Online Scam Reporting in the Philippines

I. Introduction

Online scams have become one of the most common legal and practical problems faced by Filipinos. As commerce, banking, remittances, lending, investments, employment applications, dating, social networking, and government services move online, scammers have also shifted to digital platforms.

Online scams may involve fake sellers, phishing links, investment fraud, job scams, romance scams, identity theft, hacked accounts, unauthorized bank transfers, e-wallet fraud, loan app harassment, fake government assistance, cryptocurrency schemes, SIM-related fraud, social media impersonation, and other deceptive online conduct.

In the Philippine legal context, online scam reporting is not merely a complaint to a platform. It may involve criminal law, cybercrime law, consumer protection law, banking regulations, data privacy law, telecommunications rules, evidence preservation, and civil recovery. A victim’s first steps can affect whether the money can be frozen, whether evidence is preserved, whether the scammer can be traced, and whether a criminal case can be filed.

This article explains the legal framework, reporting channels, practical procedure, required evidence, remedies, common scam types, and issues involved in reporting online scams in the Philippines.


II. What Is an Online Scam?

An online scam is a fraudulent scheme carried out through the internet, mobile communications, social media, e-commerce platforms, messaging apps, email, online banking, e-wallets, or other digital systems. It usually involves deception to obtain money, property, personal information, credentials, identity documents, account access, or other benefits.

Common elements include:

  1. A false representation or concealment of truth;
  2. Reliance by the victim on the scammer’s statement or conduct;
  3. Payment, transfer, disclosure of information, or other action by the victim;
  4. Damage, loss, or risk of loss;
  5. Use of electronic, digital, or telecommunications means.

Not every failed online transaction is automatically a scam. A seller’s delay, poor service, or breach of contract may be civil or consumer-related. A scam usually involves fraudulent intent, deception, impersonation, false promises, or deliberate taking of money or data.


III. Common Types of Online Scams in the Philippines

A. Online selling scams

These involve fake sellers on Facebook Marketplace, Instagram, TikTok, Shopee-like pages, online classifieds, or messaging apps. The victim pays through bank transfer, e-wallet, remittance, or cryptocurrency, but the item is never delivered.

Common signs include:

  • Prices far below market value;
  • Refusal to use cash on delivery or platform escrow;
  • Newly created profile;
  • Stolen product photos;
  • Pressure to pay immediately;
  • Fake tracking number;
  • Blocking after payment.

B. Phishing and account takeover

Phishing involves fake links, emails, SMS, or messages designed to steal login credentials, OTPs, PINs, passwords, card details, or e-wallet access.

Examples include fake bank alerts, fake delivery notices, fake government aid links, fake raffle notices, fake account verification pages, and fake customer support chats.

C. Unauthorized bank or e-wallet transfers

A victim’s bank account or e-wallet may be drained after clicking a phishing link, sharing an OTP, installing malicious software, or dealing with a fake support agent.

This type of scam requires immediate reporting to the bank, e-wallet provider, and law enforcement because quick action may allow freezing or tracing of funds.

D. Investment scams

These include fake investment platforms, Ponzi schemes, cryptocurrency scams, forex trading scams, fake lending or financing companies, “double your money” schemes, casino or betting schemes, and group-chat recruitment scams.

Typical promises include:

  • Guaranteed high returns;
  • No risk;
  • Daily payout;
  • Referral commissions;
  • Fake certificates;
  • Fake celebrity endorsements;
  • Pressure to reinvest;
  • Withdrawal restrictions after initial gains.

E. Job and task scams

Victims are offered online jobs, part-time work, or “task-based” income. They may be asked to deposit money to unlock tasks, pay training fees, buy products, or send personal information.

Common examples include fake work-from-home offers, fake recruitment agencies, “like and subscribe” task scams, fake overseas employment, and crypto-task platforms.

F. Romance scams

A scammer builds an emotional relationship online, then asks for money due to emergencies, travel, customs fees, hospitalization, business problems, or alleged gifts stuck in delivery.

Victims may also be blackmailed using intimate photos or videos.

G. Sextortion and blackmail

The scammer obtains or fabricates intimate images, videos, chats, or personal information, then threatens to send them to family, employers, schools, or social media contacts unless money is paid.

This may involve cybercrime, grave coercion, unjust vexation, threats, privacy violations, or anti-photo and video voyeurism laws, depending on the facts.

H. Identity theft and impersonation

A scammer uses another person’s name, photo, ID, social media account, business name, or professional identity to deceive others.

Victims may include both the person impersonated and those who paid the impersonator.

I. Fake loan apps and collection harassment

Some online lending apps or fake lenders harvest contacts, threaten borrowers, shame them publicly, impose undisclosed charges, or use abusive collection methods. Some are scams that collect “processing fees” without releasing loans.

