134 See, e.g., Thuthuzela: Turning Victims Into Survivors, Nat’l Prosecuting Authority of S. Afr. (2009), https://www.npa.gov.za/sites/default/files/resources/public_awareness/TCC_brochure_august_2009.pdf; and Recording by Christopher Mallios & John Wilkinson, Ethical Considerations for Prosecutors in Sexual Violence Cases, https://gcs-vimeo.akamaized.net/exp=1574291424~acl=%2A%2F721471601.mp4%2A~hmac=2e195e117d59dd7177bc580859b6e35b8cef0d8d630e5119723934bd690749b2/vimeo-prod-skyfire-std-us/01/2095/8/210475187/721471601.mp4 (recorded Aug. 2, 2013) (regarding considerations of prosecutorial immunity).
135 USAID South Africa Program in Support of PEPFAR: Thuthuzela Care Centers FY06 (July 31, 2007), available at https://pdf.usaid.gov/pdf_docs/PNADT749.pdf
136 Jules Verdone, South Africa Initiative Flourishes 11 Years On, 18 Just’ Cause 3 (2011), available at http://archive.vera.org/sites/default/files/resources/downloads/Just_Cause_summer_2011_.pdf.
137 Thuthuzela Care Centres, UNICEF.org, available at https://www.unicef.org/southafrica/protection_998.html.
138 See Resources, AEquitas, https://aequitasresource.org/resources/. Statutory compilations and case law summaries are available upon request. See also State Law Database, RAINN, https://www.rainn.org/public-policy-action (last visited May 18, 2017).
139 With respect to recording statements, in the last several years, offices have adopted the use of video/audio recording to capture statements, including the use of body worn cameras. These can be powerful tools to capturing victim statements, however, some concerns around their use have been raised. See, e.g., Police Body-Worn Cameras: Where Your State Stands, Urban Inst., http://apps.urban.org/features/body-camera/ (last visited July 13, 2016); Michael D. White, Police Officer Body-Worn Cameras: Assessing the Evidence, Office of Justice Programs, Diagnostic Center (2014), https://cops.usdoj.gov/RIC/Publications/cops-p289-pub.pdf; Implementing a Body-Worn Camera Program Recommendations and Lessons Learned, Office of Cmty. Oriented Policing Serv. & Police Exec. Research Forum (2014), http://www.justice.gov/iso/opa/resources/472014912134715246869.pdf; Strengthening CBP with the Use of Body-Worn Cameras, Am. Civil Liberties Union (June 2014), https://www.aclu.org/sites/default/files/assets/13_10_25_aclu_one_pager_re_body-worn_cameras_for_cbp_final.pdf; and John Wilkinson, To Record or Not To Record: Use of Body-Worn Cameras During Police Response to Crimes of Violence Against Women, 29 Strategies in Brief (2017), available at https://aequitasresource.org/wp-content/uploads/2018/09/To-Record-or-Not-To-Record-Use-of-Body-Worn-Cameras-During-Police-Response-to-Crimes-of-Violence-Against-Women-SIB29.pdf
140 See Section 3.2-A-1 on working with experts on victim behavior and Appendix F Considerations for Working with Experts.
141 Recognize corroborative evidence in reports, including observations and statements. Corroboration may include evidence of serial perpetration; other crimes, wrongs, or acts; evidence of threats or intimidation; evidence of planning (access, isolation, grooming, concealment of the crime).
142 Be aware of intoxication and its impact on the investigation as well as during the prosecution and presentation of evidence. See AEquitas, Sexual Assault Justice Initiative Literature Review (2017) (sections on Criminalistics, Toxicology, and Alcohol-Facilitated Sexual Assault); and Schuller & Stewart, supra note 44.
143 See Force and Consent Statutory Compilation and Case Law Digest, AEquitas (draft current as of 2019) (available upon request).
144 See AEquitas, Sexual Assault Justice Initiative Literature Review (2017) (sections on Image Exploitation, and Witness Intimidation and Forfeiture by Wrongdoing); AEquitas, Annotated Bibliography: Sex Trafficking (July 2016).
