Fake or “dummy” accounts are now a common feature of online disputes in the Philippines. They are used for harassment, scams, identity theft, cyber libel, extortion, doxxing, impersonation, spreading false information, and business sabotage. The first question many victims ask is simple: Can the IP address of a dummy account be traced?
The practical answer is yes, sometimes. The legal answer is more important: yes, but only through lawful methods, proper authority, and the right parties.
In the Philippine setting, tracing the IP address behind a dummy account is not something a private person may simply demand from a social media platform, telecom provider, internet service provider, or another citizen. An IP address is typically obtained or linked to a real person only through platform records, ISP or telco subscriber data, law enforcement processes, court-issued mechanisms, or regulatory cooperation, depending on the case. Whether tracing is possible also depends on the platform involved, the quality of preserved evidence, retention periods, the location of servers, and whether the account holder used VPNs, shared networks, or other obfuscation tools.
This article explains the full Philippine legal framework, the lawful routes available, who may request what, what evidence is needed, the limits of IP tracing, the privacy issues involved, and what remedies are realistically available.
1. What is a “dummy account”?
A dummy account is not a technical legal term with one fixed statutory definition. In ordinary Philippine usage, it usually refers to an online account that is:
- fake, anonymous, or pseudonymous;
- created using false identity details;
- impersonating another person;
- operated to conceal the real user;
- used for unlawful or abusive conduct.
A dummy account is not automatically illegal merely because it is anonymous or pseudonymous. The legal issue usually arises from what the account is used for, such as:
- cyber libel;
- unjust vexation or threats;
- identity theft or impersonation;
- fraud or estafa-related conduct;
- violations of data privacy;
- online sexual abuse or exploitation;
- unauthorized use of photos, names, or business marks;
- incitement, harassment, or blackmail.
That distinction matters. Philippine law generally does not punish anonymity by itself. What activates legal remedies is the wrongful act, and IP tracing is usually pursued to identify the person responsible for that act.
2. What exactly is an IP address, and why does it matter?
An IP address is a numerical label associated with an internet connection or device participating in online communications. In investigations, an IP address can be useful because it may help answer questions such as:
- What network did the activity come from?
- Which internet provider handled the traffic?
- At what date and time did the activity occur?
- Which subscriber account was assigned that IP address at that time?
But an IP address does not always identify a person by itself. It may identify only:
- an ISP or telco;
- a public Wi-Fi hotspot;
- an office network;
- a school or café;
- a shared household connection;
- a VPN exit node;
- a mobile carrier gateway;
- a cloud server or proxy.
So in legal terms, IP tracing is usually a multi-step attribution process, not a magic fingerprint. The law tries to bridge that gap through record requests, preservation, disclosure, and, where applicable, search and seizure mechanisms.
3. The basic Philippine legal principle: private citizens cannot simply “force” disclosure
In the Philippines, a victim usually cannot just email Meta, Google, X, TikTok, a telco, or an ISP and compel them to release the IP address or subscriber identity of a user. These entities are constrained by:
- privacy obligations;
- platform policies;
- jurisdictional limits;
- data retention rules;
- the need for valid legal process.
That means the legal routes generally fall into the following categories:
- Voluntary disclosure by the platform or service provider, if allowed by its rules and law;
- Preservation of records, so evidence is not deleted;
- Law enforcement request or investigation;
- Court-authorized disclosure, subpoena, warrant, or related process;
- Regulatory or cross-border legal cooperation, when the platform is foreign-based.
The crucial point is this: lawful tracing is usually institution-driven, not vigilante-driven.
4. Main Philippine laws relevant to tracing a dummy account
Several legal frameworks usually intersect.
A. The Cybercrime Prevention Act of 2012
This is the central statute for cybercrime-related offenses and procedures in the Philippines. It covers offenses such as illegal access, computer-related fraud, identity-related abuses, cyber libel, and other offenses committed through information and communications technologies.
For tracing purposes, this law is important because it recognizes and regulates:
- computer data relevant to investigations;
- traffic data;
- law enforcement powers in cybercrime cases;
- preservation and disclosure concepts;
- jurisdiction over offenses involving computer systems.
In practice, if the dummy account was used to commit a cybercrime or an offense facilitated by ICT, this law is often part of the legal basis for requesting and processing digital evidence.
