Overview
When you suspect fraud, immediate and organized evidence collection is the single best step you can take to make the case actionable. Good documentation helps law enforcement, banks, credit bureaus, and regulators quickly verify what happened, freeze losses, and pursue recovery. In my 15 years advising clients on fraud response, I’ve found that timely preservation of electronic records and clear chronological logs are the two factors that most often distinguish successful recoveries from stalled investigations.
This guide explains what to save, how to preserve it, who to notify, and how to organize materials so your report is credible and usable by investigators.
Why methodical evidence collection matters
- It speeds investigations: authorities rely on concrete artifacts (emails, transaction receipts, metadata) to trace fraudsters.
- It preserves fragile data: some records (web pages, chat threads, deleted messages) can disappear quickly unless preserved.
- It supports civil and criminal remedies: insurers, banks, and prosecutors need documentation to approve chargebacks, file suits, or press charges.
Authoritative resources that explain reporting channels and what to include include the Federal Trade Commission (FTC) and the Consumer Financial Protection Bureau (CFPB). See the FTC reporting guidance and CFPB victim resources for next steps (FTC: https://www.ftc.gov; CFPB: https://www.consumerfinance.gov).
Step-by-step: What to collect and how
- Basic incident record (start here)
- Date and time you first noticed the issue and a short summary of what happened. Record this in a dedicated incident log (date-stamped and saved as a text file or printed hard copy).
- Names and contact info of anyone involved (company reps, sellers, bank contacts, witnesses).
- Financial records
- Bank and credit card statements showing unauthorized transactions. Save PDFs or screenshots with visible account numbers (redact unnecessary digits for sharing).
- Transaction IDs, check numbers, ACH details, merchant names and timestamps.
- Communication records
- Emails: save full messages including headers (source/destination IP, Received headers). Don’t forward; export or save as .eml or PDF. Email headers often reveal sender domains and routing used in phishing.
- Text messages and chat logs: export or screenshot with timestamps and sender info.
- Voicemails: save audio files and transcribe them with timestamps.
- Digital evidence (web pages, social media, apps)
- Screenshots: capture full-screen images showing URL bar, timestamp, and any identifying details. Include browser DevTools capture when possible to preserve page code or network calls.
- Save HTML or use “Save page as” to keep a local copy.
- Preserve metadata (EXIF) for photos; do not edit images if you want to preserve original timestamps.
- Documents and contracts
- Scanned copies of invoices, receipts, purchase agreements, and any signed documents.
- Keep originals when possible; if you must share originals with authorities, keep a copy first.
- Device and account evidence
- Login attempts, account security emails (password reset notifications), and suspicious device sign-in alerts.
- If possible, export logs from services (security logs from email providers, web hosting control panels, or payment processors).
- Witness statements
- Ask witnesses to provide written, signed statements with their contact information and a short description of what they observed.
- Preserve the chain of custody
- Keep a simple log of who received, copied, or handled each piece of evidence and when. This is especially important if evidence is later presented in court.
How to preserve electronic evidence properly
- Do not delete or modify original files. Make a forensic copy (a full export or image) before any edits.
- Use screenshots as a quick backup but also save native files (emails, attachments, PDFs).
- When taking screenshots, include the URL, browser address bar, and system clock if possible.
- Save emails with full headers. For Gmail, use “Show original” and download the message.
- If you suspect malware or an infected device, stop using it and consult a professional. Continued use can overwrite logs and timestamps.
Where to report and what to include in your complaint
Report promptly to every relevant organization. Include a concise summary and attach key evidence files (organized and labeled):
- Federal Trade Commission (FTC): use IdentityTheft.gov or the FTC complaint assistant for consumer fraud. The FTC’s portal will walk you through an identity-theft recovery plan (https://www.ftc.gov).
- Internet crimes (cyber-enabled fraud): file with the FBI’s Internet Crime Complaint Center (IC3) at https://www.ic3.gov.
