Documenting Digital Stalking: How to Build a Case for the Police

The messages keep coming. Your accounts feel watched. You have a folder of screenshots on your phone, a swirl of details in your head, and the uneasy feeling that one screenshot is not enough. If that is where you are right now, you are not overreacting – and you are not alone.
Documenting digital stalking is what turns a frightening blur into a case the police, a prosecutor, or a judge can actually act on. The legal threshold is rarely about a single message. It is about a pattern – a course of conduct directed at you that would make any reasonable person feel afraid or distressed.
This guide walks you through that work step by step. You will learn what counts as digital stalking, how to build an incident log, how to preserve screenshots and metadata so they hold up later, and what police actually need from you when you walk through the door. The goal is simple: take what is scattered across your phone and your memory and turn it into a clear, credible record.
What Counts as Digital Stalking
Digital stalking – often called cyberstalking – is a repeated course of online or device-based conduct directed at a specific person that causes fear, distress, or significant disruption to daily life. It is not defined by one viral message. It is defined by the pattern.
Common behaviors include:
- Persistent unwanted messages, calls, or DMs across phones, email, and social platforms
- Fake or burner accounts used to keep contacting you after you block
- Posts about you on forums, review sites, or social media designed to harass or expose
- Tracking your location through shared apps, AirTags, or hidden device access
- Logging into your accounts, resetting your passwords, or reading your messages
- Doxxing – publishing your address, workplace, or family details
- Sharing or threatening to share intimate images
According to the U.S. Department of Justice, about 1 in 4 stalking victims experience some form of cyberstalking, most often by email or messaging. No single message has to be a crime on its own. What matters is that the conduct, taken together, is targeted, repeated, and would frighten a reasonable person. Many cases also overlap with broader hidden mechanisms of control in abusive relationships.
Why Documentation Is the Case
Police and prosecutors are looking for three things: a course of conduct, a clear identification of the person responsible, and the impact on you. Without documentation, those three pieces live only in your memory – and memory is exactly what an aggressor will try to make you doubt.
"Documentation is one of the most important things a stalking victim can do. A pattern of behavior – not a single event – is what makes a stalking case." – Stalking Prevention, Awareness, and Resource Center (SPARC)
The numbers underline why this matters. Bureau of Justice Statistics data shows only about 29% of stalking victims report the offense to law enforcement, and a RAND Corporation analysis found roughly 13% of cyberstalking cases result in criminal charges. Underreporting is part of the gap. Fragmented evidence is the rest.
Think of your documentation as the bridge between this is happening and this can be charged. Every entry you make is a brick in that bridge. If you have not started yet, our beginner's guide to documenting manipulative conversations can help you get the first entry on paper.
Build Your Stalking Log: A Field-by-Field Template
A stalking log is the spine of your case. It does not need to be fancy – a single document, spreadsheet, or printed notebook is fine. What matters is that every incident is captured the same way, every time.
The Seven Fields Every Entry Needs
Use these seven columns or headings:
- Date – the exact date the incident happened
- Time – as precise as you can manage, in your local time zone
- Platform or channel – Instagram DM, text, email, phone call, in person, etc.
- Identifier – the username, phone number, email address, or account they used
- What happened – a short, factual description, with quoted text where possible
- Witnesses or copies – anyone present, copied, or who saw it (name and contact)
- Evidence saved – the filename or location of the screenshot, recording, or export
- Impact on you – how the incident affected your sleep, work, safety, or sense of well-being
A sample entry might read: 2026-04-22, 11:47 pm, Instagram DM, @ex.account_2, sent "I saw you at the cafe today" with a photo of my street, no witnesses, saved as IG_2026-04-22.png in evidence drive, woke up at 3 am unable to sleep, called out of work the next day.
That single entry already carries a date, an identifier, a quoted threat, evidence, and impact. SPARC's free Stalking Incident and Behavior Documentation Log uses the same structure and is available in several languages. If your case may move into family court, our step-by-step guide to documenting gaslighting for family court covers the additional formatting judges look for.
Where to Keep the Log
Store your log in two places: a private cloud account the stalker cannot access, and an offline copy on a USB drive or external hard drive. Avoid devices, email accounts, or shared family plans the stalker has ever touched. If you suspect any device has been compromised, do your documentation on a different device for now.
Not sure if this is gaslighting? Analyze your conversation in 2 minutes.
Our AI-powered tool helps you identify manipulation patterns and provides personalized guidance based on your specific situation.
Start Your AnalysisCapture Evidence the Right Way
A screenshot only helps if it can stand on its own when someone else looks at it months later. The goal is to capture identity, context, and time in every piece of evidence.
Screenshots, URLs, and Metadata
Capture full-screen screenshots, not cropped excerpts. The image should clearly show the username or phone number, the timestamp, and the platform. Where possible, copy and paste the URL of the post or profile into your log alongside the screenshot.
For email, save the full message including the headers, where information about the sender's path lives. For text messages, the iOS Messages app and Android both let you export or share entire conversations – use that, not photos of your screen.
"Try to save the original evidence without making changes to it. Avoid highlighting or cropping, and include the full conversation along with account details, dates, and times." – NNEDV Safety Net Project
"Screenshots are necessary, but they are only persuasive if they capture identity, context, and time." – Eques Law Evidence Preservation Guide
Backups, Hashes, and Chain of Custody
Keep two copies of everything: one in a private cloud folder, one on an offline drive. Do not edit, crop, or annotate the original files. If you need to mark something up, do that in the log entry, not on the image itself. That way the original still matches the version police or a forensic specialist would expect to see.