B. The Data Privacy Act of 2012
An IP address may qualify as personal data, especially when it can be linked to an identifiable individual. Even when it is not directly identifying on its face, it can still be treated as part of personal information processing when combined with account logs, timestamps, and subscriber records.
Because of this law:
- platforms, ISPs, and investigators must handle data lawfully;
- private individuals cannot simply extract and publish personal data;
- disclosure must rest on lawful criteria;
- over-collection and unauthorized dissemination may itself create liability.
This means that even victims must be careful not to commit their own privacy violations while trying to identify a wrongdoer.
C. The Rules on Electronic Evidence
When a case reaches court, screenshots, emails, platform logs, message headers, and IP-related records must be presented in a legally usable way. This is where electronic evidence rules matter. They affect:
- authentication;
- integrity of records;
- relevance of metadata;
- admissibility of logs and digital records.
An IP address is only as useful as the evidence chain supporting it.
D. The Rules on Cybercrime Warrants
Philippine procedural rules provide special mechanisms for cybercrime-related judicial authorizations. These are highly important because they can support legal access to:
- subscriber information;
- traffic data;
- computer data;
- stored content, depending on the legal basis and scope.
These rules are often the real bridge between suspicion and legally usable attribution.
E. Revised Penal Code and special laws
Sometimes the underlying offense is not “cybercrime only” but a conventional offense committed through digital means, such as:
- threats;
- coercion;
- estafa;
- extortion;
- identity-related harm;
- intellectual property violations;
- violence against women involving online abuse;
- child protection and anti-exploitation offenses.
In such cases, tracing the IP address may still occur, but it is tied to proving the underlying crime.
5. Who can lawfully trace or request IP-related information?
A. The victim or private complainant
A victim may:
- gather publicly visible evidence;
- document timestamps and URLs;
- request preservation from a platform;
- file complaints with police or prosecutors;
- pursue civil or criminal action;
- ask counsel to seek court processes where available.
A private complainant generally cannot compel a platform, telco, or ISP to disclose protected records on demand.
B. Law enforcement
The Philippine National Police Anti-Cybercrime Group and the National Bureau of Investigation Cybercrime Division are the most commonly associated authorities in cyber investigations. They may receive complaints, conduct digital investigation steps, coordinate preservation, and seek judicial authorizations where required.
Their involvement is often essential because many service providers respond only to recognized legal process.
C. Prosecutors
Prosecutors assess whether there is enough basis to proceed criminally. During the criminal process, they may support requests for lawful disclosure and judicial relief.
D. Courts
Courts are the key lawful source of compulsion. They may issue the relevant orders, warrants, subpoenas, or authorizations allowed by law and procedural rules. Without court-backed process, many records cannot be obtained.
E. Platforms, ISPs, telcos, and hosting providers
These entities usually hold the records that matter:
- account registration logs;
- login IP logs;
- device identifiers;
- timestamps;
- email recovery details;
- subscriber account information;
- connection logs.
They may disclose data only within the limits of law, internal policy, and valid process.
6. The lawful ways an IP address may be traced
This is the heart of the issue. In the Philippine context, there are several lawful routes.
6.1. Through public or consensual information
The simplest lawful route is when the IP address is disclosed voluntarily or is already visible through lawful means. Examples:
- the dummy account sent an email and the full header reveals routing information;
- the sender logged into a system the victim controls, and server logs captured source IPs;
- the person used a contact form or website, and the system owner lawfully retained connection logs;
- a chat platform or forum visible to moderators contains administrative logs available to the lawful operator.
This route is lawful because the information is obtained from systems the victim or administrator already controls, or through communications voluntarily received.
Important caution: even here, one must avoid deceptive, intrusive, or unlawful collection. Lawful access to one’s own server logs is very different from planting spyware or tricking someone into unlawful surveillance.
6.2. Through platform preservation and disclosure
Social media companies and internet platforms often log sign-in IP addresses, device details, timestamps, cookies, and session metadata. These records may help identify:
- where the account was created;
- from what IPs it logged in;
- whether it used linked emails or phone numbers;
- whether multiple dummy accounts came from the same source.
A complainant may ask the platform to preserve records, especially if the content violates policies or is tied to criminal conduct. Actual disclosure, however, usually requires:
- valid law enforcement request;
- court order;
- subpoena or equivalent lawful process;
- emergency disclosure conditions, if recognized under the platform’s legal regime.
For Philippine complainants, this often means starting locally with cybercrime authorities, who can coordinate with the provider.
