I. Introduction
Scams in the Philippines take many forms: online selling fraud, investment schemes, romance scams, phishing, identity theft, fake job offers, fake lending apps, unauthorized bank transfers, SIM-related fraud, e-wallet account takeovers, cryptocurrency schemes, fake government assistance, and impersonation of banks, couriers, law enforcement, or public officials.
Reporting a scam is not only about recovering money. It is also about preserving evidence, stopping further harm, identifying the offender, protecting one’s identity and accounts, and creating an official record for banks, e-wallet providers, regulators, prosecutors, and courts.
This article explains, in the Philippine legal context, what a scam may constitute, where to report it, what evidence to prepare, what remedies may be available, and what practical steps a victim should take.
This is general legal information, not legal advice for a specific case.
II. What Is a Scam in Legal Terms?
The word “scam” is not always the exact legal term used in complaints. Depending on the facts, a scam may fall under one or more of the following legal categories:
- Estafa or swindling
- Fraud
- Theft
- Qualified theft
- Cybercrime
- Identity theft
- Unauthorized access
- Computer-related fraud
- Falsification
- Investment fraud
- Securities law violations
- Data privacy violations
- Consumer protection violations
- Harassment or abusive collection practices
- Money laundering-related activity
- Illegal recruitment
- Human trafficking-related deception
- Banking or e-wallet fraud
- SIM registration-related misuse
- Violation of lending, financing, or financial consumer protection rules
A single incident may involve several offenses. For example, a fake investment scheme may involve estafa, securities law violations, cybercrime, and money laundering indicators. A phishing incident may involve cybercrime, identity theft, unauthorized access, bank fraud, and data privacy concerns.
III. Common Types of Scams in the Philippines
A. Online Selling Scams
These include cases where a seller receives payment but never delivers the item, delivers a fake or substantially different item, uses fake tracking information, or disappears after payment.
Typical evidence includes:
- Chat messages
- Payment receipts
- Marketplace listing
- Seller profile
- Bank or e-wallet details
- Screenshots of promises and representations
- Courier details
- Proof that the item was not delivered or was different
B. Investment Scams
Investment scams often promise high returns with little or no risk. They may use terms such as “guaranteed profit,” “double your money,” “crypto trading,” “forex,” “AI trading,” “staking,” “franchise slots,” “paluwagan,” “cooperative,” “pre-selling,” or “private placement.”
Red flags include:
- Guaranteed returns
- Referral commissions
- Pressure to recruit
- No clear business model
- No regulatory license
- Use of personal bank accounts
- Refusal to provide written contracts
- Sudden freezing of withdrawals
- Excuses about system upgrades or tax clearance
- Leaders asking members not to report
C. Phishing and Account Takeover
Phishing scams involve fake links, fake login pages, fake bank messages, fake e-wallet notices, or fake customer service representatives who trick victims into giving passwords, OTPs, MPINs, or account information.
Common results include:
- Unauthorized bank transfers
- Unauthorized e-wallet withdrawals
- Loan applications in the victim’s name
- Identity theft
- SIM-related account compromise
- Use of victim’s account to scam others
D. Romance Scams
A scammer builds emotional trust and later asks for money for emergencies, travel, customs fees, medical bills, business problems, or “release” of supposed packages.
These cases can involve estafa, cybercrime, and sometimes extortion if intimate images or private information are used as leverage.
E. Fake Job or Work-from-Home Scams
These include fake employers requiring “processing fees,” “equipment deposits,” “training payments,” “verification deposits,” or task-based schemes where victims are asked to pay increasing amounts to withdraw supposed commissions.
Some fake job scams may also involve illegal recruitment or labor-related violations if employment abroad or local recruitment is falsely represented.
F. Loan App and Lending Scams
Some victims are deceived by fake lending apps that collect fees but never release loans. Others suffer from abusive collection, unauthorized contact-list access, public shaming, threats, or misuse of personal data.
Possible legal issues include fraud, data privacy violations, unfair collection practices, and violations of financial regulations.
G. Fake Government, Bank, or Delivery Messages
Scammers impersonate government agencies, banks, e-wallets, couriers, police, courts, or public officials. They may claim there is an unpaid fee, suspicious transaction, package issue, tax refund, ayuda, warrant, or account suspension.
