Introduction
Scams in the Philippines may happen through personal encounters, text messages, phone calls, social media, online marketplaces, lending offers, investment schemes, job offers, remittances, romance scams, fake buyers, fake sellers, impersonation, phishing links, e-wallet fraud, bank transfers, cryptocurrency, advance-fee schemes, or door-to-door transactions. A suspected scammer may be a stranger, online seller, recruiter, loan agent, investment promoter, fake government representative, collection agent, former friend, romantic partner, business associate, employee, or organized group.
Reporting suspected scammer activity is important for several reasons. It may help stop ongoing fraud, preserve evidence, warn authorities, support recovery efforts, protect other victims, identify repeat offenders, and create a formal record for banks, e-wallets, employers, platforms, or courts. However, reporting must be done properly. A weak, vague, emotional, or unsupported complaint may be ignored, delayed, or dismissed. A complainant must distinguish between a genuine scam, a civil dispute, a misunderstanding, failed business transaction, breach of contract, or criminal fraud.
The correct reporting channel depends on the facts. A barangay blotter may be enough for documentation in minor local disputes, but police, cybercrime units, the National Bureau of Investigation, the prosecutor’s office, the Securities and Exchange Commission, the National Privacy Commission, the Department of Trade and Industry, banks, e-wallets, or online platforms may be more appropriate depending on the scam.
The key rule is this: report suspected scam activity promptly, preserve evidence before it disappears, and describe specific facts showing deception, loss, threat, identity misuse, or unlawful conduct.
I. What Is a Scam?
A scam is a deceptive scheme designed to make a person give money, property, personal information, account access, documents, or some benefit through false representations, concealment, manipulation, impersonation, or fraudulent promises.
Common elements include:
- a false statement or misleading representation;
- intent to induce the victim to act;
- reliance by the victim;
- payment, transfer, disclosure, or other action by the victim;
- damage, loss, or risk of harm;
- refusal, disappearance, blocking, threats, or further demands after the victim complies.
Not every failed transaction is automatically a scam. For example, a delayed delivery, unpaid debt, failed business, or contract breach may be civil unless there was fraud, deceit, or criminal intent. The distinction matters because local authorities may treat purely civil matters differently from criminal complaints.
II. Common Scams in the Philippines
1. Online selling scams
A seller advertises goods, receives payment, then fails to deliver and blocks the buyer.
Examples:
- fake phone seller;
- fake appliance seller;
- fake concert ticket seller;
- fake gadget seller;
- fake car reservation seller;
- fake travel package seller.
2. Fake buyer scams
The scammer pretends to buy an item and sends fake payment proof, fake bank transfer screenshots, or phishing links.
Examples:
- “I already paid, check your email.”
- “Click this courier link to receive payment.”
- “Pay the delivery insurance first.”
- “Refund me because I overpaid.”
3. Investment scams
The scammer promises high returns, guaranteed profits, or quick doubling of money.
Examples:
- crypto investment pools;
- forex trading scams;
- “paluwagan” scams;
- Ponzi schemes;
- fake cooperative investments;
- fake franchising opportunities;
- high-yield online trading groups.
4. Online lending advance-fee scams
A supposed lender promises loan approval but asks for processing fees, insurance fees, AMLA clearance fees, correction fees, release fees, or wallet activation fees before loan release.
5. Romance scams
The scammer builds a romantic relationship and then asks for money for emergencies, travel, customs fees, medical bills, or business problems.
6. Job and recruitment scams
A fake recruiter demands payment for placement, medical exam, training, visa, uniform, work permit, processing, or overseas deployment.
7. Phishing and account takeover
The scammer sends links or messages to obtain passwords, OTPs, PINs, bank credentials, e-wallet access, or social media accounts.
8. Fake government or police scams
The scammer pretends to be from the police, NBI, court, BIR, immigration, customs, barangay, bank regulator, or other authority and demands payment to settle a supposed case.
9. Parcel and customs scams
The victim is told a package is held by customs or courier and must pay clearance, tax, insurance, or anti-money-laundering fees.
10. Sextortion and blackmail scams
The scammer threatens to expose intimate images, videos, private chats, personal information, or fake allegations unless the victim pays.
11. E-wallet and bank transfer scams
The scammer tricks the victim into sending money, revealing OTPs, or transferring funds to mule accounts.
12. Fake rental or property scams
The scammer collects reservation fees or advance rent for a property they do not own or cannot legally lease.
13. Identity theft scams
The scammer uses another person’s ID, photos, business name, or account to deceive victims.
14. Charity and emergency scams
The scammer pretends to raise money for medical emergencies, calamity victims, funeral expenses, or charitable causes.
15. Business impersonation scams
The scammer uses the name, logo, documents, or social media identity of a legitimate business to collect money.
III. Is Suspected Scammer Activity a Crime?
It may be, depending on the facts. Possible offenses or legal issues include:
- estafa or swindling;
- other forms of deceit or fraud;
- computer-related fraud;
- cybercrime;
- identity theft;
- illegal access;
- phishing;
- falsification;
- use of falsified documents;
- cyber libel, if defamatory statements are involved;
- threats or coercion;
- unjust vexation;
- data privacy violations;
- illegal recruitment;
- securities or investment violations;
- consumer protection violations;
- money laundering-related concerns;
- violation of lending or financing regulations;
- violation of e-commerce or trade rules;
- theft or misappropriation in appropriate cases.