- Local police: file a report with your local law enforcement — get a copy or complaint number to share with banks and credit bureaus.
- Financial institutions: report unauthorized transactions to your bank and card issuer immediately to start chargebacks or reversals.
- State attorney general: many states have online consumer complaint forms and resources.
When submitting a report, include:
- A clear timeline of events with dates and times.
- Copies of bank statements or screenshots of fraudulent charges.
- Key communications (emails, screenshots, chat logs) with context notes.
- Any account numbers, transaction IDs, and merchant or sender details.
Special guidance for identity theft and tax-related fraud
If the fraud involves identity theft or a suspicious tax filing, follow IRS guidance and use targeted resources. The IRS maintains pages on tax-related identity theft and steps to take if your tax account is impacted. For victims dealing with tax or refund issues, see our guide on steps to recover your tax account after identity theft for practical steps to get the IRS’s attention and restore your account: Recovery steps after identity-theft tax issues.
For credit impacts, our article on identity theft and credit reports explains how to correct fraudulent accounts and work with bureaus to remove incorrect entries: Fixing identity-theft entries on credit reports.
How to present evidence to banks, credit bureaus, and investigators
- Organize files into folders: Summary (one-page incident overview), Financial records, Communications, Digital Evidence, Witnesses, and Official Reports.
- Label files with dates and short descriptions (e.g., 2025-01-12bankstatement_page3.pdf).
- Prepare a one-page executive summary that highlights the most important proof (transaction that shows loss, sender email, exact URL of fraud page).
- When emailing evidence, send password-protected zipped files and share the password in a separate channel (phone call or SMS). Many firms have secure upload portals — use those if available.
Common mistakes to avoid
- Waiting too long: delays allow evidence to be lost or overwritten (deleted emails, expired logs).
- Editing originals: altering image files, transcripts, or emails can undermine credibility.
- Relying only on verbal accounts: always produce written or recorded documentation when possible.
- Failing to capture metadata: metadata often contains the technical trail needed to trace perpetrators.
Example (real-world, anonymized)
A client received a convincing email purportedly from their investment custodian asking them to approve a wire transfer. The client saved the email but didn’t capture headers or the originating IP. When the bank asked for proof, the shortfalls slowed the investigation. We obtained a full email export (with headers) from the client’s mail provider and combined that with bank statements showing the unauthorized wire. The bank reversed a portion of the loss and the case was referred to cybercrime investigators. The lesson: full exports and coordinated timing matter.
Next steps and practical checklist
- Immediately: take screenshots, save emails, and download statements.
- Within 24–72 hours: file reports with your bank, FTC (IdentityTheft.gov if identity theft), and local police if there’s significant loss.
- Within 1 week: organize evidence into labeled folders, prepare an incident summary, and contact any impacted vendors or partners.
- Ongoing: monitor your credit reports, enable account alerts, consider a credit freeze if identity theft is confirmed.
Resources
- FTC, Report Fraud and Identity Theft: https://www.ftc.gov
- CFPB, Consumer guidance on fraud recovery: https://www.consumerfinance.gov
- FBI IC3, Internet Crime Complaint Center: https://www.ic3.gov
For tax-specific identity-theft recovery, review our in-depth FinHelp piece on recovering your tax account after identity theft: Steps to Recover Your Tax Account After Identity Theft.
If your credit is affected, read: Identity Theft and Your Credit Report: Steps to Recover and Protect Yourself.
For broader immediate actions after an identity theft incident, see: Steps to Take After an Identity Theft Incident.
Professional disclaimer: This article is educational only and not legal advice. The steps above reflect best practices I’ve used advising clients but do not replace counsel from a lawyer, forensic specialist, or your financial institution. For significant losses or complex frauds, consult an attorney and consider engaging a digital-forensics professional.
If you’d like a downloadable checklist or a sample incident-log template I use with clients, I can point you to a printable version on FinHelp’s resources page.