Responding to Stalking: A Guide for Prosecutors

Stalking affects 7.5 million people in the United States a year, with 15 percent of women and 6 percent of men being stalked in their lifetime. Stalking entails repeat victimization because it constitutes a series of acts rather than a single incident and it can cause sustained and repeated emotional distress. This guide is a resource for prosecutors in stalking cases. It provides an overview of stalking and suggests best practices for prosecuting offenders. It should be used as a guide for attorneys to support their own research and for problem-solving in prosecuting these types of cases.

Stalking: Effective Strategies for Prosecutors

Stalking affects 6.6 million people in the United States each year and every day, in courtrooms throughout the country, stalking victims recount the fear and distress they have experienced as a result of this crime. Stalkers create and exploit vulnerabilities in their victims, relying on technology and manipulation of the justice system to conceal their crimes and cast doubt on their victim’s credibility. This article provides an overview of stalking and the modern technology stalkers use. The article emphasizes the importance of using a collaborative approach between law enforcement, victim advocates and prosecutors to assist victims and hold offenders accountable.

Stalking_Effective_Strategies_for_Prosecutors_Issue_11

Assisting Human Trafficking Victims with Return of Property and Restitution

Investigating and prosecuting cases of human trafficking and violence against sexually exploited women is rife with challenges, including balancing victims’ property interests with the need to hold traffickers and exploiters accountable. Criminal justice professionals can meet these challenges by pursuing the return of victims’ property and seeking restitution where appropriate. This Strategies in Brief identifies issues that often arise when trying to return property to victims in human trafficking cases and will provide collaborative strategies for prosecutors and allied criminal justice professionals seeking to balance victim and criminal justice interests. It also presents an overview of restitution as another means of relief for victims of human trafficking to be considered by prosecutors.

Assisting-Human-Trafficking-Victims-with-Return-of-Property-and-Restitution

 

Establishing Penetration in Sexual Assault Cases

Criminal acts of sexual violence generally fall into three categories: exposure, contact, and penetration. While prosecutors introduce evidence to establish the statutory elements at trial, defense strategies focus on targeting any vulnerability in that evidence. Where the charged offense includes an element of penetration, defenses may also include specific challenges to the prosecution’s ability to prove that penetration occurred. If the prosecution is unable to prove the element of penetration beyond a reasonable doubt, the accused will be acquitted or convicted of a less serious offense. This Strategies in Brief explains the legal requirements for establishing penetration in sexual assault prosecutions and offers strategies for effectively identifying, evaluating, and presenting evidence of penetration. The article: summarizes the categories of criminal sex offense statutes and outlines the legal requirements to establish penetration; provides strategies to prepare for and try sexual assault cases involving penetration; identifies and offers guidance for responding to common defense challenges to establishing penetration in sexual assault cases.

Establishing-Penetration-in-Sexual-Assault-Cases-SIB24

The Internet & Intimate Partner Violence: Technology Changes, Abuse Doesn’t

Although intimate partner abuse and harassment perpetrated through technology can look different than in-person abuse or harassment, the goals and motives are still the same: power and control. Technology allows an abuser to assert that power and control by keeping tabs on their partner – by knowing who the survivor talks to, what they do, and where they go. This is a key aspect of control. Because so many people live their lives on the Internet, it is a treasure trove of information, allowing abusers to stay informed and in control of their victims. This Strategies Newsletter provides an overview of online abuse and offers solutions for documenting the abuse, supporting survivors, and holding offenders accountable.

The-Internet-and-Intimate-Partner-Violence-Technology-Changes-Abuse-Does-Not-Issue16

SAJI Annotated Bibliography (June 2017)

This bibliography provides an extensive list of studies, best practices, strategies and other resources to support the prosecution of sexual assault, from the victim’s initial report through trial. The annotations offer overviews for every source on topics such as: performance measures, conviction rates, standards of practice, criminal justice reform, promising practices, investigation, responding to witnesses, pretrial, and trial strategies.

SAJI-Annotated-Bibliography-June-2017

Prosecuting Image Exploitation

Image exploitation involves the non-consensual creation, possession, or distribution of an image or images depicting victims engaged in consensual sexual activity or being sexually assaulted. As technology continues to evolve more quickly than the law, image exploitation crimes are being addressed by a patchwork of criminal laws. This Strategies Newsletter gives prosecutors insight on how to respond to this complex crime and to hold offenders accountable under imperfect or untested laws. The article explores the various forms of image exploitation and the types of statutes under which this abuse can be prosecuted.

Image-Exploitation-Strategies15

Technical Evidence in Stalking Prosecutions: Where to Get It and How to Get It In

The use of personal computers, mobile devices, and other technology in stalking activity presents challenges for the prosecutor who must connect the activity to the defendant. Prosecutors must be familiar with the sources of available evidence, how to obtain it from technology providers, and how to present it effectively to a jury. This webinar covers the applicable rules of evidence and relevant case law associated with proving a technology-facilitated stalking case. The presentation provides strategies for introducing technical evidence and for responding to common objections at trial.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Stop Calling It ‘Revenge Porn’: Prosecuting Image Exploitation

Image exploitation involves the nonconsensual creation, possession, or distribution of an image or images depicting victims engaged in consensual sexual activity or being sexually assaulted. As technology continues to evolve more quickly than the law, image exploitation crimes are being addressed by a patchwork of criminal laws. We as prosecutors must continue to respond to this complex crime and to hold offenders accountable under imperfect or untested laws. This webinar explores the various forms of image exploitation and the types of statutes under which this abuse can be prosecuted, enabling prosecutors to choose the most advantageous charging strategies within their own jurisdictions. In addition, the presenter offers offender-trial strategies are offered to assist in overcoming common victim-blaming defenses.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.