The Internet & Intimate Partner Violence: Technology Changes, Abuse Doesn’t

Although intimate partner abuse and harassment perpetrated through technology can look different than in-person abuse or harassment, the goals and motives are still the same: power and control. Technology allows an abuser to assert that power and control by keeping tabs on their partner – by knowing who the survivor talks to, what they do, and where they go. This is a key aspect of control. Because so many people live their lives on the Internet, it is a treasure trove of information, allowing abusers to stay informed and in control of their victims. This Strategies Newsletter provides an overview of online abuse and offers solutions for documenting the abuse, supporting survivors, and holding offenders accountable.

The-Internet-and-Intimate-Partner-Violence-Technology-Changes-Abuse-Does-Not-Issue16

AEquitas: Established to Promote Justice in Violence Against Women Prosecution

The criminal justice system is a critical resource for victims of sexual assault, domestic violence, stalking, and dating violence. As experienced prosecutors recognize, the concept of justice must also consider the victim’s safety, experience, and perspective. In order to provide the nation’s prosecutors with the support, information, training, mentorship, and resources necessary to objectively evaluate and constantly refine the prosecution of violence against women, several former prosecutors, a forensic nurse, and two national technical assistance providers created AEquitas: The Prosecutors’ Resource on Violence Against Women.

STRATEGIES.Issue1

Williams v. Illinois and Forensic Evidence – The Bleeding Edge of Crawford

The application of Crawford principles in the context of forensic evidence continues to plague the criminal justice system. The United States Supreme Court’s decision in Williams v. Illinois raises more questions than it answers about when and how an expert may testify to conclusions based upon the opinions or work of other (non-testifying) experts or technicians. This article reviews the relevant case law, and explores how trial prosecutors can present a case involving forensic testing conducted by a multitude of technicians and experts. It also addresses Williams’ impact on cold cases, in which original experts who performed autopsies and other forensic examinations and testing are no longer available for trial. The author provides practical suggestions to trial prosecutors who must balance limited resources against the need to secure convictions that will withstand confrontation challenges on appeal.

Williams-v-Illinois-and-Forensic-Evidence-The-Bleeding-Edge-of-Crawford-Issue-11

Integrating a Trauma-Informed Response in Violence Against Women and Human Trafficking Prosecutions

This Strategies Newsletter describes a trauma-informed approach to responding to these crimes and discusses practices where such an approach has already been incorporated, highlighting areas where continued, additional integration is necessary. This article also identifies gaps in the application of the approach, specifically in reference to other co-occurring, violence against women and human trafficking crimes, and suggests strategies to more effectively integrate trauma-informed investigative and prosecutorial practices.

Integrating-A-Trauma-Informed-Response-In-VAW-and-HT-Strategies

Prosecuting Image Exploitation

Image exploitation involves the non-consensual creation, possession, or distribution of an image or images depicting victims engaged in consensual sexual activity or being sexually assaulted. As technology continues to evolve more quickly than the law, image exploitation crimes are being addressed by a patchwork of criminal laws. This Strategies Newsletter gives prosecutors insight on how to respond to this complex crime and to hold offenders accountable under imperfect or untested laws. The article explores the various forms of image exploitation and the types of statutes under which this abuse can be prosecuted.

Image-Exploitation-Strategies15

Field Guide to Witness Intimidation

Witness intimidation affecting the criminal justice system can take many forms and arise in many contexts. Its presence and effects are not always self-evident, either to professionals working in the system or to the witnesses themselves. While overt threats may be easily recognized and categorized, other forms of intimidation may be subtle or disguised, or too easily overlooked in the course of responding to what has been identified as the primary criminal offense. This Field Guide to Witness Intimidation is intended to be a convenient reference to assist professionals in identifying acts of witness intimidation that may affect their work with victims and witnesses vulnerable to such pressures.

Field_Guide_to_Witness_Intimidation_3.19.18

Evidence of Other “Bad Acts” in Intimate Partner Violence, Sexual Violence, Stalking, and Human Trafficking Prosecutions

In proving a case of intimate partner violence, sexual violence, stalking, or human trafficking, it is often crucial to introduce evidence that the defendant has committed some other crime or bad act—usually before or after the charged crime. Such evidence is often viewed with caution by trial and appellate courts, because of the perceived risk that juries will convict the defendant based upon evidence that they committed some crime other than the one charged or that the defendant is a bad person and therefore probably guilty of the charged crime. Prosecutors should file pretrial motions in limine any time they anticipate introducing evidence of a defendant’s crimes or other bad acts, regardless of whether such a motion is required by law. It is important to identify, and to argue, any potentially applicable grounds for admission. This article describes the theories under which evidence of other bad acts might be admissible, depending on the law of the jurisdiction, gives examples, and offers further resources to help prosecutors overcome specific objections.

update

Technical Evidence in Stalking Prosecutions: Where to Get It and How to Get It In

The use of personal computers, mobile devices, and other technology in stalking activity presents challenges for the prosecutor who must connect the activity to the defendant. Prosecutors must be familiar with the sources of available evidence, how to obtain it from technology providers, and how to present it effectively to a jury. This webinar covers the applicable rules of evidence and relevant case law associated with proving a technology-facilitated stalking case. The presentation provides strategies for introducing technical evidence and for responding to common objections at trial.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

SPARC: Igniting the Conversation and Improving our Response to Stalking

With a grant from the U.S. Department of Justice, Office on Violence Against Women (OVW), the Stalking Prevention, Awareness, and Resource Center (SPARC) was formed, as a project of AEquitas, to provide allied professionals with the tools, resources, and support necessary to enhance their ability to identify stalking and to respond effectively. This webinar discusses how to access SPARC resources, raise community awareness, and coordinate with allied professionals to better identify and respond to victims of stalking and hold offenders accountable.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Overview of Stalking and Technology: Prosecution Strategies

Stalking affects 6.6 million people in the United States each year and every day, in courtrooms throughout the country, stalking victims recount the fear and distress they have experienced as a result of this crime. Stalkers create and exploit vulnerabilities in their victims, relying on technology and manipulation of the justice system to conceal their crimes and cast doubt on their victim’s credibility. This webinar gives an overview of stalking and the modern technology stalkers use. It discusses investigation and prosecution strategies as well as interviewing techniques designed to maximize victim participation and safety. It also addresses the correlation between stalking and other forms of violence and examines the role of stalking in assessing lethality. The presentation emphasizes the importance of using a collaborative approach between law enforcement, victim advocates and prosecutors to assist victims and hold offenders accountable.

This webinar recording should qualify prosecutors for 1.5 hours of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.