6.3. Through ISP or telco subscriber matching
This is the classic route:
- obtain the relevant IP address and timestamp from platform logs or server records;
- identify which ISP or telco controlled that IP block at that date and time;
- require the ISP/telco to identify the subscriber assigned that IP at that specific moment.
This step is critical because an IP address without a timestamp is often useless. Many providers use dynamic allocation. The same public IP may serve different subscribers at different times.
Lawful access to subscriber data usually requires proper legal process. Without it, the provider may refuse disclosure.
6.4. Through cybercrime warrants and court-issued processes
In serious or well-supported cases, the most reliable legal route is court-backed process under applicable procedural rules. Depending on the case, this may involve authorization to obtain:
- subscriber information;
- traffic data;
- stored computer data;
- logs and related digital evidence.
This route is far stronger than informal requests because it creates a compellable legal basis and improves evidentiary value in later proceedings.
6.5. Through criminal investigation
When a formal criminal complaint is filed, investigators may build a chain of attribution:
- offensive post or message;
- account URL and screenshots;
- platform record requests;
- IP logs;
- ISP subscriber mapping;
- device or account linkage;
- witness statements;
- seizure or examination of devices, if lawfully authorized.
This is usually the most effective route where the conduct amounts to cyber libel, online fraud, threats, sexual abuse, extortion, or identity theft.
6.6. Through civil litigation and related discovery mechanisms
In some cases, even if the conduct is not pursued criminally first, a civil action may eventually support court-assisted identification of a defendant. This is often more difficult in practice because platforms and ISPs may still require strong legal compulsion, and cross-border enforcement can be complex. Still, where a cause of action exists, civil proceedings can be part of the strategy.
6.7. Through regulatory or cross-border legal assistance
Many major platforms are not Philippine entities in the operational sense that matters for user data. Their records may be stored abroad. In such cases, local complainants often face real obstacles.
The practical solution is usually one of the following:
- Philippine law enforcement communicates through recognized legal channels;
- the provider responds to valid foreign-process-compatible requests;
- mutual legal assistance or cross-border cooperation is used where available;
- local counsel works with foreign counsel where necessary.
This is slower, but often necessary.
7. What evidence should a victim preserve before trying to trace the account?
Before thinking about IP addresses, the complainant must preserve evidence properly. Many cases fail not because the offender cannot be found, but because the initial evidence is weak, incomplete, or poorly documented.
The basic evidence package should include:
- full screenshots of posts, profiles, comments, messages, and usernames;
- URLs or direct links to profiles and content;
- date and time seen, preferably with timezone context;
- account IDs, handles, and display names;
- copies of threatening, defamatory, or fraudulent messages;
- transaction records, if money is involved;
- proof of impersonation, such as the victim’s real profile or business records;
- witness accounts from those who saw the content;
- email headers, if relevant;
- logs from owned systems or websites, if the account interacted there.
Where possible, preserve content in a way that shows context, not just cropped images. Cropped screenshots create authentication problems.
In more serious cases, a notarized narrative, forensic capture, or lawyer-assisted evidence organization can help.
8. The step-by-step lawful pathway in the Philippines
A realistic Philippine pathway usually looks like this:
Step 1: Preserve all visible evidence
Do not engage in retaliation, hacking, threats, or doxxing. Preserve the evidence immediately.
Step 2: Report the account to the platform
Request takedown if warranted and ask for record preservation if the conduct is criminal or harmful.
Step 3: Evaluate the legal theory
Determine whether the facts may support cyber libel, threats, fraud, identity theft, privacy violations, child protection violations, online harassment-related offenses, or another actionable wrong.
Step 4: File a complaint with cybercrime authorities
Typically with the PNP Anti-Cybercrime Group or the NBI Cybercrime Division, depending on the facts and urgency.
Step 5: Submit evidence with a sworn statement
The authorities need concrete dates, links, screenshots, usernames, and the narrative of harm.
Step 6: Seek lawful preservation and disclosure
Investigators or counsel may pursue the proper legal process to preserve and obtain platform and subscriber records.
Step 7: Match IP logs to ISP subscriber records
If the platform yields IP data, the next step is attribution through the relevant provider.
Step 8: Build identity linkage beyond the IP
Because IP alone is not enough, investigators often look for:
- recurring login patterns;
- linked phone numbers or emails;
- device identifiers;
- linguistic or behavioral similarities;
- account recovery data;
- financial transaction links;
- witness testimony.
