Text Scam and Libel Complaint in the Philippines

I. Overview

Text scams and libel complaints are increasingly common in the Philippines. Mobile phones are used not only for ordinary communication but also for fraud, intimidation, harassment, reputational attacks, blackmail, and identity misuse. A single text message can become evidence in a criminal complaint, a cybercrime investigation, a civil action for damages, or a defense against a false accusation.

Two legal issues often arise together:

  1. Text scam — fraudulent, deceptive, or malicious text messages intended to obtain money, personal information, account access, or other advantage.

  2. Libel complaint — a legal complaint based on allegedly defamatory statements sent or published through text, online platforms, messaging apps, or other communication channels.

In the Philippine context, a text scam may involve cybercrime, estafa, identity theft, phishing, SIM misuse, threats, harassment, or violation of telecommunications laws. A libel complaint, on the other hand, may involve the Revised Penal Code, the Cybercrime Prevention Act, and civil liability for damages.

The overlap becomes important when, for example, a scammer sends defamatory messages about a person, or when a victim publicly accuses someone of being a scammer and is later threatened with a libel case.


II. What Is a Text Scam?

A text scam is a deceptive message sent by SMS, messaging app, or similar electronic means to mislead the recipient. It may ask the recipient to send money, click a link, provide personal information, verify an account, claim a prize, pay a fake fee, or contact a fraudulent number.

Common text scams in the Philippines include:

  • fake bank alerts;
  • fake GCash, Maya, or e-wallet notices;
  • fake delivery messages;
  • fake job offers;
  • fake raffle or prize notices;
  • fake loan approvals;
  • fake government aid messages;
  • phishing links;
  • account verification scams;
  • romance or emergency money scams;
  • impersonation of relatives, employers, lawyers, police, or government agencies;
  • threats demanding payment;
  • blackmail messages;
  • fake investment offers;
  • messages using the victim’s full name or personal details.

A text scam may be sent through ordinary SMS, Viber, Messenger, WhatsApp, Telegram, email, or other platforms. The legal analysis depends on the contents of the message, the method used, the identity of the sender, the amount involved, and the harm caused.


III. What Is Libel?

Libel is a public and malicious imputation of a crime, vice, defect, act, omission, condition, status, or circumstance that tends to dishonor, discredit, or cause contempt against a person.

In simpler terms, libel may exist when someone publicly makes a false and damaging statement about another identifiable person.

The usual elements of libel are:

  1. Defamatory imputation There must be a statement that tends to dishonor, discredit, or cause contempt against a person.

  2. Publication The statement must be communicated to a third person.

  3. Identification The offended person must be identifiable.

  4. Malice Malice may be presumed in defamatory publications, though it may be rebutted depending on the circumstances.

When the defamatory statement is made through a computer system, social media, online messaging, or similar technology, the issue may become cyber libel.


IV. Can a Text Message Be Libelous?

Yes, a text message can potentially become the basis of a libel complaint if it satisfies the elements of libel.

However, not every insulting or angry text message is libel. The critical issue is publication. If a defamatory text is sent only to the person being insulted, there may be no publication to a third person. Without publication, ordinary libel may fail.

For example:

  • “You are a thief” sent directly only to the person accused may be offensive, but libel may be difficult if no third person received it.
  • “Do not trust Juan. He stole money from us” sent to a group chat may be more likely to raise libel issues because others saw it.
  • “Maria is a scammer” posted on Facebook or sent to her employer, relatives, customers, or community group may support a libel or cyber libel complaint if false and malicious.

Thus, the same statement may have different legal consequences depending on who received it.


V. Text Scam Laws Potentially Involved

Text scams may violate several Philippine laws depending on the facts.

A. Revised Penal Code: Estafa

If the scammer deceives the victim and obtains money, property, or benefit, the offense may be estafa. Estafa generally involves deceit or abuse of confidence causing damage to another.

Examples:

  • fake seller receives payment but never delivers goods;
  • scammer pretends to be a relative needing emergency money;
  • fake investment operator promises returns and disappears;
  • person misrepresents identity to borrow money;
  • scammer tricks victim into transferring e-wallet funds.

