Legal Remedies for Victims of POGO Investment Scams

A Philippine Legal Article on Criminal, Civil, Regulatory, Asset-Recovery, and Cross-Border Remedies

Victims of so-called POGO investment scams in the Philippines often discover too late that what was presented as a legitimate, high-yield business opportunity was in fact a fraud dressed up in the language of offshore gaming, technology, foreign capital, junket operations, digital assets, remittance channels, or “guaranteed” online earnings. In many cases, the scam is not really an investment in a lawful Philippine Offshore Gaming Operator (POGO) business at all. It is merely the use of the POGO label to create an illusion of profitability, regulatory tolerance, foreign backing, or insider access.

The legal problem is therefore broader than gambling law. A victim may be dealing with a combination of estafa, syndicated fraud, securities violations, cybercrime, money laundering, use of dummies, falsified documents, corporate fraud, immigration-related illegality, and unlawful solicitation of investments. Because many of these schemes involve foreign nationals, shell entities, bank layering, cryptocurrency, payment processors, call-center deception, and cross-border movements of funds, the proper legal response is usually multi-forum and multi-agency.

This article explains, in Philippine context, the principal legal remedies available to victims, the agencies that matter, the evidence that must be preserved, the difference between criminal and civil recovery, and the strategic realities of going after organizers, recruiters, coddlers, and asset holders behind a POGO-related scam.


1. What is a “POGO investment scam”?

A POGO investment scam is not a single offense defined by one statute. It is a fact pattern in which perpetrators use an alleged connection to online gaming, offshore gaming services, gaming hubs, gaming technology, VIP betting platforms, white-label systems, gaming licenses, foreign gaming traffic, gaming support services, or associated businesses to induce victims to part with money.

The pitch may take forms such as:

  • “Invest in our licensed POGO platform and receive monthly guaranteed returns.”
  • “Buy into a gaming hub, proxy betting desk, customer support arm, or payment channel.”
  • “Advance funds for a gaming operation awaiting license release.”
  • “Purchase shares in a gaming-linked corporation serving foreign bettors.”
  • “Provide capital for foreign gaming wallets, tokens, or settlement pools.”
  • “Lend money to a gaming enterprise with fixed interest and principal protection.”
  • “Join a private investor round for a gaming expansion project.”
  • “Front funds for immigration, office fit-out, servers, or processing fees tied to a gaming operation.”

Sometimes the scheme is attached to real premises, real personnel, or even real foreign clients. But legitimacy in one area does not legalize the solicitation of investments. A business can have a real office and still commit fraud. A company can have some genuine operations and still unlawfully solicit funds or misappropriate them.

What makes the scheme legally actionable is usually one or more of the following:

  • false representation of a gaming license or regulatory approval,
  • fake or misleading profit projections,
  • unauthorized solicitation of investments,
  • fake share subscriptions or loan agreements,
  • diversion of investor funds,
  • nonexistence of the represented business,
  • fabricated bank records, dashboards, or betting data,
  • use of Ponzi-style payouts from newer victims’ money,
  • concealment of beneficial owners,
  • conversion of funds into crypto or offshore transfers,
  • disappearance of organizers after collection.

2. Why the “POGO” label complicates the legal response

The term “POGO” is legally and factually loaded. In practice, it may refer to:

  • an actual licensed or formerly licensed offshore gaming operator,
  • an unlicensed gaming operation pretending to be licensed,
  • a business only adjacent to gaming,
  • a scam enterprise using gaming jargon without any lawful gaming activity,
  • a human-trafficking, cyber-fraud, or money-laundering setup masquerading as gaming,
  • a corporate vehicle created only to receive money from investors.

For victims, this means one must separate the sales story from the actual legal structure. A person may believe he invested in a regulated enterprise when in fact the money went to:

  • a personal account,
  • a shell corporation,
  • a foreign account,
  • a money mule,
  • a crypto wallet,
  • a fake escrow,
  • an unauthorized agent,
  • or a company with no authority to solicit funds.

The law does not require the scam to be labeled a “POGO scam” for remedies to exist. The focus is on the acts committed, the money taken, the representations made, and the persons who benefited.


