Reporting Overseas Scams to Philippine Authorities

A practical legal guide for victims, counsel, and compliance teams


1) What counts as an “overseas scam”?

Any fraudulent scheme where (a) the offender is abroad, (b) the platform, bank, or website used is hosted overseas, or (c) the funds or data are routed outside the Philippines. Common patterns:

  • Online marketplace fraud (non-delivery, counterfeit goods)
  • Investment/crypto offerings without registration or with guaranteed returns
  • Love/“pig-butchering” scams and advance-fee fraud
  • Business email compromise (BEC) and invoice redirection
  • Recruitment scams (fake overseas jobs, visa processing)
  • Tech support/account-recovery scams (remote access, OTP harvesting)
  • Identity theft/data breaches used to open e-wallets or bank accounts

Even if the scammer is abroad, several Philippine statutes allow domestic investigation, prosecution, asset restraint, and victim compensation when there is a Philippine nexus (victim, device, bank, or effects in the Philippines).


2) Core legal bases and when to use them

The right law depends on the scheme’s mechanics (what was misrepresented), means (computer/telecom use), money flow, and victim status (consumer, investor, bank customer).

2.1 Criminal statutes

  • Revised Penal Code (RPC) – Estafa (Art. 315) Fits classic swindling (false pretenses; fraudulent acts causing damage). Often paired with cybercrime if online means were used.
  • Cybercrime Prevention Act (RA 10175) Creates/qualifies offenses when committed through a computer system and generally increases the penalty by one degree, enabling stronger warrants and longer prescription. Jurisdiction attaches if any element, computer system, or harmful effect is in the Philippines (including substantial effect or harm to a Filipino).
  • Access Devices Regulation Act (RA 8484) For unauthorized use/possession of credit/debit cards and account numbers.
  • E-Commerce Act (RA 8792) & Rules on Electronic Evidence Governs admissibility of electronic data (emails, logs, screenshots, hash values).
  • Securities Regulation Code (RA 8799) Unregistered sale of securities, investment solicitation by unlicensed persons, market solicitation via social media/messaging apps.
  • Financial Products and Services Consumer Protection Act (RA 11765) Administrative and criminal levers against abusive financial service providers; empowers the BSP/SEC/IC to compel redress.
  • Anti-Money Laundering Act (RA 9160, as amended) For tracing, freezing, and forfeiture of proceeds when they touch covered institutions (banks/e-money/wallets/remittance).
  • SIM Registration Act (RA 11934) Facilitates attribution and takedown in telecom-enabled fraud (subpoenas/warrants to obtain SIM/account data).
  • Special statutes for particular harms (e.g., Anti-Trafficking, Anti-Child Pornography, Voyeurism) where scams overlap with exploitation.

2.2 Civil and administrative avenues

  • Civil actions for damages (contractual fraud, quasi-delict) and unjust enrichment.
  • Consumer Act remedies for deceptive sales practices.
  • Small Claims for straightforward money claims (currently up to ₱1,000,000)—fast, no lawyers required.
  • Regulatory complaints (BSP for banks/e-wallets; SEC for investments; Insurance Commission for insurance-linked pitches; National Privacy Commission for data misuse; DICT-CERT for incident reporting).

3) Who to report to (and why)

You can (and often should) report to multiple agencies in parallel: criminal, regulatory, and financial-sector channels each unlock different remedies.

  • NBI – Cybercrime Division Centralized complaints for online fraud; coordinates digital forensics, subpoenas, MLAT requests, and takedowns.
  • PNP – Anti-Cybercrime Group (ACG) Field investigations, preservation orders, device seizures, and offender identification.
  • DOJ – Office of Cybercrime (OOC) National central authority for cybercrime cooperation; processes MLAT and Budapest Convention requests for cross-border data/evidence.
  • BSP Consumer Assistance (banks/e-money/remittance) Triggers chargeback/recall attempts, fraud blocking, and compliance investigations.
  • SEC – Enforcement and Investor Protection Department Stops illegal investment solicitations, issues advisories, preserves assets.
  • National Privacy Commission (NPC) For identity theft, doxxing, SIM swap, unauthorized processing, and breaches.
  • AMLC Secretariat For financial intelligence and asset freezing/forfeiture (through courts or the Anti-Terrorism Council freeze regime where applicable).
  • DICT / CERT-PH Incident handling, platform coordination, and technical containment.
  • DFA – Consular offices If the victim is abroad or the scam involves overseas actors requiring foreign police liaison.
  • Local Prosecutor’s Office / Designated Cybercrime Courts (RTC) For preliminary investigation, warrants under the Rules on Cybercrime Warrants, and trial.

