Mobile phone scams and cyber libel are two different legal problems in the Philippines, but in real life they often overlap. A person may receive fraudulent calls, texts, chat messages, online selling offers, fake bank alerts, SIM-based impersonation attempts, or extortion threats through a mobile phone. In responding, the victim may post screenshots, name a suspect, warn the public, or accuse someone online. At that point, a second legal issue can arise: can reporting the scam itself expose the complainant to a cyber libel claim?
This is where Philippine law becomes especially important. A scam report may be lawful, necessary, and socially useful, but it still has to be handled carefully. The law generally protects legitimate complaints made in good faith through proper channels, yet it also penalizes defamatory online imputations when they falsely or maliciously attack another person’s reputation. The practical challenge is knowing how to report a mobile scam strongly enough to protect yourself and others, without crossing into actionable cyber libel.
This article explains the subject comprehensively in Philippine context.
I. Two separate legal issues that often get mixed together
A mobile phone scam is not one single offense. It may involve estafa, fraud, identity theft, phishing, unauthorized access, illegal use of bank or e-wallet credentials, SIM-related offenses, threats, coercion, or other crimes depending on the facts.
Cyber libel, by contrast, is a form of online defamation. It concerns damage to reputation caused by defamatory imputations published through a computer system or similar digital means. A person who publicly posts accusations on Facebook, X, TikTok, Instagram, messaging groups, community forums, or other online spaces may create cyber libel risk if the post goes beyond truthful, fair, good-faith reporting.
These two issues often collide in these situations:
- a victim posts the scammer’s name, photo, phone number, and accusation online;
- a netizen “exposes” someone as a scammer in a public group without final proof;
- a buyer-seller dispute is framed online as a scam;
- a person reposts a warning that later turns out to target the wrong individual;
- a complainant adds insults, ridicule, or unverified criminal accusations to an otherwise valid complaint.
So the legal question is not simply whether a scam happened. It is also whether the manner of reporting remains protected or becomes defamatory.
II. The main laws involved in the Philippines
Several areas of Philippine law are relevant.
1. Revised Penal Code on libel and defamation principles
Traditional libel rules still matter because cyber libel builds on the concept of libel. Philippine law treats libel as a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance tending to dishonor, discredit, or contempt a person.
The classic elements of libel strongly influence cyber libel analysis:
- there is an imputation;
- the imputation is defamatory;
- it is made publicly;
- the person defamed is identifiable;
- malice is present, either presumed or actual depending on the case.
2. Cybercrime law and cyber libel
When libel is committed through a computer system or similar digital platform, it becomes cyber libel. A phone itself may be the means of posting or transmitting the statement, but the core issue is digital publication.
A defamatory Facebook post written on a mobile phone can still be cyber libel. A group chat message, online review, public post, or digital expose may also raise cyber libel issues if the legal elements are present.
3. Fraud, estafa, and related scam offenses
The scam side may involve ordinary estafa, online fraud, identity fraud, phishing, social engineering, electronic payment deception, unauthorized account use, or other specific offenses depending on the facts. The exact criminal label depends on what the scammer actually did.
4. Data privacy implications
When a victim publicly posts another person’s number, photo, ID, address, or account details, privacy issues can arise, especially if the person identified turns out to be innocent, misidentified, or only loosely connected. Even where the complainant feels justified, unnecessary disclosure of personal data can create additional legal exposure.
5. Consumer and electronic transaction issues
In online selling and payment scams, documentary evidence from chats, transfers, invoices, screenshots, and platform records becomes important in both criminal complaints and defensive strategy against possible cyber libel claims.
III. What counts as a mobile phone scam
In Philippine usage, “mobile phone scam” can refer to many patterns, including:
- fraudulent text messages pretending to be banks, e-wallets, telecoms, couriers, or government agencies;
- voice calls claiming the victim has won a prize or must pay a fee;
- fake delivery, package, or customs payment alerts;
- OTP harvesting and account takeover schemes;
- online selling fraud coordinated through calls, SMS, or chat apps;
- fake job recruitment through mobile messaging;
- investment scams using messaging platforms;
- impersonation using mobile numbers or cloned accounts;
- romance, extortion, or emergency-money scams;
- SIM registration or mobile wallet verification scams;
- “send me the code” scams;
- fake debt collection or fake legal-threat calls;
- account recovery scams and phishing links;
- fake customer support calls.
