Reporting Identity Theft and Cyber Harassment to the NBI

In the Philippines, the rapid digitalization of daily life has been accompanied by a significant rise in cyber-enabled crimes. Victims of Identity Theft and Cyber Harassment often find themselves overwhelmed, yet the Philippine legal system provides specific mechanisms for redress, primarily through the National Bureau of Investigation (NBI).


I. The Legal Framework

The primary legislation governing these offenses is Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012. Other relevant laws include the Data Privacy Act of 2012 (RA 10173) and the Safe Spaces Act (RA 11313).

1. Computer-Related Identity Theft

Under Section 4(b)(3) of RA 10175, identity theft is defined as the intentional acquisition, use, misuse, transfer, possession, or alteration of identifying information belonging to another, whether natural or juridical, without right. This includes:

  • Creating fake social media accounts using another person's photos and name.
  • Using stolen credentials to access bank accounts or make unauthorized purchases.

2. Cyber Harassment and Cyber Libel

While "harassment" is a broad term, it is prosecuted under several provisions:

  • Cyber Libel: Defamation committed through a computer system (Section 4(c)(4), RA 10175).
  • Unjust Vexation: Often applied to persistent online pestering or irritation (Article 287, Revised Penal Code, in relation to Section 6 of RA 10175).
  • Gender-Based Online Sexual Harassment: Under the Safe Spaces Act, this includes uploading or sharing photos/videos without consent, stalking, or sending misogynistic/homophobic slurs online.

II. Pre-Reporting: Evidence Preservation

Before heading to the NBI, the victim must ensure that the evidence is "frozen" and admissible. Digital evidence is volatile and can be deleted instantly.

  • Screenshots: Capture the entire screen, including the URL bar, timestamps, and the profile of the perpetrator.
  • URLs: Do not just provide names; copy the direct links to the offending posts or profiles.
  • Email Headers: If the harassment or theft occurred via email, preserve the original digital copies to allow for metadata analysis.
  • Transaction Logs: For identity theft involving financial loss, secure bank statements and notification alerts.

III. The Reporting Process at the NBI

The NBI Cybercrime Division (CCD) is the specialized unit tasked with investigating these reports.

Step 1: Filing the Complaint

Victims may choose to report in two ways:

  1. In-Person (Walk-in): Visit the NBI Headquarters (V-Tech Tower, Quezon City, or the regional office nearest you). This is generally more effective for immediate action.
  2. Online: Complaints can be initiated through the NBI’s official website or email, though physical appearance is usually eventually required to swear into an affidavit.

Step 2: The Interview and Affidavit

A complainant will be interviewed by an agent or investigator. You will be required to execute an Affidavit of Complaint. This document must detail:

  • The identity of the perpetrator (if known).
  • The specific acts committed.
  • The platform used (e.g., Facebook, Viber, Email).
  • The damage caused (emotional, financial, or reputational).

Step 3: Technical Evaluation

The NBI-CCD will examine the provided digital evidence. They may issue subpoenas to Internet Service Providers (ISPs) or social media platforms to track IP addresses or account registration details.


IV. Required Documentation

To ensure a smooth process, bring the following:

  • Valid Government ID: To verify the identity of the complainant.
  • Printed Evidence: Hard copies of screenshots and messages.
  • Electronic Copies: A USB drive containing high-resolution copies of the digital evidence.
  • Special Power of Attorney (SPA): If you are representing another person or a corporation.

V. Challenges and Expectations

It is important to manage expectations regarding the speed of digital investigations:

  • Jurisdictional Hurdles: If the perpetrator is outside the Philippines or if the platform (like Meta or X) is slow to respond to data requests, the case may take months.
  • Anonymity: If the perpetrator used advanced masking tools (VPNs, Tor), identification becomes significantly more complex.
  • Prescription Period: For Cyber Libel, the prescriptive period is currently a matter of legal debate, but it is generally safer to file within one year of the discovery of the post.

VI. Penalties Under RA 10175

The law imposes heavier penalties for crimes committed via ICT:

  • Computer-related Identity Theft: Prision mayor (6 years and 1 day to 12 years) or a fine of at least ₱200,000.
  • Cyber Libel: One degree higher than that prescribed for ordinary libel in the Revised Penal Code.

Legal Note: Under Section 6 of RA 10175, if a crime punishable under the Revised Penal Code is committed through or with the use of information and communications technologies, the penalty shall be one degree higher than that provided for by the original code.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.