The goal is usually to obtain money, passwords, OTPs, identity documents, or remote access to the victim’s device.
IV. First Steps After Discovering a Scam
A victim should act quickly but carefully. The first hours matter, especially where bank transfers, e-wallet withdrawals, SIM compromise, or identity theft are involved.
1. Stop communicating except to preserve evidence
Do not continue arguing with the scammer if it risks further manipulation. Do not send additional money. Preserve the conversation.
2. Preserve evidence immediately
Take screenshots and export conversations where possible. Scammers often delete accounts, change usernames, unsend messages, or block victims.
Preserve:
- Chat history
- Profile pages
- URLs
- Phone numbers
- Email addresses
- Bank account numbers
- E-wallet numbers
- QR codes
- Transaction receipts
- Reference numbers
- Payment confirmations
- Shipping details
- Advertisements
- Voice notes
- Call logs
- Emails
- Device notifications
- Names used by the scammer
- Group chats and admin identities
- Contracts, invoices, or receipts
3. Contact the bank or e-wallet provider immediately
Report the transaction as fraudulent. Request freezing, reversal review, investigation, account tagging, or coordination with the receiving institution.
Be ready to provide:
- Date and time of transaction
- Amount
- Sender account
- Recipient account
- Reference number
- Screenshots
- Police blotter or complaint, if already available
4. Secure accounts
Change passwords, revoke device access, log out of all sessions, replace compromised cards, update MPINs, and enable stronger authentication.
5. Report to the appropriate authority
The proper office depends on the type of scam. Some cases should be reported to police cybercrime units, some to regulators, some to banks or financial authorities, and some to prosecutors.
V. Where to Report a Scam in the Philippines
There is no single office for all scams. The best reporting route depends on the facts.
A. Philippine National Police Anti-Cybercrime Group
For online scams, phishing, hacking, identity theft, cyber libel connected to extortion, online investment fraud, fake accounts, unauthorized access, and computer-related fraud, victims may report to the PNP Anti-Cybercrime Group or the cybercrime desk of the local police.
This is appropriate where the scam occurred through:
- Messenger
- TikTok
- Viber
- Telegram
- SMS
- Websites
- Online marketplaces
- E-wallets
- Online banking
- Cryptocurrency platforms
- Fake apps
- Remote access tools
The victim should bring printed and digital evidence, valid ID, and a written narrative if possible.
B. National Bureau of Investigation Cybercrime Division
The NBI Cybercrime Division also handles cybercrime complaints, including online fraud, hacking, phishing, identity theft, online extortion, and other internet-based offenses.
A victim may choose to report to the NBI where the case involves complex online evidence, multiple victims, organized groups, foreign elements, or identity misuse.
C. Local Police Station
A local police station can record the incident through a blotter and may assist in preparing or referring the complaint. A police blotter is not the same as a criminal case, but it creates an official record.
A blotter may be useful for:
- Bank or e-wallet investigations
- Insurance claims
- Internal company reports
- Later complaint filing
- Establishing a timeline
For serious or cyber-related cases, victims may still need to proceed to a specialized cybercrime unit, prosecutor, or NBI.
D. Office of the City or Provincial Prosecutor
Criminal complaints such as estafa, theft, falsification, cybercrime offenses, and related crimes may be filed for preliminary investigation before the prosecutor’s office, depending on the offense and procedure.
The complaint generally requires:
- Complaint-affidavit
- Supporting affidavits
- Evidence
- Identification documents
- Proof of transactions
- Screenshots and digital evidence
- Certification or authentication where necessary
The prosecutor determines whether probable cause exists to file the case in court.
E. Securities and Exchange Commission
Investment scams, unauthorized solicitation of investments, Ponzi schemes, pyramid-like arrangements, fake corporations, fake cooperatives, and unregistered securities offerings may be reported to the SEC.