If the scam is committed through electronic means, cybercrime laws may also apply.

B. Cybercrime Prevention Act

The Cybercrime Prevention Act may apply when the scam involves a computer system, electronic communications, digital platforms, or online accounts.

Relevant cybercrime theories may include:

  • computer-related fraud;
  • computer-related identity theft;
  • cyber libel;
  • illegal access, where hacking is involved;
  • misuse of devices;
  • cyber-related threats or harassment, depending on facts;
  • aiding or abetting cybercrime, in proper cases.

A text scam using phishing links, fake accounts, hacked accounts, or online payment platforms may fall within cybercrime investigation.

C. Identity Theft

If the scammer uses another person’s name, number, photo, profile, company identity, or official position, the case may involve identity theft.

Examples:

  • a scammer pretends to be a bank officer;
  • a person uses another’s name to borrow money;
  • a fake account uses someone’s photo to solicit donations;
  • a scammer impersonates a lawyer, police officer, employer, or relative;
  • a text sender uses stolen personal information to appear credible.

Identity theft is especially serious when it is used to commit fraud, extortion, or reputational harm.

D. SIM Registration-Related Issues

The SIM Registration framework is meant to reduce anonymous misuse of SIM cards. It may assist investigation by tying a SIM card to registration information. However, scammers may still use stolen identities, mule SIMs, fake documents, foreign numbers, spoofing, or messaging apps.

A registered SIM does not automatically prove who sent the message. It is evidence that may lead investigators to the registered user, but further proof may still be needed.

E. Data Privacy Violations

Text scams often involve misuse of personal data. Many victims receive scam messages that include their full name, address, account details, or other personal information.

Possible data privacy issues arise when:

  • personal information is collected without authority;
  • personal data is sold, leaked, or misused;
  • sensitive personal information is used in scams;
  • identity details are used to deceive victims;
  • private contact lists are harvested.

A data privacy complaint may be relevant if the issue involves unauthorized processing or misuse of personal information.

F. Threats, Coercion, and Harassment

Some scam texts are not merely deceptive; they are threatening.

Examples:

  • “Pay now or we will post your photos.”
  • “We know where you live.”
  • “Your family will be harmed if you do not send money.”
  • “We will tell your employer you are a thief.”
  • “We will spread your private photos.”

Depending on the facts, these may involve grave threats, light threats, coercion, unjust vexation, harassment, blackmail, or other offenses.


VI. Cyber Libel and Text Messages

Cyber libel may arise when defamatory statements are made through a computer system or electronic platform. A defamatory post on Facebook, a message in a group chat, an online review, a public comment, or a mass message may trigger cyber libel issues.

The question with SMS is more nuanced. A text message may be electronic communication, but the libel analysis still requires publication, identification, defamatory imputation, and malice. The stronger cyber libel cases usually involve posts or messages sent to multiple people, not merely a private one-to-one insult.

Examples that may support cyber libel:

  • a scammer sends messages to a victim’s friends claiming the victim is a prostitute, thief, drug user, or debtor;
  • a person posts screenshots and accuses someone of being a scammer without proof;
  • a business competitor sends messages to customers saying the owner is a criminal;
  • a fake number sends defamatory messages to an employer;
  • a group chat contains false accusations against an identifiable person.

Examples that may not easily support libel:

  • a private angry text sent only to the offended person;
  • vague insults without identification;
  • opinion or hyperbole not asserting a factual accusation;
  • statements that are true and made for a proper purpose;
  • privileged communications made in good faith, such as a formal complaint to authorities.

VII. Accusing Someone of Being a Scammer: Libel Risk

Victims often want to warn others after being scammed. This is understandable, but careless accusations can create libel risk.

Calling someone a “scammer,” “fraudster,” “thief,” or “estafador” can be defamatory if the accusation is false, unsupported, malicious, or publicly circulated.

A safer approach is to state verifiable facts rather than conclusions.

Riskier statement:

“Juan Dela Cruz is a scammer. Do not transact with him. He steals money.”

