Prosecuting Image Exploitation

Image exploitation involves the non-consensual creation, possession, or distribution of an image or images depicting victims engaged in consensual sexual activity or being sexually assaulted. As technology continues to evolve more quickly than the law, image exploitation crimes are being addressed by a patchwork of criminal laws. This Strategies Newsletter gives prosecutors insight on how to respond to this complex crime and to hold offenders accountable under imperfect or untested laws. The article explores the various forms of image exploitation and the types of statutes under which this abuse can be prosecuted.

Image-Exploitation-Strategies15

Technical Evidence in Stalking Prosecutions: Where to Get It and How to Get It In

The use of personal computers, mobile devices, and other technology in stalking activity presents challenges for the prosecutor who must connect the activity to the defendant. Prosecutors must be familiar with the sources of available evidence, how to obtain it from technology providers, and how to present it effectively to a jury. This webinar covers the applicable rules of evidence and relevant case law associated with proving a technology-facilitated stalking case. The presentation provides strategies for introducing technical evidence and for responding to common objections at trial.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Stop Calling It ‘Revenge Porn’: Prosecuting Image Exploitation

Image exploitation involves the nonconsensual creation, possession, or distribution of an image or images depicting victims engaged in consensual sexual activity or being sexually assaulted. As technology continues to evolve more quickly than the law, image exploitation crimes are being addressed by a patchwork of criminal laws. We as prosecutors must continue to respond to this complex crime and to hold offenders accountable under imperfect or untested laws. This webinar explores the various forms of image exploitation and the types of statutes under which this abuse can be prosecuted, enabling prosecutors to choose the most advantageous charging strategies within their own jurisdictions. In addition, the presenter offers offender-trial strategies are offered to assist in overcoming common victim-blaming defenses.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Overview of Stalking and Technology: Prosecution Strategies

Stalking affects 6.6 million people in the United States each year and every day, in courtrooms throughout the country, stalking victims recount the fear and distress they have experienced as a result of this crime. Stalkers create and exploit vulnerabilities in their victims, relying on technology and manipulation of the justice system to conceal their crimes and cast doubt on their victim’s credibility. This webinar gives an overview of stalking and the modern technology stalkers use. It discusses investigation and prosecution strategies as well as interviewing techniques designed to maximize victim participation and safety. It also addresses the correlation between stalking and other forms of violence and examines the role of stalking in assessing lethality. The presentation emphasizes the importance of using a collaborative approach between law enforcement, victim advocates and prosecutors to assist victims and hold offenders accountable.

This webinar recording should qualify prosecutors for 1.5 hours of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Following the Digital Breadcrumbs: Utilizing Technology in Sex Trafficking Prosecutions

The Internet is a haven for sex traffickers to recruit, advertise, and communicate with their victims. At the same time, these activities leave “digital breadcrumbs” to follow during an investigation. Investigators and prosecutors should work together to use the latest available resources to preserve valuable evidence that can strengthen the prosecution’s case at trial. This webinar provides practical information and investigative strategies that will assist in the identification, investigation, and successful prosecution of traffickers. It addresses how digital evidence can corroborate victim and witness testimony, support charging decisions, and reinforce evidence-based trial strategies that do not rely entirely upon victim testimony.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

Challenges Multiplied: Multi-Defendant Rape and Witnessed Rape

Multiple-offender and witnessed rape cases are becoming more prevalent and more complex due to the use of technology – particularly social media – to threaten and intimidate both victims and witnesses. The challenges to prosecution require innovative solutions to achieve justice while protecting victim privacy and witness safety.This webinar addresses issues that commonly arise in these cases, including: digital evidence; joinder and severance, immunity; principals and accessories; admissibility of evidence; witness intimidation; and common defenses.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.

#GUILTY: Identifying, Preserving, and Presenting Digital Evidence

Unfortunately, as technology becomes more integral to our lives, offenders increasingly misuse technology to facilitate crimes against women, and as a means to assert power and control in the course of an intimate partner relationship. This webinar demonstrates how cyber investigations can be used to reveal evidence of criminal activity, as well as evidence of the power and control dynamics of an abusive relationship. The presenter discusses theories of admission, rules of evidence, and case law using “real life” examples to demonstrate how to properly authenticate and introduce digital evidence in civil and criminal proceedings.

This webinar recording should qualify prosecutors for 1 hour of continuing legal education (CLE) credits. Prosecutors are encouraged to contact their state bar association in reference to application requirements and related fees.