This is especially relevant when the scam involves:
- Solicitation of money from the public
- Promise of passive income
- Investment contracts
- Crypto or forex trading pools
- Guaranteed returns
- Referral bonuses
- Shares, units, slots, memberships, or packages
- Company registration used to imply authority to solicit investments
A business may be registered with the SEC as a corporation but still lack authority to solicit investments from the public. Registration as a corporation is not the same as a license to sell securities or investment contracts.
F. Bangko Sentral ng Pilipinas and Financial Institutions
Where the scam involves banks, e-wallets, remittance companies, payment systems, unauthorized transactions, account freezing, failed fraud handling, or financial consumer complaints, the victim should report directly to the institution first and may escalate to the appropriate financial regulator.
Complaints may involve:
- Unauthorized transfers
- Delayed fraud investigation
- Account takeover
- Failure to assist
- Unexplained account freezing
- Fraudulent e-wallet activity
- Mishandling of disputed transactions
The bank or e-wallet provider’s records are often crucial because they can identify account holders, transaction paths, device data, and internal fraud flags, subject to legal process and privacy rules.
G. National Privacy Commission
If the scam involves misuse of personal data, identity theft, unauthorized disclosure, unlawful processing, doxxing, harassment through contact lists, or data breach, a complaint may be made to the National Privacy Commission.
Examples include:
- Lending app accessing contacts without proper consent
- Public shaming of borrowers
- Misuse of ID documents
- Creation of accounts using stolen personal data
- Unauthorized disclosure of private information
- Data breach by a company leading to fraud
- Refusal to correct or remove unlawfully processed personal data
H. Department of Trade and Industry
Consumer complaints involving sellers, defective products, deceptive sales practices, online merchants, misleading advertisements, or unfair trade practices may be raised with DTI, especially where the issue is consumer protection rather than a purely criminal fraud scheme.
DTI may be relevant for:
- Online sellers with identifiable business operations
- Misleading advertisements
- Non-delivery of paid goods
- Refusal to honor warranties
- Deceptive trade practices
- Consumer transactions involving registered businesses
However, where the seller is a fake identity or organized fraud group, law enforcement may be more appropriate.
I. Department of Migrant Workers, POEA-Related Channels, and Law Enforcement
For scams involving overseas jobs, placement fees, fake job orders, fake visas, fake agencies, or recruitment for work abroad, report to the appropriate migrant worker or recruitment authorities and law enforcement.
Illegal recruitment may be serious, especially where multiple victims are involved or money is collected without proper authority.
J. DOLE or NLRC-Related Reporting
If the scam is connected to employment, wages, illegal deductions, fake local jobs, labor contracting, unpaid work, or fraudulent hiring, labor agencies may become relevant.
But if the core conduct is deception to obtain money, the matter may also involve criminal fraud.
K. Platform Reporting
Victims should also report the scammer’s account to the platform used:
- Messenger
- TikTok
- YouTube
- Telegram
- Viber
- Shopee
- Lazada
- Carousell
- Marketplace platforms
- Job platforms
- Crypto exchanges
- Domain registrars or website hosts
Platform reports do not replace legal complaints, but they may preserve or remove harmful accounts and prevent further victims.
VI. Choosing the Right Complaint Route
The following practical guide may help:
Online selling scam
Report to the marketplace platform, bank or e-wallet, police cybercrime unit, and possibly DTI if there is a real seller or business.
Phishing or account takeover
Report immediately to the bank or e-wallet, then to PNP ACG or NBI Cybercrime. Consider NPC if personal data was misused.
Investment scheme
Report to SEC, police or NBI, bank or e-wallet, and prosecutor if filing a criminal complaint.
Fake lending app
Report to the lending platform if legitimate, NPC for data misuse, SEC or financial regulators for lending violations, and law enforcement for threats or fraud.
Fake job abroad
Report to migrant worker or recruitment authorities, police or NBI, and prosecutor.
Romance scam
Report to cybercrime authorities, bank or e-wallet, and prosecutor if enough evidence exists. If blackmail is involved, report urgently.
Unauthorized bank transfer
Report immediately to the bank, receiving bank or e-wallet if known, police or NBI, and financial regulator if dispute handling is unsatisfactory.
SIM-related fraud
Report to the telco, bank or e-wallet, cybercrime authorities, and relevant regulators where identity misuse occurred.