Step 9: File the criminal or civil case
Once the responsible person is identified with enough evidentiary basis.
9. Is it legal for a private person to “trace” someone’s IP on their own?
Only in narrow, lawful ways.
A private person may generally:
- inspect logs from their own website, app, or server;
- preserve email headers from communications they received;
- use data voluntarily available through their own systems;
- turn over those records to law enforcement or counsel.
A private person should not:
- hack into the account or another system;
- deploy malware, spyware, phishing pages, or credential theft;
- trick someone into unlawful surveillance;
- buy illegally obtained logs;
- bribe insiders for subscriber information;
- publish private identifying data without lawful basis;
- impersonate law enforcement to obtain records.
Those acts can create criminal, civil, and privacy liability. A victim can quickly become a violator.
10. Can a lawyer directly obtain the IP address?
A lawyer can help structure the case, send preservation demands, prepare complaints, and seek court action. But a lawyer’s letter alone does not automatically compel a platform or telco to release protected information.
In practice, counsel is most useful for:
- identifying the right cause of action;
- drafting a strong complaint-affidavit;
- preserving evidentiary integrity;
- initiating court-backed processes;
- coordinating with investigators;
- managing cross-border provider issues.
A lawyer is not a shortcut around due process, but can greatly improve the likelihood of lawful disclosure.
11. Is a subpoena enough?
Not always. It depends on:
- the type of data sought;
- the nature of the proceeding;
- the entity holding the records;
- whether the records are domestic or foreign;
- whether special cybercrime procedural rules apply.
Some providers will require very specific judicial orders or warrant-based mechanisms rather than generic requests. Others may distinguish between:
- basic subscriber information;
- traffic data;
- stored content;
- emergency disclosures.
So the real answer is: sometimes, but often more is needed.
12. The role of timestamps: why exact time matters
An IP address is rarely useful without the exact date and time of the event. This is especially true for:
- dynamic IP assignments;
- mobile carriers;
- shared NAT systems;
- high-volume platforms.
A legally useful request often needs:
- the IP address;
- exact timestamp;
- timezone;
- the event type, such as account login, message send, profile creation, or post upload.
Without timestamp precision, subscriber attribution may fail or point to multiple possibilities.
13. The limits of IP tracing
Many people assume tracing an IP leads directly to a person’s full identity. That is often false. There are several limitations.
A. Dynamic IP addresses
The IP may change over time for the same subscriber.
B. Carrier-grade NAT
Many users may appear under a shared public IP. More detailed logs may be needed.
C. VPNs and proxies
The visible IP may belong only to a VPN service, not the real user.
D. Public Wi-Fi
The subscriber may be a café, hotel, school, or office rather than the actual user.
E. Shared household use
Several people may have access to the same connection.
F. Compromised devices or accounts
The apparent source may not be the true actor.
G. Foreign platforms and retention limits
The data may already be deleted or inaccessible.
Because of these limits, Philippine investigators and courts should not treat IP attribution as infallible. It is usually part of a larger evidentiary mosaic.
14. Can an IP address alone win a case?
Usually, no.
An IP address is often only corroborative unless strongly tied to other facts. To persuade a court or prosecutor, it is much better to pair it with:
- account content;
- device seizure results, if lawfully obtained;
- subscriber records;
- message history;
- payment or transaction links;
- admissions;
- witness testimony;
- linguistic patterns;
- recovery email or phone records;
- location consistency.
The stronger cases are those where IP evidence fits into a coherent narrative, not those that rely on IP alone.
15. What if the dummy account is on Facebook, Instagram, X, TikTok, Gmail, Telegram, or another foreign platform?
This is common. The main legal issue becomes not only Philippine law, but provider policy and foreign jurisdiction.
In practice:
- Philippine complainants preserve evidence locally;
- they report the account to the platform;
- they file with local cybercrime authorities if there is an offense;
- investigators or counsel pursue lawful provider requests;
- the provider evaluates whether to disclose under its legal framework.
Some platforms are more cooperative about preservation than disclosure. Some will disclose only to law enforcement. Some require very formal legal process. Some may provide content removal but not user identification.
So yes, tracing is still possible, but it is usually slower and more process-heavy.
16. What if the account used a VPN?
A VPN can make tracing harder, but not automatically impossible.