These cases may involve lending regulations, consumer protection, cybercrime, data privacy, harassment, threats, and unfair debt collection practices.

J. Fake government assistance or official notices

Scammers impersonate government agencies and offer cash aid, benefits, IDs, permits, tax refunds, SIM registration assistance, or legal clearance in exchange for fees or personal information.

K. SIM-related and OTP scams

Scammers may use prepaid SIMs, spoofed sender names, text blasts, fake account verification, or social engineering to obtain OTPs and account access.

A victim should report not only the scammer’s account but also the phone number used, while preserving screenshots and message headers when possible.


IV. Legal Framework

Online scams in the Philippines may fall under several laws, depending on the conduct.

A. Revised Penal Code: estafa and related offenses

Many scams are prosecuted as estafa, especially when a person defrauds another through deceit, false pretenses, abuse of confidence, or fraudulent means.

Examples include:

  • Taking payment for goods with no intention to deliver;
  • Pretending to be an authorized seller;
  • Offering fake investments;
  • Misrepresenting identity or authority;
  • Inducing the victim to transfer money through false claims.

Other Revised Penal Code offenses may apply, such as falsification, use of falsified documents, threats, coercion, or unjust vexation.

B. Cybercrime Prevention Act

If the fraud is committed using information and communications technology, the Cybercrime Prevention Act may apply. Online estafa may be treated more seriously when committed through computer systems or electronic means.

The law also covers cyber-related offenses such as illegal access, data interference, computer-related fraud, computer-related identity theft, cybersex-related offenses, and cyber libel, depending on the facts.

Online scams commonly involve computer-related fraud, identity theft, phishing, unauthorized access, or misuse of digital systems.

C. Access Devices Regulation

If the scam involves credit cards, debit cards, ATM cards, account numbers, electronic payment credentials, or similar access devices, access device laws may apply.

Examples include unauthorized use of card details, possession of stolen card information, card-not-present fraud, and fraudulent transactions using another person’s payment credentials.

D. E-Commerce and electronic evidence principles

Online transactions and electronic communications may be legally recognized. Screenshots, emails, chats, transaction receipts, electronic documents, logs, and digital records may be used as evidence if properly authenticated and preserved.

E. Consumer protection laws

If the scam involves online selling, defective goods, misleading advertisements, unfair sales practices, or deceptive trade practices, consumer protection agencies may become relevant.

A dispute may be both a consumer complaint and a criminal complaint, depending on whether there was fraud.

F. Securities and investment regulation

Investment scams may involve illegal solicitation of investments, sale of unregistered securities, pyramiding, Ponzi schemes, or unauthorized investment-taking.

The Securities and Exchange Commission may be relevant when a company, group, or individual offers investment contracts or public investment schemes without authority.

G. Banking, e-money, and financial regulations

Banks, e-wallet providers, remittance companies, and payment service providers are regulated entities. They may be required to investigate unauthorized transactions, assist in fraud reports, preserve records, and cooperate with law enforcement.

Victims should immediately notify the financial institution involved because time is critical in tracing and freezing funds.

H. Data Privacy Act

If the scam involves unauthorized collection, use, disclosure, sale, or misuse of personal information, the Data Privacy Act may apply.

Examples include identity theft, account takeover, fake lending apps harvesting contacts, phishing databases, and unauthorized posting of IDs or personal details.

I. SIM Registration and telecommunications rules

When scams involve mobile numbers, text messages, OTP fraud, or fake SIM identities, telecommunications and SIM registration rules may assist law enforcement in tracing subscribers, subject to lawful process and data privacy safeguards.

J. Anti-Money Laundering framework

Scam proceeds may pass through bank accounts, e-wallets, remittance centers, crypto wallets, or money mule accounts. Suspicious transactions may be subject to anti-money laundering reporting and investigation.

Victims do not directly prosecute money laundering, but prompt reporting may help financial institutions and authorities identify suspicious accounts.


V. Is an Online Scam a Criminal Case, Civil Case, or Both?

An online scam can be criminal, civil, administrative, or all of these at the same time.

Criminal aspect

The State prosecutes the offender for crimes such as estafa, computer-related fraud, identity theft, falsification, threats, or illegal access. The victim is the complainant and witness.

Civil aspect

The victim may seek return of money, damages, restitution, or compensation. Civil liability may be included in the criminal case or pursued separately, depending on strategy and circumstances.

Administrative or regulatory aspect

If the scam involves a registered business, lending company, broker, recruitment agency, online platform, bank, or regulated entity, administrative complaints may be filed with the relevant agency.

