A contemporaneous record is a record made at or very close to the time an event occurred. Courts and police give significantly more weight to contemporaneous records than to accounts written from memory days or weeks later. The reason is simple: memories fade, shift, and can be challenged. A record made on the same day, with a timestamp proving when it was created, carries the authority of immediacy. If you are documenting incidents, the single most important thing you can do is record them as close to the time they happen as possible.
Why Apps Are Dangerous for Evidence Collection
The instinct to download an app is understandable. There are safety planning apps, evidence collection apps, and DV documentation tools available on both the App Store and Google Play. Some of them are well-designed and well-intentioned.
But every app you download creates a trail.
The App Store records your download in your purchase history. If your Apple ID is shared with a family plan โ which is common in households where one partner controls finances โ the other person can see what you downloaded. Even if you delete the app, the record of the download persists in your account history and can be recovered.
Google Play works the same way. Your download history is tied to your Google account. If your partner has access to that account โ or if your devices are linked through a shared family group โ the download is visible.
Beyond purchase history, the app itself appears on your home screen. You can move it to a folder, you can bury it on a back page, but if someone picks up your phone and swipes through your apps, they will see it. An app called "Safety Plan" or "Evidence Recorder" or "DV Help" is, in the wrong hands, not a tool โ it is a trigger.
Push notifications are another risk. An app that sends you reminders to log incidents, or alerts about safety resources, can appear on your lock screen at the worst possible moment.
And app data can be backed up to the cloud automatically. If your iCloud or Google Drive is accessible to another person โ which, again, is common in controlling relationships โ the data you stored in the app may be accessible to the person you are documenting.
App Store/Google Play purchase history (visible on shared family accounts). Home screen icon (visible to anyone who picks up the phone). Push notifications (visible on lock screen). Cloud backup data (accessible if cloud accounts are shared). Battery usage logs (show which apps you have been using). Screen time reports (show time spent in specific apps). Storage usage (shows which apps are using space). Each of these is a potential point of detection for someone living with a person who monitors their device.
The Browser-Based Alternative
A website leaves a fundamentally different footprint than an app. When you visit a website in your phone's browser, the record of that visit lives in your browser history โ and browser history can be deleted selectively, for individual sites, without affecting anything else on your phone.
More importantly, a website bookmark can be disguised. You can save a bookmark to your home screen and name it anything you want. "Recipes." "Shopping List." "Weather." The icon can be customised. To anyone who picks up your phone, it looks like a shortcut to a recipe website. It is, in fact, a gateway to an evidence collection tool.
The data that the tool stores lives in your browser's local storage โ a small database built into every modern web browser that allows websites to save information on your device. Local storage is not visible in your photo gallery, your files app, or your cloud backup. It is not synced to iCloud or Google Drive by default. It persists across browser sessions โ meaning you can close the browser, reopen it days later, and your data is still there โ but it is invisible to anyone who does not know exactly where to look.
If someone does know where to look โ if they open browser developer tools and inspect local storage โ they would see a data entry with a key name that, on its own, means nothing. It is not labelled "evidence" or "DV diary." It is a technical string that only has meaning to the tool that created it.
Local storage is a feature built into every modern web browser (Safari, Chrome, Firefox, Edge) that allows websites to store small amounts of data on your device. Unlike cookies, local storage data does not expire automatically and is not sent to any server. The data stays on your phone, in your browser, until you deliberately clear it or the website deletes it. Local storage is invisible in your phone's Photos, Files, or cloud backup. It is the digital equivalent of a hidden pocket inside your jacket โ there if you know about it, invisible if you don't.
What Police Actually Need From Your Evidence
Before explaining how to use the tool, it is worth understanding what makes evidence useful to the people who receive it.
Police officers reviewing a case need specific things. They need facts, not interpretations. "He was angry" is an interpretation. "He threw the coffee mug at the wall at approximately 7:15 PM and said, 'You're going to regret this'" is a fact. The difference between these two statements is the difference between a report that gets filed and a report that triggers action.
Detectives need dates and times. Not "last Tuesday" but "Tuesday 14 March at approximately 7:15 PM." Approximate is fine โ "approximately" is an honest qualifier that actually increases credibility, because nobody remembers exact times and claiming to do so raises suspicion.
They need locations. "At home" is a start. "In the kitchen of [address]" is better. Location grounds the incident in physical reality and allows investigators to correlate it with other evidence โ security camera footage from a neighbouring property, mobile phone tower data, or records from a doorbell camera.
They need exact words where possible. Direct quotes are powerful evidence because they demonstrate the specific nature of a threat or behaviour. "He said he would kill me" is an allegation. "'I will kill you if you leave this house' โ those were his exact words" is a statement that a prosecutor can use.