If the visible IP belongs to a VPN provider, investigators may try to determine:
- which VPN service was used;
- whether the provider keeps logs;
- whether lawful disclosure is possible;
- whether the suspect can be linked through other evidence.
Many cases do not end with the first IP result. Instead, the visible IP is only the first lead, and investigators pivot to:
- account recovery data;
- linked devices;
- payment methods;
- associated emails or phone numbers;
- pattern evidence;
- seized devices;
- witness testimony.
So a VPN complicates attribution, but does not make the account legally untouchable.
17. What if the account used a prepaid SIM or public Wi-Fi?
This creates attribution issues, but not necessarily dead ends.
Prepaid SIM
If mobile data was used, the public IP may map to a mobile carrier environment rather than neatly to a single user. Investigators may need:
- session logs;
- device identifiers;
- registration data, where legally relevant;
- timestamps with high precision.
Public Wi-Fi
The subscriber may be only the establishment. Further evidence is needed, such as:
- CCTV, if lawfully obtained;
- device login records;
- witness statements;
- local network logs;
- platform-side device and session data.
Again, the lesson is the same: IP tracing is a lead, not always final proof.
18. Does the Data Privacy Act block all tracing efforts?
No. It regulates them; it does not make them impossible.
The Data Privacy Act does not create a safe haven for online abusers. It mainly requires that personal data be processed lawfully, proportionately, and for legitimate purposes. In this context, data may still be processed or disclosed for lawful investigation, legal claims, compliance with legal obligations, or other recognized bases.
What it does prevent is:
- casual private fishing expeditions;
- unauthorized disclosure of subscriber identities;
- doxxing in the name of “justice”;
- overbroad or abusive demands for data.
So the law is not a shield for wrongdoing. It is a rulebook for lawful identification and accountability.
19. Can the victim post the suspected person’s name once they have “matched” the account?
That is risky and often a bad idea.
Even if the victim strongly suspects a person, public accusation can expose the victim to:
- defamation claims;
- privacy complaints;
- harassment-related escalation;
- evidentiary complications;
- compromise of the investigation.
Until attribution is legally solid, publication of the suspect’s identity is dangerous. The better course is to turn evidence over to counsel, investigators, or the court.
20. Is it legal to send a tracking link to see someone’s IP address?
This area requires caution.
There are situations where a person lawfully controls a website or server and logs incoming IPs as part of normal operation. That is generally different from deceptive or intrusive tactics designed to secretly capture data.
The legality can turn on:
- consent;
- deception;
- privacy expectations;
- the nature of the system used;
- whether the collection is part of lawful system administration or covert surveillance.
In the Philippine context, the safest legal principle is this: do not use trickery, malware, fake login pages, invasive tracking, or covert data capture techniques to identify a person. Rely on evidence from systems you lawfully control, or proceed through formal legal channels.
21. What remedies are available once the dummy account user is identified?
The remedy depends on the conduct.
Possible paths include:
Criminal remedies
Where the facts support offenses such as:
- cyber libel;
- threats;
- fraud;
- identity-related abuse;
- privacy violations;
- exploitation offenses;
- harassment-related criminal acts.
Civil remedies
Possible relief may include:
- damages;
- injunctions;
- takedown-related relief where available;
- protection of name, likeness, reputation, or business interests.
Administrative or platform remedies
These may include:
- account suspension;
- account removal;
- content takedown;
- preservation of evidence.
Often, a combined strategy works best: preserve evidence, push for takedown, and pursue criminal or civil liability where justified.
22. Cyber libel and dummy accounts in the Philippines
One of the most common Philippine uses of dummy accounts is anonymous defamation. In those situations, the real legal problem is usually not the fake profile itself but the allegedly defamatory publication.
For a viable complaint, the complainant typically needs to show:
- the defamatory statement;
- publication to others;
- identification of the offended party;
- malice or its legal equivalent, depending on context;
- the person responsible for the publication.
Tracing the IP may help prove the last element: who actually controlled or used the account.
But cyber libel cases also raise constitutional and evidentiary concerns, so careful handling is essential. The complainant should focus on precise posts, dates, and authorship evidence, not broad outrage.
23. Identity theft, impersonation, and business sabotage
Dummy accounts are often used to impersonate:
- private individuals;
- lawyers, doctors, or professionals;
- public officials;
- online sellers;
- influencers;
- companies and brands.
