Tampering with Evidence

What should be logged if it may relate to Domestic Abuse, Coercive Control, or potential interference with your safety, finances, or legal process.

They may indicate:

  • control,
  • intimidation,
  • sabotage,
  • boundary violations,
  • evidence tampering,
  • financial abuse,
  • digital abuse.

Examples include:

  • changed documents or wills
  • locked phones/devices
  • wiped computers
  • deleted Cloud Backup or hard-drive backups
  • changed alarm/security codes
  • stolen mail
  • stolen bank cards
  • damaged property
  • unauthorized account access
  • missing paperwork
  • unexplained changes to passwords or settings

These can fit patterns of:
Financial Abuse
and
Technology-Facilitated Abuse


How to log each incident

Use the same structure every time:

Date/time: when discovered (and when it may have happened, if known)
What happened: factual description only
Evidence: photos, screenshots, receipts, emails, device logs
Impact: financial loss, fear, inability to work, security risk
Action taken: changed password, called bank, informed lawyer, police report number

Example:

18 May 2026, 09:30 — Discovered alarm code had been changed without my permission. Unable to access property. Locksmith called. Invoice saved. Solicitor informed.

Or:

18 May 2026, 16:10 — Noticed external hard drive wiped. Files missing. Photos taken. IT specialist contacted for forensic recovery.


Why details matter

Individually, each event can look “minor.”

Together they may reveal a pattern.

Courts and investigators often look for:
Pattern Recognition

That pattern can show:

  • escalation
  • intent
  • repeated interference
  • ongoing risk

Digital evidence is especially important

For devices/accounts:

  • photograph screens/errors
  • keep login alerts
  • save bank notifications
  • export emails
  • note exact timestamps

If you suspect device tampering, avoid using that device to investigate further if it could overwrite evidence.


Psychological note

These acts often aim to trigger:

  • confusion
  • helplessness
  • self-doubt
  • hypervigilance

That activates the Amygdala.

Logging restores control by re-engaging the Prefrontal Cortex:
observe → record → preserve → pass to professionals

That’s how you protect yourself.

A good rule:

If it made you stop and think, “that’s odd” or “that feels wrong” — log it.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.