3. The main legal remedies available to victims

Victims generally have several possible remedies, often pursued at the same time:

  • criminal complaints,
  • civil actions for recovery of money and damages,
  • regulatory complaints,
  • corporate and securities remedies,
  • freezing, tracing, and anti-money-laundering routes through government agencies,
  • immigration-related and labor-related referrals in proper cases,
  • cross-border asset recovery and law-enforcement coordination.

The best approach is usually not to choose only one. A scam of this nature often requires a layered strategy.


4. Criminal remedies: the most immediate pressure point

A. Estafa

For many victims, the first and most obvious remedy is a criminal complaint for estafa. This usually applies where money was obtained by deceit, false pretenses, fraudulent acts, abuse of confidence, or misappropriation.

Common estafa fact patterns include:

  • promising a licensed gaming investment that never existed,
  • soliciting funds for a business purpose but diverting them elsewhere,
  • receiving money for share placement or participation rights without authority,
  • issuing fake receipts, fake contracts, or fake proof of profit,
  • refusing to return principal after using fraudulent representations.

A victim does not need a perfect written contract to prove estafa. Messages, presentations, bank transfers, recorded meetings, witnesses, and admissions may be enough to support a complaint.

Important point: not every failed investment is estafa. Loss alone is not fraud. The issue is whether there was deceit at the outset, fraudulent diversion, or unlawful appropriation.


B. Large-scale or syndicated fraud concerns

Where many victims are involved, the case may take on the character of a broader organized fraud. Even if not every special anti-fraud law applies, the existence of multiple complainants helps establish:

  • pattern,
  • common misrepresentation,
  • organized solicitation,
  • coordinated fund collection,
  • systemic diversion of funds.

Multiple complainants also improve leverage for law-enforcement attention and for tracing common destinations of money.


C. Securities-law violations

A very important remedy in POGO investment scam cases is the route involving securities regulation. If what was offered to the public or to multiple persons is effectively an investment contract, share offering, profit-sharing arrangement, pooled investment scheme, or participation in expected profits from the efforts of others, the transaction may fall within securities regulation.

Potentially actionable conduct includes:

  • sale of unregistered securities,
  • acting as an unlicensed broker, dealer, or solicitor,
  • fraudulent statements in connection with the sale of securities,
  • use of corporations to solicit investment without proper authority.

This matters because scammers often call the money “capital contribution,” “convertible bridge,” “venture slot,” “equity allocation,” “profit participation,” “partner unit,” or “silent share,” hoping to avoid the appearance of public solicitation. But substance matters more than labels.

For victims, this expands the case beyond ordinary estafa and may support complaints involving investment solicitation fraud before the proper regulatory authorities and prosecutorial bodies.


D. Cybercrime-related exposure

If the scam used online platforms, fake websites, social media ads, messaging apps, email spoofing, fraudulent dashboards, or online payment channels, cybercrime dimensions may exist. This does not automatically convert every fraud into a cybercrime case, but digital execution may trigger additional legal consequences where unlawful acts were committed using information and communications technology.

This is especially relevant where organizers:

  • used fake trading or betting dashboards,
  • hacked or cloned websites,
  • used deceptive online identities,
  • conducted mass digital solicitation,
  • laundered funds through online channels,
  • ran fraudulent account portals showing fake earnings.

E. Falsification and use of false documents

Victims are often shown:

  • fake licenses,
  • fake corporate registrations,
  • fake board resolutions,
  • forged IDs,
  • fake permits,
  • fabricated tax or audit documents,
  • counterfeit foreign gaming certificates,
  • bogus legal opinions.

Where false documents are created or knowingly used to induce investment, criminal liability may arise independently of estafa.


F. Money laundering implications

Many POGO-linked scams do not end with the taking of money. The next move is concealment:

  • movement through multiple bank accounts,
  • conversion to cryptocurrency,
  • transfers to corporate shells,
  • cash withdrawals through runners,
  • offshore remittances,
  • purchases of vehicles, property, luxury goods, or equipment.

Victims do not directly file a money-laundering prosecution on their own in the same way they file a civil complaint, but they can provide critical information to law enforcement and agencies whose mandates include tracing suspicious flows. In practical terms, showing the path of money is often more important than arguing labels.


5. Civil remedies: recovering money and damages

A criminal case punishes wrongdoing, but many victims ultimately care most about money recovery. That is where civil remedies become crucial.