The exact complaint should match the conduct. It is not enough to say “scammer.” The complainant should explain what false statement was made, what was paid or given, what happened afterward, and what evidence proves the deception.
IV. Civil Dispute Versus Criminal Scam
Authorities often ask whether the issue is truly criminal or only civil. This distinction matters.
A. Civil dispute
A matter may be civil if it involves:
- unpaid debt;
- delayed delivery without proof of fraud;
- breach of contract;
- poor workmanship;
- business disagreement;
- failure to pay after receiving goods;
- refund dispute;
- defective product;
- failed investment where risks were disclosed;
- disagreement over contract terms.
Civil disputes may still be serious, but they may require demand letters, barangay conciliation, mediation, small claims, arbitration, or civil litigation.
B. Criminal scam
A matter is more likely criminal if there is evidence of:
- false identity;
- fake documents;
- fake receipts;
- repeated victims;
- immediate blocking after payment;
- no intention to deliver or perform from the start;
- use of mule accounts;
- impersonation;
- forged permits or IDs;
- fake legal threats;
- multiple advance fees;
- phishing links;
- account takeover;
- intentional concealment;
- coordinated fraudulent scheme.
A transaction can have both civil and criminal aspects. For example, an online seller who deliberately uses fake identity, collects payments from multiple buyers, and never delivers may face criminal fraud issues, not merely civil liability.
V. Why Report Suspected Scammer Activity?
Reporting may help:
- document the incident;
- support bank or e-wallet fraud complaints;
- preserve a formal record for insurance, employment, platform, or legal purposes;
- help authorities identify repeat offenders;
- support freezing or tracing of accounts through proper channels;
- prevent additional victims;
- support criminal investigation;
- support civil recovery;
- support takedown of fake accounts or posts;
- prove that the victim acted promptly.
Even if money recovery is uncertain, reporting may still be useful.
VI. First Step: Preserve Evidence Before Reporting
Evidence can disappear quickly. Scammers delete messages, deactivate accounts, change numbers, block victims, remove posts, or withdraw funds.
Preserve evidence before confronting the suspect or reporting the account.
Important evidence includes:
- screenshots of conversations;
- screen recordings showing profile, messages, and links;
- account names, usernames, handles, and profile URLs;
- phone numbers;
- email addresses;
- website URLs;
- app names;
- group links;
- advertisements or posts;
- payment instructions;
- bank or e-wallet account names and numbers;
- transaction receipts;
- reference numbers;
- fake IDs or permits;
- fake contracts;
- fake receipts;
- delivery or courier details;
- photos or videos;
- voice messages;
- call logs;
- names of witnesses;
- proof of non-delivery or non-performance;
- proof of blocking or refusal;
- demand messages;
- threats or blackmail messages;
- personal data submitted.
Do not rely only on memory.
VII. How to Take Strong Screenshots and Screen Recordings
A useful screenshot should show:
- the scammer’s name or account;
- complete message;
- date and time;
- platform used;
- payment demand;
- payment details;
- promised item, service, loan, investment, or benefit;
- proof of payment;
- refusal, blocking, or further demands.
A screen recording is often stronger because it can show:
- opening the app or website;
- navigating to the profile;
- showing the URL;
- opening the chat;
- scrolling through the conversation;
- showing payment instructions;
- showing account information;
- showing the post or advertisement.
Avoid cropping the only copy of screenshots. Keep originals.
VIII. Create a Timeline of Events
A clear timeline helps authorities understand the incident.
Example:
| Date and Time | Event | Evidence |
|---|---|---|
| June 1, 9:00 AM | Saw Facebook post offering iPhone for ₱18,000 | Screenshot of post |
| June 1, 9:30 AM | Seller said item was available and asked for reservation fee | Messenger screenshot |
| June 1, 10:00 AM | Sent ₱5,000 through GCash to number 09xx | GCash receipt |
| June 1, 11:00 AM | Seller promised delivery same day | Chat screenshot |
| June 2, 8:00 AM | Seller demanded additional shipping insurance | Chat screenshot |
| June 2, 1:00 PM | Seller blocked complainant | Screen recording |
A timeline is especially useful for police, NBI, prosecutors, banks, e-wallets, and platforms.
IX. Identify the Correct Reporting Channel
Different authorities handle different aspects of scam activity.
1. Barangay
Useful for local documentation, neighbor disputes, small local transactions, or when the suspect lives in the same barangay or city and the matter is appropriate for barangay conciliation.
2. Local police
Useful for criminal complaints, blotter reports, estafa, threats, fake identities, local suspects, and urgent assistance.
3. PNP cybercrime authorities
Useful for online scams, hacking, phishing, fake accounts, online threats, identity theft, and digital fraud.
4. NBI cybercrime office
Useful for more complex online scams, tracing, coordinated schemes, fake accounts, cybercrime, and digital evidence.
5. Prosecutor’s office
Useful for filing a criminal complaint-affidavit for preliminary investigation.
6. Bank or e-wallet provider
Important when money was transferred. Report quickly to request account review, possible hold, or fraud investigation.
7. SEC
Useful for investment scams, lending scams, fake financing companies, unregistered investment solicitation, and corporate impersonation.
8. DTI
Useful for consumer transactions, online selling disputes, defective goods, deceptive sales practices, and business complaints.
9. National Privacy Commission
Useful when personal data, IDs, selfies, contacts, or private information were misused or threatened.
10. DOLE, DMW, POEA-related channels, or recruitment authorities
Useful for employment or overseas recruitment scams.