VII. Evidence Needed to Report a Scam
The strength of a scam complaint depends heavily on evidence. A victim should prepare a clear, organized file.
A. Identity of the Victim
Prepare:
- Valid government ID
- Contact details
- Address
- Proof of ownership of account used for payment
- Authorization if filing for another person
B. Narrative of Events
Prepare a written timeline:
- When and how the scammer contacted you
- What representations were made
- What made you rely on them
- Amounts paid
- Dates and times of payment
- What happened after payment
- When you realized it was a scam
- What steps you took afterward
C. Proof of Deception
This is important for fraud or estafa. Evidence may include:
- False promises
- Fake identity
- Fake documents
- Fake licenses
- Fake tracking numbers
- Fake receipts
- Guaranteed returns
- Misrepresentations about authority or business
- Edited screenshots
- Fake government or bank pages
- Fake customer service accounts
D. Proof of Payment or Loss
Prepare:
- Bank transfer receipts
- E-wallet transaction records
- Deposit slips
- QR payment screenshots
- Cryptocurrency transfer hashes
- Remittance receipts
- Card transaction records
- Loan disbursement records
- Reference numbers
E. Digital Evidence
Preserve:
- Screenshots
- Screen recordings
- URLs
- Email headers, where available
- Usernames and profile links
- Phone numbers
- Chat exports
- Call logs
- Audio recordings, where lawfully obtained
- Device notifications
- IP or login notices from platforms
- App names and APK files, if relevant
Do not alter screenshots. Keep originals. If possible, save files with dates and source descriptions.
F. Witnesses
If others were also scammed or saw the representations, obtain their names and statements. Multiple victims strengthen investment fraud, recruitment scams, and organized scheme complaints.
VIII. How to Draft a Complaint-Affidavit
A criminal complaint often requires a complaint-affidavit. It should be clear, factual, and chronological.
A basic structure includes:
- Personal information of the complainant
- Identity of the respondent, if known
- How contact began
- Representations made by the respondent
- Why the complainant believed the respondent
- Payments made
- Failure of respondent to deliver, pay, or perform
- Attempts to demand return or explanation
- Evidence attached
- Statement that the affidavit is executed to charge the respondent for appropriate offenses
Avoid exaggeration. Do not include facts that cannot be supported. Label attachments clearly, such as:
- Annex A: Screenshot of Facebook profile
- Annex B: Messenger conversation
- Annex C: GCash receipt
- Annex D: Bank transfer confirmation
- Annex E: Demand message
- Annex F: Seller’s advertisement
IX. Estafa in Scam Cases
Many scams are reported as estafa or swindling. In general terms, estafa involves deceit or abuse of confidence that causes damage to another.
A scam may constitute estafa where:
- The scammer made false representations.
- The victim relied on those representations.
- The victim parted with money, property, or rights.
- The scammer failed to deliver or return what was due.
- The victim suffered damage.
Examples:
- Seller takes payment with no intent to deliver.
- Fake investor collects money using false promises.
- Borrower obtains money through false identity or false purpose.
- Agent receives funds for a transaction but misappropriates them.
- Recruiter collects placement fees for a fake job.
Not every unpaid debt is estafa. The key issue is often whether there was fraud at the beginning or misappropriation after receipt of money under an obligation to deliver or return it.
X. Cybercrime Aspect
If the scam was committed using information and communications technology, cybercrime laws may apply. Online fraud can carry consequences distinct from ordinary offline fraud.
Cybercrime may be involved in:
- Phishing
- Hacking
- Unauthorized access
- Identity theft
- Computer-related fraud
- Use of fake websites
- Fake online accounts
- Online payment fraud
- Malware
- SIM or OTP scams
- Remote access scams
- Unauthorized use of credentials
Digital evidence becomes especially important. Victims should preserve URLs, accounts, timestamps, email headers, transaction logs, and device notifications.