A. Civil action for sum of money, rescission, or damages

A victim may sue to recover:

  • principal amount invested,
  • promised but unpaid returns where legally recoverable,
  • actual damages,
  • moral damages where warranted,
  • exemplary damages in proper cases,
  • attorney’s fees and costs in proper circumstances.

The legal theory depends on the facts:

  • fraud,
  • breach of contract,
  • void agreement,
  • rescission,
  • unjust enrichment,
  • quasi-delict in certain scenarios,
  • recovery of money obtained through misrepresentation.

A civil case may proceed separately or alongside criminal action, subject to procedural rules and litigation strategy.


B. Attachment and preservation of assets

In fraud cases, one of the most valuable civil tools is the attempt to secure assets early before they disappear. The problem with scammers is not merely proving the case; it is that by the time judgment arrives, the money may already be gone.

Victims should therefore think in terms of:

  • identifying bank accounts,
  • locating vehicles,
  • tracing real property,
  • identifying condominium units, office leases, servers, equipment, luxury assets,
  • identifying receivables, business partners, and corporate signatories.

A civil strategy that ignores asset location is often too late.


C. Piercing through shell entities

POGO-linked scams frequently use corporations. A victim transfers money to a company account, only to later discover:

  • the corporation had no real operations,
  • the company was only a receiving vehicle,
  • the directors were nominees,
  • beneficial owners hid behind foreigners or local dummies,
  • fund transfers moved immediately to related entities.

Where facts justify it, courts may look beyond the separate juridical personality of a corporation. Corporate form is not a shield for fraud. Still, this requires proof. One must show that the entity was used as an instrument to defeat law, justify wrong, or protect fraud.


D. Recovery from those who actually received or benefited from the money

Victims should not assume only the “main salesman” is liable. Depending on the evidence, liability may extend to:

  • incorporators,
  • directors,
  • officers,
  • signatories,
  • solicitors,
  • recruiters,
  • finance handlers,
  • account holders,
  • escrow pretenders,
  • wallet custodians,
  • conspirators,
  • spouses or relatives who knowingly received diverted property,
  • companies used to warehouse funds.

The best defendant list is evidence-driven, not anger-driven. Naming everyone without basis weakens a case. But stopping at the front-end recruiter when others clearly benefited also weakens recovery.


6. Regulatory remedies and agency pathways

A POGO investment scam is usually too complex for a single complaint filed in one office. Victims should understand the institutional landscape.

A. Law-enforcement and prosecution offices

A criminal complaint may be brought through the appropriate law-enforcement and prosecutorial channels. The practical goal is to document:

  • the scheme,
  • the representations,
  • the specific amounts paid,
  • the identities of persons involved,
  • the documentary trail,
  • the digital trail,
  • the asset trail.

A carefully structured complaint is far more effective than a general narrative saying only “I was scammed.”


B. Securities and corporate regulators

Where the scheme involved share sales, investment contracts, pooled returns, solicited capital, or corporate participation, complaints to the relevant securities and corporate regulatory bodies may be critical.

This is especially important when:

  • the entity sold supposed shares without proper authority,
  • organizers were not licensed to solicit investments,
  • false corporate disclosures were used,
  • shell corporations were used to project legitimacy.

Victims often overlook this route and file only estafa, losing the advantage of a specialized regulatory theory.


C. Anti-money-laundering and suspicious-transaction channels

Although private complainants do not control government anti-money-laundering processes, they can supply crucial information:

  • receiving account names,
  • dates and amounts,
  • linked accounts,
  • withdrawals,
  • crypto conversion points,
  • beneficiary wallets,
  • suspicious property acquisitions,
  • foreign transfers.

In major scam cases, financial tracing is often the bridge between complaint and actual recovery.


D. Gambling regulators and related authorities

If the perpetrators falsely claimed licensing, authority, or approval from a gaming regulator, that false representation should be directly documented. If there was a real license or service permit somewhere in the chain, that does not legalize unlawful investment solicitation. But evidence about the true status of the operation can expose the deception.

The regulatory question to ask is not just “Were they in gaming?” but:

  • What exactly were they licensed to do, if anything?
  • Did that authority include raising money from private investors?
  • Was the licensed entity the same as the collecting entity?
  • Were the solicitors authorized by the entity they invoked?
  • Was the represented project even within the scope of any legitimate permit?