Legally, not every suspicious message is already a completed criminal scam. Some are attempts, some are deceptive solicitations, some are threats, and some are identity-based fraud. That matters because a public accusation that someone is definitely a “criminal scammer” may be much riskier than saying there was a suspicious transaction or reported fraudulent conduct under investigation.
IV. Why scam victims worry about cyber libel
Victims often hesitate to report because the suspected scammer threatens them with libel. This is common. The suspect says:
- “I will sue you for posting my name.”
- “You cannot call me a scammer online.”
- “Delete your post or I will file cyber libel.”
- “You have no right to expose me publicly.”
- “That was just a failed transaction, not a scam.”
Sometimes this threat is baseless intimidation. Sometimes it reflects a real legal risk if the victim posted recklessly. Philippine law does not prohibit honest reporting of wrongdoing, but it does punish defamatory publication when the legal requirements are present.
The safest principle is this: report the conduct through proper authorities and describe facts carefully; do not turn a factual complaint into a public online conviction by accusation, insult, or exaggeration.
V. The legal right to complain is real
A person has the legal right to file a complaint, report suspicious conduct, preserve evidence, and seek police or prosecutorial action. Good-faith complaints to proper authorities are very different from defamatory public attacks.
A legitimate complainant usually has stronger protection when the report is made through:
- law enforcement;
- prosecutorial complaint process;
- official scam-reporting channels;
- telecom or bank fraud departments;
- platform complaint systems;
- barangay or mediation channels where appropriate;
- direct written demand letters based on facts.
The legal system generally recognizes a difference between good-faith complaint and malicious public defamation.
VI. The most important distinction: official report vs. public online accusation
This is the central distinction in the topic.
1. Official report
A report to the police, prosecutors, cybercrime units, telecom providers, banks, e-wallets, or legitimate platform administrators is generally on much safer legal ground, especially when done in good faith and supported by evidence.
Even if the complaint is later not proven, a good-faith report based on genuine suspicion and real facts is very different from a defamatory smear.
2. Public online accusation
A public post saying “This person is a scammer,” “He stole my money,” or “She is a criminal fraudster,” especially with names, faces, and contact details, carries greater cyber libel risk if:
- the accusation is false or cannot be substantiated;
- the wrong person is identified;
- the post uses insulting or humiliating language;
- the post implies guilt as an established fact rather than a complaint;
- the post adds unnecessary personal attacks unrelated to the incident.
The law is much less forgiving when a person bypasses formal reporting and instead seeks public shaming.
VII. The elements of cyber libel in practical terms
To understand the risk, it helps to reduce the legal elements into practical questions.
1. Was there a defamatory imputation?
A statement is defamatory when it tends to dishonor, discredit, or expose a person to contempt. Calling someone a scammer, thief, fraudster, swindler, liar, or criminal is usually defamatory in nature unless protected by truth, fair comment, privilege, or other defenses.
2. Was the person identifiable?
The person need not be named fully if readers can still identify them from context, photos, number, profile, or business name.
3. Was there publication?
A private note is different from a public Facebook post. Publication exists when the statement is communicated to someone other than the person attacked. Posting in a group chat, comment thread, community page, or public story may qualify.
4. Was malice present?
In defamation law, malice is critical. Some statements may carry presumed malice unless privilege or another defense applies. In practical terms, a reckless, vindictive, humiliating, or unverified public accusation is much more dangerous than a measured factual report made in good faith.
VIII. Truth is important, but truth alone is not a magic shield in careless online posting
Many people assume that as long as what they posted is “true,” cyber libel is impossible. That is too simplistic.
Truth is powerful, but in practice the poster should still consider:
- whether the statement can actually be proven;
- whether the wording goes beyond provable fact;
- whether the post includes opinion mixed with accusation;
- whether publication was made in good faith and for a legitimate purpose;
- whether the suspect was correctly identified;
- whether the post was unnecessarily insulting or excessive.
A person may have a legitimate grievance yet still create legal trouble by overstating the case online.
IX. Fair comment, opinion, and factual reporting
Some speech is opinion, and not every negative statement is defamatory. But saying “In my opinion he is a scammer” does not automatically remove liability. Courts look at substance, not merely labels. If the statement implies undisclosed defamatory facts or asserts criminal conduct as real, saying “opinion” may not help much.
