I. Introduction
Scams in the Philippines now happen through text messages, phone calls, Facebook Marketplace, Messenger, Viber, Telegram, WhatsApp, Instagram, TikTok, dating apps, online banking, e-wallets, cryptocurrency platforms, fake investment schemes, online lending apps, job offers, parcel delivery messages, fake government pages, and impersonation of banks or public officials.
A victim’s first instinct is often to “trace the scammer.” This is understandable. The victim wants to know who the scammer is, recover the money, stop the fraud, warn others, and file a case. But tracing a scammer must be done lawfully. Victims should preserve evidence, report quickly to banks or platforms, request account freezing where possible, file complaints with proper authorities, and avoid illegal retaliation, hacking, doxxing, threats, or public accusations without proof.
In the Philippine context, scam cases may involve criminal law, cybercrime law, consumer protection, data privacy, banking rules, telecommunications rules, e-wallet procedures, anti-money laundering concerns, and civil remedies.
This article discusses how to trace and report a scammer in the Philippines, what evidence to collect, where to report, what crimes may apply, what agencies may help, how to request preservation of digital evidence, how to pursue recovery, and what mistakes victims should avoid.
This is general legal information, not a substitute for legal advice from a lawyer or direct assistance from law enforcement.
II. What Is a Scam?
A scam is a fraudulent scheme designed to deceive a person into giving money, property, account access, personal information, identity documents, or other benefits.
A scam may involve:
- False identity;
- false promises;
- fake documents;
- fake online stores;
- fake investments;
- fake jobs;
- fake loans;
- fake bank alerts;
- fake romantic relationships;
- fake charity appeals;
- fake parcel delivery notices;
- fake government messages;
- unauthorized bank transfers;
- identity theft;
- phishing links;
- impersonation;
- mule accounts;
- fake receipts;
- forged screenshots;
- manipulated conversations.
The key feature is deception. The scammer induces the victim to act by lying, concealing facts, pretending authority, or misusing trust.
III. Common Scams in the Philippines
1. Online selling scams
The scammer pretends to sell goods such as phones, gadgets, shoes, appliances, tickets, vehicles, pets, or luxury items. The buyer pays a deposit or full price, but the seller disappears.
2. Fake buyer scams
The scammer pretends to buy an item and sends a fake payment receipt, fake bank transfer confirmation, or courier pickup request.
3. Phishing and smishing
The victim receives a fake bank, e-wallet, delivery, or government link and enters passwords, OTPs, card details, or personal information.
4. Vishing
The scammer calls the victim pretending to be from a bank, telco, government agency, courier, or law enforcement office.
5. Investment scams
The scammer promises high returns, guaranteed profit, cryptocurrency trading, forex trading, “double your money,” online paluwagan, task-based earnings, or networking returns.
6. Romance scams
The scammer builds an emotional relationship and later asks for money for emergencies, travel, hospital bills, customs fees, or business problems.
7. Job scams
The scammer offers employment, work-from-home tasks, overseas placement, training, or visa processing in exchange for fees.
8. Loan scams
The scammer offers fast loans but demands processing fees, insurance, collateral release fees, or advance payments.
9. Fake online lending or debt collection scams
The scammer pretends to be a lender or collector and threatens the victim or contacts.
10. Identity theft
The scammer uses the victim’s name, ID, photo, SIM, social media, or documents to open accounts, borrow money, or deceive others.
11. Unauthorized bank or e-wallet transfers
The scammer gains access to the victim’s account and transfers funds to mule accounts.
12. Fake charity or emergency scams
The scammer pretends to collect for medical emergencies, disaster relief, burial assistance, or community causes.
13. Marketplace meet-up scams
The scammer arranges pickup, fake escrow, fake courier, or fake proof of payment.
14. Ticket and reservation scams
The scammer sells fake concert tickets, airline tickets, hotel bookings, or event passes.
15. Rental scams
The scammer advertises a condo, apartment, dormitory, or vacation rental that does not exist or is not theirs to rent.
IV. First Rule: Preserve Evidence Immediately
The most important step after being scammed is evidence preservation. Many victims lose their case because they delete messages, fail to take screenshots, lose transaction references, or only remember details verbally.
Preserve:
- Chat messages;
- SMS messages;
- emails;
- call logs;
- screenshots of profile pages;
- usernames and display names;
- phone numbers;
- bank account numbers;
- e-wallet numbers;
- QR codes;
- transaction receipts;
- reference numbers;
- deposit slips;
- proof of payment;
- product listings;
- links;
- website URLs;
- tracking numbers;
- fake IDs sent by scammer;
- photos or videos;
- voice recordings, if lawfully obtained;
- delivery details;
- courier details;
- IP-related information if visible;
- social media posts;
- group chat records;
- names of witnesses;
- timeline of events.
Do not rely only on screenshots if the original messages still exist. Keep the original conversation in the app because authorities may need to inspect it.
V. Create a Timeline
A clear timeline helps police, prosecutors, banks, e-wallets, platforms, and lawyers understand the case.
Include:
- Date and time you first contacted the scammer;
- platform used;
- name, username, page name, or number used by scammer;
- what the scammer promised;
- amount requested;
- payment method;
- date and time of payment;
- account or wallet where money was sent;
- reference number;
- date scam was discovered;
- attempts to contact scammer;
- reports made to bank, e-wallet, platform, police, or other agencies;
- responses received.
The timeline should be factual and chronological.
VI. Secure Your Accounts First
Before tracing the scammer, protect yourself from further loss.
Immediately:
- Change passwords for banking, e-wallet, email, and social media;
- enable multi-factor authentication;
- log out unknown devices;
- block cards if card details were exposed;
- call the bank or e-wallet;
- report unauthorized transactions;
- freeze affected accounts;
- secure your SIM;
- contact telco if SIM swap is suspected;
- scan phone or computer for malware;
- uninstall suspicious apps;
- revoke app permissions;
- update recovery email and phone number;
- warn contacts if your account was used to scam others.
If the scam involved OTP, remote access, phishing, or account takeover, speed is critical.
VII. Can You Trace a Scammer Yourself?
You may gather public and personal evidence, but you should not use illegal methods.
You may lawfully:
- Save screenshots;
- identify usernames, links, phone numbers, bank accounts, and wallet numbers;
- search public profiles;
- check whether the same number or account appears in other scam reports;
- ask the bank or e-wallet to investigate;
- report to the platform;
- file a police or cybercrime complaint;
- request preservation of records through authorities;
- coordinate with other victims carefully;
- ask a lawyer to assist.
You should not:
- Hack accounts;
- threaten the scammer;
- publish private information without verification;
- impersonate law enforcement;
- entrap without guidance;
- access someone else’s account;
- buy leaked personal data;
- bribe insiders;
- harass suspected relatives;
- spread unverified accusations;
- post ID documents publicly;
- use spyware or illegal tracking tools.
Illegal tracing can expose the victim to criminal or civil liability and may weaken the case.
VIII. What Information Helps Trace a Scammer?
Helpful tracing information includes:
A. Phone number
A phone number may help identify a SIM subscriber through lawful requests by authorities. Victims should preserve SMS, call logs, and messaging app details.