E. Immigration and foreign-national concerns

Many POGO-linked scams involve foreign nationals. Immigration status may not be the victim’s main remedy, but it matters because:

  • organizers may flee,
  • foreigners may have entered under one status and operated under another,
  • immigration records may help identify movement and aliases,
  • deportation risks may affect leverage and recovery timing.

A victim should not confuse immigration consequences with refund. Deportation does not equal restitution. Still, immigration records can help identify persons and patterns of operation.


7. When the victim signed contracts: does that destroy the case?

No.

Scammers often hide behind:

  • subscription agreements,
  • loan agreements,
  • acknowledgment receipts,
  • “risk disclosure” forms,
  • arbitration clauses,
  • waivers,
  • side letters,
  • nominee agreements,
  • confidentiality provisions.

A written contract does not erase fraud. If consent was obtained through deceit, the agreement may be voidable, rescissible, or otherwise vulnerable. A contract also does not authorize a person to sell securities illegally or to misappropriate funds.

Common defense themes include:

  • “It was a risky investment, not a scam.”
  • “You knew gaming businesses are volatile.”
  • “You voluntarily joined.”
  • “Losses happened because of regulation, market shifts, or raids.”
  • “Returns were not guaranteed.”
  • “The agreement says no refund.”

These defenses may matter if the case is a true business failure. But they weaken significantly if the victim proves:

  • the project was fictional,
  • the license was fake,
  • the entity could not legally solicit funds,
  • the money was diverted from the stated use,
  • documents were fabricated,
  • later victims paid earlier victims,
  • organizers concealed ownership or fund flow.

8. The role of electronic evidence

In POGO investment scams, the strongest evidence is often digital:

  • chat threads,
  • Viber, WhatsApp, Telegram, WeChat, Messenger messages,
  • Zoom recordings,
  • email chains,
  • pitch decks,
  • screenshots of fake dashboards,
  • online ads,
  • website captures,
  • blockchain transaction hashes,
  • cloud documents,
  • voice notes,
  • social media promotions.

Victims should preserve evidence in a way that helps eventual admissibility and credibility:

  • save originals,
  • export full chat histories where possible,
  • preserve metadata,
  • back up cloud files,
  • do not edit screenshots,
  • record the source URLs,
  • keep device copies,
  • keep bank confirmations and reference numbers.

A common mistake is printing only selected screenshots while deleting the original phone data. That damages proof.


9. Bank, payment, and crypto tracing

A legal response becomes much stronger when the victim can answer these questions:

  • To whose account was the money first sent?
  • Was it a personal account or corporate account?
  • Who signed the receipts?
  • What account received subsequent transfers?
  • Was there immediate withdrawal?
  • Was the money converted to digital assets?
  • Was the same account used for multiple victims?
  • Did the collector ask that funds be split among several accounts?
  • Were “admin fees,” “license fees,” or “activation fees” sent to different recipients?
  • Are there linked accounts sharing the same surname, address, number, or device?

The victim is usually not expected to solve the whole chain alone. But the more initial financial detail provided, the easier it becomes for authorities and counsel to build a tracing map.


10. Remedies where there are many victims

Group victimization changes strategy.

When several persons were induced by the same story, through the same entity or agents, and paid into related accounts, they should consider:

  • consolidating factual information,
  • creating a transaction matrix,
  • identifying all common accounts,
  • identifying common presentations and scripts,
  • organizing witness statements,
  • synchronizing complaint dates,
  • mapping the hierarchy of organizers and collectors.

Even where each victim paid under a slightly different setup, common proof of scheme architecture is valuable.

The strongest group cases usually have:

  • a master list of victims,
  • dates and amounts,
  • recipient accounts,
  • copies of contracts,
  • recruiter identities,
  • event chronology,
  • copies of pitches,
  • relationship map of all actors.

11. What if the scam involved a real corporation?

That does not end the inquiry. A real corporation may be:

  • the actual fraud vehicle,
  • an unwitting shell hijacked by insiders,
  • a partly real business used to give cover to illegal fundraising,
  • a legitimate company whose name was misused by unauthorized agents.

The victim must determine:

  • who authorized the investment pitch,
  • whether there was board authority,
  • whether shares were actually issued,
  • whether the money entered the corporation’s books,
  • whether the company benefited,
  • who controlled the corporate account,
  • whether the supposed business project existed at all.