XI. Identity Theft and Use of Personal Information
Scams often involve stolen identity documents, selfies, signatures, mobile numbers, or account credentials. Identity theft can lead to:
- Fraudulent loans
- Fake accounts
- SIM misuse
- Bank account opening
- E-wallet registration
- Marketplace seller accounts
- Fake employment or recruitment accounts
- Use of victim’s name to scam others
A victim should immediately:
- Notify banks, e-wallets, and telcos
- Change passwords and MPINs
- Report lost or compromised IDs
- File a police blotter
- Monitor credit, loan, and account activity
- Notify agencies or companies where the ID may be misused
- Consider reporting to the National Privacy Commission
XII. Bank and E-Wallet Reporting
Where money was sent through a bank or e-wallet, report immediately. Time is critical because funds may be transferred out quickly.
A victim should ask the provider to:
- Tag the transaction as fraudulent
- Investigate the recipient account
- Coordinate with the receiving institution
- Freeze funds if still available
- Preserve records
- Provide a case number
- Explain the dispute process
- Escalate the complaint if necessary
Keep records of all calls, emails, chat support sessions, and reference numbers.
Important point: reporting does not guarantee reversal. Providers usually investigate based on rules, timing, account status, and available funds. But early reporting improves the chance of freezing remaining funds and creating a trail.
XIII. Can the Money Be Recovered?
Recovery is possible but not guaranteed. It depends on:
- How quickly the victim reported
- Whether the funds remain in the recipient account
- Whether the recipient account can be identified
- Whether the account holder cooperates
- Whether there are multiple transfers
- Whether the scammer used mule accounts
- Whether a criminal case is filed
- Whether restitution or settlement is made
- Whether the court orders return or damages
In many scams, money is quickly moved through several accounts. Still, reporting is important because account trails can help identify suspects and prevent further use of mule accounts.
XIV. Mule Accounts
Scammers often use bank or e-wallet accounts belonging to third persons. These are sometimes called mule accounts. The account holder may be:
- A willing participant
- Someone who rented or sold their account
- A person deceived into receiving and forwarding funds
- A victim of identity theft
- A fake or fraudulently opened account
Even if the account holder claims not to be the mastermind, receiving scam proceeds may create legal exposure depending on knowledge and participation.
Victims should include all known recipient account details in complaints.
XV. Demand Letters
A demand letter may be useful before or alongside a complaint, especially where the respondent is known.
A demand letter usually states:
- Facts of the transaction
- Amount paid
- Failure or fraudulent conduct
- Demand for refund or performance
- Deadline
- Warning that legal action may follow
However, a demand letter is not always advisable where the scammer may use the warning to hide, delete evidence, threaten the victim, or move funds. For organized online scams, immediate reporting may be better.
XVI. Reporting Investment Scams
Investment scams deserve special attention because they often involve many victims.
Victims should gather:
- Names of promoters
- Company name
- SEC registration number, if claimed
- Marketing materials
- Recorded presentations
- Group chat messages
- Promised returns
- Payment instructions
- Wallet addresses
- Contracts or certificates
- Referral structures
- Withdrawal records
- List of other victims
- Screenshots of leaders’ statements
- Notices telling members not to report
A common misconception is that a company’s SEC registration means it is authorized to solicit investments. Corporate registration alone does not automatically authorize the sale of securities or investment contracts to the public. Victims should report schemes that solicit investments without proper authority or that operate like Ponzi or pyramid schemes.
XVII. Reporting Online Lending Abuse
Online lending-related scams or abuses may involve both financial regulation and privacy law.
Report if the app or lender:
- Collects advance fees but does not release a loan
- Uses threats or public shaming
- Contacts people from the borrower’s phonebook
- Posts defamatory content
- Uses fake legal threats
- Misuses IDs or selfies
- Imposes hidden charges
- Operates without authority
- Continues harassment after payment
- Discloses personal data to third parties
Preserve screenshots of threats, call logs, messages to contacts, app permissions, loan terms, payment records, and public posts.
XVIII. Reporting Fake Online Sellers
For fake sellers, the victim should report to:
- Marketplace platform
- Payment provider
- Police cybercrime unit
- DTI, where consumer-business issues are present
- Prosecutor, where criminal complaint is pursued
Evidence should show:
- The listing
- Seller identity and account link
- Price and item description
- Agreement to sell
- Payment
- Non-delivery or wrong delivery
- Seller’s refusal to refund
- Blocking or disappearance
Small-value scams may still be reported. Even if the individual amount is low, repeated acts may show a larger fraud pattern.