B. Bank account number
Bank accounts used to receive scam proceeds may be mule accounts. Report the receiving account quickly to the sending and receiving banks.
C. E-wallet number
E-wallet accounts may have KYC data, transaction logs, device logs, and linked numbers. These are usually accessible only through lawful investigation.
D. Social media profile
Save the profile URL, username, display name, page ID if visible, profile photos, posts, comments, group listings, and marketplace ad.
E. Email address
Preserve emails, headers if available, sender address, reply-to address, and attachments.
F. Website or URL
Save the full URL, screenshots, domain name, payment page, and browser history.
G. Transaction reference number
This is critical for banks, e-wallets, and law enforcement.
H. Courier or delivery information
If goods or documents were shipped, preserve tracking numbers, pickup address, recipient details, and courier records.
I. Government IDs sent by scammer
Scammers often use stolen IDs. Preserve them but do not assume the person on the ID is the scammer.
J. Photos and videos
Images may be stolen from innocent people. Use them as leads, not final proof.
IX. Bank and E-Wallet Transfers: Act Immediately
If money was sent through a bank or e-wallet, report immediately.
Request:
- fraud report;
- transaction hold or freeze, if possible;
- recall or reversal request;
- investigation reference number;
- preservation of transaction logs;
- escalation to fraud department;
- confirmation of report in writing;
- information on required police report or affidavit;
- coordination with receiving institution.
Provide:
- your account details;
- receiving account or wallet number;
- amount;
- date and time;
- reference number;
- screenshots;
- scammer’s messages;
- proof that transaction was fraudulent.
Time matters because scam funds are often transferred out quickly.
X. Can the Bank or E-Wallet Reveal the Scammer’s Name?
Usually, banks and e-wallets will not simply disclose the receiving account holder’s personal information directly to the victim because of bank secrecy, data privacy, internal rules, and legal restrictions.
However, they may:
- receive your fraud report;
- investigate internally;
- freeze or restrict accounts in appropriate cases;
- coordinate with law enforcement;
- preserve records;
- provide information through lawful process;
- respond to subpoenas, court orders, or official requests.
Victims should not expect customer service to reveal the account holder’s identity immediately.
XI. Mule Accounts
Many scams use mule accounts. A mule account is an account used to receive and move scam proceeds. The account holder may be:
- a knowing participant;
- a person who rented out their account;
- a recruited “payment agent”;
- a victim of identity theft;
- someone deceived into receiving funds;
- a person whose account was hacked.
Even if the receiving account is traced, the named account holder may not be the mastermind. But the account is still an important lead.
XII. Reporting to the Sending Bank or E-Wallet
Report to your own bank or wallet first. Ask them to coordinate with the receiving institution.
Provide complete details and request written acknowledgment.
Useful wording:
“I am reporting a fraudulent transaction and requesting immediate assistance for recall, hold, investigation, and preservation of records.”
Keep the ticket number.
XIII. Reporting to the Receiving Bank or E-Wallet
If you know the receiving bank or wallet, report there too.
Some institutions may not disclose information but may accept fraud reports and take internal action.
Provide:
- receiving account number or wallet number;
- transaction reference;
- amount;
- date and time;
- proof of payment;
- scam evidence;
- your contact details;
- police report, if available.
Ask for a report reference number.
XIV. Reporting to Social Media and Online Platforms
If the scam happened on Facebook, Marketplace, Instagram, TikTok, Telegram, Viber, WhatsApp, Shopee, Lazada, Carousell, dating apps, job platforms, or other online platforms, report the account or listing.
Before reporting, save evidence. Some platforms remove the listing or account after reporting, which may make evidence harder to retrieve.
Preserve:
- profile URL;
- listing URL;
- screenshots;
- chat thread;
- transaction details;
- group name;
- admin names, if relevant;
- page transparency information, if available;
- seller ratings or reviews;
- comments by other victims.
Then report using the platform’s fraud or scam reporting system.
XV. Reporting to Police or Cybercrime Authorities
A scam may be reported to police or cybercrime units, especially if it involves online fraud, identity theft, unauthorized account access, phishing, or large financial loss.
Prepare:
- complaint-affidavit or sworn statement;
- valid ID;
- screenshots and printouts;
- transaction receipts;
- bank or wallet report reference;
- phone numbers and account numbers used;
- profile links;
- timeline;
- names of witnesses;
- device used, if relevant.
The police may evaluate whether the case falls under cybercrime, estafa, identity theft, or another offense.
XVI. Reporting to the Prosecutor’s Office
A criminal complaint may be filed with the Office of the City or Provincial Prosecutor.
A prosecutor evaluates whether there is probable cause to charge the suspect in court.
If the scammer’s identity is unknown, law enforcement investigation may be needed first. However, a complaint may still help preserve the case if there are identified account holders, phone numbers, or known persons.
XVII. Reporting to the National Bureau of Investigation
Cyber-related scams may also be reported to the NBI cybercrime division or relevant office. NBI may assist in investigation, evidence preservation, tracing, and case buildup.
Prepare organized evidence. The stronger your documents, the easier it is for investigators to understand the case.
XVIII. Reporting to the Philippine National Police Cybercrime Unit
The PNP has cybercrime units that handle online scams, hacking, identity theft, phishing, and related complaints.
Victims may report online fraud involving:
- social media scams;
- unauthorized bank transfers;
- phishing;
- fake websites;
- fake accounts;
- online threats;
- identity theft;
- online investment scams;
- fake seller or buyer scams.
XIX. Reporting to the Barangay
Barangay reporting may help if:
- the scammer is known and lives in the same city or municipality;
- the issue involves a local person;
- barangay conciliation is required before some civil actions;
- the victim wants an incident record;
- the scam began as a personal transaction.
However, barangay officials usually cannot trace cybercriminals, compel banks to reveal account holders, or prosecute crimes. Serious online scams should be reported to law enforcement.
XX. Reporting to the DTI
If the scam involves a business, online seller, merchant, store, or consumer transaction, the Department of Trade and Industry may be relevant.
However, if the seller is fake, unregistered, or the issue is clearly criminal fraud, law enforcement may be more appropriate.
Consumer complaints are different from criminal scam complaints, though both may arise from the same facts.
XXI. Reporting to the SEC
If the scam involves investment solicitation, lending companies, financing companies, investment contracts, securities, online lending apps, or unregistered investment schemes, the Securities and Exchange Commission may be relevant.
Investment scam red flags include:
- guaranteed high returns;
- recruitment commissions;
- “double your money” schemes;
- cryptocurrency investment pools;
- forex managed accounts;
- no registration;
- no license to solicit investments;
- pressure to reinvest;
- leaderboards and referral bonuses;
- refusal to return capital.
A criminal complaint may still be necessary for recovery and prosecution.
XXII. Reporting to the National Privacy Commission
If the scam involves misuse of personal data, identity theft, unlawful disclosure, harassment using contacts, unauthorized processing of IDs, or data breach issues, a complaint or report to the National Privacy Commission may be relevant.