They need witnesses. Even if witnesses are not willing to make statements, noting who else was present creates a lead that investigators can follow. "The children were in the next room" or "The neighbour was mowing the lawn and may have heard shouting" gives police a starting point for corroboration.
And they need patterns. A single incident is often not enough to trigger criminal investigation. But a documented pattern of escalating behaviour โ shown through dated, timestamped entries with theme tags like "intimidation," "financial control," "threats," "surveillance" โ transforms individual incidents into a picture of systematic abuse that is much harder to dismiss.
Date and time (as precise as possible, "approximately" is fine). Location (specific โ room, address, public place). What happened (factual description, not interpretation). Exact words spoken (direct quotes in quotation marks where remembered). Who was present (names, relationships, or descriptions). Physical evidence (photos, screenshots, messages โ noted, not attached to the entry). Your physical and emotional state (briefly โ "I was shaking" or "I could not sleep after" โ this documents impact). Theme (harassment, threat, financial control, surveillance, physical violence, etc.).
Using the Evidence Ledger
The Evidence Ledger is a browser-based tool designed for exactly this purpose. It works on any phone with a modern browser. It stores everything in local storage. Nothing is sent to any server. Nothing is backed up to the cloud. The tool does not know who you are, where you are, or what you are recording.
When you open the tool for the first time, you see an empty ledger. You tap "New Entry" and a form appears.
The first field asks what happened. This is where you type your factual account. Be specific. Include dates, times, locations, exact words, and who was present. Do not worry about perfect grammar or structure โ the tool will timestamp and reference your entry automatically.
The second field asks where it happened. Type the location.
The third field asks about witnesses. Note anyone who was present or who might have seen or heard something.
The fourth field is a theme selector. You tap the theme that best describes the type of incident โ harassment, intimidation, financial control, threats, surveillance, discrimination, assault, or other. This theme tag serves two purposes: it helps you categorise your own experience, and it allows investigators to quickly identify patterns across multiple entries.
The fifth field is for additional notes โ anything else that seems relevant.
When you tap "Save Entry," the tool creates a record with an automatic timestamp (the exact date and time you saved it), a unique reference ID (EV-0001, EV-0002, and so on), and all the information you entered. This entry is stored in your browser's local storage and added to your ledger.
Each subsequent entry follows the same process. Over time, your ledger builds into a chronological, referenced, theme-tagged record of incidents. The tool does not analyse your entries or make any judgments about them. It simply records what you tell it, when you tell it, and preserves it until you choose to do something with it.
Each evidence entry gets a unique reference ID (like EV-0001). This might seem like a small technical detail, but it serves a critical function: it allows investigators, lawyers, and courts to refer to specific incidents precisely. Instead of "the time he threatened me in the kitchen," you can say "see entry EV-0014." This precision makes your evidence easier to work with, harder to dismiss, and directly citable in legal proceedings. Professional evidence management systems use reference IDs for the same reason.
Exporting Your Evidence
When you are ready to share your evidence โ with police, a lawyer, a DV service, a journalist, or a trusted person โ the tool can export your complete ledger as a structured text file.
The export includes every entry, in chronological order, with reference IDs, timestamps, locations, witnesses, theme tags, and your account of what happened. It is formatted professionally โ the kind of document that a detective or lawyer can pick up and immediately understand without needing any explanation of the system.
You can send this file through the Dead Drop (the secure email tool on this platform), attach it to a regular email, or save it to a USB drive for physical delivery. The choice is yours, and the tool does not track which method you use.
Once you have exported and sent your evidence, you may choose to clear your local storage. The tool includes a panic clear button that immediately and irrecoverably erases all stored data from your browser. One tap. Everything gone. If your device is about to be inspected by the person you are documenting, this function exists for your safety.
The panic clear function is a safety tool for emergencies โ when someone is about to search your device and finding your evidence would put you in danger. However, if you are already involved in legal proceedings (a court case, a DVO application, a police investigation), you may have a legal obligation to preserve evidence. Deliberately destroying evidence that is subject to a court order or legal hold can have serious legal consequences. If you are unsure, seek legal advice before clearing your data. The tool provides safety, but safety and legal obligation can sometimes conflict โ and a lawyer can help you navigate that.
Disguising the Tool on Your Phone
The most important aspect of browser-based evidence collection is that it can be made invisible on your device. Here are specific steps for both iPhone and Android.
On iPhone using Safari, navigate to the Evidence Ledger page. Tap the share button (the square with an arrow pointing up). Tap "Add to Home Screen." Change the name to something innocent โ "Recipes," "Shopping," "Notes," whatever feels natural on your phone. The icon will appear on your home screen looking like any other app shortcut. If someone asks, it is a recipe website you like.