11. Social media platforms, app stores, marketplaces, and websites
Useful for takedown, suspension, fraud reporting, and preserving account information.
Often, a victim should report to more than one channel.
X. Reporting to the Barangay
A barangay blotter or barangay complaint may help document a local incident.
A. When barangay reporting may help
Barangay reporting may be useful when:
- the suspect is known and nearby;
- the dispute is local;
- the amount is small;
- the victim wants documentation;
- the parties live in the same city or municipality and barangay conciliation applies;
- the issue involves harassment, threats, or local intimidation;
- the complainant needs a record before escalating.
B. Limits of barangay action
Barangay officials cannot investigate complex cybercrime in the same way police or NBI can. They cannot compel banks or platforms to reveal account records. They cannot prosecute criminal cases. Serious fraud, cybercrime, illegal recruitment, threats, or large-scale scams should be reported to appropriate authorities.
C. What to bring
Bring:
- valid ID;
- screenshots;
- payment receipts;
- suspect’s name or address, if known;
- phone number;
- written timeline;
- witnesses, if any.
D. Barangay blotter versus formal complaint
A blotter records an incident. A barangay complaint may initiate conciliation proceedings if proper. A blotter alone does not guarantee investigation or recovery.
XI. Reporting to Local Police
The local police station may receive complaints involving fraud, estafa, threats, coercion, theft, fake documents, or other criminal acts.
A. When to go to police
Go to police when:
- money was taken through deception;
- suspect is known or traceable;
- there are threats;
- fake documents were used;
- physical meeting occurred;
- suspect may continue victimizing others;
- a police blotter is needed for bank or platform reporting;
- urgent safety concerns exist.
B. What to bring
Prepare:
- valid ID;
- printed screenshots;
- phone with original messages;
- payment receipts;
- bank or e-wallet transaction details;
- suspect information;
- timeline;
- witnesses;
- fake documents;
- demand messages;
- proof of loss.
C. What to ask for
You may ask for:
- blotter entry;
- investigation;
- referral to cybercrime unit if online;
- guidance on filing complaint-affidavit;
- assistance in contacting payment provider if urgent;
- referral to prosecutor if appropriate.
XII. Reporting to PNP or NBI Cybercrime Units
If the scam happened online, cybercrime authorities may be more appropriate than ordinary blotter reporting.
A. Cybercrime-related scam activity
Examples include:
- fake Facebook seller;
- phishing link;
- hacked account;
- fake online lending app;
- fake investment group;
- fake job page;
- sextortion;
- fake bank email;
- identity theft;
- online impersonation;
- use of mule e-wallets;
- fake online marketplace.
B. What cybercrime authorities may need
They may need:
- screenshots;
- URLs;
- profile links;
- email headers;
- account usernames;
- payment details;
- device used;
- phone numbers;
- IP-related information, if available;
- transaction receipts;
- statement of events;
- original device for inspection, if necessary.
C. Do not hack back
Victims should not attempt to hack accounts, trace IPs illegally, install spyware, impersonate law enforcement, or threaten the scammer. Illegal self-help can expose the victim to liability.
XIII. Filing a Complaint With the Prosecutor
A criminal complaint may be filed with the prosecutor’s office through a complaint-affidavit.
A. When prosecutor filing is appropriate
This may be appropriate when:
- the scammer is identified;
- the evidence is sufficient;
- money or property was lost;
- fraud was intentional;
- law enforcement has advised filing;
- the complainant wants criminal prosecution;
- the offense requires preliminary investigation.
B. Complaint-affidavit contents
A complaint-affidavit should include:
- complainant’s identity;
- respondent’s identity, if known;
- how the scam started;
- false representations made;
- amount paid or property given;
- payment details;
- what happened after payment;
- how complainant discovered the fraud;
- evidence attached;
- witnesses;
- damage suffered;
- request for appropriate charges.
C. Attachments
Attach:
- screenshots;
- receipts;
- bank or e-wallet records;
- identity documents of suspect, if available;
- fake documents;
- written demand;
- police blotter, if any;
- witness affidavits;
- timeline.
XIV. Reporting to Banks and E-Wallet Providers
If money was sent through a bank or e-wallet, report immediately. Time matters because funds may be withdrawn quickly.
A. What to provide
Provide:
- transaction reference number;
- date and time;
- amount;
- sender account;
- receiver account;
- receiver name;
- receiver phone number;
- screenshots of scam messages;
- proof that payment was induced by fraud;
- police blotter or complaint, if available;
- request for account review or freeze, if possible.
B. Possible outcomes
The provider may:
- open an investigation;
- request additional documents;
- temporarily restrict the account if policy allows;
- advise filing police report;
- coordinate with authorities upon legal request;
- decline reversal if funds were already withdrawn;
- preserve internal records.
Recovery is not guaranteed. Fast reporting improves the chance of action.
C. Do not send more money
Scammers often claim that paying more will unlock the previous payment. This usually increases the loss.
XV. Reporting to the Securities and Exchange Commission
The SEC may be relevant where the suspected scam involves:
- investment solicitation;
- promised profits;
- crypto investment groups;
- fake corporations;
- fake lending companies;
- online lending apps;
- financing companies;
- crowdfunding-style schemes;
- unauthorized sale of securities;
- Ponzi schemes;
- corporate impersonation.
A. Evidence to preserve
For SEC-related complaints, preserve:
- company name;
- alleged registration number;
- certificates shown;
- investment contracts;
- promised returns;
- screenshots of posts;
- names of recruiters;
- payment records;
- group chat messages;
- marketing materials;
- testimonies or payout screenshots;
- proof of recruitment or referral commissions.