If a platform might delete a post or account, ask law enforcement about a preservation letter – police can ask the platform to hold the data while a case is being built. You can also screen-record a scrolling thread to capture context that a single screenshot would miss. For workplace-related digital stalking, our workplace gaslighting documentation templates include log formats HR and legal counsel are used to seeing.
What Police Actually Need From You
When you walk into a police station or call to make a report, the officer needs to leave the conversation with five things in hand. Building toward those five things is what your log and evidence drive are for.
Bring a single labeled folder, plus a USB drive, that contains:
- A clear identification of the suspect – legal name if known, plus all known usernames, phone numbers, and email addresses
- A timeline showing repeated conduct – your stalking log, printed if possible, with the most recent incidents on top
- Copies of the evidence – printed screenshots and a digital copy on the USB
- A written impact statement – one or two paragraphs describing how the conduct has affected your sleep, work, relationships, and sense of safety
- Names and contact information for witnesses – friends, coworkers, neighbors, or IT staff who saw any of it
Ask for the officer's name, badge or ID number, and the report or case number in writing before you leave. Request a copy of the report itself; you will need it for protective-order filings, insurance, employer accommodations, and follow-up calls.
You do not have to do this alone. It is okay to bring a trusted friend, a domestic-violence advocate, or a stalking specialist. Many local victim-services agencies will sit with you during the report and help translate the legal language. Pair the conversation with a domestic violence safety plan so the officer can see you are already thinking about protection, not just prosecution.
Reporting: Local Police, IC3, and Beyond
Most digital stalking cases benefit from being reported in more than one place. Each channel does something a little different.
- Local police – your first stop for an incident report and case number. They handle in-person threats, local statutes, and protective-order coordination.
- FBI Internet Crime Complaint Center (IC3) – the federal channel for online crimes. File at ic3.gov when conduct crosses state lines or happens entirely online. Federal cyberstalking is prosecuted under 18 U.S.C. § 2261A, which covers repeated electronic conduct intended to harass, intimidate, or cause fear.
- Civil court – a protective or restraining order is a separate, faster track that can prohibit contact even if criminal charges are not yet filed.
- A stalking hotline or advocate – the SPARC and NNEDV networks can help with safety planning, document review, and connecting you with local services.
If a report does not move forward at first, you have not run out of options. Ask for a supervisor, request your report and case number in writing, and escalate to IC3 if the conduct involves interstate communications. Filing a parallel civil protective order is often the fastest way to get an enforceable boundary in place.
Staying Safe While You Document
Documentation does not mean staying engaged. As a general rule, do not respond to the stalker's messages – your responses can be twisted, and silence preserves the pattern more cleanly.
Preserve evidence first, then decide whether to block. If blocking removes your only window into the behavior, consider keeping one parallel account – an email address or social handle the stalker can still reach – that a trusted person helps you monitor. That way the pattern keeps building while your primary devices stay quieter.
Then harden everything else:
- Change passwords on a clean device, and turn on two-factor authentication using an authenticator app, not SMS
- Audit shared accounts, family plans, cloud storage, and location-sharing apps
- Sweep for unfamiliar Apple AirTags, Tile trackers, and unknown Bluetooth devices
- Check any vehicle you share or have shared for GPS trackers
- Review which apps have access to your contacts, microphone, and location
The NNEDV Safety Net Project offers a digital safety review through local advocates – a trained person can help you find access points you might miss on your own. Pair that with your log and your evidence drive, and you have the three things a strong digital-stalking case rests on: documentation, identification, and a plan to stay safe while it moves forward. If you are also weighing whether technology tools can help identify manipulation, they can supplement – but never replace – the human work of safety planning.
Frequently Asked Questions
What evidence do I need to prove cyberstalking to the police? Police want to see a documented pattern: time-stamped messages, full-context screenshots, an incident log, witnesses if any, identification of the suspect, and a clear statement of how the conduct affects your daily life and sense of safety. The pattern is what proves the legal element of "course of conduct."
Should I block a stalker or keep collecting evidence? Preserve first, then decide. Save the messages and metadata before blocking. If safe, keep a parallel account open – or ask a trusted person to monitor – so the pattern can keep being documented while you protect your daily devices.
How do I make a stalking log? Use a single document or spreadsheet with seven columns: date, time, platform, identifier, what happened, witnesses, evidence file saved, and impact on you. SPARC publishes a free Stalking Incident and Behavior Documentation Log you can print and use.
What if the police don't take my report seriously? Ask for a supervisor, request a copy of the report and the case number, escalate to the FBI's IC3 if the conduct crosses state lines, contact a stalking advocate or hotline, and consider filing for a civil protective or restraining order in parallel.
Is digital stalking a federal crime? Yes. Under 18 U.S.C. § 2261A, cyberstalking that uses interstate communications – which most online conduct does – is a federal crime. All 50 states also have stalking statutes that cover digital behavior, although the exact definitions vary.
How do I preserve screenshots so they hold up in court? Capture the full screen so the username, timestamp, and platform are visible. Save the URL. Keep the original file untouched – do all of your annotations in the log, not on the image. Back up to an offline drive that the stalker cannot reach.