4) Jurisdiction and venue in cross-border cases

  • Territoriality plus effects doctrine. Philippine authorities can act when any element of the offense occurred here (victim in PH, device used here, funds touched a PH bank/e-wallet, data stored on a PH server, or harm felt here).
  • Cybercrime’s extraterritorial clause broadens reach to offenses that affect a computer system or person in the Philippines even if the offender is abroad.
  • Venue: any place where an element occurred; for cyber offenses, venue may be laid where the complainant accessed the communication, where the account was debited/credited, or where the device was used.
  • Prescription: longer where penalties are raised by RA 10175; do not delay, as logs and KYC data expire quickly.

5) Evidence playbook (win cases by getting this right)

5.1 Preserve first, then report

  • Do not delete chats or emails.
  • Forensically capture: take full-screen screenshots showing URL, date/time, handles, and transaction IDs; export chat histories; download statements; save emails (with full headers).
  • Hash files (e.g., SHA-256) to fix integrity; keep originals read-only.
  • Record chain of custody: who collected, when, where saved, and how transferred.
  • Freeze requests: immediately ask your bank/e-wallet/remittance center to flag and recall transfers and to send SWIFT recall or internal wallet hold if possible.

5.2 What investigators ask for

  • Valid ID; Affidavit-Complaint (see template outline below)
  • Device identifiers (IMEI, SIM nos.), email addresses, usernames, wallet tags, blockchain tx hashes, IPs if available
  • Bank/e-wallet references, receipts, and chats showing misrepresentation and reliance
  • List of platform URLs, ads, groups, and recruiter profiles
  • Contact numbers, call logs, OTP messages (never forward live OTPs)

5.3 Admissibility

  • Cite the Rules on Electronic Evidence: authenticity can be shown via metadata, headers, logs, and testimony of the person who captured or maintains the system.
  • For data held by platforms (e.g., subscriber info, IP logs), authorities use Preservation Orders and Disclosure Orders under the Rules on Cybercrime Warrants. Your early report is what starts those clocks.

6) Step-by-step: how to file

  1. Secure the funds trail

    • Notify your bank/e-wallet immediately for recall/chargeback, card blocking, and internal fraud case creation.
    • File a written complaint with reference numbers; this anchors your later BSP escalation.
  2. Prepare your Affidavit-Complaint

    • Facts in chronological order; attach numbered exhibits (screenshots, receipts).
    • Identify false statements and how you relied on them; quantify losses (principal, fees, FX).
    • Specify channels used (app/site/number), dates/times, and devices.
  3. File with NBI or PNP-ACG (you can file with both)

    • Request immediate data preservation and coordination with banks, telcos, and platforms.
  4. Parallel regulatory complaints

    • BSP (for banks/e-money), SEC (for investments), NPC (for data misuse), DICT/CERT (technical/hack incident), AMLC (if large or organized).
  5. Preliminary investigation at the Prosecutor’s Office

    • Submit affidavit and evidence; respond to counter-affidavits; request issuance of subpoenas and warrants (search, preservation, disclosure, real-time collection if applicable).
  6. Court actions

    • Criminal: Information filed before a designated cybercrime court.
    • Civil: damages/recovery; consider Small Claims if purely monetary and uncontested on facts.
  7. Cross-border cooperation

    • Through DOJ-OOC, investigators can send MLAT or Budapest Convention requests to foreign counterparts for subscriber data, takedowns, or funds restraint.

7) Money recovery strategies (what actually works)

  • Speed is everything: bank and e-wallet recalls are usually possible only within hours or a few days.
  • Layered hops: scammers fan out funds across mule accounts (often local before going offshore). Ask investigators to freeze downstream accounts once identified.
  • Card chargebacks: for card-not-present fraud or misrepresentation by merchants; follow your issuer’s documentary requirements precisely.
  • Remittance holds: if cash-out is pending, branch-level alerts may stop release.
  • Crypto: provide tx hashes and wallet addresses; investigators escalate to exchanges for KYC and freezing if funds hit custodial wallets.
  • Restitution: upon conviction or settlement; in administrative cases (e.g., FCPA), regulators can order or broker reimbursement.