Platform or private complaint

Reports to Facebook, Instagram, TikTok, Shopee, Lazada, banks, e-wallets, or telecom providers may result in account suspension, freezing, reversal review, or preservation of evidence. These do not replace criminal reporting but are often necessary.


VI. Immediate Steps After Discovering an Online Scam

The first hours after an online scam are important. A victim should act quickly but carefully.

Step 1: Stop communicating, except to preserve evidence

Do not send more money. Do not click more links. Do not install apps. Do not give OTPs, passwords, PINs, IDs, or selfies.

If the scammer is still communicating, preserve messages. Avoid threats or statements that may complicate the case.

Step 2: Secure accounts

Immediately change passwords for affected accounts, especially email, online banking, e-wallets, social media, and messaging apps.

Enable two-factor authentication. Log out of unknown devices. Revoke suspicious app permissions. Check recovery email, recovery number, and linked devices.

Step 3: Contact the bank, e-wallet, or remittance provider

Report the transaction immediately. Provide transaction reference numbers, account names, account numbers, dates, times, amounts, and screenshots.

Ask whether the transaction can be held, reversed, frozen, disputed, or investigated. Request a case reference number.

Step 4: Preserve evidence

Do not delete chats, emails, transaction receipts, call logs, links, posts, profiles, or screenshots.

Save:

  • Full conversation threads;
  • Payment receipts;
  • QR codes;
  • Account numbers;
  • Phone numbers;
  • Email addresses;
  • Social media profile links;
  • URLs;
  • Photos and videos;
  • Product listings;
  • Delivery records;
  • IP notices or login alerts;
  • Bank or e-wallet statements;
  • Names used by the scammer.

Step 5: Report the account or listing to the platform

Report the profile, page, marketplace listing, group, channel, website, or app. Take screenshots before reporting because the account may disappear.

Step 6: File a report with law enforcement

Online scams may be reported to cybercrime units, local police, or the National Bureau of Investigation. For serious losses, organized scams, identity theft, threats, or repeated fraud, formal reporting is important.

Step 7: Prepare an affidavit-complaint if pursuing a case

A criminal complaint usually requires a sworn statement narrating the facts and attaching evidence. The complaint may later be filed with the prosecutor’s office for preliminary investigation, depending on the offense and evidence.


VII. Where to Report Online Scams in the Philippines

The appropriate reporting channel depends on the type of scam.

A. Philippine National Police Anti-Cybercrime Group

The PNP Anti-Cybercrime Group handles cybercrime complaints, including online fraud, phishing, identity theft, unauthorized access, sextortion, and social media scams.

Victims may report to cybercrime offices or local police stations that can refer the matter to cybercrime investigators.

B. National Bureau of Investigation Cybercrime Division

The NBI Cybercrime Division also handles cyber-related complaints, digital evidence, online fraud, identity theft, hacking, cyber extortion, and related offenses.

For many victims, the NBI is a preferred channel when the scam is complex, organized, involves multiple victims, or requires technical investigation.

C. Local police station

A victim may report to the local police station, especially if immediate documentation is needed. The local police may prepare a blotter or refer the matter to a cybercrime unit.

A police blotter alone is usually not enough to recover money or prosecute a scammer, but it can help document the incident and support reports to banks or platforms.

D. Prosecutor’s Office

For criminal prosecution, a complaint may be filed with the city or provincial prosecutor. Usually, the complaint includes an affidavit-complaint, supporting affidavits, and documentary evidence.

Law enforcement may assist in building the case, but a complainant may also seek legal assistance and directly file when evidence is sufficient.

E. Banks and e-wallet providers

When money was transferred through a bank, e-wallet, remittance platform, or payment provider, the victim should report to the financial institution immediately.

This report is essential for:

  • Freezing suspicious accounts;
  • Preserving transaction logs;
  • Starting dispute review;
  • Blocking compromised accounts;
  • Identifying mule accounts;
  • Supporting law enforcement requests.

F. Securities and Exchange Commission

Investment scams, unauthorized securities offerings, Ponzi schemes, and suspicious investment solicitations may be reported to the SEC.

This is especially relevant when the scammer operates under a business name, group, corporation, cooperative-like scheme, or online investment platform.

G. Department of Trade and Industry

Consumer complaints involving online sellers, deceptive sales practices, non-delivery of goods, defective goods, and misleading advertisements may be brought to the DTI, especially when the seller is identifiable and appears to be engaged in trade or business.

However, where there is clear fraud, law enforcement reporting should also be considered.

H. National Privacy Commission

Cases involving unauthorized use, disclosure, or processing of personal data may be reported to the NPC.

Examples include fake loan apps accessing contacts, unauthorized posting of IDs, identity theft, doxxing, or misuse of personal information.