B. Important distinction
A company may be registered as a corporation but not authorized to solicit investments from the public. Corporate registration alone does not automatically make an investment offering lawful.
XVI. Reporting to the Department of Trade and Industry
DTI may be relevant for consumer complaints involving businesses, sellers, defective products, false advertising, deceptive sales, or online transactions.
Examples:
- online seller with registered business name fails to deliver;
- misleading product claims;
- refusal to refund under consumer rules;
- fake promotions;
- unfair sales practices;
- defective goods sold through online channels.
If the seller is a private individual using a fake identity, police or cybercrime channels may be more appropriate.
XVII. Reporting to the National Privacy Commission
Report privacy-related scam activity when the scammer:
- collected valid IDs;
- collected selfies with IDs;
- collected bank details;
- harvested contact lists;
- posted personal information;
- threatened to expose personal data;
- used the victim’s identity;
- shared private documents;
- used personal data for harassment;
- created fake accounts using victim’s photos.
A privacy report should explain what personal data was collected, how it was used, and what harm occurred.
XVIII. Reporting Employment and Recruitment Scams
Recruitment scams are common and may involve local or overseas employment.
Warning signs include:
- placement fee demanded before verified job offer;
- fake visa processing;
- fake agency;
- fake employer;
- no license;
- personal account payments;
- immediate deployment promises;
- fake contracts;
- tourist visa work schemes;
- demand for medical, training, or uniform fees through unofficial channels.
Report to appropriate labor, migrant worker, police, or prosecutor channels depending on the facts. Preserve job posts, contracts, receipts, recruiter identity, and chat messages.
XIX. Reporting Marketplace and Platform Scams
If the scam happened through a platform, report within the platform as well.
Examples:
- Facebook Marketplace;
- Shopee or Lazada-related impersonation;
- Carousell;
- TikTok shop;
- Instagram shops;
- Telegram groups;
- online forums;
- dating apps;
- job platforms;
- rental platforms.
Platform reporting may lead to account takedown, suspension, or internal investigation. Preserve evidence before reporting because the account may disappear.
XX. Reporting Social Media Impersonation
If someone uses another person’s name, photo, business name, or identity to scam others:
- screenshot the profile;
- copy the profile URL;
- capture posts and messages;
- preserve proof of impersonation;
- report to the platform;
- warn contacts carefully;
- report to cybercrime authorities if fraud occurred;
- document victims or attempted victims.
If a business is impersonated, the business should post a careful notice through official channels and avoid naming unverified suspects without evidence.
XXI. Reporting Sextortion or Blackmail Scams
If the scam involves threats to expose intimate photos, videos, private chats, or personal secrets:
- preserve threats;
- do not send more money or images;
- do not meet the offender;
- secure accounts;
- report to cybercrime authorities;
- report to platform for takedown if content is posted;
- report to payment provider if money was sent;
- seek urgent help if the victim is a minor or at risk.
If the victim is a minor, do not forward or circulate intimate material. Report promptly to proper authorities.
XXII. What If the Suspected Scammer Is Unknown?
Even if the scammer is unknown, reporting may still be useful. Provide identifiers such as:
- phone number;
- e-wallet number;
- bank account;
- username;
- profile URL;
- email;
- website;
- IP-related records if available;
- photos used;
- account names;
- transaction details;
- delivery address;
- courier details.
Authorities and payment providers may use lawful processes to identify account holders.
XXIII. What If the Suspect Used a Fake Name?
Many scammers use fake names. Do not rely solely on display names.
Preserve:
- account URL;
- phone number;
- payment account name;
- bank or wallet number;
- remittance receiver name;
- profile creation details, if visible;
- photos;
- mutual contacts;
- voice messages;
- delivery details;
- transaction metadata.
A fake name does not make reporting useless.
XXIV. What If the Scam Uses a Mule Account?
A mule account is a bank, e-wallet, or remittance account used to receive scam proceeds. The account holder may be part of the scam, paid to lend the account, or deceived.
Report the receiving account immediately. Provide:
- account name;
- account number;
- phone number;
- amount;
- transaction reference;
- screenshots linking the account to the scam.
Mule accounts are often the best lead.
XXV. What If the Scammer Is Abroad?
Scams may be cross-border. If the scammer appears abroad:
- report locally if the victim is in the Philippines;
- report to payment provider;
- report to platform;
- preserve foreign phone numbers and accounts;
- note country indicators;
- consult cybercrime authorities;
- consider embassy or foreign law enforcement reporting for serious cases.
Recovery may be harder, but local reporting still creates a record.
XXVI. What If the Victim Is Abroad and the Scammer Is in the Philippines?
A victim abroad may authorize a representative in the Philippines to help report, but formal complaints may require affidavits, identification, and notarized or apostilled documents.
Useful steps:
- preserve digital evidence;
- send authorization or SPA if needed;
- report to platform and payment provider;
- coordinate with Philippine counsel or family;
- prepare affidavit abroad if required;
- provide proof of payment and identity.
XXVII. What If Multiple Victims Exist?
Multiple victims strengthen the case because they may show a pattern of fraud.
Victims should:
- preserve individual evidence;
- create a list of victims;
- avoid sharing sensitive information publicly;
- avoid coaching each other’s affidavits;
- file separate or coordinated complaints;
- identify common accounts and phone numbers;
- preserve group chats;
- appoint a representative for coordination if needed.