Examples:
- scammer used your ID to borrow money;
- lending app accessed your contacts and harassed them;
- your personal information was posted publicly;
- a company mishandled your data;
- your identity was used to create fake accounts;
- debt collectors disclosed your alleged debt to others.
Data privacy remedies do not replace criminal complaints but may support them.
XXIII. Reporting to Telcos
If the scam involved SMS, calls, SIM swap, stolen SIM, or number impersonation, report to the telco.
Request:
- blocking of lost or compromised SIM;
- investigation of SIM replacement;
- preservation of records;
- report reference number;
- SIM registration concerns;
- assistance with account recovery.
Telcos usually will not disclose subscriber data directly to victims but may respond to lawful requests by authorities.
XXIV. Reporting to Website Hosts or Domain Registrars
If there is a fake website, phishing site, or fraudulent payment page, report it to:
- the platform hosting the website;
- domain registrar;
- browser safe browsing report systems;
- payment processor;
- bank or e-wallet linked to the site.
Before reporting, save screenshots and URLs.
XXV. Reporting to the App Store or Play Store
If the scam involved a malicious app, fake loan app, fake investment app, or remote access app, report the app to the app store.
Preserve:
- app name;
- developer name;
- screenshots;
- download link;
- permissions requested;
- messages instructing installation;
- date installed;
- what happened after installation.
XXVI. Crimes That May Apply
A. Estafa
Estafa is commonly involved in scams. It generally involves defrauding another person through deceit or abuse of confidence, causing damage.
Examples:
- fake seller accepts payment and disappears;
- fake investment solicitor promises returns and misappropriates money;
- borrower uses false identity to obtain money;
- scammer tricks victim into sending funds.
B. Computer-related fraud
If fraud is committed through computer systems, online platforms, or digital communications, cybercrime provisions may apply.
C. Computer-related identity theft
This may apply when a scammer uses another person’s identity online without authority.
D. Illegal access
If the scammer hacked or accessed an account without permission, illegal access may apply.
E. Data interference or system interference
These may apply if the scammer altered, deleted, or interfered with data or systems.
F. Misuse of devices
This may apply in certain cases involving tools, credentials, or devices used for cybercrime.
G. Falsification
If fake IDs, fake receipts, fake contracts, fake bank confirmations, fake permits, or forged documents were used, falsification may apply.
H. Use of falsified documents
Using a fake document to deceive the victim may be separately punishable.
I. Theft or qualified theft
If property or funds are taken without consent, theft-related charges may be considered depending on facts.
J. Swindling by false pretenses
Certain deceptive representations may fall under swindling provisions.
K. Threats, coercion, or harassment
If the scammer threatens or extorts the victim, additional offenses may apply.
L. Money laundering-related concerns
If proceeds are moved through mule accounts, banks and authorities may consider anti-money laundering implications.
XXVII. Estafa in Online Scams
Estafa is often the basic complaint in online scam cases.
To build an estafa complaint, evidence should show:
- The scammer made a false representation or deceitful act;
- the victim relied on that representation;
- the victim parted with money or property;
- the scammer caused damage;
- the scammer had fraudulent intent.
Examples:
- Scammer advertised a phone and promised delivery after payment, but never intended to deliver.
- Scammer promised investment returns but used funds for personal purposes.
- Scammer pretended to be a bank employee and induced the victim to transfer money.
- Scammer used fake receipts to obtain goods.
XXVIII. Cybercrime Angle
If the scam used the internet, electronic communications, online payment systems, or computer data, cybercrime law may increase the seriousness of the case or provide additional investigative tools.
Cybercrime evidence may include:
- chat logs;
- account login data;
- IP logs;
- device IDs;
- email headers;
- URLs;
- platform records;
- e-wallet logs;
- digital payment trails.
These records are usually obtained through official investigation, not private requests.
XXIX. Identity Theft
Identity theft occurs when a person uses another’s identifying information without authority.
Examples:
- using another person’s ID to open a wallet account;
- using stolen photos for a fake seller profile;
- pretending to be a bank employee;
- creating a fake account under someone else’s name;
- using the victim’s identity to borrow money;
- using another person’s SIM or email.
If the scammer sent you an ID, be careful. The ID may belong to another victim.
XXX. Falsification in Scam Cases
Falsification may be involved if the scammer used:
- fake government ID;
- fake business permit;
- fake SEC certificate;
- fake DTI registration;
- fake bank deposit slip;
- fake transfer receipt;
- fake employment contract;
- fake visa;
- fake courier receipt;
- fake certificate of title;
- fake notarized document;
- fake court paper;
- fake police clearance.
Preserve copies but do not alter them.
XXXI. Civil Remedies
Aside from criminal complaint, a victim may pursue civil remedies to recover money or damages.
Possible civil remedies:
- small claims case;
- ordinary civil action for sum of money;
- damages;
- rescission or cancellation of contract;
- replevin for recovery of goods;
- injunction, in limited cases;
- attachment, if grounds exist.
Civil remedies may be practical if the scammer is identified and has recoverable assets.
XXXII. Small Claims
If the amount falls within the small claims procedure and the defendant is identified, small claims may be a practical remedy for recovery of money.
Small claims may be useful for:
- unpaid loans;
- undelivered goods;
- failed online sale;
- refund claims;
- simple money claims.
However, small claims requires knowing whom to sue and where to serve them. If the scammer used fake identity or cannot be located, criminal investigation may be needed first.
XXXIII. Criminal Case vs Civil Case
A criminal case punishes the offender and may include civil liability. A civil case focuses on recovery or compensation.
A victim may pursue both depending on facts.
However:
- Criminal cases require proof beyond reasonable doubt at trial.
- Civil cases generally require preponderance of evidence.
- Criminal investigation may help identify the scammer.
- Civil judgment may be difficult to collect if the scammer has no assets.
- Settlement may resolve civil liability but may not automatically erase criminal liability.
XXXIV. Can You Recover the Money?
Recovery depends on speed, traceability, and whether funds remain in accounts.
Possible recovery routes:
- Bank or e-wallet hold or reversal;
- voluntary refund by scammer;
- settlement during investigation;
- restitution in criminal case;
- civil judgment;
- small claims judgment;
- attachment or execution against assets;
- insurance or bank reimbursement in limited cases;
- chargeback for card transactions, where available.
The faster the report, the better the chance of freezing funds.
XXXV. Chargebacks and Payment Disputes
If payment was made by credit card, debit card, payment gateway, or platform escrow, check whether chargeback or buyer protection is available.
Act quickly because dispute windows are limited.
Provide:
- proof of scam;
- proof of non-delivery;
- communications;
- transaction receipt;
- police report if required;
- platform report.
Bank transfer and e-wallet transfers are usually harder to reverse once completed.
XXXVI. Tracing Through Bank Accounts
A victim may know only the receiving bank account. The bank will usually not identify the account holder to the victim directly.
The proper process is:
- Report to your bank.
- Report to receiving bank.
- File police or cybercrime complaint.
- Provide transaction evidence.
- Authorities request records through lawful process.
- Bank provides information to authorities if legally required.
- Investigators identify account holder and transaction trail.