In such cases, IP tracing may be particularly valuable because the wrongdoer is using false identity details. The key evidence often includes:
- the fake profile;
- unauthorized use of photos, logos, or names;
- messages sent to third persons;
- proof of reputational, economic, or personal harm;
- platform records showing account creation and access history.
The stronger the impersonation proof, the easier it is to justify formal requests for identifying information.
24. Why preservation is urgent
One of the biggest practical problems is not legal theory but data disappearance.
Platforms and providers may not retain logs forever. Some records are deleted quickly; others are kept only for limited periods. If the victim waits too long:
- the platform logs may be gone;
- the account may be deleted;
- subscriber mapping may no longer be available;
- the evidence chain may weaken.
So lawful action should begin promptly:
- preserve screenshots and links immediately;
- report to the platform quickly;
- file with cybercrime authorities without unnecessary delay;
- seek preservation as soon as the offense is recognized.
25. What a complainant should not do
A lawful case can be damaged by self-help misconduct. The following are especially dangerous:
- hacking the suspected person’s account;
- buying leaked credentials or subscriber data;
- posting private addresses, phone numbers, or IDs online;
- threatening the suspected person;
- fabricating screenshots;
- inducing someone to confess through unlawful coercion;
- using fake “forensic” reports;
- editing screenshots or altering metadata;
- installing trackers or spyware.
These tactics can make the evidence unusable and create fresh liability.
26. What makes a tracing request more likely to succeed?
The strongest cases usually have these features:
- a clearly identifiable unlawful act;
- precise dates and timestamps;
- intact URLs and screenshots;
- serious or repeated harm;
- prompt reporting;
- strong platform identifiers;
- preserved logs from owned systems, where available;
- legal framing tied to a recognized offense;
- a request that is specific rather than broad or speculative.
Requests fail when they are vague, emotional, delayed, unsupported, or aimed only at “finding out who this is” without a legal theory.
27. Can a person be compelled to reveal if they own the dummy account?
Potentially, depending on the stage and nature of proceedings, but this depends on procedural and constitutional limits. Compulsion issues may involve:
- due process;
- self-incrimination concerns in criminal contexts;
- discovery rules in civil contexts;
- authenticity and chain-of-custody requirements for devices.
The safer view is that identity should be built through lawful records and corroborative evidence, not merely forced accusation.
28. Special caution in family, employment, and political disputes
A large share of dummy-account complaints arise in:
- breakups and family conflicts;
- workplace rivalries;
- business competition;
- local political disputes.
In these settings, allegations are often emotionally charged and factually messy. There may be:
- multiple people with motive;
- shared network access;
- retaliatory complaints;
- selective screenshots;
- anonymous group-admin behavior;
- burner accounts tied to campaign environments.
IP tracing can help, but these disputes also require caution because false attribution is common.
29. Philippine practical realities: what usually happens in real cases
In real Philippine practice, not every complaint leads to a clean IP-to-person identification. Common obstacles include:
- weak initial documentation;
- deleted content;
- uncooperative platforms;
- foreign-hosted records;
- limited retention periods;
- VPN usage;
- shared or dynamic IPs;
- insufficient legal process;
- inability to tie the subscriber to the actual user.
So the proper expectation is not “the IP will reveal everything,” but rather: a legally managed investigation may produce a chain of evidence that identifies the user behind the dummy account.
That is the realistic standard.
30. Bottom line
In the Philippines, the IP address of a dummy account can be traced legally only through lawful evidence gathering, platform preservation, law enforcement action, and when necessary, court-backed processes directed at platforms, ISPs, telcos, or other service providers.
A private citizen may preserve public evidence and use logs from systems they lawfully control, but cannot lawfully compel disclosure or engage in hacking, covert surveillance, or doxxing. The central legal tools arise from cybercrime law, privacy law, electronic evidence rules, and judicial procedures for obtaining digital records. Even then, an IP address is not always equal to a person. It is often only one part of a broader attribution case.
The most important principles are these:
- act quickly;
- preserve evidence carefully;
- use lawful channels only;
- involve the proper Philippine authorities;
- understand that IP tracing is useful but not infallible;
- build the case around the unlawful act, not just the fake account.
A dummy account can hide a name, but it does not always defeat the law. The real issue is not whether the account is fake. It is whether there is a legally supportable path from online misconduct to admissible proof of the person behind it. In the Philippines, that path exists, but it depends on discipline, due process, and proper use of the legal system.