Law Enforcement Technology

APR 2014

Issue link: https://let.epubxp.com/i/286869

Contents of this Issue

Navigation

Page 13 of 47

14 Law Enforcement Technology April 2014 www.officer.com What does the evidence look like? At their most extreme, abusers may share intimate or embarrassing pictures or videos of victims via text message, email, and even social media among the teens' friends and schoolmates. In some states, these images are considered to be child pornography, and possession and distribution laws apply. Even solely between abuser and victim, however, the content of text or instant messages, social media posts, and other items can reveal name-calling, bul- lying, shaming, and demands for sexual activity which the victim doesn't want. Both abusers and victims may refer, directly or indirectly, to physical or sexu- al abuse via text messages, chats, images and videos, or email. Threats of physical violence, too, can take place via mobile device, along with sextortion—the threat to share intimate images or details unless the victim does what the abuser demands. And accord- ing to the Urban Institute, a 2007 study reported that some teens were "made to feel afraid of what their partner might do if they did not respond to their part- ner's cellphone call, email, instant mes- sage, or text message." Not only content, but also frequency can indicate unhealthy dating relation- ships. Repeated calls and texts received from a current or former partner throughout the day and/or night, for a sustained period of time, can be consid- ered harassing and perhaps even threat- ening. During an investigation, establish- ing these timelines can be just as impor- tant as establishing their sentiment. While "victim-blaming" has driven a number of youth to suicide in recent years, bear in mind that according to the Urban Institute's report, several stud- ies have shown "reciprocal" violence Circle 25 on Reader Service Card At their most extreme, abusers may share intimate or embarrassing pictures or videos of victims via text message, email, and even social media, among the teens' friends and schoolmates. I N V E S T I G AT I O N S LET_13-15_TeenDating0414.indd 14 3/20/14 9:12 AM

Articles in this issue

Links on this page

Archives of this issue

view archives of Law Enforcement Technology - APR 2014