Safer factual reporting looks like this:
- “I sent payment on this date and did not receive the item.”
- “This account stopped responding after payment.”
- “I have filed a complaint regarding this transaction.”
- “Please be cautious while this matter is unresolved.”
Riskier language looks like this:
- “This man is a criminal syndicate member.”
- “She steals from everyone.”
- “He is definitely a scammer so destroy his business.”
- “This person should be jailed; spread this everywhere.”
The more factual, measured, and documented the post, the safer it tends to be. The more sweeping, humiliating, and conclusive the accusation, the riskier it becomes.
X. Scam reporting on social media: what creates the biggest cyber libel risk
The riskiest conduct usually includes:
- posting a person’s full name with an accusation of crime without adequate proof;
- posting screenshots that expose private details irrelevant to the complaint;
- tagging employers, family members, or unrelated contacts to shame the person;
- reposting rumors from others without verification;
- using memes, ridicule, profanity, or degrading language;
- accusing a person of being part of a criminal network without basis;
- posting old or incomplete chats that distort the incident;
- refusing to correct the post after discovering error or mistaken identity.
Cyber libel risk increases sharply when the reporting becomes public punishment rather than factual complaint.
XI. Group chats, text blasts, and “private” digital sharing
People often think cyber libel exists only in fully public posts. That is unsafe thinking.
A message in:
- a group chat,
- a Viber or Messenger group,
- a homeowners’ page,
- a buy-and-sell group,
- a community bulletin channel,
- a work chat,
- a school thread,
may still constitute publication depending on the context. A defamatory accusation sent to multiple people is not made harmless simply because it is not on a public timeline.
Likewise, forwarding a post or screenshot can create exposure. Repetition of a defamatory statement can itself be actionable.
XII. Anonymous posts and fake accounts
Using an anonymous or dummy account does not automatically avoid legal consequences. People often believe they can safely post “scammer alerts” anonymously. That is legally risky. The real problem is not the account name but the act of digital publication and whether the poster can later be identified through evidence, devices, accounts, IP-related investigation, or surrounding circumstances.
An anonymous accusation can still support a cyber libel complaint if investigators can connect it to a person.
XIII. Reporting a scam properly: evidence first
The most legally sound approach is to build the report around evidence, not outrage.
Important evidence includes:
- screenshots of the text messages or chats;
- phone numbers used;
- dates and times of calls or messages;
- payment receipts, transfers, and reference numbers;
- names and account identifiers used by the suspect;
- delivery receipts or lack thereof;
- voice recordings if lawfully obtained and usable;
- platform usernames and profile links;
- bank or e-wallet transaction history;
- the ad, listing, or representation that induced payment;
- proof of demand and nonresponse;
- any threats, extortion messages, or admissions.
The report becomes stronger, and the risk of reckless accusation becomes lower, when it is anchored in specific facts.
XIV. How to describe the incident without creating unnecessary cyber libel risk
The safest legal style is factual, chronological, and non-inflammatory.
Safer wording includes:
- “I am reporting a suspected scam.”
- “These are the messages I received.”
- “Payment was sent, but the promised item or service was not delivered.”
- “The number/account used in the transaction is listed below for investigative purposes.”
- “A complaint has been filed.”
- “This matter is under complaint and verification.”
Riskier wording includes:
- “This person is a criminal.”
- “He steals from everyone.”
- “She runs a syndicate.”
- “This scammer should be ruined.”
- “Spread this so no one will ever trust him again.”
The law pays attention not just to the event, but to how the accusation is framed.
XV. Naming the suspect: legally delicate
Naming a suspect online is where many complainants get into trouble. Even if a scam occurred, problems arise when:
- the account name is fake and the wrong real person is named;
- the mobile number belonged to someone else or was recycled;
- the bank account owner was only a mule or an unrelated person;
- the complainant inferred identity from limited online clues;
- two people share the same name;
- the named person was only an intermediary or courier.
In legal terms, mistaken identity can destroy a defense. Publicly warning about a number or account linked to a disputed transaction is very different from definitively accusing a specific individual of criminal conduct.
XVI. Posting phone numbers and account details
Victims often post:
- mobile numbers,
- GCash or bank accounts,
- profile links,
- IDs,
- home addresses,
- photos.