Each victim should still provide their own statement and proof of loss.
XXVIII. What If the Suspected Scammer Offers Settlement?
Settlement may be possible, but be careful.
Before accepting settlement:
- get payment first or through secure arrangement;
- use written settlement terms;
- avoid withdrawing complaints prematurely;
- consider whether other victims exist;
- do not sign broad waivers without understanding them;
- require actual refund, not promises;
- preserve evidence until payment clears;
- consult counsel for large amounts.
A partial refund does not automatically erase criminal liability, especially if fraud affected multiple victims.
XXIX. Demand Letter Before Reporting
A demand letter may help in some cases, especially where the issue may be civil or where the suspect is known.
A demand letter may request:
- delivery of item;
- refund;
- explanation;
- return of money;
- correction of false statements;
- cessation of threats;
- preservation of evidence.
However, in fast-moving scams, sending a demand first may give the scammer time to disappear. If fraud is clear and funds were just sent, report to the payment provider and authorities immediately.
XXX. Sample Demand Message
A short message may state:
“I paid ₱___ on ___ for ___. You represented that ___. No item/service/loan was delivered. Please refund the amount to ___ within ___ hours/days. I am preserving all communications, payment records, and account details, and I reserve the right to report this matter to the proper authorities.”
Avoid threats, insults, or defamatory public posts.
XXXI. Sample Incident Report Format
A report may be organized as follows:
Subject: Report of Suspected Scam Activity
- Complainant: Name, address, contact number, email
- Suspect: Name used, username, phone number, account link, payment account
- Platform: Facebook, Messenger, GCash, bank, website, etc.
- Date of first contact: ___
- Representation made: What the suspect promised or claimed
- Amount paid or property given: ___
- Payment method: Bank/e-wallet/remittance details
- What happened after payment: No delivery, blocking, further demands, threats
- Evidence: Screenshots, receipts, URLs, timeline
- Request: Investigation, blotter, assistance, referral, account review
XXXII. Sample Complaint-Affidavit Outline
A complaint-affidavit may include:
- personal circumstances of complainant;
- how the complainant encountered the suspect;
- exact statements made by the suspect;
- reason complainant believed the suspect;
- payment or transfer made;
- details of receiving account;
- failure to deliver or perform;
- further demands or threats;
- discovery of fraudulent nature;
- damage suffered;
- evidence attached;
- witnesses;
- request for prosecution.
The affidavit should be factual and chronological.
XXXIII. Sample Narrative for Online Selling Scam
On or about [date], I saw a post by [account/page name] offering [item] for sale for ₱[amount]. I contacted the account through [platform]. The person represented that the item was available and would be shipped after payment. Relying on this representation, I sent ₱[amount] to [payment account name/number] on [date/time]. After receiving payment, the person failed to deliver the item, gave excuses, and later blocked me. Attached are screenshots of the post, chat messages, payment receipt, and proof that the account became inaccessible.
XXXIV. Sample Narrative for Investment Scam
On [date], respondent represented that I could earn [return] by investing ₱[amount] in [scheme]. Respondent stated that the investment was guaranteed and that profits would be paid on [date]. I sent money to [account]. After the promised payout date, respondent failed to return my money or profits and continued to solicit more funds. I later discovered that other persons were similarly solicited. Attached are screenshots of the investment offer, payment receipts, group chat messages, and respondent’s account details.
XXXV. Sample Narrative for Lending Advance-Fee Scam
On [date], I applied for an online loan through [page/app/account]. The person using the name [name] informed me that my loan of ₱[amount] was approved but required payment of a processing/release fee of ₱[amount]. I paid to [account]. After payment, no loan was released. Instead, the person demanded additional fees for [reason]. I realized that the promised loan was never intended to be released. Attached are screenshots of the approval message, payment instructions, receipts, and further demands.
XXXVI. Sample Narrative for Phishing or Account Takeover
On [date], I received a message pretending to be from [bank/e-wallet/platform] instructing me to click a link and verify my account. I entered my details because the page appeared official. Shortly after, unauthorized transactions occurred in my account totaling ₱[amount]. Attached are screenshots of the message, link, unauthorized transactions, and account notifications.
XXXVII. What to Ask From Local Authorities
Depending on the office, a complainant may ask for:
- blotter entry;
- investigation;
- referral to cybercrime unit;
- assistance in preserving evidence;
- guidance on complaint-affidavit;
- endorsement to prosecutor;
- coordination with bank or e-wallet through lawful process;
- safety assistance if threats are involved;
- certification or copy of report for bank/platform use.
Be specific. Authorities can help better when the request is clear.
XXXVIII. What Not to Do When Reporting a Scam
Avoid:
- deleting messages;
- editing screenshots;
- sending more money to “catch” the scammer;
- threatening the scammer;
- hacking accounts;
- posting the suspect’s private information without legal advice;
- making exaggerated claims;
- naming innocent persons without basis;
- relying only on verbal narration;
- losing payment receipts;
- delaying payment-provider reports;
- signing settlement documents without receiving payment;
- withdrawing complaints based only on promises;
- sharing intimate or sensitive evidence publicly.
XXXIX. Public Posting About Suspected Scammers
Victims often want to warn others. This is understandable, but public posting can create defamation or privacy risks if done carelessly.
Safer public warning:
“Please be cautious of this account. I paid for an item on [date], but I have not received delivery or refund. I have reported the matter to the proper authorities.”
Riskier statement:
“This person is a criminal scammer and estafador. Destroy their life.”
