There are many ways to collect evidence. Some can be safer than others, depending on your situation, so following these tips may help.
You should always use a safe device to collect evidence, especially if you think you may be tracked or monitored. This is a device that allows you to make calls, send messages and go online without the abusive person knowing.
It could be your personal device (if your abuser can’t access the device or any shared accounts you have), the device of a trusted person such as a family member or friend, or a computer at your work or a public library.
Avoid using your safe device to access accounts that are linked or known to the abuser. If you must use a device or account that the abuser might have access to, delete the evidence as soon as you have sent it to a trusted person.
Learn more about using safe devices.
Take screenshots, photos and recordings
Taking a screenshot or screen recording is one way to save evidence such as abusive text messages, online posts and live text chats, as well as details of the account or profile that was used by the abuser.
Try to save the original evidence, without making any changes to it. For example, avoid highlighting abusive comments within a screenshot or cropping images.
You may need to take multiple screenshots to capture the extent of the abuse. Include the full conversation (rather than the abusive comment on its own), as well as account details, dates and times.
Remember, some apps notify the other person if a screenshot or screen recording is taken, or a file is downloaded or saved. If this is the case, it may be best to take a photo or video of what’s on your screen using another device.
Record the URL and source information
If abusive content is posted of you online, try to capture the URL and the person responsible for the posting, even if the abuser is using a fake account.
The URL is the web address or link where the content is located. You can usually see it in the address bar at the top of the page, if you are using a desktop, laptop or tablet. For example, the URL for this page is esafety.gov.au/key-issues/domestic-family-violence/help-support/collecting-evidence
The URL will help to find the content that has been posted. However, once the content is removed or deleted the URL may no longer be available, which is why taking screenshots or photos is also a good idea.
It can also be helpful to capture source information, such as the HTML (Hypertext Markup Language) code. This will help you to save information in case the content at the URL changes. There are different ways to capture source information – based on the web browser and device you are using. For example, if you’re using Google Chrome on your desktop, you can ‘right click’ on a blank part of the webpage and select ‘view page source’ to display the HTML code. You can then screenshot or copy the information.
Save voice recordings
Try to save or record a copy of any abusive or threatening voice messages. These may be phone voicemails from the abuser, or messages or chats sent using an online platform or service. Some voicemail services only keep saved messages for a few weeks or months, so you may need to download or save them before they are deleted or record the message using a voice recording app or video. It’s a good idea to use another device to record, because the abuser might be notified when you save the message or make a copy.
Take note of repeated behaviours
Tech-based domestic, family and sexual violence can involve repeated and persistent abusive behaviour that is used to control someone. This is known as coercive control. Sometimes it’s the fact that the behaviour is repeated that makes it abusive, because you’re constantly worried about what the person will do next. You should take a note of each incident, no matter how small it is or how many incidents happen, as this can help to show how the impact has grown over time.
Screenshots or photos can also be used to build evidence – for example, to show how often you receive texts or have missed calls from the abusive person’s phone number (even if the number is blocked).
An incident of abuse may appear harmless to someone who doesn’t know the background and context, so it’s helpful to explain in your notes why it’s a problem. For example, if an abuser sent their partner a flame emoji, it might not be obvious to another person that it was a threat – unless they knew the abuser had a history of harming or threatening their partner with fire or burning.
Your notes might also include:
- any threats the abuser makes in person, such as saying they are watching you and can track your every move
- what is said or a description of what is shown in the evidence you collected
- how the evidence is abusive or related to other incidents
- the date and time of the abuse
- times when your device or online access was controlled or limited.
Record the information in a way that works for you. This can include written notes or voice recordings.
Search your details online
If you think personally identifiable information may have been published about you as part of the abuse, you can search your name and details online to check. Make a record of any evidence that you find.
For example, you could use an online search engine like Google to check if your abuser has intentionally shared your private address, personal phone number or any pictures identifying you or where you live without your consent – this is known as ‘doxing’. Find out more about what you can report to eSafety and what to know first, if you find abusive content targeting you online.
You can check reverse phone lookup websites to see if your phone number has been shared online and whether any other real or fake details about you have been included.
You can also try a reverse image search which lets you upload your image to find out if it’s been posted or shared on the internet.
Another way of finding out if your private information has been shared is to create a Google Alert to link you to anything that is posted online about you (or people with your name). The alerts may come at unexpected times, and they might not always relate to you, especially if you have a common name. So it’s good to be prepared for those alerts, to make sure they don’t become triggering or retraumatising.
Download chat logs or account activity
Some online platforms and services allow you to access your information or content and save it. Check if you can download your account activity or request chat logs or transaction logs (records of when messages were delivered). Some phone providers can also give you call logs or text transcripts.
This can help you to document unwanted contact or harassment, including the number of times someone messages or calls (even if the calls are missed or from an unknown number or an unfamiliar name).
If you are experiencing financial abuse, or abusive messages are sent to you via online banking transactions, you can collect your bank statements as evidence. You could also check your credit rating to see if any lines of credit have been taken out in your name and report to your bank if you see suspicious activity.
Note any monitoring or stalking
Tracking devices, spyware, surveillance systems and other ‘smart’ or assistive technologies can be used to monitor and cyberstalk you.
Look for patterns to help identify what sort of device or technology is being used and make notes about when and how it seems to be happening. These are some things to think about:
- If you suspect you are being followed, try to think where it’s happening. For example, is it happening when you’re in your car or wherever you take your phone or bag?
- If you suspect you are being watched, try to think where it’s happening. For example, is it in one particular room in your home where there may be a hidden camera?
- If you share the care of a child, could the abusive person have planted a tracking device in their bag or toy or added a spying app to their phone?
- If you share the care of pets or animals, could the abusive person have planted a tracking device on the pet’s collar or be monitoring you through the pet’s microchip?
Take photos of any tracking devices you find in your home, car or belongings – this is useful if you think it’s safest to leave them in place, so the abuser doesn’t know you have found them.
You can also use these tips:
- If you get an alert on your phone about an unknown device that is travelling with you, take a screenshot or photo of the notice.
- If you find a tracking device (such as an AirTag) on or in your car, on equipment like a pram or sewn into clothing, it may be best to take a photo and leave it in place, then report it to the police when it’s safe to do so. Removing it may alert the abuser.
- If you think spyware has been installed on your device, it may be best to take a photo using a safe device – don’t take a screenshot, because the spyware could detect this. You should speak with the police or seek legal advice before removing it. There are people who can help when you are being tracked. A domestic, family and sexual violence support service can usually advise how to get help.
- If you suspect a home surveillance system or any smart home technologies or assistive technologies may have been accessed or had the settings changed by your abuser, contact the manufacturer or an expert to check. If changes have been made, take a photo of the changed settings. Only reset the systems when it’s safe to do so, or after you’ve spoken with police.