This may help warn others, but it also creates risk. The more personal data published, the more careful the complainant must be. Public disclosure can be attacked as excessive, inaccurate, or abusive, especially if the data belongs to a misidentified person.
A safer approach is to preserve full data for official complaint channels and be restrained in public discussion.
XVII. What if the suspect threatens cyber libel to silence the victim?
This happens often. The mere threat does not mean the victim is legally wrong. A legitimate complainant can still:
- file a police or cybercrime complaint;
- report to the bank, e-wallet, or telecom;
- preserve all threatening messages;
- avoid retaliatory defamatory posting;
- keep communications factual and documented.
In fact, a scam suspect’s use of cyber libel threats can itself be part of the pattern of intimidation. But the victim should not answer with insults or unsupported public accusations. The stronger move is formal reporting and careful documentation.
XVIII. Official complaint channels and why they matter legally
From a legal-risk perspective, formal channels are safer because they show seriousness and good faith. A victim who simply posts online but does not report officially looks more vulnerable to the argument that the goal was shaming, not redress.
A victim who reports through proper channels can show:
- the complaint was genuine;
- the report was based on evidence;
- the purpose was investigation or remedy;
- the complainant did not merely seek to humiliate someone publicly.
That distinction may be very important in defending against cyber libel allegations.
XIX. Good faith as practical protection
Good faith does not excuse everything, but it matters greatly.
Good faith is strengthened when the complainant:
- accurately states what happened;
- avoids exaggeration;
- files through proper channels;
- keeps the report limited to relevant facts;
- corrects mistakes promptly;
- does not fabricate or edit screenshots deceptively;
- does not weaponize the complaint for revenge.
Bad faith becomes easier to infer when the complainant:
- spreads the accusation widely with inflammatory language;
- continues attacking after learning key facts are uncertain;
- uses the issue to shame, blackmail, or extort;
- posts obviously altered or incomplete evidence;
- includes unrelated insults about character, family, looks, or private life.
XX. Buyer-seller disputes are especially tricky
Many cyber libel threats arise from online selling disputes. Not every failed transaction is automatically a scam. Some are cases of delay, misunderstanding, defective goods, courier failure, or business conflict. Publicly calling the seller a scammer before sorting out the facts can be risky.
A complainant is on stronger ground when there is evidence of classic fraud indicators such as:
- false identity,
- no intention to deliver,
- repeated victim pattern,
- fake tracking,
- blocked communication after payment,
- deceptive representations from the start.
But where the issue is still ambiguous, public criminal labeling becomes more dangerous.
XXI. Extortion, threats, and blackmail through mobile phone
Some scams involve threats: “Send money or your private photos will be released,” “Pay this fee or your relative goes to jail,” or “Give me money or I will post lies about you.” These may involve crimes beyond mere fraud, including grave threats, unjust vexation, coercive acts, sextortion-type conduct, or related offenses depending on the facts.
Victims should preserve the entire message chain. Selective screenshots are less persuasive than full chronology. Again, official reporting is safer than retaliatory shaming.
XXII. Fake legal threats sent by phone or chat
Scammers often pretend to be:
- police officers,
- NBI agents,
- bank lawyers,
- court staff,
- telecom compliance officers,
- customs officers,
- tax agents.
The goal is usually to pressure payment or disclosure of personal information. A victim who receives such threats should preserve the messages and report them. But public accusations against a named person should still be careful. The phone number alone does not always prove the real identity of the person behind the scheme.
XXIII. Reposting someone else’s scam warning
Reposting is not automatically safe. When you share another person’s accusation, you may also participate in publication. The legal risk depends on what exactly you shared, how you framed it, and whether the content is defamatory or false.
Safer reposting language is cautious and non-conclusive:
- “Sharing this reported incident for awareness.”
- “Unverified report; please exercise caution.”
- “The complainant states the following facts.”
Riskier reposting is endorsing the accusation as proven fact without checking.
XXIV. Media-style exposure vs. ordinary personal posts
There is a practical difference between careful reportage and personal ranting. Even outside formal journalism, a post that behaves like responsible reporting is safer than one that behaves like digital mob justice.
Safer reporting characteristics include:
- chronology,
- documentary support,
- restrained language,
- acknowledgment that a complaint has been filed,
- limited disclosure,
- no unnecessary humiliation.
