What should be logged if it may relate to Domestic Abuse, Coercive Control, or potential interference with your safety, finances, or legal process.
They may indicate:
- control,
- intimidation,
- sabotage,
- boundary violations,
- evidence tampering,
- financial abuse,
- digital abuse.
Examples include:
- changed documents or wills
- locked phones/devices
- wiped computers
- deleted Cloud Backup or hard-drive backups
- changed alarm/security codes
- stolen mail
- stolen bank cards
- damaged property
- unauthorized account access
- missing paperwork
- unexplained changes to passwords or settings
These can fit patterns of:
Financial Abuse
and
Technology-Facilitated Abuse
How to log each incident
Use the same structure every time:
Date/time: when discovered (and when it may have happened, if known)
What happened: factual description only
Evidence: photos, screenshots, receipts, emails, device logs
Impact: financial loss, fear, inability to work, security risk
Action taken: changed password, called bank, informed lawyer, police report number
Example:
18 May 2026, 09:30 — Discovered alarm code had been changed without my permission. Unable to access property. Locksmith called. Invoice saved. Solicitor informed.
Or:
18 May 2026, 16:10 — Noticed external hard drive wiped. Files missing. Photos taken. IT specialist contacted for forensic recovery.
Why details matter
Individually, each event can look “minor.”
Together they may reveal a pattern.
Courts and investigators often look for:
Pattern Recognition
That pattern can show:
- escalation
- intent
- repeated interference
- ongoing risk
Digital evidence is especially important
For devices/accounts:
- photograph screens/errors
- keep login alerts
- save bank notifications
- export emails
- note exact timestamps
If you suspect device tampering, avoid using that device to investigate further if it could overwrite evidence.
Psychological note
These acts often aim to trigger:
- confusion
- helplessness
- self-doubt
- hypervigilance
That activates the Amygdala.
Logging restores control by re-engaging the Prefrontal Cortex:
observe → record → preserve → pass to professionals
That’s how you protect yourself.
A good rule:
If it made you stop and think, “that’s odd” or “that feels wrong” — log it.