The way we interact with technology continues to increase and evolve as we rely on computers, smart phones, and other digital devices to complete many of our daily activities. Unfortunately, as technology becomes more integral to our lives, offenders have increasingly misused technology to facilitate crimes against women, and as a means to assert power and control in the course of an intimate partner relationship. Where technology is being used to perpetrate crimes, investigators and prosecutors can identify, preserve, and present digital evidence in order strengthen cases, support victims, and hold offenders accountable for the full range of their criminal and abusive activity
This presentation demonstrates how cyber investigations can be used to reveal evidence of criminal activity, as well as evidence of the power and control dynamics of an abusive intimate partner relationship, but while also supporting the protection of victim privacy. The presenter discusses theories of admission, rules of evidence, and case law is discussed using “real life” examples to demonstrate how to properly authenticate and introduce digital evidence in civil and criminal proceedings.
At the conclusion of this presentation, participants will be better able to:
– Identify how offender misuse technology to perpetrate crimes and assert power and control against intimate partners
– Coordinate with allied professionals to better identify sources of digital evidence that can be used to strengthen prosecutions
– Effectively litigate the admission of digital evidence by analyzing applicable evidence rules, current case law, and underlying theories of admission