A rant full of insults, mockery, and conclusions is much harder to defend.
XXV. Can the victim directly accuse someone of estafa or scam?
Legally, that is dangerous unless the facts are very solid and the context is proper. The safer route is to say the conduct is suspected fraudulent, under complaint, or reported as a scam incident, instead of asserting guilt like a court judgment.
There is a large legal difference between:
- “I am filing a complaint for what I believe is a scam,” and
- “This person is a criminal scammer.”
The first is a complaint position. The second is a reputational verdict.
XXVI. Complaints to police, NBI, prosecutors, banks, and telecoms
Reports to appropriate institutions are usually the best legal route. The reason is not only practical investigation but also legal discipline. Institutional complaints force the complainant to focus on verifiable facts, attachments, and chronology.
This does not mean every complaint is automatically immune from challenge. A knowingly false complaint, malicious fabrication, or bad-faith misuse of process can still create liability. But legitimate good-faith reporting through official channels is far safer than public online accusation.
XXVII. Can a complaint letter itself be libelous?
In ordinary principle, a complaint made to the proper authority in good faith is treated differently from defamatory mass publication. Still, the complainant should stick to relevance and necessity. A complaint that includes wild, unrelated, degrading accusations may create problems. Precision protects both the case and the complainant.
XXVIII. What to do before posting anything publicly
Before posting publicly about a scam incident, a legally careful person should ask:
- Do I have documentary proof?
- Am I certain of the identity of the person I am naming?
- Am I reporting facts, or venting conclusions?
- Is public posting necessary, or should I report officially first?
- Am I including personal data that is not needed?
- Can I phrase this as a factual warning rather than a declaration of guilt?
- Would I be willing to defend every line of this post under oath?
If the answer to the last question is no, the post is likely too aggressive.
XXIX. What a legally careful public warning looks like
A careful warning usually has these features:
- it describes the transaction;
- it identifies the account, number, or profile used in the transaction only as necessary;
- it avoids declaring the person guilty as a matter of fact;
- it states that a report or complaint has been made;
- it avoids ridicule, name-calling, and inflammatory language;
- it invites caution, not harassment.
A good warning tries to prevent harm without turning into punishment.
XXX. What a risky public post looks like
A risky post usually has these features:
- absolute statements of criminal guilt;
- humiliating language;
- unsupported details about private life;
- calls for mass shaming;
- threats of retaliation;
- tagging employers or relatives to embarrass the person;
- edited screenshots that conceal context;
- refusal to delete or correct after discovering possible error.
That kind of post is far easier to frame as cyber libel.
XXXI. Deleted posts and screenshots
Deleting a post does not necessarily erase exposure. Others may have screenshots. Publication already occurred if third parties saw the post. At the same time, prompt deletion and correction may still matter practically in showing reduced bad faith or an attempt to mitigate harm.
A complainant who realizes a post was inaccurate should correct or remove it immediately.
XXXII. Can the alleged scammer sue even if the scam report was true?
A person can file a case even if the complainant believes the report is true. Filing is one thing; winning is another. This is why discipline in wording and evidence is so important. The goal is not to become “unsuable,” which is unrealistic, but to be in the strongest position if challenged.
XXXIII. Criminal and civil exposure can coexist
Cyber libel may be criminal, and defamation can also have civil consequences. At the same time, the underlying scam may separately expose the suspect to criminal and civil liability. So it is possible for both sides to threaten or file actions arising from the same digital conflict:
- the victim files fraud-related complaints;
- the accused files cyber libel claims;
- both invoke screenshots, messages, and posts;
- the same evidence is examined from two legal angles: fraud and defamation.
This is one reason why careful reporting strategy matters from the start.
XXXIV. The danger of editing screenshots, partial context, and “expose” pages
A scam complaint becomes much weaker and more dangerous if the complainant:
- crops out important context,
- alters message timestamps,
- omits settlement attempts,
- mixes true screenshots with false narrative,
- publishes “wanted” graphics without official basis.
These actions can suggest malice and seriously damage credibility.
XXXV. Mobile number ownership is not always identity
A core practical problem in scam reporting is that a mobile number does not always prove who actually committed the fraud. Phones can be lost, sold, borrowed, spoofed, or used by another person. SIM registration, account names, or e-wallet details may help, but mistaken attribution remains possible.