Safer factual statement:

“I paid this account for an item on March 3. The item was not delivered. The seller stopped replying. I have filed a complaint and am sharing this to warn others to verify before sending payment.”

The second statement is still potentially sensitive, but it is more factual and less conclusory. The safest course is to report to the platform, bank, e-wallet provider, and authorities rather than relying only on public shaming.


VIII. Truth as a Defense in Libel

Truth may be a defense, but it is not always enough by itself. In Philippine libel law, truth may help when the statement is made with good motives and for justifiable ends.

This matters because a person may believe, “It is not libel if it is true.” That is an oversimplification. Truth is important, but the manner, purpose, audience, wording, and supporting evidence also matter.

For example, a victim who has receipts, screenshots, demand messages, and a filed complaint may have a stronger basis to warn others. But if the victim exaggerates, adds unsupported accusations, attacks relatives, or publishes private information unnecessarily, legal exposure may remain.


IX. Opinion, Fair Comment, and Privileged Communication

Not every negative statement is libel.

A. Opinion

Statements of opinion may be protected if they do not imply false defamatory facts. For example:

  • “I had a bad experience with this seller.”
  • “I do not recommend transacting with this account.”
  • “In my opinion, this looks suspicious.”

However, labeling someone as a criminal or scammer may be treated as a factual accusation, not mere opinion.

B. Fair Comment

Fair comment may apply to matters of public interest or public conduct, especially where the statement is based on disclosed facts.

C. Privileged Communication

Certain communications are privileged, such as statements made in official proceedings, complaints to proper authorities, or communications made in the performance of a legal, moral, or social duty.

A complaint submitted to the police, prosecutor, NBI, PNP, barangay, e-wallet provider, bank, or platform may be safer than a public accusation, provided it is made in good faith and based on evidence.


X. Private Message Versus Group Chat Versus Public Post

The audience matters.

A. Private one-to-one text

A defamatory insult sent only to the person concerned may lack publication for libel. It may still be evidence of harassment, threats, coercion, unjust vexation, or other offenses.

B. Group chat

A defamatory message in a group chat may be published because third persons can read it. This may support libel or cyber libel depending on the platform and circumstances.

C. Public social media post

A defamatory post on Facebook, TikTok, X, Instagram, YouTube, or similar platform is more likely to satisfy publication.

D. Message to employer, family, or clients

A defamatory message sent to third persons specifically to damage reputation may be strong evidence of publication and malice.


XI. Text Scam Evidence: What to Preserve

Victims should preserve evidence immediately. Scammers often delete accounts, change numbers, or block victims.

Important evidence includes:

  • screenshots of the text messages;
  • full phone number or sender ID;
  • date and time of messages;
  • full message thread, not only selected parts;
  • links included in the text;
  • screenshots of websites opened from the link;
  • call logs;
  • voice recordings, where legally obtained;
  • payment receipts;
  • bank transfer confirmations;
  • e-wallet transaction IDs;
  • account names and numbers used by the scammer;
  • delivery records, if a fake seller is involved;
  • social media profile URLs;
  • marketplace listing screenshots;
  • emails;
  • names of witnesses;
  • barangay or police blotter;
  • reports filed with platforms, banks, e-wallets, or telecom companies.

Do not rely on cropped screenshots alone. Full context is important.


XII. Libel Evidence: What to Preserve

For libel or cyber libel complaints, preserve:

  • screenshots of the defamatory statement;
  • URL or link, if online;
  • name or username of the poster;
  • phone number or account that sent the message;
  • date and time;
  • list of recipients or group members, if known;
  • comments, reactions, shares, or replies;
  • evidence that the statement refers to the complainant;
  • proof that third persons saw or received it;
  • evidence of falsity;
  • evidence of damage to reputation, employment, business, family, or mental well-being;
  • witness statements from recipients or readers.

For group chats, preserve the group name, members, timestamps, and context. For public posts, capture the entire page, not just the defamatory line.


XIII. Reporting a Text Scam

A victim may report a text scam to several entities depending on the case.

