Get on the App Store

How to Secretly Document Domestic Violence Texts for a Restraining Order

If you are in immediate danger, call 911. For confidential support 24/7, contact the National Domestic Violence Hotline: call 1-800-799-SAFE (7233), text “START” to 88788, or chat at thehotline.org.

You are reading this article because you — or someone you care about — may be receiving threatening, controlling, or abusive text messages from a domestic partner. You already know that something is wrong. What you need now is a safe, practical plan to build a case.

This guide will show you how to automatically and silently archive every abusive text message to a secure location that the abuser cannot access, tamper with, or even know about. The goal is simple: create a court-ready evidence trail that protects you when you are ready to act.


Why You Need to Document — Even If You’re Not Ready to Leave

Many victims hesitate to collect evidence because they are not sure whether they will file for a protective order or press charges. That’s okay. You do not need to decide right now. But starting to build a record today is one of the most powerful things you can do for your future self.

Here’s why:

  • Patterns matter in court. A single threatening text can be dismissed as “taken out of context.” Dozens of threatening texts over weeks and months establish a clear pattern of abuse that judges take seriously.
  • Memory fades. Records don’t. Six months from now, you may not remember the exact date or wording of a specific threat. An automated archive captures every single message, word for word, with exact timestamps.
  • Abusers delete evidence. If the abuser has access to your phone — even briefly — they can delete message threads. An off-device archive is beyond their reach.
  • It strengthens every legal action. Whether you eventually file for a temporary restraining order (TRO), pursue criminal charges, or negotiate a custody agreement, a documented history of abuse is your strongest asset.

Safety First: Before You Do Anything

Your physical safety is more important than any piece of evidence. Before you set up any documentation system, consider these precautions:

Is Your Phone Being Monitored?

Abusers frequently monitor their partner’s devices. Warning signs include:

  • They seem to know about private conversations or search history.
  • They installed apps on your phone “for your convenience.”
  • Your phone battery drains unusually fast (a symptom of background spyware).
  • They have your phone passcode, Apple ID password, or iCloud login.

If you suspect monitoring, do not change your phone behavior suddenly. Abruptly deleting apps or changing passwords can alert the abuser and escalate the danger. Instead:

  • Use a different, secure device (a friend’s phone, a library computer, a prepaid phone) to research your options and set up your safety plan.
  • Contact the National Domestic Violence Hotline (1-800-799-7233) from a safe phone for personalized guidance.
  • Visit TechSafety.org for detailed digital safety toolkits created specifically for abuse survivors.

Can You Safely Install an App?

For this method to work, you need to install a forwarding app on the phone that receives the abusive texts. Consider:

  • Do you control your own App Store account? If the abuser has access to your Apple ID, they may see your app downloads in “Purchased” history. You can hide purchases in the App Store.
  • Can you use Screen Time restrictions? If the abuser uses Screen Time to control your phone, you may need to wait until you have access to a safe device.
  • Is there a window of opportunity? Even a few minutes of private access to your phone is enough to install and configure the app.

If installing an app is too risky right now, skip to the “Alternative Documentation Methods” section below. Do not put yourself in danger for evidence.


The Silent Archiving Method: Auto-Forward Texts to a Secure Email

The most reliable way to document abuse is to automatically forward every incoming text message to a secure email address that only you (and your attorney) can access. This runs silently in the background — no notifications, no alerts, nothing visible on your screen.

Why This Method Is the Gold Standard for Evidence

Feature Screenshots Manual Forwarding Auto-Forward to Email
Runs silently ❌ Requires active effort ❌ Visible activity ✅ Completely invisible
Tamper-proof ❌ Easily edited ❌ Can be deleted ✅ SMTP headers prove authenticity
Chronological integrity ❌ Disorganized files ❌ Easy to miss messages ✅ Automatic, complete timeline
Survives phone loss ❌ Lost with device ❌ Lost with device ✅ Stored in the cloud
Court-admissible metadata ❌ No routing data ❌ Limited ✅ Full email headers with timestamps

Step-by-Step Setup Guide

Step 1: Create a Secret, Secure Email Address

Before anything else, create a brand new email account that the abuser does not know about. Do this from a safe device — not from your personal phone or shared computer.

Recommended providers: - ProtonMail — end-to-end encrypted, based in Switzerland - Tutanota — encrypted, no phone number required to sign up - Gmail or Outlook work too, as long as you use a strong, unique password and enable two-factor authentication (2FA)

Important rules: - Do not use your real name in the email address. Something like [email protected] is fine. - Do not save the password on your phone’s browser or keychain. - Do not tell anyone about this email except your attorney or a single trusted person.

Step 2: Install SMS to Email Forwarder

Download SMS to Email Forwarder from the App Store. The app is free to install and includes a permanent free plan.