Avoid posting private addresses, IDs, family information, or unverified accusations. Preserve evidence and report through proper channels.
XL. Reporting Without Committing Cyber Libel
When warning others, focus on verifiable facts:
- amount paid;
- date;
- platform;
- item or service;
- non-delivery;
- lack of refund;
- report filed.
Avoid unsupported statements of criminal guilt unless there is a final judgment or sufficient legal basis. Calling someone a “scammer” may be risky if the facts are disputed.
XLI. If the Suspect Threatens You After Reporting
Preserve threats and update the authorities.
Threats may include:
- physical harm;
- doxxing;
- legal intimidation;
- false complaints;
- posting private information;
- harassment of family;
- workplace contact.
Report urgent threats to police. If the threats are online, cybercrime authorities may also be involved.
XLII. If the Scam Involves Personal Data or IDs
If you sent IDs, selfies, birthdate, address, bank details, or employment information:
- preserve proof of what was sent;
- secure accounts;
- change passwords;
- enable two-factor authentication;
- monitor e-wallets and bank accounts;
- report suspicious transactions;
- watch for fake accounts using your identity;
- consider replacing compromised IDs if necessary;
- report misuse to privacy or cybercrime authorities.
Identity misuse can continue after the money scam ends.
XLIII. If the Scam Involves OTP, Password, or PIN
If you gave OTPs, passwords, PINs, or account access:
- call the bank or e-wallet immediately;
- freeze or secure the account;
- change passwords;
- revoke linked devices;
- check transaction history;
- report unauthorized transactions;
- preserve phishing messages;
- file police or cybercrime report.
A legitimate bank, e-wallet, lender, or government office should not ask for your OTP or password.
XLIV. If the Scam Involves Cryptocurrency
Crypto scams are harder to reverse but should still be reported.
Preserve:
- wallet address;
- transaction hash;
- exchange used;
- screenshots;
- chat messages;
- promised returns;
- account profile;
- date and amount.
Report to the exchange if one was used. Report to cybercrime authorities for larger losses.
XLV. If the Scam Involves Remittance
If money was sent through a remittance center:
- preserve receipt;
- report immediately;
- ask if payout can be stopped;
- provide receiver name;
- provide tracking number;
- file police report if required.
If the money has not yet been claimed, there may be a chance to cancel or hold it depending on the provider’s rules.
XLVI. If the Scam Involves Cash Meet-Up
If the transaction involved physical meet-up:
Preserve:
- meeting location;
- date and time;
- CCTV possibility;
- description of suspect;
- vehicle plate number, if any;
- witnesses;
- receipts or acknowledgment;
- chat arranging meet-up.
Report quickly because CCTV may be overwritten.
XLVII. If the Scam Involves Delivery or Courier
Preserve:
- courier booking;
- tracking number;
- rider details;
- delivery address;
- proof of pickup;
- proof of delivery;
- photos of parcel;
- messages arranging delivery.
Some scams use fake courier links, fake COD, parcel switching, or empty package delivery.
XLVIII. If the Scam Involves Fake Documents
Preserve fake documents exactly as received.
Examples:
- fake IDs;
- fake permits;
- fake SEC certificates;
- fake business registrations;
- fake receipts;
- fake bank slips;
- fake court orders;
- fake warrants;
- fake contracts;
- fake employment offers;
- fake visas.
Do not alter them. Fake documents may support fraud, falsification, impersonation, or cybercrime complaints.
XLIX. If the Scam Involves a Registered Business Name
A registered business name does not automatically prove legitimacy. Scammers may use real business names or copied certificates.
Check:
- official contact channels;
- registered address;
- whether the person is authorized;
- whether payment account belongs to the business;
- whether the website or page is official;
- whether documents are copied or edited.
Report impersonation to the real business and authorities.
L. If the Scam Involves a Corporation
A corporation may be real but the offer may still be illegal or fraudulent. A person may also impersonate a corporation.
Determine:
- exact corporate name;
- registration number;
- office address;
- authority to operate;
- authority to solicit investments or lend;
- identity of officers;
- payment channels;
- contracts;
- receipts.
Corporate registration alone does not authorize all activities.
LI. If the Scam Involves a Friend or Relative
Scams by known persons are difficult emotionally. Still, preserve evidence.
The matter may be:
- debt;
- loan;
- investment fraud;
- partnership dispute;
- estafa;
- misappropriation;
- breach of trust;
- family conflict.
If there was trust and money was misused, legal analysis depends on the facts. Barangay conciliation may apply in some local disputes, but serious fraud may require police or prosecutor action.
LII. If the Scam Involves a Romantic Partner
Romance scams may overlap with emotional manipulation, blackmail, abuse, or VAWC issues.
Preserve:
- love messages tied to money requests;
- emergency stories;
- bank or e-wallet transfers;
- promises to repay;
- fake identities;
- photos used;
- threats;
- intimate material, if involved.
If the offender is an intimate partner and the victim is a woman, additional protective remedies may be relevant.
LIII. If the Scam Involves a Minor Victim
If the victim is a minor:
- involve a parent or guardian;
- preserve evidence;
- report promptly;
- avoid blaming the child;
- do not circulate sensitive material;
- report sexual exploitation or grooming immediately.
Schools may also assist if classmates or school platforms are involved.
LIV. If the Scam Involves Elderly Victims
Elderly victims may be targeted through romance, investment, medical, lottery, charity, or family emergency scams.