XXXVII. Tracing Through E-Wallets
E-wallets may have:
- registered name;
- mobile number;
- KYC documents;
- device information;
- linked accounts;
- transaction history;
- withdrawal routes;
- cash-out agents.
These records are generally accessible through official investigation, subpoena, court order, or proper legal process.
Report quickly because accounts may be emptied.
XXXVIII. Tracing Through Phone Numbers
A phone number may be traced through telco records under lawful procedures. Victims cannot usually compel telcos to reveal subscriber identity directly.
Phone numbers may also be prepaid, registered under another person, stolen, spoofed, or abandoned.
Preserve:
- SMS;
- call logs;
- number used;
- messaging app profile;
- date and time of calls;
- screenshots of display name;
- recordings if lawfully obtained.
XXXIX. Tracing Through Social Media
Social media platforms may have:
- profile creation data;
- linked email or phone;
- login IPs;
- device data;
- messages;
- account recovery information;
- page administrators;
- marketplace listing history.
These are generally released only through lawful requests.
Victims should save profile URLs, not just display names. Display names can be changed, but URLs and user IDs are more useful.
XL. Tracing Through Email
Email tracing may involve:
- sender email address;
- reply-to address;
- email headers;
- IP-related metadata;
- attached documents;
- payment instructions;
- domain used;
- phishing links.
Forward suspicious emails to the relevant bank, platform, or cybersecurity reporting channel. Preserve the original email.
XLI. Tracing Through Cryptocurrency
Crypto scams are difficult but not hopeless.
Evidence to preserve:
- wallet address;
- transaction hash;
- exchange used;
- screenshots of platform;
- chat instructions;
- blockchain explorer records;
- amount and token;
- date and time;
- exchange account details, if known.
Blockchain transactions may be traceable, but identifying the person requires exchange records and official cooperation.
Avoid “recovery experts” who promise to retrieve crypto for upfront fees. Many are secondary scammers.
XLII. Beware of Recovery Scams
After being scammed, victims often become targets again.
Recovery scammers claim:
- “We can hack the scammer.”
- “We can recover your crypto.”
- “We know someone inside the bank.”
- “Pay a processing fee and we will release your money.”
- “We are from law enforcement.”
- “We can trace the scammer instantly.”
- “We can delete your loan records.”
- “We can freeze accounts for a fee.”
Be cautious. Legitimate authorities do not ask for bribes or secret processing fees.
XLIII. What Not to Post Online
Victims often post scammer details online. Public warnings may help others, but careless posting can create risks.
Avoid posting:
- unverified personal information;
- full ID cards of suspected persons;
- addresses of alleged relatives;
- bank account details of innocent persons;
- threats;
- defamatory statements;
- private conversations unrelated to the scam;
- sensitive personal data;
- your own full account details or IDs.
You may post a factual warning, but be careful with accusations unless evidence is strong.
XLIV. Doxxing Risks
Doxxing means publicly exposing private personal information. Even if angry, victims should avoid doxxing suspected scammers or account holders without verification.
The account holder may be:
- another victim;
- a mule;
- an identity theft victim;
- a person whose ID was stolen;
- a person with the same name;
- an unrelated person whose photos were stolen.
Improper doxxing may expose the victim to legal claims.
XLV. Lawful Public Warning
A safer public warning focuses on facts:
- platform username;
- transaction pattern;
- amount requested;
- method used;
- warning not to transact;
- statement that report has been filed.
Avoid declaring personal guilt if identity is uncertain.
Example:
“Warning: This account used the name [Name] and number [Number] in a transaction where payment was requested but goods were not delivered. I have reported the matter to the platform and authorities. Please verify carefully before transacting.”
XLVI. Demand Letter to the Scammer
If the scammer is known, a demand letter may be sent before filing or alongside a complaint.
A demand letter may:
- demand refund;
- demand delivery of item;
- demand cessation of threats;
- demand preservation of evidence;
- warn of legal action.
But do not make threats beyond lawful remedies.
XLVII. Sample Demand Letter
Subject: Formal Demand for Refund
Dear [Name],
This refers to the amount of ₱[Amount] that I sent to you on [Date] through [Bank/E-Wallet/Payment Method], with reference number [Reference Number], for [purpose of transaction].
Despite receipt of payment, you failed to deliver [item/service] and have not provided a valid refund or explanation. Your representations induced me to part with my money, causing damage.
I formally demand that you refund the amount of ₱[Amount] within [number] days from receipt of this letter. If you fail to do so, I will pursue appropriate legal remedies, including filing complaints with the proper authorities.
This demand is made without prejudice to all my rights and remedies under law.
Sincerely, [Name]
XLVIII. Complaint-Affidavit
A complaint-affidavit is often needed for criminal complaints. It should be clear, factual, and supported by documents.
It should include:
- name and details of complainant;
- known details of respondent;
- how contact began;
- false representations made;
- payment details;
- proof of payment;
- damage suffered;
- attempts to demand refund;
- attached evidence;
- request for prosecution.
XLIX. Sample Complaint-Affidavit for Online Scam
COMPLAINT-AFFIDAVIT
I, [Name], Filipino, of legal age, residing at [Address], after being duly sworn, state:
On [Date], I communicated with a person using the name/account [Name or Username] through [Platform].
Said person represented that [state representation, such as they were selling a phone, offering an investment, processing a loan, or providing a service].
Relying on these representations, I sent the amount of ₱[Amount] on [Date and Time] through [Bank/E-Wallet/Payment Method] to [Account Name/Number], with reference number [Reference Number].
After receiving the money, the said person failed to deliver [item/service/return], stopped responding, blocked me, or gave false excuses.
I later discovered that the representations were false and that I was deceived into sending money.
Attached are copies of the conversation, screenshots, proof of payment, account details, and other supporting evidence.
I am executing this affidavit to charge the responsible person or persons with the appropriate offense, including estafa, cybercrime-related offenses, and other crimes supported by the evidence.
IN WITNESS WHEREOF, I sign this affidavit on [Date] at [Place].
[Signature] [Name]
SUBSCRIBED AND SWORN to before me this [Date] at [Place], affiant exhibiting competent proof of identity.
L. Sample Evidence Index
When filing a complaint, attach an evidence index.
Evidence Index
Annex A – Screenshot of scammer’s profile/page Annex B – Screenshots of conversation from [Date] to [Date] Annex C – Proof of payment dated [Date] Annex D – Bank/e-wallet transaction receipt with reference number Annex E – Screenshot of product listing or offer Annex F – Demand message requesting refund Annex G – Report ticket from bank/e-wallet/platform Annex H – Other supporting documents
LI. Request to Bank or E-Wallet for Investigation
Subject: Fraud Report and Request for Investigation/Recall
Dear [Bank/E-Wallet Provider],
I am reporting a fraudulent transaction involving my account.
Sender Account/Wallet: [Details] Receiving Account/Wallet: [Details] Amount: ₱[Amount] Date and Time: [Date/Time] Reference Number: [Reference Number]
The transfer was made because I was deceived by a person using [name/profile/number] through [platform]. After receiving the money, the person failed to deliver the promised item/service and became unreachable.