I. Telecommunications providers

Scam SMS, phone numbers, OTP fraud, and suspicious SIMs may be reported to the relevant telco. Telcos may block numbers, investigate abuse, and cooperate with lawful requests from authorities.

J. Online platforms

Reports may be filed with social media platforms, online marketplaces, messaging apps, hosting providers, payment platforms, and app stores.

Platform reporting can result in takedown, account suspension, content preservation, or blocking, but it does not substitute for official legal action.


VIII. Evidence Needed for Online Scam Reporting

The strength of an online scam complaint often depends on documentation.

A. Identity and contact evidence

Collect:

  • Scammer’s name or alias;
  • Profile URL;
  • Username or handle;
  • Phone number;
  • Email address;
  • Account number;
  • E-wallet number;
  • Bank name;
  • QR code;
  • Photos used;
  • Business name;
  • Website domain;
  • Group or page name.

B. Communication evidence

Preserve:

  • Chat messages;
  • Emails;
  • SMS;
  • Call logs;
  • Voice messages;
  • Video calls, if recorded legally;
  • Screenshots of posts and offers;
  • Terms promised by the scammer;
  • Statements inducing payment.

The conversation should show what was promised, how the victim was induced, and what happened after payment.

C. Payment evidence

Preserve:

  • Bank transfer receipt;
  • E-wallet transaction receipt;
  • Remittance slip;
  • QR payment confirmation;
  • Credit card transaction record;
  • Crypto transaction hash;
  • Account number and account name;
  • Date and time of transfer;
  • Amount;
  • Reference number.

D. Platform evidence

Save:

  • Product listing;
  • Advertisement;
  • Seller page;
  • Group post;
  • Marketplace entry;
  • Website screenshots;
  • App page;
  • Reviews or comments;
  • Other victims’ reports.

E. Personal loss evidence

Prepare:

  • Total amount lost;
  • Dates of each payment;
  • Consequential losses;
  • Fees paid;
  • Unauthorized charges;
  • Emotional distress or threats, if relevant;
  • Attempts to recover or contact the scammer.

F. Technical evidence

Where available, preserve:

  • Email headers;
  • URLs;
  • IP login alerts;
  • Device notifications;
  • Malware app name;
  • File names;
  • Links clicked;
  • Screenshots of suspicious websites;
  • SMS sender details;
  • Browser history;
  • App permissions.

Do not tamper with devices if hacking or malware is involved. A cybercrime investigator or digital forensic specialist may need to examine the device.


IX. How to Prepare an Affidavit-Complaint

A formal complaint commonly requires an affidavit-complaint. It should be clear, chronological, and supported by attachments.

A. Basic contents

The affidavit should include:

  1. Full name, age, address, and contact details of the complainant;
  2. Statement that the complainant is executing the affidavit voluntarily;
  3. Description of how the complainant encountered the scammer;
  4. Details of the representation made by the scammer;
  5. Explanation of why the complainant believed the scammer;
  6. Dates, times, and amounts of payments;
  7. Account numbers or payment channels used;
  8. What happened after payment;
  9. Loss suffered;
  10. Evidence attached;
  11. Request for investigation and prosecution.

B. Sample structure

Affidavit-Complaint for Online Scam

I, [Name], of legal age, Filipino, and residing at [Address], after being sworn, state:

  1. I am the complainant in this case.
  2. On [date], I saw/contacted/received a message from [name/username/profile] offering [item/service/investment/job].
  3. The respondent represented that [state promises].
  4. Relying on those representations, I transferred the amount of [amount] on [date] through [bank/e-wallet/remittance] to [account name and number].
  5. Attached are copies of the conversation, payment receipt, profile, and other documents.
  6. After receiving payment, the respondent [blocked me/failed to deliver/refused refund/demanded more money/disappeared].
  7. I later discovered that the representations were false because [state facts].
  8. I suffered damage in the amount of [amount].
  9. I am executing this affidavit to request investigation and filing of appropriate charges.

The affidavit must be notarized or sworn before an authorized officer.

C. Attachments

Number the attachments clearly:

  • Annex A: Screenshot of profile;
  • Annex B: Screenshot of offer;
  • Annex C: Chat conversation;
  • Annex D: Payment receipt;
  • Annex E: Bank or e-wallet report;
  • Annex F: Platform report;
  • Annex G: Government ID of complainant;
  • Annex H: Other supporting documents.

X. Reporting to Banks and E-Wallets

When a scam involves a bank or e-wallet transfer, the victim should report immediately. Timing matters because funds may be moved quickly through mule accounts.

