Responding to Stalking: A Guide for Prosecutors

Stalking affects 7.5 million people in the United States a year, with 15 percent of women and 6 percent of men being stalked in their lifetime. Stalking entails repeat victimization because it constitutes a series of acts rather than a single incident and it can cause sustained and repeated emotional distress. This guide is a resource for prosecutors in stalking cases. It provides an overview of stalking and suggests best practices for prosecuting offenders. It should be used as a guide for attorneys to support their own research and for problem-solving in prosecuting these types of cases.

To Record or Not To Record: Use of Body-Worn Cameras During Police Response to Crimes of Violence Against Women

For a variety of reasons—officer safety, public accountability, evidence collection, and departmental transparency—an increasing number of police departments have adopted, or are considering adopting, the use of body-worn cameras (BWCs). While BWCs can provide helpful evidence in cases involving gender-based violence (GBV), their use may also adversely impact victim safety and privacy. This article discusses many of the issues law enforcement, prosecutors, and allied professionals must consider when BWCs are used in GBV investigations. The article describes the importance of multidisciplinary collaboration – at the local, state, and federal levels – in order to develop effective BWC policies that address victim safety, privacy, and autonomy. The article also addresses issues such as deactivation of a BWC at appropriate points during the investigation; privacy and safety considerations; discovery, redaction, protective orders limiting dissemination; and requests under freedom of information or open records statutes.

To-Record-or-Not-To-Record-Use-of-Body-Worn-Cameras-During-Police-Response-to-Crimes-of-Violence-Against-Women-SIB29

Stalking: Effective Strategies for Prosecutors

Stalking affects 6.6 million people in the United States each year and every day, in courtrooms throughout the country, stalking victims recount the fear and distress they have experienced as a result of this crime. Stalkers create and exploit vulnerabilities in their victims, relying on technology and manipulation of the justice system to conceal their crimes and cast doubt on their victim’s credibility. This article provides an overview of stalking and the modern technology stalkers use. The article emphasizes the importance of using a collaborative approach between law enforcement, victim advocates and prosecutors to assist victims and hold offenders accountable.

Stalking_Effective_Strategies_for_Prosecutors_Issue_11

The Internet & Intimate Partner Violence: Technology Changes, Abuse Doesn’t

Although intimate partner abuse and harassment perpetrated through technology can look different than in-person abuse or harassment, the goals and motives are still the same: power and control. Technology allows an abuser to assert that power and control by keeping tabs on their partner – by knowing who the survivor talks to, what they do, and where they go. This is a key aspect of control. Because so many people live their lives on the Internet, it is a treasure trove of information, allowing abusers to stay informed and in control of their victims. This Strategies Newsletter provides an overview of online abuse and offers solutions for documenting the abuse, supporting survivors, and holding offenders accountable.

The-Internet-and-Intimate-Partner-Violence-Technology-Changes-Abuse-Does-Not-Issue16

Prosecuting Image Exploitation

Image exploitation involves the non-consensual creation, possession, or distribution of an image or images depicting victims engaged in consensual sexual activity or being sexually assaulted. As technology continues to evolve more quickly than the law, image exploitation crimes are being addressed by a patchwork of criminal laws. This Strategies Newsletter gives prosecutors insight on how to respond to this complex crime and to hold offenders accountable under imperfect or untested laws. The article explores the various forms of image exploitation and the types of statutes under which this abuse can be prosecuted.

Image-Exploitation-Strategies15

Technical Evidence in Stalking Prosecutions: Where to Get It and How to Get It In

The use of personal computers, mobile devices, and other technology in stalking activity presents challenges for the prosecutor who must connect the activity to the defendant. Prosecutors must be familiar with the sources of available evidence, how to obtain it from technology providers, and how to present it effectively to a jury. This webinar covers the applicable rules of evidence and relevant case law associated with proving a technology-facilitated stalking case. The presentation provides strategies for introducing technical evidence and for responding to common objections at trial.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Stop Calling It ‘Revenge Porn’: Prosecuting Image Exploitation

Image exploitation involves the nonconsensual creation, possession, or distribution of an image or images depicting victims engaged in consensual sexual activity or being sexually assaulted. As technology continues to evolve more quickly than the law, image exploitation crimes are being addressed by a patchwork of criminal laws. We as prosecutors must continue to respond to this complex crime and to hold offenders accountable under imperfect or untested laws. This webinar explores the various forms of image exploitation and the types of statutes under which this abuse can be prosecuted, enabling prosecutors to choose the most advantageous charging strategies within their own jurisdictions. In addition, the presenter offers offender-trial strategies are offered to assist in overcoming common victim-blaming defenses.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Overview of Stalking and Technology: Prosecution Strategies

Stalking affects 6.6 million people in the United States each year and every day, in courtrooms throughout the country, stalking victims recount the fear and distress they have experienced as a result of this crime. Stalkers create and exploit vulnerabilities in their victims, relying on technology and manipulation of the justice system to conceal their crimes and cast doubt on their victim’s credibility. This webinar gives an overview of stalking and the modern technology stalkers use. It discusses investigation and prosecution strategies as well as interviewing techniques designed to maximize victim participation and safety. It also addresses the correlation between stalking and other forms of violence and examines the role of stalking in assessing lethality. The presentation emphasizes the importance of using a collaborative approach between law enforcement, victim advocates and prosecutors to assist victims and hold offenders accountable.

This webinar recording should qualify prosecutors for 1.5 hours of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Following the Digital Breadcrumbs: Utilizing Technology in Sex Trafficking Prosecutions

The Internet is a haven for sex traffickers to recruit, advertise, and communicate with their victims. At the same time, these activities leave “digital breadcrumbs” to follow during an investigation. Investigators and prosecutors should work together to use the latest available resources to preserve valuable evidence that can strengthen the prosecution’s case at trial. This webinar provides practical information and investigative strategies that will assist in the identification, investigation, and successful prosecution of traffickers. It addresses how digital evidence can corroborate victim and witness testimony, support charging decisions, and reinforce evidence-based trial strategies that do not rely entirely upon victim testimony.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Challenges Multiplied: Multi-Defendant Rape and Witnessed Rape

Multiple-offender and witnessed rape cases are becoming more prevalent and more complex due to the use of technology – particularly social media – to threaten and intimidate both victims and witnesses. The challenges to prosecution require innovative solutions to achieve justice while protecting victim privacy and witness safety.This webinar addresses issues that commonly arise in these cases, including: digital evidence; joinder and severance, immunity; principals and accessories; admissibility of evidence; witness intimidation; and common defenses.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.