A. Telecom provider

Report the number and message to the mobile network. The provider may block, investigate, or preserve relevant account information subject to law.

B. Bank or e-wallet provider

If money was transferred, immediately report the transaction to the bank or e-wallet provider. Provide transaction ID, account number, recipient name, amount, time, and screenshots. Prompt reporting may help freeze or trace funds.

C. Platform or app

If the scam used Facebook, Messenger, Viber, Telegram, WhatsApp, Shopee, Lazada, TikTok, Instagram, or another platform, report the account and preserve screenshots before the account is deleted.

D. Law enforcement

For serious scams, file a report with cybercrime authorities, police, or the NBI. Bring printed and digital copies of evidence.

E. Prosecutor’s office

If the suspect is identified and evidence is sufficient, a criminal complaint may be filed for preliminary investigation.

F. National Privacy Commission

If the case involves misuse, leak, or unauthorized processing of personal data, a data privacy complaint may be considered.


XIV. Filing a Libel or Cyber Libel Complaint

A libel or cyber libel complaint generally requires a sworn complaint-affidavit and supporting evidence.

The complaint should identify:

  1. the complainant;
  2. the respondent, if known;
  3. the defamatory statement;
  4. where and when it was made;
  5. who saw or received it;
  6. why it refers to the complainant;
  7. why it is false or malicious;
  8. how it damaged the complainant;
  9. supporting witnesses and documents.

The complainant should attach screenshots, links, printed copies, affidavits of witnesses, and proof of damage.

If the sender is unknown, the victim may first seek law enforcement assistance to identify the sender. The complaint may require technical investigation, subpoenas, preservation requests, or coordination with telecoms and platforms.


XV. When the Sender Is Unknown

Many text scam and libel cases involve unknown senders. An anonymous number or fake account does not make the case impossible, but it makes investigation harder.

Possible investigative leads include:

  • registered SIM information;
  • call and text logs;
  • IP addresses, if apps or links were used;
  • payment accounts;
  • bank or e-wallet recipient names;
  • device identifiers;
  • delivery addresses;
  • marketplace profiles;
  • email addresses;
  • social media accounts;
  • witnesses who know the sender;
  • repeated language patterns;
  • linked phone numbers;
  • prior transactions.

Victims should avoid illegal self-help methods such as hacking, phishing, doxxing, or threatening suspects. These may create liability for the victim.


XVI. Demand Letters

A demand letter may be useful in some cases, especially where:

  • the sender is known;
  • the victim wants retraction or apology;
  • money was obtained and restitution is possible;
  • defamatory posts remain online;
  • the victim wants preservation of evidence;
  • a civil settlement is possible.

A demand letter may ask the respondent to:

  • stop sending messages;
  • retract defamatory statements;
  • delete or correct posts;
  • issue an apology;
  • preserve evidence;
  • return money;
  • cease using the victim’s name or identity;
  • communicate only through counsel.

However, demand letters must be carefully drafted. A threatening or excessive demand may create counterclaims or escalate the dispute.


XVII. Barangay Proceedings

Barangay conciliation may be relevant if the parties live in the same city or municipality and the offense or dispute is covered by barangay conciliation rules. However, many cybercrime, libel, and serious fraud cases may go directly to law enforcement or the prosecutor depending on the circumstances.

Barangay blotters may still be useful as a record of harassment, threats, or repeated unwanted communications, but a blotter is not a criminal conviction and does not itself resolve the case.


XVIII. Civil Liability for Text Scam or Libel

Apart from criminal liability, the victim may seek civil damages.

Possible damages include:

  • actual damages, such as money lost to the scam;
  • moral damages for anxiety, humiliation, sleepless nights, or reputational harm;
  • exemplary damages in proper cases;
  • attorney’s fees;
  • litigation expenses;
  • business losses, if proven.

In libel cases, reputational damage can support moral damages. In scam cases, the victim may seek return of the amount lost and other damages.