A. Information to provide

Give the bank or e-wallet provider:

  • Your name and account details;
  • Transaction reference number;
  • Date and time of transaction;
  • Amount;
  • Recipient account number or mobile number;
  • Recipient account name;
  • Screenshots of the scam;
  • Police or cybercrime report, if already available;
  • Statement that the transaction was fraudulent.

B. What to request

Ask the provider to:

  1. Block or secure your account;
  2. Investigate the transaction;
  3. Preserve logs;
  4. Coordinate with the receiving institution;
  5. Freeze or hold funds if possible;
  6. Issue a report or reference number;
  7. Provide requirements for dispute or recovery.

C. Limits of bank or e-wallet recovery

Recovery is not guaranteed. If the funds were withdrawn or moved, reversal may be difficult. Banks and e-wallets also evaluate whether the transaction was authorized, whether the victim shared OTPs or credentials, and whether internal fraud controls were triggered.

Even when reimbursement is denied, the transaction records may still be useful for law enforcement.


XI. Reporting to Social Media and Online Platforms

Many scams occur through social media platforms. Before reporting a scammer’s account, take screenshots because the account may be deleted or changed.

A. What to preserve

Save:

  • Profile URL;
  • Username;
  • Profile photo;
  • Account creation clues, if visible;
  • Posts;
  • Comments;
  • Marketplace listing;
  • Messages;
  • Group or page name;
  • Admins or moderators, if relevant;
  • Payment instructions.

B. Why platform reporting matters

Platform reporting may lead to:

  • Removal of scam content;
  • Suspension of accounts;
  • Blocking of fake pages;
  • Preservation of records;
  • Prevention of further victims;
  • Support for law enforcement requests.

C. Platform reports are not enough

A platform takedown does not automatically result in arrest, prosecution, or refund. For serious losses, file with law enforcement and financial institutions.


XII. Online Selling Scam: Legal and Practical Approach

In an online selling scam, the victim should determine whether the case is:

  1. A genuine seller dispute;
  2. A consumer complaint;
  3. A criminal fraud case;
  4. A platform dispute;
  5. A combination of these.

A. Indicators of criminal fraud

Criminal fraud is more likely when:

  • The seller used a fake identity;
  • The seller used stolen photos;
  • Multiple victims exist;
  • The seller blocked the buyer after payment;
  • The seller never had the item;
  • The account was created only for scamming;
  • The seller gave fake tracking details;
  • The seller demanded more payments;
  • The same payment account is used in repeated scams.

B. Remedies

Possible remedies include:

  • Report to the platform;
  • Report to the bank or e-wallet;
  • File complaint with cybercrime authorities;
  • File consumer complaint if seller is identifiable;
  • File criminal complaint for estafa or computer-related fraud;
  • Coordinate with other victims, while avoiding harassment or unlawful disclosure.

XIII. Investment Scam Reporting

Investment scams can cause large losses and often involve many victims.

A. Red flags

Common red flags include:

  • Guaranteed high returns;
  • Pressure to recruit others;
  • Referral commissions;
  • No legitimate registration or license;
  • Use of “trading bots” or fake dashboards;
  • Payouts funded by new investors;
  • Difficulty withdrawing funds;
  • Sudden account freeze;
  • Claims of taxes or fees before withdrawal;
  • Celebrity or influencer endorsements that cannot be verified.

B. Where to report

Victims may report to:

  • SEC, for unauthorized investment solicitation;
  • PNP or NBI cybercrime units;
  • Banks and e-wallets used for payments;
  • Prosecutor’s office;
  • Online platforms where recruitment occurred.

C. Evidence

Collect:

  • Investment contract or terms;
  • Screenshots of promised returns;
  • Referral links;
  • Group chat messages;
  • Names of recruiters;
  • Payment receipts;
  • Dashboard screenshots;
  • Withdrawal requests;
  • SEC registration claims;
  • Marketing materials;
  • Videos or webinars, if available.

D. Important legal point

A company’s mere registration as a corporation does not automatically authorize it to solicit investments from the public. Victims should distinguish between business registration and authority to sell securities or investment contracts.


XIV. Phishing and Unauthorized Transfers

Phishing cases are urgent because compromised accounts may continue to be exploited.

A. Immediate action

The victim should:

  1. Disconnect from suspicious websites or apps;
  2. Change passwords using a clean device;
  3. Call the bank or e-wallet provider;
  4. Block cards, accounts, or devices;
  5. Report unauthorized transactions;
  6. Preserve phishing messages and links;
  7. File cybercrime report.

B. Evidence

Preserve:

  • SMS or email link;
  • Sender details;
  • Screenshot of fake website;
  • Date and time clicked;
  • Information entered;
  • Unauthorized transaction records;
  • Login alerts;
  • Device used;
  • Bank or e-wallet notifications.