8) Special scenarios

  • Business Email Compromise (BEC)

    • Open simultaneous cases: NBI/PNP, bank recall, AMLC financial tracing.
    • Provide spoofed domain evidence, email headers, and the fraudulent invoice.
  • Fake overseas jobs/foreign recruiters

    • Include POEA/DMW (for illegal recruitment) alongside cybercrime and estafa.
  • Investment via overseas platforms

    • Even if the issuer is offshore, domestic solicitation triggers SEC jurisdiction; keep proof of pitches to Philippine residents.
  • Identity takeover/SIM swap

    • Pair a criminal report with an NPC complaint and your telco/bank’s fraud team; ask for account restoration and negative-listing reversal.

9) Affidavit-Complaint: outline you can adapt

  1. Affiant’s identity (name, address, citizenship, ID)

  2. Jurisdiction & venue paragraph (element occurred in ___ City; device used; bank account located here)

  3. Chronology of events (dated bullet points with exhibits)

  4. Misrepresentations and reliance (quote the exact words/posts)

  5. Loss computation (principal, fees, exchange rates; attach statements)

  6. Legal basis (e.g., Estafa under Art. 315 in relation to RA 10175; violations of RA 8799/RA 8484, as applicable)

  7. Reliefs sought

    • Investigation, preservation/disclosure orders, asset freeze/recall, prosecution, restitution
  8. Verification & jurat (notarization)

  9. Annexes (A-1, A-2… screenshots; B-1… bank docs; C-1… platform reports)


10) Practical timelines and expectations

  • Bank/e-wallet recall: measured in hours/days. Act immediately.
  • Subpoena/warrant turnaround: varies by court and complexity; early, well-documented complaints move faster.
  • International requests: expect longer; this is why domestic footholds (local mule accounts, telco data) are critical.
  • Civil money claims: small claims are typically the fastest route to a judgment, but enforceability depends on whether assets are located in the Philippines.

11) Common pitfalls (and how to avoid them)

  • Late reporting → logs and CCTV/branch footage auto-delete. Report within days, not weeks.
  • Screenshot cropping → strips crucial metadata. Always include address bar and timestamps.
  • Mixing originals and edits → keep raw exports separate; label work copies.
  • One-track reporting → file to criminal + regulator + financial-sector simultaneously.
  • Under-pleading → cite both estafa and cybercrime qualification where online means were used.

12) Frequently asked tactical questions

Q: The scammer’s account is in a local bank but the person is abroad. Who has jurisdiction? A: Philippine agencies do—the account and victim are domestic, giving venue and investigative anchors.

Q: Can I recover if I sent crypto? A: Yes, if funds hit a custodial exchange with KYC; provide hashes quickly so authorities can request freezes. Purely on-chain to self-custody is harder but still traceable.

Q: Do I need barangay conciliation first? A: No. Criminal complaints and most cyber fraud scenarios are exempt; parties also usually reside in different cities/countries.

Q: Should I confront the scammer? A: No. You may tip them off and lose recovery windows.


13) Counsel’s checklist (one-page)

  • Draft and notarize Affidavit-Complaint with exhibit index
  • Issue preservation letters to banks, e-wallets, telcos, platforms
  • File with NBI/PNP-ACG; request preservation/disclosure orders
  • Parallel filings: BSP, SEC, NPC, DICT/CERT, AMLC (as applicable)
  • Compute losses; initiate recall/chargeback
  • Track deadlines for replies and appeals; diarize prescription
  • Prepare expert or custodian witnesses for electronic evidence

14) Final reminders

  • Move immediately; most recoveries happen in the first 24–72 hours.
  • Escalate on multiple fronts—criminal, regulatory, and financial.
  • Treat evidence like you’re already in court: preserve, hash, label, and log chain of custody.
  • Even when offenders sit overseas, Philippine law provides real tools to investigate, restrain, and prosecute—use them in parallel.

This article provides general information, not legal advice. Complex or high-value cases should be reviewed by counsel to tailor strategy, especially for cross-border evidence and MLAT work.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.