XIX. Injunctions, Takedowns, and Retractions

Where defamatory content remains online or repeated messages continue, the victim may seek practical remedies such as:

  • platform takedown;
  • account suspension;
  • cease-and-desist demand;
  • retraction;
  • clarification post;
  • apology;
  • civil court remedies;
  • criminal complaint;
  • protection-related remedies if threats or abuse are involved.

The appropriate remedy depends on urgency, evidence, identity of the offender, and risk to the victim.


XX. Common Text Scam Scenarios and Legal Analysis

A. Fake bank text with phishing link

A text claims that the recipient’s bank account is locked and asks the recipient to click a link. The link asks for username, password, OTP, or card details. This may involve phishing, computer-related fraud, identity theft, unauthorized access, and data privacy violations.

Victim should preserve the message, avoid clicking further, report to the bank, change credentials, and file a report if money was lost.

B. Fake GCash or e-wallet verification message

A text claims the account will be suspended unless the user verifies. It asks for OTP or MPIN. This may involve fraud, identity theft, and unauthorized access.

Never disclose OTPs, MPINs, or passwords. Report immediately to the e-wallet provider.

C. Fake job offer

A message offers high pay for simple online tasks and later asks the victim to deposit money. This may involve estafa and computer-related fraud.

Evidence should include all messages, payment receipts, bank/e-wallet details, and task instructions.

D. Fake delivery message

A text claims a package cannot be delivered unless the recipient pays a small fee through a link. This may be phishing or fraud.

Victim should verify through the official courier website or app, not through the text link.

E. Fake emergency text from a relative

A scammer pretends to be a child, parent, sibling, or friend and asks for urgent money. This may be estafa and identity misuse.

Victim should call the person through a known number before sending money.

F. Threatening collection text

Some loan apps or collectors send threats, shame messages, or messages to the victim’s contacts. Depending on facts, this may involve harassment, threats, unfair collection practices, data privacy violations, or libel if defamatory messages are sent to third persons.

G. Public accusation after failed transaction

A buyer posts online that the seller is a scammer. If the seller truly defrauded the buyer, the buyer may have defenses. But if the facts are incomplete, the public accusation may create libel risk. A factual report is safer than a broad criminal label.


XXI. Libel Complaint by an Alleged Scammer

A common situation is that a scam victim publicly complains, and the alleged scammer threatens to file cyber libel.

This does not automatically mean the victim should be silent. But the victim should be careful.

A victim should:

  • preserve all proof of the transaction;
  • avoid exaggerated statements;
  • avoid insulting the person’s family;
  • avoid posting private information unnecessarily;
  • state only verifiable facts;
  • file formal complaints;
  • report to the platform;
  • warn others in measured language;
  • avoid declaring guilt before legal finding;
  • consult counsel for serious cases.

A person can report fraud without recklessly defaming another.


XXII. Defenses to Libel or Cyber Libel

Possible defenses include:

  1. Truth with good motives and justifiable ends The statement was true and made for a proper purpose.

  2. Lack of publication The statement was not communicated to a third person.

  3. Lack of identification The complainant was not identifiable.

  4. Privileged communication The statement was made in a formal complaint, official proceeding, or good-faith duty.

  5. Fair comment or opinion The statement was opinion based on disclosed facts, not a false factual accusation.

  6. No malice The circumstances rebut malice.

  7. Good faith warning The statement was made to protect others, though this must be carefully supported.

  8. Absence of defamatory meaning The words used were not defamatory in context.

The best defense depends on the exact words, audience, evidence, and motive.


XXIII. Risks of Counterclaims

In text scam and libel disputes, both sides may file complaints. For example:

  • the victim files estafa or cybercrime complaint;
  • the alleged scammer files libel complaint;
  • the victim files unjust vexation or harassment complaint;
  • the respondent files counter-affidavit alleging false accusation;
  • both parties file civil claims.

Because of this, communications should be disciplined. Emotional posts, threats, insults, and doxxing can weaken an otherwise strong complaint.


XXIV. Doxxing and Posting Personal Information

Victims sometimes post the alleged scammer’s address, phone number, family photos, workplace, ID, or personal documents. This can create legal problems.

Even if the person is suspected of scamming, publishing unnecessary personal data may raise privacy, harassment, or libel issues.