145 See Section 3.1-F-1 on Conducting Trauma-Informed Interview of the Victim to Reveal Evidence of the Crime.
146 See Appendix H for strategies for identifying and responding to victim and witness intimidation; and AEquitas, Field Guide to Witness Intimidation: A Reference for Identification (January 2018), available at https://aequitasresource.org/wp-content/uploads/2018/09/Field_Guide_to_Witness_Intimidation_3.19.18.pdf.
147 See, e.g., Anderson, supra note 96; Jane Anderson & Supriya Prasad, Prosecuting Image Exploitation 15 Strategies (Mar. 2015), available at https://aequitasresource.org/wp-content/uploads/2018/09/Image-Exploitation-Strategies15.pdf; Police Body-Worn Cameras: Where Your State Stands, supra note 136; White, supra note 139; Office of Cmty. Oriented Policing Serv. & Police Exec. Research Forum, supra note 136; and Am. Civil Liberties Union, supra note 136.
148 See, e.g., Riley v. California, 134 S. Ct. 2473, 2477 (2014) (holding a warrant was required to search the contents of the cell phone belonging to an individual who has been arrested); State v. Diamond, A15-2075, 2017 WL 163710 (Minn. Ct. App. Jan. 17, 2017) (holding that the Fifth Amendment right against self-incrimination was not violated when defendant was ordered to provide fingerprint to unlock cell phone); and Carpenter v. United States, 138 S. Ct. 2206 (2018) (holding that an individual maintains a legitimate expectation of privacy in the record of his physical movements as captured through cell site location information, and that the government must generally obtain a search warrant supported by probable cause before acquiring cell site location information from a wireless carrier). Please contact AEquitas for additional research and information and for sample search warrant affidavits at (202) 558-0040 or info@aequitasresource.org.
149 See Social Media Evidence—How to Find It and How to Use It, ABA Section on Litigation (2013), http://www.americanbar.org/content/dam/aba/administrative/litigation/materials/aba-annual-2013/written_materials/15_1_social_media_evidence.authcheckdam.pdf. Please contact AEquitas for sample search warrant affidavits and additional resources at (202) 558-0040 or info@aequitasresource.org.
150 See, e.g., Monica T. Whitty & Garry Young, Cyberpsychology: The Study of Individuals, Society, and Digital Technologies 26 (2017); Adam N. Johnson, Self-Disclosure in Computer-Mediated Communication: The Role of Self-Awareness and Visual Anonymity. 31 Eur. J. Soc. Psychol. 177 (2001); John A. Bargh, Katelyn Y. A. McKenna & Grainne M. Fitzsimons, Can You See the Real Me? Activation and Expression of the ‘True Self’ on the Internet, 58 J. Soc. Issues, 33 (2002); and Noam Lapidot-Lefler & Azy Barak, The Benign Online Disinhibition Effect: Could Situational Factors Induce Self-Disclosure and Prosocial Behaviors?, 9 Cyber Psychol.: J. of Psychosocial Res. on Cyberspace (2015).
151 Contact AEquitas at (202) 558-0040 or info@aequitasresource.org to further discuss privacy concerns related to victim information and property.
152 See Statute of Limitations Statutory Compilation, AEquitas & Joyful Heart Foundation (2017).
153 AEquitas, Evidence of Other “Bad Acts” in Intimate Partner Violence, Sexual Violence, Stalking, and Human Trafficking Prosecutions, 31 Strategies in Brief (2017), available at https://aequitasresource.org/wp-content/uploads/2018/09/Image-Exploitation-Strategies15.pdf.
154 For more on John Doe arrest warrants, see AEquitas and Amy Jeanguenat, Understanding the Use of John Doe Arrest Warrants in Cold Case Sexual Assaults for Prosecutors (RTI International, 2018).
155 See, e.g., Sexual Assault Victims’ DNA Bill of Rights, Cal. Penal Code § 680; Sexual Assault Kit Testing Initiatives and Non-investigative Kits, Office on Violence Against Women (Jan. 2017), https://www.justice.gov/ovw/page/file/928236/download; and Victims’ Rights and Sexual Assault Kits, Nat’l Ctr. for Victims of Crime, https://victimsofcrime.org/our-programs/dna-resource-center/untested-sexual-assault-kits/victims’-rights-and-sexual-assault-kits (last visited May 21, 2017).