I request immediate investigation, recall or hold if still possible, preservation of transaction records, and coordination with the receiving institution. Attached are screenshots, proof of payment, and related evidence.
Please provide a report or ticket number for this complaint.
Sincerely, [Name] [Contact Details]
LII. Request to Platform for Preservation
Subject: Report of Fraudulent Account and Request for Preservation of Records
Dear [Platform],
I am reporting the account/page/profile [Name/URL] for fraudulent activity.
The account induced me to send ₱[Amount] on [Date] for [transaction], but failed to deliver and appears to have engaged in fraud. I request that the account, messages, listing, login records, and related data be preserved for law enforcement investigation.
Attached are screenshots, transaction proof, and relevant details.
Sincerely, [Name]
LIII. Importance of Preservation Requests
Digital evidence can disappear quickly. Accounts may be deleted, names changed, chats unsent, websites removed, and numbers abandoned.
A preservation request asks a platform, bank, telco, or provider to retain relevant records. Victims can request preservation, but official law enforcement requests are stronger.
Act quickly.
LIV. Screenshots: Best Practices
When taking screenshots:
- include date and time if visible;
- capture the profile URL;
- capture full conversation context;
- capture payment instructions;
- capture account numbers;
- capture promises and representations;
- capture blocking or refusal to refund;
- avoid cropping too much;
- save original files;
- back up to cloud or drive;
- print copies for filing.
Do not edit screenshots except to print or organize. Altered screenshots may be challenged.
LV. Chat Export
Some apps allow exporting chats. Exported chats may be useful, but original app messages are still important.
If possible:
- export chat;
- save media;
- keep the original conversation;
- back up device;
- note phone model and account used.
LVI. Voice Calls
If the scam involved calls, preserve:
- call logs;
- phone number;
- date and time;
- duration;
- notes of what was said immediately after the call;
- voicemail, if any;
- lawful recordings, if available.
Be careful with recording laws and privacy. If unsure, rely on call logs and written notes.
LVII. Fake IDs and Stolen Photos
Scammers often send IDs to appear trustworthy. The ID may be stolen.
Do not automatically harass the person shown in the ID. Preserve it as evidence and let authorities verify.
Similarly, scammer profile photos may be stolen from innocent people.
LVIII. If You Know the Scammer Personally
If the scammer is someone you know, such as a friend, relative, coworker, neighbor, or romantic partner, gather evidence and consider whether the matter is:
- criminal fraud;
- civil debt;
- breach of contract;
- investment scam;
- domestic or family dispute;
- partnership dispute;
- employment-related issue.
Not every unpaid debt is automatically a scam. The key is fraudulent intent or deceit at the time money or property was obtained.
LIX. Scam vs Debt
A person who borrowed money and later failed to pay may not automatically be a scammer. The distinction matters.
A debt may become a civil case if there was a genuine loan but nonpayment.
A scam or estafa may exist if the borrower used deceit from the beginning, such as:
- fake identity;
- false collateral;
- no intention to pay;
- false emergency;
- fake investment;
- false documents;
- repeated pattern of fraud;
- misappropriation of entrusted money.
Evidence of deceit is crucial.
LX. Scam vs Failed Business
A failed business or investment loss is not automatically a scam. Business risk exists.
It may become fraud if:
- returns were guaranteed falsely;
- money was misused;
- no real business existed;
- financial statements were falsified;
- new investors were used to pay old investors;
- licenses were falsely claimed;
- funds were diverted;
- investor was deceived about material facts.
LXI. Online Seller Scam vs Delivery Delay
A delayed delivery is not always a scam. But it may become suspicious when:
- seller gives fake tracking;
- seller blocks buyer;
- seller refuses refund;
- seller uses fake identity;
- seller repeatedly changes excuses;
- same account has multiple complaints;
- price is unrealistically low;
- payment was sent to a different person’s account;
- seller cannot prove shipment.
The complaint should show fraud, not just inconvenience.
LXII. Investment Scam Red Flags
Be cautious when an “investment” has:
- guaranteed returns;
- very high profit in short time;
- referral commissions;
- no clear business model;
- pressure to recruit;
- no registration to solicit investments;
- celebrity photos or fake endorsements;
- vague crypto or forex claims;
- “limited slot” urgency;
- refusal to provide contracts;
- payments to personal accounts;
- returns paid only when new members join;
- group chats full of hype but no audited records.
LXIII. Loan Scam Red Flags
A loan offer may be fraudulent if:
- advance fee required before release;
- no proper lender identity;
- no written loan terms;
- payment to personal e-wallet;
- fake approval letter;
- threats if you refuse to pay more;
- repeated “processing” or “release” fees;
- request for OTP or bank login;
- request to install remote access app;
- lender is unregistered;
- interest and fees are hidden.
LXIV. Job Scam Red Flags
A job offer may be a scam if:
- fee required before hiring;
- salary is unrealistically high;
- no legitimate interview;
- recruiter uses personal account only;
- job requires receiving and forwarding money;
- applicant must buy equipment from a specific seller;
- fake visa or deployment fee;
- no POEA/DMW process for overseas work;
- task scam requiring deposits to earn commissions.
LXV. Romance Scam Red Flags
Warning signs:
- quick emotional intimacy;
- refuses video call;
- claims to be foreign military, engineer, seafarer, doctor, or overseas worker;
- asks for emergency money;
- sends fake passport or ticket;
- claims package is stuck in customs;
- asks for payment to release gifts;
- promises marriage but repeatedly needs funds;
- uses stolen photos.
LXVI. Phishing Red Flags
Phishing messages often:
- create urgency;
- threaten account closure;
- ask to verify account;
- contain suspicious links;
- ask for OTP;
- imitate bank or government language;
- use shortened URLs;
- come from unknown numbers;
- request card details or PIN;
- direct you to a fake login page.
No legitimate bank should ask for OTP or full password through chat or call.
LXVII. Unauthorized Transaction Cases
If your account was accessed and money transferred without consent:
- Call bank or wallet immediately.
- Block account or card.
- Change passwords.
- Report to cybercrime authorities.
- Ask bank for investigation.
- Request transaction recall.
- Preserve SMS, emails, OTP messages, and login alerts.
- Check if SIM swap occurred.
- File written dispute.
- Follow up in writing.
The case may involve unauthorized access, identity theft, computer-related fraud, and bank consumer protection issues.
LXVIII. If Your Identity Was Used to Scam Others
If someone used your name, photos, ID, or account to scam others:
- Report identity theft to police or cybercrime unit.
- Report fake accounts to platforms.
- Notify bank or e-wallet if your account was used.
- Secure your IDs and accounts.
- File a data privacy complaint if appropriate.
- Publish a careful factual notice if needed.
- Do not ignore victims contacting you.
- Preserve evidence showing impersonation.
You may need an affidavit of denial or identity theft report.
LXIX. If Your Bank or Wallet Account Was Used as a Mule
If you discover that your account received suspicious funds:
- do not withdraw or transfer the money;
- report to your bank or wallet immediately;
- preserve messages from anyone who instructed you;
- file a police report if you were deceived;
- cooperate with investigation;
- do not spend the funds;
- seek legal advice.