Family members should help:
- preserve evidence;
- secure bank accounts;
- report to authorities;
- block scam numbers;
- monitor repeat contact;
- avoid public shaming of the victim;
- coordinate with banks and e-wallets.
LV. If the Scam Involves a Business Victim
Businesses may be scammed through:
- fake suppliers;
- fake purchase orders;
- fake bank account substitution;
- invoice fraud;
- phishing;
- CEO fraud;
- fake government compliance fees;
- fake courier or customs fees;
- fake customer chargebacks.
Businesses should:
- preserve emails with headers;
- secure accounts;
- notify bank;
- review internal controls;
- report to cybercrime authorities;
- document losses;
- warn employees;
- preserve server logs where relevant.
LVI. Recovery of Money
Recovery is possible but not guaranteed.
Recovery is more likely if:
- report is made immediately;
- receiving account is not yet emptied;
- payment provider can hold funds;
- scammer is known;
- multiple victims cooperate;
- bank or e-wallet records identify suspect;
- authorities act quickly;
- there is a settlement backed by actual payment.
Recovery is harder if:
- money was withdrawn;
- mule accounts were used;
- cryptocurrency was used;
- scammer is abroad;
- victim delayed;
- evidence is incomplete.
Reporting is still important even if recovery is uncertain.
LVII. Insurance, Chargebacks, and Platform Protection
Depending on payment method, the victim may have non-criminal remedies:
- credit card dispute;
- platform buyer protection;
- marketplace refund process;
- e-wallet dispute process;
- bank fraud investigation;
- insurance claim;
- escrow claim;
- courier claim.
These remedies have deadlines. Act quickly.
LVIII. Small Claims for Recovery
If the suspect is known and the claim is for a sum of money within the applicable threshold, small claims court may be an option.
Small claims may be useful when:
- respondent is identifiable;
- amount is recoverable;
- claim is straightforward;
- evidence of payment and non-refund exists.
However, small claims may not punish criminal fraud or trace unknown scammers.
LIX. Civil Action for Damages
A victim may file a civil case for:
- return of money;
- actual damages;
- moral damages;
- exemplary damages;
- attorney’s fees;
- injunction;
- damages for fraud, breach, or tort.
Civil action is more practical when the scammer is identified and has assets.
LX. Criminal Case Versus Civil Recovery
A criminal case aims to punish the offender and may include civil liability. A civil case aims to recover money or damages. A regulatory complaint aims to stop unlawful activity or impose administrative sanctions.
A victim may need more than one route.
LXI. How to Strengthen a Report
A strong report has:
- clear timeline;
- complete payment records;
- screenshots showing false representations;
- account details of recipient;
- proof of non-delivery or non-performance;
- suspect identifiers;
- witnesses;
- evidence of other victims, if any;
- proof of loss;
- organized attachments.
A weak report says only: “I was scammed. Please help.”
LXII. Evidence Attachment System
Organize attachments:
- Annex A: Screenshot of advertisement
- Annex B: Chat conversation
- Annex C: Payment instructions
- Annex D: Payment receipt
- Annex E: Follow-up demand
- Annex F: Proof of blocking
- Annex G: Suspect profile
- Annex H: Other victims’ screenshots
- Annex I: Demand letter
- Annex J: Bank/e-wallet report
This makes the complaint easier to evaluate.
LXIII. Reporting Suspected Scam Before Money Is Lost
If you suspect a scam before paying, you may still report:
- fake page;
- phishing link;
- impersonation;
- fake investment solicitation;
- fake recruitment;
- fake government demand;
- suspicious online lending app;
- attempt to obtain OTP;
- attempted sextortion.
Preserve evidence of the attempt. Reporting attempts can help prevent harm to others.
LXIV. If Local Authorities Say It Is a Civil Matter
This sometimes happens. If authorities decline criminal action, ask politely what additional facts or documents are needed.
You may also:
- file a written complaint-affidavit with the prosecutor;
- consult a lawyer;
- pursue small claims or civil action;
- report to regulators;
- report to payment providers;
- file with cybercrime units if online elements exist;
- gather additional evidence of fraud or multiple victims.
Do not argue aggressively at the station. Ask for guidance and document the response.
LXV. If Authorities Refuse to Receive a Report
If a report is refused, consider:
- going to the proper unit;
- submitting a written complaint;
- asking for a desk officer or investigator;
- filing with prosecutor directly;
- filing with cybercrime unit;
- reporting to the relevant regulator;
- consulting counsel;
- documenting the attempted report.
Sometimes the issue is not refusal but wrong office or incomplete evidence.
LXVI. Avoiding False Accusations
Accusing someone of being a scammer is serious. If the facts are uncertain, use cautious wording:
- “suspected scam activity”
- “possible fraud”
- “unresolved transaction”
- “failure to deliver after payment”
- “identity appears suspicious”
- “request for investigation”
Avoid knowingly false accusations. False reporting, malicious prosecution, defamation, or harassment can create liability.
LXVII. Rights of the Complainant
A complainant generally has the right to:
- report suspected criminal activity;
- present evidence;
- request documentation;
- seek investigation;
- file a complaint-affidavit;
- be treated respectfully;
- receive copies or reference numbers where available;
- pursue civil or administrative remedies;
- protect personal data;
- seek safety assistance if threatened.
LXVIII. Responsibilities of the Complainant
A complainant should:
- tell the truth;
- preserve evidence;
- avoid fabricating or editing evidence;
- avoid public defamation;
- cooperate with authorities;
- provide complete details;
- update authorities if new evidence appears;
- avoid taking illegal self-help actions;
- respect privacy of uninvolved persons.