A safer warning focuses on transaction facts:

  • account name used;
  • transaction date;
  • platform username;
  • amount paid;
  • item not delivered;
  • complaint filed.

Avoid posting unrelated family members, home addresses, children’s names, private IDs, or unverified accusations.


XXV. Screenshots as Evidence

Screenshots are useful but may be challenged. The opposing party may claim they were edited, incomplete, fabricated, or taken out of context.

To strengthen screenshots:

  • capture the full screen;
  • include date and time;
  • include phone number or username;
  • preserve the original device;
  • do not delete the thread;
  • back up the messages;
  • export chat history where possible;
  • use screen recording to show navigation;
  • have witnesses preserve their copies;
  • print and attach to affidavits;
  • preserve metadata if available.

For serious cases, digital forensic preservation may be necessary.


XXVI. Authentication of Electronic Evidence

Electronic evidence must be authenticated. The person presenting the evidence should be able to explain:

  • how the message was received;
  • what device received it;
  • whether the screenshot is accurate;
  • whether the message remains in the device;
  • who had access to the device;
  • whether the number or account belongs to the respondent;
  • whether the evidence was altered;
  • how the evidence was stored.

A screenshot is stronger when supported by testimony, device inspection, telecom records, platform records, payment records, and witness statements.


XXVII. Role of Telecom and Platform Records

Telecom and platform records may help identify senders, but private individuals usually cannot simply demand confidential subscriber information. Law enforcement, prosecutors, or courts may need to issue lawful requests.

Relevant records may include:

  • subscriber registration details;
  • call and text logs;
  • cell site information, where legally available;
  • account registration details;
  • IP logs;
  • login history;
  • linked email addresses;
  • payment accounts;
  • device information.

These records are usually obtained through lawful investigative channels.


XXVIII. The Importance of the Exact Words Used

In libel, exact wording matters. A complaint should quote the precise statement. Paraphrasing may weaken the case.

Compare:

  • “He is a scammer.”
  • “I think he might be involved in a scam.”
  • “I paid him and did not receive the item.”
  • “Several people complained about non-delivery.”
  • “A complaint has been filed against him.”

These statements have different legal risks. Defamatory meaning often depends on wording and context.


XXIX. Identification Without Naming the Person

Libel may exist even if the person is not named, as long as readers can identify the person.

A post may identify someone by:

  • photo;
  • phone number;
  • nickname;
  • workplace;
  • address;
  • unique facts;
  • initials;
  • screenshots;
  • tags;
  • comments;
  • group context;
  • account name;
  • transaction details.

A person who says “I did not name you” may still be liable if the audience understood who was being referred to.


XXX. Malice

Malice is a key concept in libel. It may be presumed from defamatory publication, but the respondent may try to show good faith, truth, fair comment, or privileged communication.

Evidence of malice may include:

  • repeated posting despite correction;
  • refusal to delete false accusation;
  • personal grudge;
  • exaggeration;
  • fabricated screenshots;
  • sending defamatory messages to employer or family;
  • intent to shame rather than report;
  • using fake accounts;
  • targeting unrelated people.

Evidence of good faith may include:

  • formal complaint filed;
  • accurate statement of facts;
  • warning limited to affected persons;
  • no unnecessary insults;
  • willingness to correct mistakes;
  • supporting receipts and screenshots;
  • lack of personal vendetta.

XXXI. Prescription Periods and Urgency

Legal time limits may apply to libel, cyber libel, estafa, and other offenses. The applicable period depends on the specific offense charged and current legal interpretation. Because prescription can be technical, victims should act promptly.

Practical urgency also matters because:

  • messages may be deleted;
  • accounts may be deactivated;
  • numbers may be abandoned;
  • funds may be withdrawn;
  • CCTV or transaction records may expire;
  • platform logs may not be preserved indefinitely;
  • witnesses may forget details.

Prompt reporting improves the chance of preserving evidence.