XIX. Reporting Cryptocurrency Scams
Crypto scams may involve fake exchanges, fake trading bots, fake mining, fake staking, recovery scams, investment pools, phishing wallets, or impersonation.
Preserve:
- Wallet addresses
- Transaction hashes
- Exchange records
- Chat messages
- Website URLs
- Whitepapers or promotional material
- Screenshots of dashboards
- Promised returns
- Withdrawal refusal messages
- Names of promoters
- Group chats
Crypto transactions may be difficult to reverse, but wallet trails can still support investigation, especially if funds pass through identifiable exchanges.
Beware of “recovery agents” who promise to recover crypto for a fee. Many are secondary scammers.
XX. Reporting Romance, Sextortion, and Blackmail Scams
Where the scam involves threats to release intimate images, private conversations, or false accusations, the victim should report urgently. Do not pay if payment will simply encourage further demands.
Preserve:
- Threat messages
- Account links
- Payment demands
- Images or files sent by the blackmailer
- Screenshots of posts or threats
- Phone numbers and email addresses
Victims should also use platform tools to report and block accounts, adjust privacy settings, and warn close contacts if necessary. If the victim is a minor or if minors are involved, the matter becomes especially serious and should be reported immediately.
XXI. The Role of a Police Blotter
A police blotter is an official police record of a reported incident. It is useful but limited.
It may help:
- Document the date and time of reporting
- Support bank or e-wallet fraud claims
- Show that the victim acted promptly
- Serve as an initial record before filing a complaint
However, a blotter alone does not mean a criminal case has been filed in court. For prosecution, a complaint must usually proceed through proper investigative or prosecutorial channels.
XXII. The Role of the Prosecutor
The prosecutor evaluates whether there is probable cause to charge a person in court. The victim must provide evidence connecting the respondent to the offense.
If the scammer’s identity is unknown, law enforcement investigation may be needed before a prosecutor can proceed against a named respondent. However, complaints may still be filed or referred for investigation where digital identifiers, accounts, or financial trails exist.
XXIII. Civil Remedies
Aside from criminal prosecution, a victim may pursue civil remedies for recovery of money or damages.
Possible civil claims may include:
- Return of money
- Damages
- Interest
- Attorney’s fees, where proper
- Breach of contract, if there was a contract
- Fraud-based civil liability
For smaller claims, simplified procedures may be available depending on the amount and nature of the claim. However, if the case involves criminal fraud, cybercrime, or unknown offenders, administrative and criminal reporting may be more practical first.
XXIV. Criminal Case vs. Civil Case vs. Administrative Complaint
A scam may lead to several types of action:
Criminal complaint
Aims to punish the offender and may include restitution or civil liability. Examples: estafa, cybercrime, theft, falsification.
Civil case
Aims to recover money or damages. It does not necessarily punish the offender criminally.
Administrative complaint
Filed with regulators such as SEC, DTI, NPC, financial regulators, or labor/recruitment authorities. It may result in penalties, suspension, revocation, orders, or regulatory action.
These remedies can sometimes proceed separately or in coordination, depending on the facts.
XXV. Time Limits and Urgency
Victims should report as soon as possible. Delay can cause problems:
- Funds may be withdrawn.
- Accounts may be deleted.
- Evidence may disappear.
- Witnesses may become unavailable.
- Platforms may lose logs.
- Legal limitation periods may become an issue.
- Scammers may victimize more people.
Even if a victim feels embarrassed, reporting promptly is better than waiting.
XXVI. How to Preserve Digital Evidence Properly
Digital evidence should be preserved in a way that maintains credibility.
Best practices:
- Take full-screen screenshots showing date, time, URL, and account name.
- Do not crop excessively.
- Save original files.
- Export chat history where possible.
- Record the profile URL, not just the display name.
- Save transaction receipts as PDFs or images.
- Keep email headers if available.
- Back up evidence in cloud and offline storage.
- Do not edit images except to make separate redacted copies.
- Keep a chronological evidence folder.