On Android using Chrome, the process is similar. Navigate to the page. Tap the three-dot menu. Tap "Add to Home screen." Rename it. The bookmark appears on your home screen as an icon indistinguishable from any other app.
Your browser history will show a visit to the website. You can delete this specific history entry without clearing your entire browser history. On Safari, go to History, find the entry, swipe left, and delete. On Chrome, tap the three-dot menu, tap History, find the entry, tap the X to remove it. The bookmark on your home screen will continue to work even after the history entry is deleted.
Disguise the bookmark with an innocent name. Delete the browser history entry for the website. Do not screenshot the evidence tool itself (screenshots are backed up to the cloud). Make entries when you are alone and safe. Export and send only when you are ready. Use panic clear if your device is about to be searched. Never tell the person you are documenting that you are keeping a record. If you need to practice, make a test entry and delete it to see how the process feels before using it for real.
The Emotional Reality of Evidence Collection
The practical advice in this article โ how to use the tool, how to disguise it, how to format entries โ is necessary but insufficient. Because the hardest part of preserving evidence is not technical. It is emotional.
Recording what is happening to you forces you to confront it. Writing "he said he would kill me" on a Tuesday evening, with a timestamp that proves you were living in that reality at 7:15 PM on a specific date, makes it real in a way that your mind has been working hard to make unreal. The coping mechanisms that help you survive โ minimisation, normalisation, hope that it will get better โ are temporarily stripped away by the act of factual recording.
This is painful. It is also powerful.
The contemporaneous record does something that memory alone cannot: it creates an external witness. Your ledger becomes the version of events that cannot be gaslit, cannot be rewritten, and cannot be erased by the person who tells you it never happened or that you are remembering it wrong. The entry you made at 7:15 PM on Tuesday says what it says. It was made at the time. It carries the weight of immediacy. And when you read it back to yourself weeks or months later, it will remind you of what you knew to be true in the moment before the fog of coercive control settled back in.
If you find yourself unable to write a detailed entry โ if you are too shaken, too tired, too frightened โ write one sentence. "It happened again, worse this time, 7:15 PM kitchen." That is enough. A one-sentence entry with a timestamp is infinitely more useful than a detailed account written from memory three weeks later. Brevity is not weakness. It is evidence of the conditions under which the record was made โ and any detective or lawyer who reads a series of brief, timestamped entries will understand exactly what those conditions were.
If you can only write one sentence, write one sentence. Date and time will be added automatically. A pattern of brief entries with timestamps tells police more than you might think โ it shows frequency, escalation, and the conditions under which you were recording. A one-line entry made at 2 AM carries its own story. You do not need to write perfectly. You need to write at all.
What Happens After You Send Your Evidence
When your evidence reaches its recipient โ police, a lawyer, a DV service โ it enters a system. Understanding that system helps you prepare for what comes next.
Police will review the file and assess whether it meets the threshold for investigation. A single incident may not be enough. A documented pattern almost always is. The reference IDs and timestamps in your evidence make their job significantly easier because they can cross-reference your entries with other records โ emergency calls, medical visits, statements from neighbours or family members.
If police open an investigation, your evidence file becomes part of the case. The fact that it was created contemporaneously, with automatic timestamps and unique reference IDs, gives it evidentiary weight that a retrospective account would not have. Your ledger may be used in court proceedings โ and the structured, professional format in which it is presented matters, because judges and magistrates are accustomed to working with referenced, chronological evidence files.
If police decline to act, your evidence file is not wasted. You can present it to a lawyer for a protection order application. You can present it to a DV service for safety planning. You can present it to a journalist if you believe there is a public interest in your case. The file is yours. The evidence is yours. The decision about what to do with it is yours.
The Evidence Belongs to You
This is the principle that underpins everything in this article: your evidence is yours.
It lives on your phone. It is not stored on any server. No platform, no company, no government has a copy. When you export it, you choose who receives it. When you clear it, it is gone. At every step, you are in control โ of the record, of the distribution, and of the timing.
The tool does not make decisions for you. It does not analyse your situation. It does not tell you what to do. It gives you a structured, professional, timestamped way to record what is happening, and it gives you the means to share that record when you are ready.
When you are ready.
Not before.
Sources and further reading:
Australian Institute of Family Studies, "Evidence and proof in family law proceedings"
Queensland Courts, "Applying for a domestic violence order: evidence guide"
Law Council of Australia, "Domestic and Family Violence: Evidence best practices"
Australian Federal Police, "How to report a crime: evidence preparation"
Word count: ~3,300 | Target keywords: preserve evidence phone, evidence collection DV, contemporaneous record domestic violence, how to document abuse, phone evidence police, browser evidence tool, hidden evidence app | Knowledge boxes: 8 | Internal links: Evidence Ledger, Dead Drop, Tools for the Night