C. Liability issues

Disputes may arise over whether the transaction was unauthorized, whether the victim shared OTPs, whether the bank’s security controls were sufficient, and whether the financial institution acted promptly after notice.

The victim should document the timeline carefully.


XV. Sextortion and Blackmail

Sextortion victims often hesitate to report due to shame or fear. Prompt reporting is important.

A. What to do

The victim should:

  • Stop paying;
  • Preserve messages and threats;
  • Save account links and payment details;
  • Report the account to the platform;
  • File with cybercrime authorities;
  • Secure social media privacy settings;
  • Inform trusted persons if necessary;
  • Avoid negotiating endlessly.

B. Evidence

Collect:

  • Threat messages;
  • Screenshots of profiles;
  • Payment demands;
  • Payment receipts, if any;
  • Images or videos involved, if safely preserved;
  • List of threatened recipients;
  • Dates and times.

C. Legal issues

Sextortion may involve threats, coercion, cybercrime, privacy violations, and offenses involving intimate images. If the victim is a minor, child protection laws and online sexual abuse or exploitation laws may apply, and the case becomes especially serious.


XVI. Identity Theft and Fake Accounts

When someone uses another person’s name, photo, or identity to scam others, both the impersonated person and the defrauded victims should report.

A. For the impersonated person

Steps include:

  1. Take screenshots of the fake account;
  2. Report to the platform as impersonation;
  3. Warn contacts through legitimate channels;
  4. File a report if money was collected or reputation was damaged;
  5. Consider a notarized affidavit of denial if needed by victims or institutions.

B. For victims who paid the fake account

Steps include:

  1. Preserve proof that they dealt with the fake account;
  2. Preserve payment details;
  3. Report to payment provider;
  4. File cybercrime or police report;
  5. Avoid accusing the real person without proof.

C. Legal remedies

Depending on facts, the offender may be liable for identity theft, estafa, computer-related fraud, falsification, or other offenses.


XVII. Fake Loan Apps and Abusive Online Lending

Online lending scams and abusive collection practices may involve several issues.

A. Scam lending

A fake lender may require processing fees, insurance fees, verification deposits, or taxes before releasing a loan. After payment, no loan is released.

This may be reported as fraud.

B. Abusive collection

Some lenders or collection agents shame borrowers, contact phone contacts, threaten criminal cases, post personal information, or use abusive language.

This may involve regulatory complaints, privacy complaints, harassment, threats, or unfair collection practices.

C. Evidence

Preserve:

  • App name;
  • Screenshots of loan terms;
  • Screenshots of permissions requested;
  • Collection messages;
  • Threats;
  • Contact-harassment proof;
  • Proof of payments;
  • Company details;
  • App store page;
  • Privacy policy, if any.

D. Where to report

Depending on the facts, reports may be made to law enforcement, the National Privacy Commission, relevant financial regulators, app stores, and consumer protection agencies.


XVIII. Crypto and Digital Asset Scams

Cryptocurrency scams may involve fake exchanges, fake wallets, investment pools, romance-investment combinations, rug pulls, phishing, or fake recovery services.

A. Evidence

Collect:

  • Wallet addresses;
  • Transaction hashes;
  • Exchange account details;
  • Screenshots of promises;
  • Chat logs;
  • Website URLs;
  • App names;
  • Payment records;
  • KYC information submitted;
  • Withdrawal denial messages.

B. Challenges

Crypto transfers are often difficult to reverse. Scammers may use foreign platforms, mixers, mule wallets, or fake identities. Still, transaction hashes can help trace fund movement and support law enforcement requests to exchanges.

C. Beware of recovery scams

After a crypto scam, victims are often targeted again by “recovery experts” claiming they can retrieve funds for an upfront fee. Many are also scammers.


XIX. Role of the Barangay

For online scams, barangay conciliation may not be appropriate when the offense is serious, cyber-related, involves unknown persons, crosses jurisdictions, or requires law enforcement investigation.

However, barangay records may help in some situations, such as documenting harassment, identifying a local respondent, or supporting a civil dispute between persons in the same locality.

A victim should not rely solely on barangay proceedings for cybercrime or online fraud.


XX. Jurisdiction and Venue

Online scams often involve parties in different cities, provinces, or countries. The victim may be in one place, the scammer in another, the bank account in another, and the platform hosted abroad.

For practical purposes, victims usually report where they reside, where they discovered the crime, where the transaction occurred, or to specialized cybercrime units. Law enforcement and prosecutors determine proper venue based on the applicable rules and evidence.

Because cybercrime may be committed through digital systems crossing territorial boundaries, jurisdiction can be more flexible but also more complex.