XXXII. Settlement

Some text scam and libel disputes settle. Settlement may involve:

  • return of money;
  • apology;
  • retraction;
  • deletion of posts;
  • non-disparagement agreement;
  • undertaking not to contact;
  • withdrawal of complaint, where legally permissible;
  • civil compromise.

However, not all criminal cases are freely dismissible by private agreement. Even if the complainant forgives the respondent, the State may still have an interest in prosecution depending on the offense.

Settlement agreements should be written carefully. They should avoid admitting facts unintentionally unless intended.


XXXIII. What a Victim Should Not Do

A victim should avoid:

  • hacking the sender’s account;
  • threatening the suspect;
  • posting unverified accusations;
  • publishing private addresses or IDs;
  • creating fake accounts to retaliate;
  • editing screenshots;
  • deleting parts of conversations;
  • sending false reports;
  • contacting the suspect’s family with insults;
  • making threats of violence;
  • demanding excessive money unrelated to actual loss;
  • using the wrong legal labels carelessly.

The victim’s own conduct may become evidence.


XXXIV. What an Accused Person Should Do

A person accused of text scam or libel should:

  • preserve all messages and transaction records;
  • avoid deleting accounts or conversations;
  • avoid retaliatory posts;
  • avoid contacting the complainant in a threatening manner;
  • prepare a factual timeline;
  • gather proof of delivery, refund, or legitimate transaction;
  • identify witnesses;
  • respond through counsel for serious accusations;
  • submit a counter-affidavit if required;
  • correct misunderstandings early where possible;
  • avoid admitting criminal liability casually in chats.

If falsely accused, the person may have defenses and possible remedies, but must respond carefully.


XXXV. Complaint-Affidavit for Text Scam

A complaint-affidavit for a text scam should generally include:

  1. complainant’s identity;
  2. respondent’s identity, if known;
  3. how the complainant received the text;
  4. full text of the message;
  5. phone number or account used;
  6. date and time;
  7. link or instructions sent;
  8. how the complainant was deceived;
  9. amount or property lost;
  10. payment details;
  11. efforts to contact the sender;
  12. reports made to bank, e-wallet, platform, or telecom;
  13. attached screenshots and receipts;
  14. names of witnesses.

The affidavit should be chronological and factual.


XXXVI. Complaint-Affidavit for Libel or Cyber Libel

A complaint-affidavit for libel should generally include:

  1. the exact defamatory words;
  2. date, time, and place of publication;
  3. platform or method used;
  4. person or group who saw or received the statement;
  5. explanation of how the complainant was identified;
  6. explanation of why the statement is false;
  7. facts showing malice;
  8. harm suffered;
  9. attached screenshots, links, and witness affidavits;
  10. prior demands or retractions, if any.

A libel complaint should not be vague. Courts and prosecutors examine the exact words and context.


XXXVII. Sample Safer Public Warning

When warning others, use measured language. For example:

“Public advisory: I paid ₱____ to this account on [date] for [item/service]. As of today, I have not received the item/service and the account has stopped responding. I have reported the matter to the platform and payment provider. Please verify carefully before transacting.”

This avoids unnecessary criminal labels while still communicating the factual risk.


XXXVIII. Sample Demand for Retraction

A demand for retraction may say:

“You sent or published statements on [date] claiming that I [exact accusation]. These statements are false and have damaged my reputation. I demand that you immediately cease publication, remove the statements, and issue a written clarification or retraction. I reserve all rights to file the appropriate civil and criminal actions.”

This should be adjusted to the facts and reviewed carefully in serious cases.


XXXIX. Relationship Between Text Scam and Libel Complaints

A text scam case and a libel case may exist independently, but they often interact.

Scenario 1: Scammer defames the victim

The scammer sends texts to the victim’s friends claiming the victim is a criminal. The victim may have claims for scam-related offenses and libel.

Scenario 2: Victim publicly accuses scammer

The victim posts that the seller is a scammer. The seller threatens cyber libel. The victim’s defense depends on truth, good faith, evidence, and wording.

Scenario 3: Fake number sends defamatory scam messages

A fake number impersonates the victim and sends messages asking for money. This may involve identity theft, fraud, and reputational harm.