This is why corporate records, signatories, and accounting entries matter. The issue is not just existence of a company but use of the company in relation to the victim’s money.


12. Can the victim recover from a recruiter or agent even if the mastermind vanished?

Often, yes.

A recruiter or intermediary may incur liability if he:

  • made the false representations,
  • solicited the victim,
  • collected or routed the money,
  • vouched for fake licenses,
  • profited from commissions,
  • knowingly participated in the fraud,
  • concealed material facts.

The law does not always require the recruiter to be the ultimate mastermind. Participation in deceit may be enough. Still, a recruiter who genuinely lacked knowledge may raise defenses. The evidence must show not just involvement, but the quality of that involvement.


13. When the scam used foreign law, offshore documents, or foreign entities

Perpetrators often overwhelm victims with international paperwork:

  • offshore incorporation documents,
  • foreign “gaming authority” certificates,
  • overseas escrow forms,
  • foreign arbitration clauses,
  • multilingual subscription papers,
  • nominee ownership schemes,
  • overseas profit statements.

These documents do not automatically defeat Philippine remedies. If the solicitation, payment, deceit, or injury occurred in the Philippines, Philippine law and Philippine forums may still have substantial relevance. The mere presence of a foreign company in the paper trail does not remove Philippine jurisdiction over acts committed here.

The practical question is always:

  • where the victims were induced,
  • where funds were paid,
  • where misrepresentations were made or received,
  • where the perpetrators operated,
  • where assets may be found,
  • where criminal acts and harmful effects occurred.

14. Asset recovery is often the central battle

Winning on paper is not the same as getting paid.

Victims of POGO investment scams should think in terms of asset recovery from the beginning, not after years of litigation. Important targets may include:

  • bank deposits,
  • condominium units,
  • luxury vehicles,
  • office equipment,
  • receivables from business partners,
  • lease deposits,
  • franchise or service receivables,
  • digital assets,
  • cash storage points,
  • properties in the names of relatives or affiliated entities.

A case with no asset theory risks becoming symbolic rather than restorative.


15. Practical timeline of remedies

A realistic legal response often unfolds in phases.

First phase: emergency evidence and tracing

Immediately after discovery:

  • preserve messages and documents,
  • secure bank and payment proof,
  • identify accounts and recipients,
  • identify all persons who participated,
  • document meetings, locations, and offices,
  • preserve website and online platform snapshots.

Second phase: complaint structuring

Then:

  • prepare a clear factual chronology,
  • separate promises from proof,
  • distinguish direct actors from peripheral names,
  • identify all legal theories supported by evidence,
  • determine whether to proceed criminally, civilly, or both.

Third phase: multi-agency filing

Depending on facts:

  • criminal complaint,
  • regulatory complaint,
  • corporate and securities complaint,
  • financial tracing referrals,
  • immigration or cross-border coordination where proper.

Fourth phase: preservation and recovery

As the case develops:

  • locate assets,
  • identify transferees,
  • test shell-company structures,
  • seek preservation-oriented relief where available,
  • prepare to prove both fraud and destination of funds.

16. Common mistakes victims make

The most common mistakes are strategic:

  • waiting too long because the scammer keeps promising repayment,
  • accepting new fake postdated promises,
  • signing replacement contracts that blur the original fraud,
  • deleting original chats after “reconciliation,”
  • failing to identify the first receiving account,
  • assuming one complaint in one agency is enough,
  • suing only the visible recruiter and ignoring the money trail,
  • treating the case purely as a failed investment rather than fraudulent solicitation,
  • failing to coordinate with other victims,
  • not preserving evidence of fake licenses and profit statements.

Another serious mistake is confronting the scammer too early in a way that gives time to move assets or destroy records.


17. Common defenses used by perpetrators

Perpetrators typically argue:

  • the victim knew the business was speculative,
  • the venture failed because of regulation or enforcement,
  • the victim is merely a disappointed investor,
  • the contract bars refund,
  • profits were projections, not guarantees,
  • funds were used for business but losses occurred,
  • the recipient account was only temporary,
  • the collector was not the owner,
  • the victim dealt with another entity,
  • no public solicitation occurred,
  • the project was legitimate but derailed.

These arguments must be met with concrete proof of deceit, illegality of solicitation, diversion of funds, and false authority.