XXI. Can the Victim Get the Money Back?

Recovery depends on timing, payment method, and whether funds can still be located.

A. Possible recovery routes

  1. Bank or e-wallet hold, reversal, or dispute;
  2. Freezing of account through appropriate legal process;
  3. Voluntary refund by respondent;
  4. Restitution in criminal proceedings;
  5. Civil action for sum of money or damages;
  6. Settlement during preliminary investigation or court proceedings;
  7. Recovery from platform buyer protection, if applicable.

B. Why recovery is difficult

Scammers often immediately transfer funds to mule accounts, withdraw cash, buy crypto, or split funds among many accounts. Some use fake or stolen identities.

Prompt reporting improves the chance of recovery but does not guarantee it.

C. Settlement

Some respondents offer settlement after being identified. A victim may accept settlement but should be careful. Settlement of civil liability does not automatically erase criminal liability in all cases. Written agreements should be properly drafted, and legal advice may be necessary.


XXII. Demand Letters

A demand letter may be useful when the respondent is identifiable and there is a possibility of resolving the dispute.

A demand letter may state:

  • Facts of the transaction;
  • Amount paid;
  • Failure to deliver or fraudulent act;
  • Demand for refund or performance;
  • Deadline;
  • Warning of legal action.

However, in obvious scams involving fake identities, sending a demand letter may be useless or may alert the scammer to destroy evidence. For phishing, account takeover, sextortion, or organized fraud, immediate reporting is usually more important.


XXIII. Filing a Criminal Complaint

A criminal complaint for online scam usually includes:

  1. Affidavit-complaint;
  2. Government ID of complainant;
  3. Screenshots and electronic evidence;
  4. Payment records;
  5. Bank or e-wallet reports;
  6. Platform reports;
  7. Witness affidavits, if any;
  8. Proof of demand or refund request, if relevant;
  9. Other evidence identifying the respondent.

The complaint may be filed with law enforcement for investigation or directly with the prosecutor when the respondent is known and evidence is sufficient.

The prosecutor determines whether there is probable cause to file the case in court.


XXIV. Electronic Evidence Issues

Electronic evidence must be preserved and presented properly.

A. Screenshots

Screenshots are useful but may be challenged. They should show:

  • Date and time;
  • Full profile or username;
  • URL or account link;
  • Conversation sequence;
  • Payment instructions;
  • Context before and after the key message.

Avoid cropping too much. Save original files when possible.

B. Chat exports

Where the app allows, export chats. Preserve the device used. Do not alter messages.

C. URLs and metadata

Copy profile links, post links, website URLs, and email headers. These may help identify the source or preserve evidence.

D. Authentication

The complainant should be prepared to state under oath that the screenshots or files are true and accurate copies of what appeared on the device or account.

E. Chain of custody

For serious cases, especially hacking, malware, large-value fraud, or sextortion, avoid unnecessary manipulation of the device. Investigators may need to preserve digital evidence.


XXV. What Not to Do After Being Scammed

Victims should avoid actions that may harm their case or expose them to liability.

Do not:

  1. Send more money to “unlock” funds or process refunds;
  2. Pay “recovery agents” without verification;
  3. Delete conversations;
  4. Publicly post private information of suspected persons without proof;
  5. Threaten violence;
  6. Hack back;
  7. Use someone else’s account to entrap without guidance;
  8. Fabricate evidence;
  9. Edit screenshots deceptively;
  10. Send IDs or selfies to unknown persons;
  11. Share OTPs or passwords;
  12. Rely only on social media shaming instead of formal reporting.

XXVI. Special Issues Involving Minors

When the victim is a minor, or when the scam involves sexual images, grooming, exploitation, blackmail, or coercion, the matter is more serious.

Parents, guardians, schools, and authorities should act promptly. Evidence should be preserved without spreading or forwarding exploitative material. Reports should be made to law enforcement units handling cybercrime and child protection.

Cases involving minors may trigger child protection laws, anti-trafficking laws, online sexual abuse or exploitation laws, and special confidentiality rules.


XXVII. Role of Lawyers

A lawyer may assist in:

  • Evaluating whether the case is criminal, civil, administrative, or regulatory;
  • Drafting affidavits and complaints;
  • Preserving evidence;
  • Coordinating with banks or platforms;
  • Filing with the prosecutor;
  • Seeking civil recovery;
  • Handling settlements;
  • Protecting victims from counterclaims;
  • Advising on privacy and public postings;
  • Representing victims in court.

Legal assistance is especially useful for large losses, investment scams, identity theft, sextortion, business scams, cross-border scams, and cases involving public accusations.