Allowing your account to be used for suspicious transfers can create serious legal risk.
LXX. If the Scammer Is Abroad
Many scam operations are cross-border. Still, report in the Philippines if:
- victim is in the Philippines;
- payment was made from a Philippine account;
- receiving account is in the Philippines;
- local mule accounts were used;
- local victims are involved;
- online communications reached you in the Philippines.
Recovery may be harder, but local bank accounts, e-wallets, agents, or recruiters may be traceable.
LXXI. If the Scammer Used a Fake Name
Even if the name is fake, the following may still help:
- account number;
- wallet number;
- phone number;
- IP logs through platform;
- cash-out location;
- delivery address;
- bank KYC records;
- social media login data;
- device identifiers;
- transaction trail;
- other victims’ reports.
Do not give up simply because the display name is fake.
LXXII. If the Scammer Blocked You
Blocking is common. Before the account disappears:
- screenshot profile;
- copy profile URL;
- screenshot blocked messages if visible;
- save payment details;
- ask mutual group admins for listing details;
- report to platform;
- file complaint.
Do not create fake accounts to harass the person. Evidence and official reporting are better.
LXXIII. If the Scammer Deleted Messages
Some apps allow message deletion. If messages were deleted:
- screenshot remaining conversation;
- check notifications;
- check email notifications;
- check backups;
- ask platform for preservation through authorities;
- gather payment and account evidence;
- ask witnesses who saw the conversation.
Deleted messages may still exist in platform records for a time.
LXXIV. If Other Victims Exist
Other victims may strengthen the case by showing pattern.
Coordinate carefully:
- gather their affidavits;
- collect their transaction receipts;
- identify common account numbers;
- identify common phone numbers;
- avoid mob harassment;
- avoid posting unverified claims;
- file coordinated complaints if possible.
Multiple complainants may help authorities prioritize the case.
LXXV. Group Investment Scam Complaints
For investment scams with many victims:
- organize victim list;
- record amounts, dates, and payment channels;
- preserve group chats;
- identify recruiters, leaders, account holders, and admins;
- gather marketing materials;
- preserve videos and webinars;
- collect contracts or receipts;
- report to SEC and law enforcement;
- consult counsel for coordinated action.
LXXVI. What to Bring When Reporting
Bring:
- valid ID;
- printed complaint-affidavit, if available;
- screenshots;
- USB or digital copy of evidence;
- transaction receipts;
- bank or wallet reports;
- scammer profile links;
- phone numbers;
- account numbers;
- timeline;
- demand letters, if any;
- names of witnesses;
- other victim affidavits, if any.
Organize documents in chronological order.
LXXVII. How to Present Digital Evidence
For each screenshot, label:
- date captured;
- platform;
- account name;
- URL or number;
- what it proves.
Example:
“Annex B-3: Screenshot of Messenger conversation dated March 5 showing respondent instructed complainant to send ₱10,000 to GCash number ______.”
This helps investigators and prosecutors.
LXXVIII. Affidavit of Witness
If another person saw the scam, referred the scammer, joined the group, or received similar representations, have them execute an affidavit.
AFFIDAVIT OF WITNESS
I, [Name], Filipino, of legal age, residing at [Address], after being sworn, state:
I personally know [Complainant] and have personal knowledge of the facts stated here.
On [Date], I saw/participated in/was informed of communications involving [Scammer Name/Profile] regarding [transaction].
I personally saw that [state what witness observed, such as the scammer promised delivery, requested payment, admitted receipt, or refused refund].
I am executing this affidavit to attest to the facts known to me in relation to the complaint of [Complainant].
Signed this [Date] at [Place].
[Signature] [Name]
LXXIX. Police Blotter vs Criminal Complaint
A police blotter records an incident. It is useful but usually not enough by itself to prosecute.
A criminal complaint requires evidence, affidavits, and evaluation by law enforcement or prosecutor.
Victims should ask what the next step is after blotter entry.
LXXX. Prosecutor’s Preliminary Investigation
For offenses requiring preliminary investigation, the process usually includes:
- Filing complaint-affidavit and evidence;
- issuance of subpoena to respondent;
- respondent files counter-affidavit;
- complainant may reply;
- prosecutor determines probable cause;
- case is dismissed or information is filed in court.
If the scammer is unknown, investigation to identify the respondent may be needed first.
LXXXI. When Identity Is Unknown
If the scammer’s real identity is unknown, file a report with all available identifiers:
- account numbers;
- wallet numbers;
- phone numbers;
- social media URLs;
- email addresses;
- transaction logs;
- courier details.
Authorities may use lawful processes to identify persons behind those accounts.
A complaint may initially refer to “John Doe” or unknown persons, depending on procedure, but prosecution generally requires identifying accused persons.
LXXXII. Subpoenas and Court Orders
Banks, telcos, platforms, and e-wallet providers often require legal process before releasing subscriber or account information.
This may include:
- subpoena;
- court order;
- official law enforcement request;
- prosecutor-issued process;
- cybercrime preservation or disclosure procedures;
- other lawful authority.
Victims cannot usually compel disclosure by private demand alone.
LXXXIII. Data Privacy and Bank Secrecy Issues
Victims often feel frustrated when banks or platforms refuse to reveal the scammer’s details. These institutions must balance fraud reporting with privacy, bank secrecy, and due process rules.
The proper path is to file reports and allow authorities to request records lawfully.
LXXXIV. If the Scammer Is a Registered Business
If the scammer used a business name, check and preserve:
- DTI registration;
- SEC registration;
- business permit;
- official receipts;
- invoices;
- website;
- office address;
- names of officers;
- bank account name;
- contracts;
- advertisements.
A registered business can still commit fraud, but registration gives leads for complaints.
LXXXV. If the Scammer Is an Online Lending App
If the scam involves an online lending app:
- verify if the lending company is registered;
- preserve loan messages;
- preserve harassment messages;
- screenshot app permissions;
- preserve proof of payments;
- report abusive collection;
- file data privacy complaint if contacts were accessed or harassed;
- report to SEC if the lending company or financing company is involved.
Unauthorized or abusive lending practices may involve multiple legal issues.
LXXXVI. If the Scam Involves a Fake Government Officer
If someone pretends to be from BIR, NBI, PNP, court, immigration, customs, DSWD, DFA, LTO, SEC, or another government office:
- do not pay personal accounts;
- verify directly with the agency;
- preserve messages and calls;
- report to the agency and police;
- include impersonation in complaint.
Government fees should generally be paid through official channels, not personal wallets.
LXXXVII. If the Scam Involves Fake Customs or Parcel Fees
Common pattern:
- scammer says a package is stuck in customs;
- victim must pay customs tax, clearance fee, anti-money laundering fee, or delivery fee;
- payment is sent to personal accounts;
- more fees follow.
This is often linked to romance scams or fake prize scams.
Preserve shipping documents, courier names, tracking numbers, and payment instructions.