18. Distinguishing a scam from a risky but real venture

This distinction is legally important.

A risky venture may involve:

  • actual operations,
  • lawful authority for its business,
  • genuine accounting,
  • real use of funds for represented purposes,
  • truthful disclosures about uncertainty,
  • no fabricated licenses,
  • no misuse of investor money.

A scam tends to show:

  • false authority,
  • false profits,
  • fabricated business status,
  • unlawful solicitation,
  • fake accounts or dashboards,
  • commingling or diversion of funds,
  • no transparent records,
  • evasive movement of money,
  • inconsistent identities or entities,
  • disappearance after collection.

Courts and prosecutors look for facts, not labels. Victims should therefore avoid broad accusations without documentary support.


19. What victims should gather before filing

The strongest cases usually compile the following:

Identity and contact records

  • full names used,
  • aliases,
  • phone numbers,
  • email addresses,
  • messaging handles,
  • company names,
  • office addresses,
  • building names,
  • passport or ID copies if available.

Payment records

  • bank transfer slips,
  • check images,
  • deposit slips,
  • remittance confirmations,
  • e-wallet screenshots,
  • crypto wallet addresses and hashes,
  • receipts and acknowledgments.

Representation records

  • contracts,
  • pitch decks,
  • presentations,
  • screenshots of profit promises,
  • claimed license documents,
  • brochures,
  • event invitations,
  • voice notes,
  • group chat announcements.

Business status records

  • company registration documents shown to victims,
  • claimed permits,
  • board resolutions,
  • share certificates,
  • cap tables,
  • dashboards,
  • projected returns,
  • payout histories.

Victim narrative

  • date of first contact,
  • who introduced whom,
  • what exactly was promised,
  • how much was paid,
  • to whom,
  • what was received afterward,
  • when suspicions began,
  • what excuses were later given.

A well-organized chronology is often the difference between a vague complaint and an actionable case.


20. Special caution: illegal contracts and the victim’s position

Some POGO-related arrangements may involve legally questionable business activity. Victims sometimes fear that because the transaction touched gaming, side betting, payment routing, nominee ownership, or regulatory shortcuts, they have no remedy. That is not automatically true.

The law does not reward fraud merely because the scam operated in a shady environment. Still, the victim’s own participation may affect litigation posture, credibility, or available claims if the arrangement itself was unlawful. For this reason, legal framing matters. The case should focus accurately on:

  • the deceit,
  • the unauthorized solicitation,
  • the fraudulent diversion,
  • the false representation of legality,
  • and the unlawful taking or retention of money.

A person may be both imprudent and defrauded. The presence of risk or poor judgment does not erase criminal deceit.


21. The real objective: not just punishment, but traceable recovery

In Philippine practice, victims of complex fraud often make the mistake of focusing only on arrest or public pressure. Those matter, but the most effective legal response asks, from the very beginning:

  • Where did the money go?
  • Who touched it?
  • What property did it become?
  • Which entity benefited?
  • What records prove the false pitch?
  • Which forum creates the strongest leverage?
  • What relief is most likely to produce restitution?

A successful response to a POGO investment scam is rarely one-dimensional. It usually requires a coordinated approach involving criminal accountability, civil recovery, regulatory exposure, and financial tracing.


22. Key takeaways

Victims of POGO investment scams in the Philippines are not limited to one remedy. Depending on the facts, they may pursue:

  • criminal complaints for deceit-based offenses,
  • securities and investment-solicitation complaints,
  • civil actions to recover money and damages,
  • corporate and regulatory complaints,
  • financial tracing and anti-money-laundering referrals,
  • cross-border coordination where foreign actors or offshore transfers are involved.

The most important legal truths are these:

  1. A “POGO” label does not legalize solicitation of funds.
  2. A written contract does not cure fraud.
  3. A failed venture is not always a scam, but deceit, fake authority, and diversion of funds create strong legal exposure.
  4. Recovery depends heavily on early evidence preservation and asset tracing.
  5. The strongest cases combine criminal, civil, and regulatory strategies rather than relying on only one path.

In the Philippine setting, the law provides meaningful remedies, but success depends less on outrage and more on disciplined proof: who solicited, what was promised, where the money went, which legal theory applies, and what assets can still be reached.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.