ScamWatch

If you feel you're being scammed in United States: Contact the Federal Trade Commission (FTC) at 1-877-382-4357 or report online at reportfraud.ftc.gov

Scam‑Baiting Safely: How to Collect Evidence, Avoid Legal Risk, and Help Law Enforcement

Woman in handcuffs, sitting in a dimly-lit room, appearing contemplative.

Introduction — Why 'scam‑baiting' needs a safety-first approach

It’s natural to want to catch a scammer in the act — to record a robocall, save a smishing text, or respond to a spoofed number to learn where the fraud comes from. But playing ‘scam detective’ can backfire: you can destroy useful evidence, violate local recording or privacy laws, or accidentally give scammers new information they can use to harm you or others.

This guide explains how to collect reliable, usable evidence, how to minimize legal risk (including call‑recording rules), and how to hand off what you find to the right authorities so your report actually helps investigations and consumer protection efforts.

Key takeaways you'll find below: quick evidence priorities, safe collection steps, basic legal guardrails, and how to report to the FTC, FCC and the FBI’s IC3 so your report is actionable.

Step‑by‑step: Collecting evidence without breaking the case

If you want your information to be useful to investigators, follow a consistent, minimal‑risk routine. Start by prioritizing preservation over confrontation — don't try to trick, bait, or deliberately entrap someone.

What to collect first

  • Call/text metadata: Save timestamps, originating number shown on your phone, any full message headers, carrier details, and the exact date/time (use your device clock). Screenshots are fine — capture full screens so headers are visible.
  • Original messages: Preserve SMS/MMS or message threads. Do not edit or crop content that could remove metadata.
  • Voicemails and audio: If a voicemail arrives, keep the original file in your voicemail system or ask your carrier to preserve it. If you must save audio, export the original file rather than re‑recording from a speaker to avoid quality loss and metadata deletion.
  • Payment/URL evidence: Save any web links, QR codes, payment instructions, wallet addresses, or screenshots of requested payment methods (gift cards, P2P apps, cryptocurrency addresses).

How to capture things safely

  1. Take immediate screenshots of text threads and on‑screen call logs (include status bar timestamp when possible).
  2. Use your device’s native export features (export SMS or voicemail when the carrier or platform provides one).
  3. Keep originals: don’t alter files. Copy files to a separate secure folder or external drive and label them with date/time and a short description.
  4. Do not forward sensitive data to unknown third parties — only send evidence to official reporting portals or law enforcement contacts. Scammers often request proof of prior contact; don’t reply to those requests with more personal data.

Important technical note: forensic quality matters. A screenshot or saved voicemail is useful; a re‑recorded speaker‑to‑speaker audio file is far less reliable. When possible, export or request original files from your carrier or messaging provider. For guidance on standards and chain‑of‑custody best practices for digital evidence, see forensic and SWGDE/NIST resources.

Red flag — avoid these actions: do not modify metadata, do not post alleged evidence publicly (it can alert the scammer and contaminate the evidence chain), and avoid elaborate baiting conversations that can expose you or others to threats or criminal liability.

Legal risk, call‑recording laws, and how to stay on the right side of the law

Recording laws differ across the United States: federal law provides a one‑party baseline, but a number of states require all‑party (often called “two‑party”) consent before you record a phone call or conversation. That means recording a call without required consent could create criminal or civil exposure in some jurisdictions. Always check the law that applies to you and, when in doubt, avoid recording or get explicit consent.

Practical, low‑risk alternatives to recording

  • Rely on screenshots, call logs, and saved voicemail exports rather than secretly recording live conversations.
  • Use an initial verbal banner if you must record: "This call is being recorded" — and get an explicit "I consent" when the law requires it.
  • If a scam involves financial loss or identity theft, contact your bank and your local police first; banks can freeze or reverse transfers faster than evidence alone will produce an arrest.

How and where to report so your evidence counts

Once preserved, submit evidence to the official channels that collect and triage scam reports. These portals aggregate reports, let law enforcement connect related incidents, and improve industry mitigation efforts.

  • FTC (ReportFraud.ftc.gov) — central consumer portal for fraud, identity theft and marketplace scams. Filing helps regulators and consumer protection teams spot trends.
  • FCC Consumer Complaint Center — use for unlawful robocalls, spoofing and telephony abuses; telecom providers and regulators use these complaints to target spoofing networks.
  • FBI / IC3 (ic3.gov) — file an Internet Crime Complaint for cyber‑enabled fraud, vishing, or if you lost money and suspect an organized enterprise is involved. IC3 reports are routed to FBI field offices and law enforcement partners.
  • State and local law enforcement / Attorney General — many scams are investigated locally; file a police report and your state AG’s consumer complaint form when appropriate. See your state AG website for submission steps.

After filing: save the complaint reference numbers, provide investigators with copies (not originals) of preserved evidence, and follow law enforcement instructions. Avoid posting evidence publicly — investigators prefer controlled evidence transfers to preserve chain of custody. For actionable chain‑of‑custody and preservation steps, agencies reference SWGDE/NIST/DOJ standards.

Final checklist before you submit a report

ItemDone?
Saved full screenshots of messages and call logs 
Exported or preserved original voicemails/files (if available) 
Recorded timestamps, originating number, and device carrier 
Did not alter metadata or publicly post evidence 
Filed with FTC, FCC and/or IC3 as appropriate 

Scam‑baiting can help investigators when done safely: preserve originals, know the recording rules that apply to you, and route information through official channels. If you’re uncertain about legal risk in your jurisdiction, consult an attorney before recording or publishing any suspect call or message.