Scenario 4: Collection harassment

A lender or collector sends messages to the borrower’s contacts calling the borrower a criminal or immoral person. This may involve data privacy, harassment, and libel issues.

Scenario 5: Group chat accusation

A person accuses another in a group chat of estafa. If false and malicious, this may be libelous. If true, factual, and made in good faith to warn victims, defenses may exist.


XL. Remedies Available to Victims

Victims may consider:

  • blocking the number after preserving evidence;
  • reporting to telecom provider;
  • reporting to bank or e-wallet provider;
  • reporting to platform;
  • filing a cybercrime complaint;
  • filing an estafa complaint;
  • filing a libel or cyber libel complaint;
  • filing a data privacy complaint;
  • sending a demand letter;
  • seeking civil damages;
  • requesting takedown of defamatory content;
  • warning contacts in measured language;
  • strengthening account security.

The correct remedy depends on the facts.


XLI. Remedies Available to Persons Falsely Accused

A person falsely accused of being a scammer may consider:

  • demanding retraction;
  • requesting takedown;
  • preserving the defamatory posts;
  • filing a libel or cyber libel complaint;
  • filing a civil action for damages;
  • responding factually with proof;
  • reporting fake accounts;
  • documenting business losses;
  • avoiding retaliation.

A false accusation of scamming can seriously harm reputation, livelihood, and personal relationships.


XLII. Practical Legal Strategy for a Text Scam Victim

A strong response usually follows this sequence:

  1. Stop communicating emotionally.
  2. Preserve all messages and transaction records.
  3. Report the transaction to the bank or e-wallet immediately.
  4. Report the number or account to the platform or telecom.
  5. Prepare a chronological evidence folder.
  6. File a report with cybercrime authorities or police.
  7. Avoid public accusations unless carefully worded.
  8. If warning others, state facts and attach only necessary proof.
  9. Consult counsel if the amount is large, threats are involved, or a libel threat is received.
  10. Follow up on preservation and investigation.

XLIII. Practical Legal Strategy for a Libel Complainant

A person considering libel complaint should:

  1. preserve the exact defamatory statement;
  2. identify who received or saw it;
  3. prove that it refers to the complainant;
  4. prove falsity and damage;
  5. avoid retaliating online;
  6. consider a demand for takedown or retraction;
  7. gather witness affidavits;
  8. file within the applicable period;
  9. prepare for possible defenses;
  10. consider whether civil damages or settlement is preferable.

XLIV. Practical Legal Strategy for a Person Threatened With Libel

A person threatened with libel after reporting a scam should:

  1. stop posting emotionally;
  2. save all scam evidence;
  3. review the exact words posted;
  4. remove or edit unsupported accusations if necessary;
  5. preserve proof that the statements were factual;
  6. file formal complaints;
  7. avoid further defamatory labels;
  8. respond through counsel if a formal complaint is filed;
  9. gather witnesses who were also victimized;
  10. rely on facts, not insults.

A libel threat does not erase the scam complaint, but careless speech can create a separate problem.


XLV. Conclusion

Text scams and libel complaints in the Philippines involve overlapping areas of criminal law, cybercrime law, evidence law, telecommunications regulation, data privacy, and civil liability. A scam victim may have remedies for fraud, identity theft, cybercrime, threats, harassment, or damages. A person defamed through texts, group chats, or online posts may have remedies for libel or cyber libel. At the same time, a victim who publicly accuses someone of being a scammer must be careful to avoid creating a libel issue.

The most important practical rule is to preserve evidence and communicate carefully. Save the messages, transaction records, links, phone numbers, account details, and witness statements. Report through proper channels. When warning others, state verifiable facts rather than reckless accusations. When filing a complaint, identify the correct offense and present the exact words, dates, recipients, and supporting documents.

In Philippine law, a text message is not “just a text” when it is used to deceive, threaten, harass, defame, or steal. It can become the foundation of a criminal complaint, a civil claim, a cybercrime investigation, or a defense. The outcome often depends on the evidence, the wording, the audience, the intent, and the ability to connect the message to the sender.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.