- Write a timeline while memory is fresh.
For formal proceedings, printed screenshots may be accepted for filing, but originals and device access may still be needed for verification.
XXVII. If the Scammer Is Anonymous
Many victims think they cannot report because they do not know the scammer’s real name. This is not necessarily true.
You may still report using:
- Phone number
- Email address
- Social media account
- Username
- Profile URL
- Bank account number
- E-wallet number
- QR code
- Crypto wallet address
- Website
- IP-related notices
- Delivery address
- Marketplace account
- Device or login records
- Names used in chat
Law enforcement, banks, platforms, and regulators may be able to request or preserve identifying information through proper legal channels.
XXVIII. If the Scammer Is Abroad
Scams may involve foreign accounts, overseas phone numbers, foreign websites, or international syndicates. Reporting is still useful because:
- Philippine victims and local mule accounts may be involved.
- Local bank or e-wallet accounts may be used.
- Platforms may preserve records.
- Law enforcement may coordinate through proper channels.
- Complaints may help identify patterns.
Recovery may be harder, but reporting helps establish official records and may assist broader investigations.
XXIX. If the Victim Accidentally Helped the Scam
Some victims are tricked into receiving money, forwarding funds, opening accounts, verifying SIMs, or lending IDs. They may later realize they were used as part of a scam.
In this situation, the person should stop immediately, preserve evidence, report the incident, and seek legal advice. Continuing to receive or transfer suspicious funds after discovering the scheme may create serious legal exposure.
XXX. What Not to Do After Being Scammed
Victims should avoid:
- Sending more money to “unlock” funds
- Paying “recovery agents”
- Threatening violence
- Posting unverified accusations against innocent namesakes
- Deleting conversations out of embarrassment
- Editing evidence
- Sharing OTPs or passwords
- Allowing remote access to devices
- Negotiating without preserving proof
- Relying only on social media posts instead of official reports
- Publicly posting sensitive personal information
- Harassing suspected account holders without evidence
Public warnings may help others, but they should be factual and avoid unnecessary exposure to defamation, privacy, or harassment issues.
XXXI. Sample Evidence Folder Structure
A victim may organize evidence like this:
Timeline
- Written summary of events
Identity of Scammer
- Profiles, usernames, phone numbers, emails
Representations
- Advertisements, promises, proposals, contracts
Conversations
- Chat screenshots, exported messages, call logs
Payments
- Receipts, bank records, e-wallet confirmations
Non-Performance or Fraud
- Failed delivery, refusal to refund, blocked account
Reports Made
- Bank case numbers, platform reports, police blotter
Other Victims
- Statements or screenshots from group chats
Personal Impact
- Financial loss, account compromise, identity misuse
XXXII. Sample Incident Timeline
A simple timeline may look like this:
- January 5: Saw Facebook advertisement for discounted phone.
- January 6: Seller confirmed item was available and promised delivery within three days.
- January 6: Paid ₱15,000 to GCash number ending in 1234.
- January 7: Seller sent alleged tracking number.
- January 9: Courier confirmed tracking number was invalid.
- January 10: Asked seller for refund.
- January 11: Seller blocked complainant.
- January 12: Reported transaction to GCash and filed police blotter.
- January 13: Prepared complaint-affidavit with screenshots and payment receipt.
A clear timeline helps police, banks, lawyers, and prosecutors understand the case quickly.
XXXIII. Sample Report Narrative
A victim’s written report may state:
I am reporting an online scam involving a person using the name ______ and the account/profile ______. On , I saw a post offering ______ for ₱. The seller represented that . Relying on these representations, I sent payment of ₱ through ______ to account/number ______ on ______. After receiving payment, the seller failed to deliver the item/refund the money and eventually blocked me. Attached are screenshots of the conversation, the seller’s profile, the advertisement, and the payment receipt. I respectfully request investigation and appropriate action.
This should be adapted to the actual facts.
XXXIV. Scam Reporting for Businesses
Businesses can also be victims of scams, such as invoice fraud, business email compromise, fake suppliers, employee-assisted fraud, fake purchase orders, or unauthorized transfers.