XXVIII. Online Scam Prevention

Prevention is not a substitute for reporting, but it reduces risk.

Practical precautions include:

  1. Verify seller identity before paying.
  2. Use platform escrow or cash on delivery where available.
  3. Avoid direct transfers to unknown persons.
  4. Do not share OTPs, passwords, or PINs.
  5. Check URLs carefully.
  6. Avoid clicking links from unsolicited messages.
  7. Confirm investment authority, not merely business registration.
  8. Be skeptical of guaranteed high returns.
  9. Do not pay fees to receive prizes, jobs, loans, or donations.
  10. Use strong passwords and two-factor authentication.
  11. Keep devices updated.
  12. Avoid installing unknown APKs or remote access apps.
  13. Verify customer service numbers from official sources.
  14. Be cautious with QR codes.
  15. Protect personal IDs and selfies.
  16. Monitor bank and e-wallet notifications.
  17. Report suspicious numbers and accounts early.

XXIX. Practical Reporting Checklist

A victim should prepare the following:

  1. Valid government ID;
  2. Written timeline of events;
  3. Name or alias of scammer;
  4. Profile links and usernames;
  5. Phone numbers and email addresses;
  6. Chat screenshots or exports;
  7. Product listing, ad, or investment offer;
  8. Payment receipts;
  9. Bank or e-wallet account details of recipient;
  10. Transaction reference numbers;
  11. Bank or e-wallet complaint reference number;
  12. Platform complaint reference number;
  13. Proof of loss;
  14. Witness statements, if any;
  15. Affidavit-complaint;
  16. Device used, if relevant;
  17. URLs, email headers, and technical details, if available.

XXX. Sample Incident Timeline

A clear timeline helps investigators understand the case.

Example:

  • March 1, 2026: I saw a Facebook Marketplace post selling a mobile phone.
  • March 2, 2026: I messaged the seller through Messenger.
  • March 2, 2026: The seller sent photos and promised same-day shipping.
  • March 3, 2026: I transferred ₱15,000 through GCash to number 09XX-XXX-XXXX under the name Juan D.
  • March 3, 2026: The seller sent a tracking number.
  • March 4, 2026: The tracking number was found to be invalid.
  • March 5, 2026: The seller blocked me.
  • March 6, 2026: I reported the transaction to GCash and Facebook.
  • March 7, 2026: I prepared this complaint with attached screenshots and receipts.

XXXI. Frequently Asked Questions

1. Is a police blotter enough?

Usually, no. A blotter documents the incident, but a formal complaint with evidence is generally needed for investigation or prosecution.

2. Can I report even if the amount is small?

Yes. Small-value scams are still reportable. Multiple small complaints may reveal a larger scheme.

3. What if I only know the scammer’s mobile number?

You may still report. Provide the number, transaction records, screenshots, and platform details. Authorities may seek subscriber or account information through proper legal channels.

4. What if the scammer used a fake name?

You may still report. Many online scam cases begin with aliases, numbers, accounts, and digital traces.

5. Can I post the scammer online?

You may warn others, but be careful. Posting accusations, personal data, IDs, addresses, or unverified information may expose you to privacy, defamation, or harassment issues. Formal reporting is safer.

6. Can the bank reverse the transfer?

Sometimes, but not always. It depends on timing, rules, whether the funds remain, and the circumstances of the transaction. Report immediately.

7. What if I shared my OTP?

Report anyway. Sharing an OTP may affect reimbursement, but it does not necessarily prevent criminal investigation of the scammer.

8. Can I file against a bank account holder used as a mule?

Possibly. If the account holder knowingly participated, they may be liable. If their account was also compromised or misused, further investigation is needed.

9. Can I file a case if the scammer is abroad?

Yes, but enforcement may be more difficult. Preserve evidence and report to cybercrime authorities.

10. What if the scammer refunds the money?

A refund may resolve the civil loss, but it does not automatically eliminate possible criminal liability in all cases. The legal effect depends on the offense and stage of proceedings.


XXXII. Conclusion

Online scam reporting in the Philippines requires quick action, careful evidence preservation, and use of the proper reporting channels. Victims should immediately secure their accounts, notify banks or e-wallet providers, preserve chats and transaction records, report the scammer to the platform, and file with appropriate law enforcement or regulatory agencies.

The legal remedies may include criminal prosecution, civil recovery, administrative complaints, platform takedowns, account freezing, and regulatory action. The applicable laws may involve estafa, cybercrime, access device fraud, data privacy, securities regulation, consumer protection, telecommunications rules, and financial regulations.

The most important practical rule is to act quickly and document everything. The sooner a victim reports, the better the chance of preserving evidence, tracing accounts, preventing further losses, and pursuing legal remedies.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.