Get on the App Store

How to Preserve Threatening Texts as a Crime Witness

You did the right thing. You came forward, gave a statement, agreed to testify. Now someone wants you to reconsider.

The texts started a week after you talked to the detective:

"I know what you told them."

"Be careful what you say in court."

"Nice family you have."

You screenshot them. The detective told you to save everything. But your hands are shaking as you read them, and the last thing you're thinking about is evidence preservation methodology.

Here's the problem with screenshots: phones get lost, broken, stolen — or deliberately destroyed by people who want those screenshots to disappear. And if you only have screenshots on the phone that gets taken from you, you have nothing.

This guide sets up a system where every threatening text is automatically, immediately, and permanently archived somewhere the sender can't reach — your attorney's inbox, the prosecutor's email, or a secure third-party account.


Why Automatic Archiving Is Critical for Witnesses

Manual DocumentationAutomatic Archiving
You have to remember to screenshotEvery text is captured without your action
Screenshots live on your phone onlyArchive lives in a separate email account
Can be deleted if your phone is takenCannot be accessed by your attacker
Gaps in documentation are exploited by defenseContinuous record proves completeness
Emotional state affects documentation consistencySystem runs regardless of your emotional state

The legal reality: Witness intimidation is a federal crime (18 U.S.C. § 1512) and a felony in all 50 states. But proving it requires evidence — and the best evidence is a complete, unedited, timestamped record of every threatening message received.


The Setup: Direct-to-Prosecutor Archiving

Option A: Forward to Your Attorney (Recommended)


Threatening texts → Your phone → SMS to Email Forwarder
                                         ↓
                              [email protected]
                                         ↓
                              Attorney-client privilege
                              protects the archive
      

Why attorney first:

  • Communications are protected by attorney-client privilege
  • Your attorney decides what to share with prosecutors and when
  • The archive becomes a legal work product — harder to subpoena
  • Your attorney knows what's admissible and can preserve chain of custody

Option B: Forward to Prosecutor's Office


Threatening texts → Your phone → SMS to Email Forwarder
                                         ↓
                              [ADA name]@da.gov
                                         ↓
                              Becomes part of
                              the case file
      

When to use this option:

  • If you don't have a private attorney
  • If the prosecutor specifically asks for real-time forwarding
  • If the threats are escalating rapidly and you need law enforcement to see them immediately

Option C: Forward to a Secure Personal Archive

If you don't yet have legal representation:

  1. Create a new email: [randomstring]@protonmail.com
  2. Write down the password and give it to a trusted person in a sealed envelope
  3. Forward all SMS to this address
  4. When you get an attorney, share the login credentials with them

Setup Steps (Any Option)

  1. Download SMS to Email Forwarder
  2. Enter the destination email (attorney, prosecutor, or personal archive)
  3. Complete the Shortcuts setup — 2 minutes
  4. Verify: have a friend text you, confirm it arrives in the destination inbox
  5. Do not tell anyone about the forwarding (except your attorney)

What Makes the Archive Legally Powerful

1. Completeness

Because the system forwards every incoming text — not just threatening ones — the defense cannot argue that you selectively preserved only incriminating messages. The record includes mundane texts from friends, delivery notifications, and spam alongside the threats. This completeness is a feature, not a bug.

2. Continuous Timestamps

Every forwarded email has an independently verifiable timestamp. This creates a timeline of intimidation that prosecutors can present to the court:

TimeIncoming Text
Mon 9:14 AM"I heard you went to the police"
Wed 2:33 PM"You should think about your family"
Fri 11:47 PM"Last chance to do the right thing"
Sun 6:02 AM"We know where your kids go to school"

This pattern of escalating threats, documented automatically with timestamps, is devastating evidence in a witness intimidation prosecution.

3. Chain of Custody

The archive email was set up once and left to run. You didn't touch it, edit it, or curate it. The defense cannot argue tampering because the system operated autonomously. Your attorney can testify to when the forwarding was established and that the inbox has been untouched since.

4. Off-Device Redundancy

Even if the defendant destroys your phone, the archive survives. Even if they hack your iCloud, the ProtonMail archive is separate. Even if they threaten you into deleting your texts, the forwarded emails are already in your attorney's inbox.


Practical Scenarios

The Night Before Trial

The defendant's associate texts at 2 AM: "Tomorrow would be a bad day to show up."

Without forwarding: You panic. You screenshot it. Maybe you miss it because you were sleeping. Maybe your phone doesn't save the screenshot properly.

With forwarding: The text is in your attorney's inbox before you wake up. She calls the ADA at 7 AM with the email chain. The judge is informed. Witness protection is arranged. The defendant's associate is arrested for witness tampering before lunch.

The Burner Phone Problem

The threats come from multiple numbers — burner phones that change weekly. You can't block them all. You can't filter by sender.

With forwarding: Every text from every number is captured. The forensic pattern — different numbers, similar language, escalating severity — constitutes evidence of organized intimidation. Your attorney builds a timeline showing coordinated harassment across 8 different phone numbers over 6 weeks.

The "I Didn't Say That" Defense

In court, the defendant claims the threatening texts were never sent from their associate's phone. "Someone must have spoofed the number."

Your evidence: The forwarded emails contain the sender's phone number as received by your carrier. Combined with carrier records (subpoenaed by the prosecutor), the originating number is verified. The email timestamps match the carrier delivery times. The defense's "spoofing" argument collapses.


Safety Precautions

Digital Safety

  • Don't tell the sender you're archiving their messages. Let them keep incriminating themselves.
  • Don't respond to threats. Any engagement may be used to argue you provoked the conversation.
  • Don't delete threats from your phone. Keep them on-device AND in the archive. Two copies are better than one.
  • Don't access the archive email from your primary phone. If your phone is compromised, the attacker shouldn't be able to find the archive destination.

Physical Safety

If you're receiving threats as a witness, contact law enforcement immediately. This tool preserves evidence — it does not replace physical protection.

If You ExperienceContact
Direct threats of violence911 + your ADA/prosecutor
Feeling followed or watched911 + detective assigned to your case
Threats to family members911 + prosecutor's victim advocate
Online harassment or doxxingFBI Internet Crime Complaint Center (IC3)
Need emotional supportNational Crime Victim Hotline: 1-855-4-VICTIM

For Prosecutors and Attorneys: How to Receive the Archive

If you're advising a witness to set up SMS forwarding to your inbox:

  1. Create a dedicated case email (e.g., [email protected]) to avoid mixing with other correspondence
  2. Enable email retention rules — no auto-delete, no archiving, preserve all headers
  3. Document the chain of custody — note the date and time forwarding was established
  4. Treat the inbox as evidence — restrict access to case team only
  5. Export periodically — download .eml files to secure case storage as backup

Start Archiving Before the Next Threat Arrives

Every threat that isn't documented is a threat that didn't officially happen. Every text that gets deleted, lost, or destroyed is a gap the defense will exploit.

You already did the hardest thing — you came forward. The least you can do for yourself is make sure the evidence of intimidation against you is bulletproof.

Set it up now. Before the next text arrives.


Related: personal safety dead man's switch | saving harassment texts as evidence | documenting stalker texts for police


Protect yourself. Preserve the evidence.

Download SMS to Email Forwarder — automatic, tamper-proof text archiving.


Ready to get started?

Set up automatic SMS forwarding in under 2 minutes. Free plan available — no credit card required.

Download on the App Store