Business victims should:
- Preserve email headers and logs
- Secure corporate accounts
- Notify banks immediately
- Conduct internal incident review
- Revoke compromised access
- Report to cybercrime authorities
- Notify affected customers if personal data was involved
- Consider NPC obligations if a data breach occurred
- Review internal controls
Business email compromise cases often require urgent action because funds may move quickly.
XXXV. Scams Involving Minors or Vulnerable Persons
If the victim is a minor, elderly person, person with disability, or otherwise vulnerable, reporting should be handled carefully. Guardians, parents, or authorized representatives may need to assist.
For minors, scams involving sexual exploitation, sextortion, grooming, or trafficking should be treated as urgent and serious. Evidence should be preserved, but it should not be unnecessarily shared.
XXXVI. Settlement and Withdrawal
Some scammers offer a refund after a complaint is filed. Settlement may be possible, but victims should be cautious.
Consider:
- Get settlement terms in writing.
- Do not surrender original evidence.
- Confirm funds are cleared before signing anything.
- Understand whether the offense is one that the State may still prosecute.
- Do not sign false statements.
- Do not agree to confidentiality that prevents lawful reporting, especially where there are multiple victims.
- Seek legal advice for significant amounts.
A refund does not always erase criminal liability, particularly where public interest or multiple victims are involved.
XXXVII. Preventive Measures
To avoid scams:
- Verify businesses independently.
- Check whether investment offers are properly licensed.
- Be suspicious of guaranteed returns.
- Do not share OTPs, passwords, MPINs, or recovery codes.
- Use official app stores and official websites.
- Avoid clicking links from unsolicited messages.
- Confirm bank or government notices through official channels.
- Use strong passwords and two-factor authentication.
- Do not send money to personal accounts for supposed corporate transactions without verification.
- Beware of urgency, secrecy, and pressure.
- Check seller history, reviews, and account age.
- Avoid deals that are far below market price.
- Do not let others use your bank or e-wallet account.
- Do not send IDs or selfies unless necessary and verified.
- Use escrow or platform-protected payment when available.
XXXVIII. Frequently Asked Questions
Can I report a scam even if the amount is small?
Yes. Small scams may be part of a larger pattern. Reporting also helps create records against repeat offenders.
Should I report to the police or NBI?
For online scams, either police cybercrime units or NBI cybercrime channels may be appropriate. Local police may also create an initial blotter. Serious, complex, or multi-victim cases may benefit from specialized cybercrime handling.
Can I get my money back from GCash, Maya, or my bank?
Possibly, but it is not guaranteed. Report immediately. Recovery depends on timing, account status, available funds, and investigation results.
Is a police blotter enough?
No, not always. A blotter is an official record, but a formal complaint or investigation may still be needed.
What if I only know the scammer’s phone number?
You can still report. Phone numbers, e-wallet numbers, bank accounts, usernames, and profile links can help investigators.
What if I sent the money voluntarily?
You may still have a case if you sent money because of fraud, false pretenses, or deception.
What if the scammer refunded part of the money?
Preserve evidence and document the partial refund. The remaining loss and fraudulent conduct may still be relevant.
What if the scammer threatens to sue me for posting online?
Be factual. Avoid insults, exaggerations, or accusations against unverified persons. Official reports are safer and more effective than purely public accusations.
What if the scammer used someone else’s bank account?
Report the recipient account anyway. It may be a mule account, compromised account, or part of the money trail.
XXXIX. Conclusion
Reporting a scam in the Philippines requires both speed and organization. The victim should preserve evidence, secure accounts, notify banks or e-wallet providers, and report to the proper authority depending on the nature of the scam.
Online scams may be reported to cybercrime authorities. Investment scams may be reported to the SEC and law enforcement. Banking and e-wallet fraud should be reported immediately to the financial institution. Data misuse may be reported to the National Privacy Commission. Consumer-related transactions may involve DTI. Recruitment scams may involve labor or migrant worker authorities. Criminal complaints may proceed through police, NBI, or the prosecutor’s office.
The most important practical rule is this: act quickly, keep evidence, and report through official channels. Even when recovery is uncertain, reporting helps create an official record, supports investigation, protects others, and preserves the victim’s legal remedies.