LXXXVIII. If the Scam Involves Fake Investment Groups
Preserve:
- group chat screenshots;
- names of admins;
- payment instructions;
- promised returns;
- referral mechanics;
- payout screenshots;
- contracts;
- webinars;
- promotional videos;
- social media ads;
- SEC registration claims;
- bank and wallet accounts used.
Report to law enforcement and SEC.
LXXXIX. If the Scam Involves Crypto or Forex
Preserve:
- platform name;
- website URL;
- wallet addresses;
- transaction hashes;
- exchange receipts;
- chat messages;
- promised returns;
- account dashboard screenshots;
- withdrawal refusal messages;
- names of recruiters;
- KYC documents submitted.
Do not pay “withdrawal taxes” or “unlocking fees” demanded by the platform without verification. Fake trading platforms often show fake profits but block withdrawal until more fees are paid.
XC. If the Scam Involves Online Marketplace Meet-Up
If a meet-up occurred:
- note location, date, and time;
- save CCTV request details;
- identify nearby establishments;
- preserve vehicle plate if seen;
- keep witness names;
- report quickly because CCTV retention may be short.
Authorities may request CCTV from establishments or barangay.
XCI. CCTV Evidence
If CCTV may exist:
- identify exact location and time;
- ask establishment to preserve footage;
- report to police quickly;
- request official assistance;
- avoid personally demanding footage aggressively.
CCTV may be overwritten after a short period.
XCII. Courier Evidence
If the scam involved delivery:
- tracking number;
- sender and recipient details;
- pickup and delivery addresses;
- rider name if available;
- proof of delivery;
- photos;
- COD records;
- chat with rider;
- courier complaint reference.
Report to the courier and request preservation.
XCIII. Not All Scammer Details Are Reliable
Scammers use:
- fake names;
- stolen IDs;
- borrowed accounts;
- rented bank accounts;
- mule wallets;
- spoofed numbers;
- VPNs;
- stolen photos;
- fake business permits;
- fake receipts;
- disposable SIMs.
Treat every detail as a lead, not final proof, until verified.
XCIV. Avoid Paying More Money
Once you suspect a scam, stop paying. Scammers often invent additional fees:
- release fee;
- tax;
- processing fee;
- verification fee;
- anti-money laundering clearance;
- customs fee;
- insurance;
- notarial fee;
- attorney fee;
- refund fee;
- account unlocking fee;
- chargeback fee.
Legitimate refunds do not usually require victims to pay more money to recover their own funds.
XCV. Negotiating With the Scammer
Sometimes scammers offer partial refund if the victim stays quiet. Be cautious.
If negotiating:
- keep communications;
- do not threaten illegal action;
- do not accept stolen funds knowingly;
- document any settlement;
- insist on traceable refund;
- do not withdraw complaint based only on promises;
- consider legal advice.
A settlement may recover money but may not automatically erase criminal liability.
XCVI. Settlement and Desistance
If the scammer refunds the money, the victim may sign acknowledgment or settlement documents. But be careful with affidavits of desistance.
A criminal case may still proceed depending on the offense and evidence. A victim should not sign false statements saying no scam happened if a scam did happen.
A proper settlement can state that restitution was made without necessarily making false claims.
XCVII. Sample Settlement Receipt
ACKNOWLEDGMENT OF RESTITUTION
I, [Name], acknowledge receipt of ₱[Amount] from [Name] on [Date] as restitution/refund for the transaction involving [brief description].
This acknowledgment confirms receipt of payment only and does not waive any rights except to the extent expressly agreed in a separate written settlement.
Signed this [Date] at [Place].
[Signature] [Name]
XCVIII. If You Are Accused of Scamming
If someone accuses you of scamming:
- preserve your communications;
- gather proof of delivery or refund;
- do not threaten the complainant;
- respond calmly;
- provide receipts if legitimate;
- settle genuine mistakes promptly;
- consult counsel if a complaint is filed;
- do not fabricate evidence;
- do not delete accounts if evidence is needed.
False accusations can harm reputation, but the response should be lawful.
XCIX. False Scam Reports
Filing a false scam report can lead to liability. A person should not file criminal complaints out of anger, revenge, or business pressure if the facts do not support fraud.
A complaint should be truthful, supported by evidence, and limited to facts personally known.
C. Time Limits and Delay
Delays can harm a scam case because:
- funds disappear;
- accounts are closed;
- CCTV is overwritten;
- platforms delete data;
- phones are discarded;
- witnesses forget;
- scammer changes identity;
- legal prescriptive periods may run.
Report as soon as possible.
CI. Practical Step-by-Step Guide After Being Scammed
Step 1: Stop communicating except to preserve evidence
Do not send more money. Do not threaten.
Step 2: Screenshot and save everything
Save chats, profiles, payment details, URLs, and receipts.
Step 3: Secure your accounts
Change passwords, block cards, freeze affected accounts.
Step 4: Report to bank or e-wallet immediately
Request investigation, recall, hold, and preservation.
Step 5: Report to platform
Report account, listing, page, group, or app.
Step 6: Prepare timeline and evidence folder
Organize documents chronologically.
Step 7: File police or cybercrime report
Bring printed and digital evidence.
Step 8: File prosecutor complaint if respondent is identified
Prepare complaint-affidavit and annexes.
Step 9: Consider regulatory complaints
Report to SEC, DTI, NPC, telco, or other agencies depending on scam type.
Step 10: Consider civil recovery
Small claims or civil action may be useful if the scammer is identified.
CII. Checklist: Evidence to Preserve
- Scammer name and alias;
- username;
- profile URL;
- phone number;
- email address;
- group or page name;
- listing URL;
- screenshots of offer;
- screenshots of conversations;
- proof of payment;
- account or wallet number;
- QR code;
- transaction reference number;
- bank or e-wallet ticket number;
- demand messages;
- fake documents;
- courier details;
- website URLs;
- app name;
- IP or header data if available;
- witness names;
- other victim information.
CIII. Checklist: Reports to File
Depending on facts:
- Your bank or e-wallet;
- receiving bank or e-wallet;
- platform used;
- PNP cybercrime unit;
- NBI cybercrime office;
- local police;
- city or provincial prosecutor;
- DTI for consumer transaction;
- SEC for investment or lending scam;
- NPC for personal data misuse;
- telco for SIM-related scam;
- courier for delivery fraud;
- app store for malicious app;
- website host or domain registrar for phishing site.
CIV. Checklist: Questions to Ask the Bank or Wallet
Ask:
- Can the transaction be recalled?
- Can the receiving account be placed on hold?
- What documents are needed?
- What is my report reference number?
- Will you coordinate with the receiving institution?
- Do I need a police report?
- How can I submit evidence?
- Will you preserve transaction logs?
- How long is investigation?
- Will I receive written findings?
CV. Checklist: Questions to Ask Law Enforcement
Ask:
- What offense is being investigated?
- Do I need a complaint-affidavit?
- What additional evidence is needed?
- Can you request preservation from the platform, bank, wallet, or telco?
- Can you identify the account holder?
- Should I file with the prosecutor?
- What case number or reference number will I use?
- How do I follow up?
- Can other victims join the complaint?
- Should I avoid further communication with the scammer?