LXIX. Rights of the Accused or Suspected Person
Even suspected scammers have rights. Authorities must investigate based on evidence. A person is not criminally guilty merely because someone calls them a scammer.
This is why a report should focus on facts, not insults.
LXX. Practical Prevention Tips
Before sending money:
- verify identity;
- verify business registration and authority;
- avoid upfront fees to personal accounts;
- use escrow or platform-protected payment;
- avoid OTP sharing;
- inspect items in person when possible;
- be suspicious of pressure tactics;
- check account age and reviews;
- verify official contact channels;
- avoid deals that are too good to be true;
- do not send IDs to strangers;
- confirm bank account name matches business name;
- use written contracts for large transactions;
- avoid paying through untraceable methods;
- search for duplicate photos or suspicious listings when possible.
LXXI. Practical Emergency Checklist After Being Scammed
Immediately:
- stop sending money;
- screenshot everything;
- screen record profiles and chats;
- save URLs;
- save payment receipts;
- report to bank or e-wallet;
- report to platform;
- secure accounts;
- change passwords;
- file police or cybercrime report if serious;
- prepare timeline;
- warn contacts if identity data was compromised.
LXXII. Frequently Asked Questions
1. Should I report to barangay or police first?
For minor local disputes, barangay may help document or mediate. For fraud, online scams, threats, identity theft, or significant loss, police or cybercrime authorities are usually more appropriate.
2. Can I report even if I do not know the scammer’s real name?
Yes. Provide phone numbers, usernames, URLs, payment accounts, receipts, and screenshots. Authorities may use lawful processes to identify the person.
3. Can I get my money back after reporting?
Possibly, but recovery is not guaranteed. Report to the bank or e-wallet immediately because funds may be withdrawn quickly.
4. Is a police blotter enough?
A blotter documents the incident but may not be enough for prosecution or recovery. You may need a complaint-affidavit, bank report, cybercrime complaint, or civil case.
5. What if the scammer blocks me?
Preserve proof of blocking and all prior messages. Blocking after payment may support your complaint.
6. What if the seller says delivery is only delayed?
Delay alone may not prove fraud. Gather evidence of false promises, refusal to refund, blocking, fake identity, or multiple victims.
7. What if I posted the scammer online?
Be careful. Public accusations may create defamation risk if not accurate or provable. Focus on factual statements and report to authorities.
8. What if I gave my ID to the scammer?
Treat it as identity theft risk. Monitor accounts, change passwords, report misuse, and consider privacy or cybercrime complaints.
9. Can local authorities force GCash, Maya, or a bank to return my money?
Authorities may assist through proper legal processes, but instant recovery is not guaranteed. Payment providers have their own investigation procedures.
10. What if many people were scammed by the same person?
Coordinate evidence and file reports. Multiple victims can show a pattern and strengthen the case.
11. Can I file estafa?
Possibly, if the facts show deceit, reliance, payment, and damage. A prosecutor or lawyer can assess the proper charge.
12. What if the scammer is a registered business?
A registered business can still commit fraud or deceptive practices. Report to police, prosecutor, DTI, SEC, or other regulator depending on the business type and conduct.
13. What if the scam involves investment returns?
Report to the SEC and law enforcement. Investment solicitation without proper authority may create regulatory and criminal issues.
14. What if the scam involves online lending fees?
Report to law enforcement, cybercrime authorities, SEC if a lending company is claimed, and the payment provider.
15. What if I am afraid of retaliation?
Preserve threats and report them. Ask authorities for guidance and avoid meeting the suspect alone.
LXXIII. Key Legal Principles
The key principles are:
- A scam report should be based on specific facts, not merely suspicion or anger.
- Fraud usually involves deception, reliance, payment or transfer, and damage.
- Online scam evidence must be preserved quickly.
- Banks and e-wallets should be notified immediately after fraudulent transfers.
- Barangay reporting is useful for documentation but may not be enough for cybercrime or serious fraud.
- Police, NBI, prosecutors, and regulators handle different aspects of scam activity.
- A failed transaction is not always criminal; proof of deceit matters.
- Public accusations can create defamation risk if false or excessive.
- Multiple victims and repeated patterns strengthen scam complaints.
- Identity documents sent to scammers create continuing data privacy and identity theft risks.
- Recovery is uncertain, but fast reporting improves chances.
- Victims should avoid illegal self-help such as hacking or threats.
Conclusion
Reporting suspected scammer activity to local authorities in the Philippines requires speed, organization, and evidence. The victim should preserve screenshots, screen recordings, URLs, payment receipts, account names, phone numbers, fake documents, and a clear timeline before the scammer deletes evidence or disappears. The report should explain what was promised, what was paid or given, what false statements were made, what happened afterward, and what damage resulted.
The proper reporting channel depends on the scam. Barangay reporting may help with local documentation and minor disputes. Police and cybercrime units are appropriate for fraud, threats, identity theft, phishing, and online scams. The NBI may assist in complex cybercrime matters. Prosecutors handle criminal complaints. Banks and e-wallets should be notified immediately for payment-related scams. The SEC may be relevant for investment, lending, and corporate scams. DTI may assist with consumer transactions. The National Privacy Commission may be relevant when personal data or IDs are misused.
The guiding rule is clear: do not merely call someone a scammer online; preserve evidence, report through proper channels, and let the facts support the case.