporting is especially important.


XXX. Online Scam Prevention Tips

Although reporting is important, prevention remains essential.

Use platform-protected payment methods where possible. Do not send OTPs, passwords, PINs, or recovery codes. Verify sellers outside comments and screenshots. Avoid deals that are too good to be true. Check business registration, reviews, and account history. Beware of newly created accounts. Do not pay advance fees for jobs or loans. Do not invest in guaranteed high-return schemes. Confirm bank or e-wallet account names before paying. Avoid clicking links from unsolicited SMS, email, or chat messages. Enable two-factor authentication. Use strong and unique passwords. Regularly check account activity. Report fake accounts immediately.


XXXI. Frequently Asked Questions

1. Can I report even if I lost only a small amount?

Yes. A small amount may still involve a criminal offense. Also, a small individual loss may be part of a larger scam affecting many victims.

2. What if I only know the scammer’s username?

You may still report. Provide the username, profile link, screenshots, phone number, payment account, and all other details. Investigators may use these as leads.

3. What if the scammer deleted the account?

You should still report. Screenshots, URLs, payment records, and platform data may still be useful.

4. Is a screenshot enough?

A screenshot is useful but may not be enough by itself. Stronger evidence includes transaction records, URLs, account details, original messages, email headers, and bank or e-wallet confirmations.

5. Can the police force the bank to return the money?

Not automatically. Banks and e-wallets have their own procedures and legal obligations. Police investigation may assist, but recovery depends on timing, traceability, account status, and legal processes.

6. Can I post the scammer’s details online?

Caution is necessary. Posting unverified personal information may create legal risks, especially if the account name belongs to an innocent person, identity theft victim, or mule account. It is safer to report to authorities, banks, and platforms.

7. Should I confront the scammer?

Usually, no. Confrontation may cause the scammer to delete evidence, transfer funds, or disappear. Preserve evidence first and report.

8. Can I file both with the PNP ACG and NBI?

Both agencies handle cybercrime, but duplicative complaints may cause practical complications. It is often better to proceed clearly with one primary investigative agency, while still reporting separately to banks, platforms, and regulators when needed.

9. Do I need a lawyer?

A lawyer is not always required to make an initial report, but legal assistance may be helpful when preparing a complaint-affidavit, filing with the prosecutor, dealing with large losses, handling corporate matters, or pursuing civil recovery.

10. What if the scammer is abroad?

You may still report. Cross-border scams are harder to investigate, but local accounts, payment channels, mule accounts, and digital traces may still be within Philippine jurisdiction or reachable through cooperation mechanisms.


XXXII. Conclusion

Reporting online scams to the PNP Anti-Cybercrime Group is a crucial step for victims in the Philippines. The report helps preserve digital evidence, trigger investigation, identify suspects, coordinate with banks and platforms, and support possible criminal prosecution.

The most important actions are immediate preservation of evidence, prompt reporting to banks or e-wallet providers, organized preparation of screenshots and transaction records, and filing a clear complaint with the PNP ACG or appropriate cybercrime authority.

Online scams may involve cybercrime, estafa, identity theft, data privacy violations, access device fraud, securities violations, and other offenses. Because each case depends on its facts, the strength of the complaint will usually depend on the clarity of the narrative, the completeness of evidence, and the speed with which the victim reports the incident.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.