Practical exercises in documenting evidence for law enforcement¶
In many abuse or stalking cases, the first thing a survivor hears from the police is: “Do you have any evidence?”
It’s a painful question, but a crucial one. Collecting digital evidence — calmly, safely, and in a legally useful way — can help build a stronger case. These exercises walk through real-world scenarios and how to record what’s happening in a way that makes sense to law enforcement.
Exercise 1: Screenshot like a pro (without alerting the abuser)¶
Scenario: You’ve received a threatening message on WhatsApp or Instagram.
Goal: Capture a timestamped image that shows who, what, and when.
Steps:
Open the message, but do not reply.
Take a screenshot of the full conversation. On most phones:
Android: Power + Volume Down.
iPhone: Side button + Volume Up.
Check that:
The sender’s name or number is visible.
The time and date of the message are visible.
Do not crop the image. Keep the original.
Save it in a clearly named folder (e.g. “evidence-whatsapp-threats-april”).
If possible, email it to yourself from another email address as a backup.
If the message disappears or they delete it, your screenshot still stands.
Exercise 2: Record online harassment or impersonation¶
Scenario: Someone has created a fake social media account pretending to be you.
Goal: Document the impersonation and the date it was active.
Steps:
Visit the fake profile using a web browser, not an app. (Easier for capturing links.)
Take screenshots of:
The full profile page (name, photo, bio).
Any posts or messages sent.
Copy the URL of the fake account.
Paste that URL into a text file with the date and time you saw it.
Report the fake account to the platform — but only after capturing evidence.
Optional: Use archive.today to save a snapshot of the page, in case it’s deleted.
Exercise 3: Document stalking via location tracking¶
Scenario: You believe someone is tracking your movements digitally.
Goal: Record patterns, suspected tools, and dates.
Steps:
Keep a daily log (paper or digital) for 2–4 weeks, noting:
Any suspicious behaviour (e.g. they “just happen” to show up).
Any notifications about unfamiliar logins or device access.
When your phone battery drains unusually fast.
Note dates, times, and locations.
If you suspect a specific app or tool (like Life360, Find My iPhone), write it down.
Do not uninstall or wipe anything without first talking to a support worker or digital safety expert. It could be key evidence.
Follow-up: Ask a trusted person or tech support worker to inspect the phone for spyware, but only if it’s safe to do so.
Exercise 4: Preserve abusive emails or DMs¶
Scenario: You’re receiving harassing emails, or being spammed via messages.
Goal: Save the original message, headers included.
Steps:
In your email, click “Show original” or “View headers” (exact location depends on the service).
Save the email as a .eml or .txt file with the full headers intact.
If you can’t do that, at minimum:
Screenshot the message with the sender’s address and timestamp visible.
Note whether the email was forwarded, replied to, or marked as spam.
Create a folder just for these and back it up securely.
For DMs (Instagram, Facebook etc.):
Screenshot before blocking.
Save the username, message, and timestamp.
Exercise 5: Create an evidence pack for police¶
Scenario: You’re preparing to go to the police or ask a solicitor for help.
Goal: Organise your evidence clearly, with minimal tech fuss.
Steps:
Create a folder on your computer called “Evidence – [Your Name or Case Name]”.
Inside, make subfolders:
“Screenshots”
“Email evidence”
“Social media”
“Phone logs or tracking”
“Daily log”
For each item, include:
A clear filename (e.g. “2025-06-01-threatening-whatsapp.png”).
A brief note in a text file: what it shows, when it happened, and why it matters.
If you’re handing it to someone (advocate, solicitor, police), provide:
A summary list of the contents.
Your preferred contact method and a safe time to reach you.
Final advice¶
Do not delete anything until you’ve spoken to a support worker or legal adviser.
Do not engage or escalate — responding often helps the abuser, not you.
Back everything up — ideally on a USB stick or cloud service with a strong password.
Trust your instincts — if something feels off, document it. Even small things build patterns.