After installation: 1. Open the app and enter your secret email address as the forwarding destination. 2. Follow the one-time Shortcuts Automation setup — this takes about 2 minutes. 3. Once configured, close the app. It does not need to stay open. The iOS Shortcuts Automation handles everything in the background.

Privacy note: SMS to Email Forwarder relays messages through our secure servers for email delivery. We enforce a strict zero-retention policy — no message content is stored, logged, or analyzed after delivery. We do not track your activity, and subscriptions are our only revenue source.

Step 3: Verify It Works

Send yourself a test text from a different phone (or ask a trusted friend to text you). Within seconds, the message should appear in your secret email inbox — complete with the sender’s phone number, the full text, and a timestamp.

Once verified, you can move the app icon to a folder on a secondary home screen or into the App Library where it is less visible.

Step 4: Let It Run. Don’t Engage.

From this point forward, every incoming SMS and iMessage automatically goes to your secure inbox. You do not need to open the app, press any buttons, or take any action.

Critical advice: - Do not engage with the abuser about the messages. Do not quote their texts back at them or mention that you are recording anything. - Do not delete messages on your phone if it is safe to keep them. Having both the phone record and the email archive strengthens your case. - Check your secret email periodically from a safe device to confirm messages are arriving.


What Makes Email Evidence Admissible in Court

Courts in every U.S. state accept text messages as evidence in domestic violence and protective order cases. The key requirements are:

  1. Authentication — You must prove the messages are real and came from the abuser. Email records include the sender’s phone number and SMTP routing headers, which are far more difficult to forge than screenshots.

  2. Completeness — Judges want to see full conversations, not cherry-picked snippets. Automatic forwarding captures every message without gaps.

  3. Chain of Custody — The messages went directly from your phone to a secure email inbox with no human editing in between. This creates a clean, unbroken chain of custody.

  4. Timestamps — Every forwarded email carries server-verified delivery timestamps. Unlike screenshots (which show only what was on the screen at one moment), email headers prove exactly when the message was received and forwarded.


When You’re Ready: How to Use Your Archive

You do not need to act on a specific timeline. When you are ready — whether that’s next week or next year — your archive will be waiting.

To File for a Restraining Order (TRO / Order of Protection)

  1. Print the emails or export them as PDFs from your inbox.
  2. Highlight the specific threats — any messages where the abuser threatens physical harm, stalks your location, threatens your children, or engages in a pattern of intimidation.
  3. Present them to the court along with your petition. The chronological email trail demonstrates the ongoing pattern that judges require.

To Support a Criminal Case

  1. Share inbox access with your attorney or the detective assigned to your case.
  2. Law enforcement can subpoena SMTP logs from your email provider to further verify authenticity.
  3. The complete, unedited archive prevents the defense from arguing that you selectively presented only harmful messages.

To Strengthen a Custody Case

  1. Courts take a parent’s abusive behavior seriously when deciding custody.
  2. A documented pattern of threatening, controlling, or violent texts can be decisive evidence in custody and visitation hearings.
  3. Your email archive proves the abuse was ongoing — not a single isolated incident.

Alternative Documentation Methods

If auto-forwarding is not possible (e.g., the abuser controls your phone entirely), consider these backup approaches:

  • Use a second camera. Take photos or videos of the abusive messages on your phone screen using someone else’s phone. This is less reliable than email forwarding but better than nothing.
  • Ask your carrier for records. Phone carriers retain SMS metadata (dates, times, numbers) for a period of time. Your attorney can subpoena these records.
  • Use a domestic violence advocate. Contact the National Domestic Violence Hotline — their advocates can help you create a personalized safety and documentation plan based on your specific situation.

Resources

You are not alone, and help is available — free and confidential.

Resource Contact
National Domestic Violence Hotline 1-800-799-SAFE (7233) · Text “START” to 88788 · thehotline.org
National Teen Dating Abuse Helpline 1-866-311-9474
StrongHearts Native Helpline 1-844-762-8483
RAINN (Sexual Assault) 1-800-656-HOPE (4673)
Tech Safety Resources TechSafety.org
Coalition Against Stalkerware stopstalkerware.org

Disclaimer: We are software developers, not lawyers. This article provides technical solutions for digital evidence preservation and should not be construed as legal advice. Always consult with a licensed attorney in your jurisdiction regarding domestic violence, protective orders, or criminal matters. If you are in immediate danger, call 911.


You deserve to be safe. When you are ready, your evidence will be ready too. Download SMS to Email Forwarder — free, silent, and private.


Ready to start protecting yourself?

Automate your evidence collection today. Download SMS to Email Forwarder on the App Store to securely backup crucial text messages.

Download on the App Store