BlogContact
Call 512-801-9754

Free Consultation · Available 24/7

How to Document Evidence for a Private Investigation
HomeResourcesClient Education HubHow to Document Evidence for a Private Investigation
Client Education Hub

How to Document Evidence for a Private Investigation

What you document before calling us can significantly strengthen your investigation.

19-Year LAPD Veteran
Travis County Approved Vendor
TX License A11319
100% Confidential

Before your PI begins their investigation, the information you provide helps focus the work and reduces the time, and cost, required to gather the evidence you need. Here's what you should document before your first consultation, and what you should absolutely leave to the professional.

Key Points

Keep a written timeline of suspicious events with dates and times
Save screenshots of relevant text messages and social media posts
Note vehicle descriptions, license plates, and locations
Do not confront the subject or tip them off
Do not attempt surveillance yourself
Do not access the subject's phone, email, or accounts
Preserve all financial records and statements
Write down witness names and contact information

What to Document Before Calling

A written timeline: Write down every suspicious event you have observed, with specific dates, times, and locations. Include what you saw, heard, or discovered, not your interpretation of it, just the facts. This timeline helps your PI identify patterns and plan surveillance windows.

Digital evidence: Screenshot text messages, social media posts, emails, and any other digital communications that are relevant. Do not delete anything. Save screenshots to a secure location the subject cannot access.

Financial records: If your case involves hidden assets, fraud, or financial misconduct, gather bank statements, credit card statements, and any other financial records you have legitimate access to.

What to Leave to the Professional

Do not attempt surveillance yourself: Following someone yourself creates legal risk (stalking laws), tips off the subject, and produces evidence that is typically inadmissible in court because you are a party to the case.

Do not access the subject's accounts: Accessing someone else's phone, email, or social media accounts without their consent is a federal crime under the Computer Fraud and Abuse Act and a state crime under Texas Penal Code §33.02. Evidence obtained this way is inadmissible and exposes you to criminal liability.

Do not confront the subject: Confronting the subject before your PI has gathered sufficient evidence eliminates the element of surprise and may cause them to destroy evidence or change their behavior.

Key Takeaways

  • A written timeline with specific dates, times, and locations is the most valuable thing you can provide.
  • Screenshot and preserve all relevant digital evidence before it disappears.
  • Never attempt surveillance yourself, it creates legal risk and compromises admissibility.
  • Never access the subject's accounts without consent, it is a federal crime.
  • Do not confront the subject until your PI has gathered sufficient evidence.

Related Resources

Have questions about your situation? Call David Watson for a free confidential consultation.

512-801-9754
Watson PI

Free Confidential Consultation

Speak directly with David Watson. No obligation. 100% confidential.

Call 512-801-9754Send a Message
TX License A11319
Travis County Approved Vendor
State Farm Approved Vendor