CVI. Practical Tips for Stronger Complaints
A strong complaint is:
- organized;
- chronological;
- supported by documents;
- focused on deceit and damage;
- clear about payment details;
- specific about account numbers and usernames;
- supported by original digital evidence;
- not exaggerated;
- not filled with speculation;
- filed promptly.
Avoid emotional but vague complaints. State facts.
CVII. Common Mistakes Victims Make
Victims often:
- Delete chats after being blocked.
- Fail to screenshot profile URLs.
- Wait too long to report to the bank.
- Keep paying additional fees.
- Post unverified personal information online.
- Harass suspected relatives.
- Use fake “recovery agents.”
- File incomplete complaints.
- Rely only on screenshots without transaction proof.
- Forget reference numbers.
- Fail to preserve original messages.
- Assume the name on the wallet is the mastermind.
- Sign false desistance documents after partial refund.
- Ignore account security after phishing.
- Do not follow up with authorities.
CVIII. Preventive Measures
To avoid scams:
- Verify seller identity;
- avoid advance payments to strangers;
- use platform escrow where available;
- inspect items before payment;
- avoid deals that are too good to be true;
- do not share OTPs;
- do not click bank links from SMS;
- verify bank numbers directly;
- check business registration but do not rely on registration alone;
- use credit card or protected payment methods when possible;
- avoid sending IDs unnecessarily;
- do not install remote access apps;
- do not invest in guaranteed high-return schemes;
- verify SEC registration for investment offers;
- verify recruiters and agencies;
- protect SIM and email;
- use strong passwords;
- enable multi-factor authentication.
CIX. Special Warning: OTP and Remote Access
Never share OTPs, PINs, passwords, CVV, or recovery codes.
Never install remote access apps because a caller instructs you to do so. Remote access apps can allow scammers to control your phone, read OTPs, open banking apps, and transfer funds.
If you installed one:
- disconnect internet;
- uninstall the app;
- change passwords from another device;
- report to bank;
- reset device if necessary.
CX. Special Warning: Fake Receipts
Fake receipts are common. Always verify actual account credit before releasing goods.
Check:
- actual bank balance;
- transaction history;
- reference number;
- sender details;
- whether transfer is pending;
- whether check or deposit can be reversed;
- whether screenshot is edited.
Do not release items based solely on screenshot proof.
CXI. Special Warning: Fake Escrow
Scammers create fake escrow pages or fake courier payment systems. Verify directly with official platform websites and apps.
If the buyer or seller sends a link requiring card or bank login, treat it as suspicious.
CXII. Special Warning: SIM Swap
If your phone suddenly loses signal and bank alerts show activity, contact telco and bank immediately. SIM swap can allow scammers to receive OTPs.
Preserve telco reports and bank alerts.
CXIII. Special Warning: Account Recovery Fraud
Scammers may ask for codes “to verify your identity” or “recover your account.” Those codes may actually allow them to take over your account.
Never send verification codes to anyone.
CXIV. Practical Recovery Expectations
Victims should be realistic:
- Some scams are traceable but recovery may be slow.
- Account holders may be mules.
- Funds may be gone within minutes.
- Law enforcement needs evidence and legal process.
- Platforms may not disclose data directly.
- Civil recovery requires identifying and serving the defendant.
- Criminal conviction requires proof beyond reasonable doubt.
- Quick reporting improves recovery chances.
CXV. Frequently Asked Questions
1. Can I trace a scammer using their phone number?
You can preserve the number and report it. Telcos generally will not reveal subscriber identity directly to you, but authorities may request information through lawful process.
2. Can the bank tell me who owns the receiving account?
Usually not directly. Banks may investigate and cooperate with authorities, but personal account information is protected.
3. What should I do first after sending money to a scammer?
Report immediately to your bank or e-wallet and request recall, hold, investigation, and preservation. Then preserve evidence and file a police or cybercrime report.
4. Can I get my money back?
Possibly, especially if reported quickly and funds are still traceable. Recovery becomes harder once funds are withdrawn or transferred.
5. Is an online selling scam estafa?
It may be estafa if the seller used deceit to obtain money and had no intention to deliver or refund.
6. Is failure to pay a debt a scam?
Not always. Nonpayment of debt is usually civil unless there was fraud or deceit from the beginning.
7. Can I post the scammer’s ID online?
Be careful. The ID may be stolen. Posting personal data may create legal risk. Preserve it for authorities instead.
8. Can I file a complaint if I only know the e-wallet number?
Yes. The number is a lead. Authorities may use lawful processes to identify the account holder.
9. What if the scammer used a fake ID?
Preserve it. It may support fraud or identity theft charges, but the person shown may be another victim.
10. Can I report to both NBI and PNP?
You may seek assistance from appropriate law enforcement offices, but avoid filing confusing duplicate complaints without informing each office of prior reports.
11. Do I need a lawyer?
For small or straightforward reports, you may begin with banks and law enforcement. A lawyer is advisable for large losses, identified suspects, investment scams, civil recovery, or complex evidence.
12. What if the scammer returned part of the money?
Document the partial refund. You may still pursue the balance and legal remedies depending on the facts.
13. What if the scammer is a minor?
Report still may be made, but special rules involving minors may apply.
14. What if the scammer is abroad?
Report in the Philippines if Philippine accounts, victims, or transactions are involved. Cross-border recovery is harder but local leads may exist.
15. Can I hack the scammer to get evidence?
No. Illegal hacking can expose you to liability and may compromise your case.
CXVI. Key Legal Principles
- Preserve evidence immediately.
- Report bank and e-wallet transfers quickly.
- Do not expect private institutions to reveal personal data without legal process.
- Scams may involve estafa, cybercrime, identity theft, falsification, data privacy violations, or other offenses.
- Long chat threads are useful, but proof of payment is essential.
- Mule accounts may not identify the mastermind, but they are important leads.
- Avoid illegal tracing, hacking, threats, or doxxing.
- A criminal complaint requires facts, evidence, and identity of responsible persons where possible.
- Civil recovery may be pursued separately or alongside criminal remedies.
- Acting quickly improves the chance of freezing funds and preserving digital evidence.
CXVII. Conclusion
Tracing and reporting a scammer in the Philippines requires speed, discipline, and lawful procedure. The victim should first preserve evidence, secure accounts, report immediately to banks or e-wallets, and request investigation or recall. The victim should then report to the relevant platform and file a complaint with cybercrime authorities, police, NBI, or the prosecutor’s office, depending on the facts. Regulatory agencies such as the SEC, DTI, NPC, telcos, or couriers may also be involved depending on the scam.
The strongest scam complaints are built on clear timelines, complete screenshots, original messages, proof of payment, account numbers, profile links, witness statements, and written reports to banks and platforms. Victims should avoid illegal tracing, public doxxing, hacking, threats, and recovery scams.
A scammer may hide behind fake names, stolen IDs, mule accounts, disposable SIMs, and fake profiles, but each digital and financial trace can become part of the evidence trail. The faster the victim acts, the better the chance of preserving records, identifying suspects, freezing funds, and pursuing criminal or civil remedies.