This is why official investigation matters. A victim can confidently report that a number was used in the incident; that is different from confidently asserting who the real offender is.
XXXVI. When public interest matters
Warnings about scams can serve public interest. That matters. Society benefits when fraud patterns are exposed. But public interest is not a free pass for carelessness. The more the complainant claims public-interest protection, the more important it becomes to act responsibly:
- verify facts,
- avoid exaggeration,
- limit disclosure,
- focus on conduct,
- avoid unnecessary reputational destruction.
Public interest strengthens responsible reporting, not reckless accusation.
XXXVII. How to structure a legally careful scam report
A strong and careful report often follows this order:
First, identify the transaction or incident. Second, state the dates, numbers, accounts, and messages used. Third, attach screenshots and payment proof. Fourth, explain what representation was made and why you believe it was fraudulent. Fifth, state any demand for refund, return, or explanation. Sixth, indicate that you are reporting the matter for investigation. Seventh, avoid insults and unsupported personal conclusions.
This structure works better in both official complaints and any cautious awareness posting.
XXXVIII. Defenses and arguments commonly raised in cyber libel disputes arising from scam reports
A person accused of cyber libel after reporting a scam typically relies on arguments such as:
- the report was made in good faith;
- the statements were substantially true or based on documented facts;
- the publication was a legitimate complaint or warning;
- the language was factual, not malicious;
- the post concerned a matter of public concern;
- the complainant had evidence of the transaction and nonperformance;
- the accused was identified only to the extent necessary.
The strength of these arguments depends heavily on wording, proof, and context.
XXXIX. Common mistakes complainants make
The biggest mistakes are usually these:
- posting before gathering evidence;
- naming the wrong person;
- using insults and ridicule;
- overstating uncertain facts;
- confusing breach or delay with outright scam too early;
- encouraging harassment by others;
- including irrelevant private information;
- relying only on social media instead of filing official reports;
- refusing to correct a mistaken post.
These mistakes create avoidable cyber libel risk.
XL. Common intimidation tactics used by scammers
Suspected scammers often try to reverse pressure by saying:
- the victim is the one committing cyber libel;
- the victim will be jailed for posting;
- the victim must delete all evidence;
- the transaction was confidential;
- the victim cannot report account details.
Such threats often aim to freeze the victim. A legally careful response is not panic and not public rage. It is evidence preservation, official complaint, and restrained factual communication.
XLI. Special caution for influencers, admins, and page owners
Admins of buy-and-sell groups, community pages, and public awareness pages should be extra careful. Amplifying accusations to large audiences increases publication and reputational harm. Page owners who post “scammer alerts” as settled fact without checking may face heightened exposure.
A careful admin should prefer neutral wording, documented basis, and willingness to revise or remove inaccurate content.
XLII. Settlement, retraction, and correction
Some disputes end in refund, retraction, or mutual settlement. If a complainant posted publicly and later receives clarification, refund, or proof of mistake, prompt correction matters. Continuing the accusation after the factual basis weakens can become much more dangerous legally.
Likewise, an accused person who resolves the issue may still care deeply about reputational harm. Once the commercial dispute is fixed, the lingering defamatory post often becomes the next conflict.
XLIII. The safest overall legal strategy
For a person facing a mobile phone scam in the Philippines, the safest legal strategy is:
Document everything. Report through proper authorities and official channels. Use factual language. Avoid declaring guilt as a final fact in public. Do not include unnecessary personal data. Do not post out of anger. Do not ignore threats, but do not let them force silence about a genuine complaint. Keep the focus on evidence, chronology, and formal remedies.
XLIV. The bottom line
In the Philippines, reporting a mobile phone scam is lawful and important, but the manner of reporting matters. A victim may and should preserve evidence, file complaints, and warn others carefully. But once the complaint becomes a public online accusation that identifies a person and attacks reputation with definitive criminal labels, humiliating language, or unverified claims, cyber libel risk enters the picture.
The safest legal distinction is this:
A good-faith, evidence-based report to proper authorities is on far safer ground. A public online declaration that someone is a scammer or criminal, especially with weak proof or excessive language, is much riskier.
So the real legal rule is not “never post” and not “post whatever is true.” It is more exact than that: report facts, preserve evidence, use proper channels, speak with restraint, and never confuse suspicion or complaint with final public judgment.