156 See, e.g., Jenifer Markowitz, A Prosecutor’s Reference – Medical Evidence and the Role of Sexual Assault Nurse Examiners in Cases Involving Adult Victims, AEquitas (2010), available at https://aequitasresource.org/wp-content/uploads/2018/09/Prosecutor_Reference_Medical_Evidence.pdf; Jenifer Markowitz, Absence of Anogenital Injury in the Adolescent/Adult Female Sexual Assault Patient, 13 Strategies in Brief (Sept. 2012), available at https://aequitasresource.org/wp-content/uploads/2018/09/Absence_of_Anogenital_Injury_in_the_Adolescent_Adult_Female_Sexual_Assault_Patient_Issue_13.pdf; and AEquitas, Sexual Assault Justice Initiative Literature Review (2017).
157 See e.g., Sexual Assault Kit Tracking System, QueTel, https://www.quetel.com/products/sexual-assault-kit-tracking-system/ (last visited June 13, 2017); Navigating Notification: A Guide to Re-engaging Sexual Assault Survivors Affected by the Untested Rape Kit Backlog, Joyful Heart Foundation (2016), available at http://www.endthebacklog.org/information-survivors/victim-notification; 12 Key Questions to Guide Victim Notification Protocols, Sexual Assault Kit Initiative, https://sakitta.org/resources/docs/SAKI-Victim-Notification-Guide.pdf; and Rebecca Campbell, Giannina Fehler-Cabral & Sheena Horsford, Creating a Victim Notification Protocol for Untested Sexual Assault Kits: An Empirically Supported Planning Framework, J. of Forensic Nursing (2017).
158 For additional information and resources on DNA for investigation and prosecution, see Practitioner Resources, Sexual Assault Kit Initiative, https://sakitta.org/resources/ (last visited June 13, 2017); and Section 3.2-A-5 DNA and Forensics.
159 See Investigating Sexual Assaults: Model Policy, Int’l Ass’n of Chiefs of Police (2005); Improving Police Response to Sexual Assault, Human Rights Watch (2013), https://www.hrw.org/sites/default/files/reports/improvingSAInvest_0.pdf.
160 In cases of intimidation, detectives can document incidents and notify prosecutors. In the rare circumstance where additional information is disclosed by the victim, detectives should document the statement and review it with the prosecution so that where discovery rules require, it is passed on to the defense.
161 Check your individual jurisdiction’s rules of professional responsibility. See Berger v. United States, 295 US 78, 88 (1935); National Prosecution Standards, Nat’l District Att’y Ass’n (3d ed., 2010); Model Rules of Professional Conduct (Am. Bar Ass’n); and Criminal Justice Standards, Prosecution Function (Am. Bar Ass’n, 4th ed. 2015).
162 See, e.g., Beichner & Spohn, supra note 13.
163 Training both law enforcement and prosecutors in the core competencies identified in Appendix B and fostering multidisciplinary collaboration can help with appropriate decision-making.
164 See, e.g., R. Lovell et. al, Offending patterns for serial sex offenders identified via the DNA testing of previously unsubmitted sexual assault kits, 52 J. Crim. Justice 68-78 (2017), available at https://doi.org/10.1016/j.jcrimjus.2017.08.002; and Rebecca Campbell et. al, Tested at last: How DNA Evidence in Untested Rape Kits Can Identify Offenders and Serial Sexual Assaults, 33(24) J. Interpersonal Violence 3792-3814 (Dec. 2018), available at http://journals.sagepub.com/doi/abs/10.1177/0886260516639585.
165 For more on conducting sexual violence case reviews, see Appendix M on Sample Case Review Protocol, Appendix N on Sample Case Data Tracking Sheet, and Appendix O on Sample Case Review Timeline.
166 Dempsey, supra note 71.
167 Id.
168 See Rape and Sexual Offences: Chapter 2: Sexual Offences Act 2003 – Principal Offences, and Sexual Offences Act 1956 – Most commonly charged offences, Crown Prosecution Service, https://www.cps.gov.uk/legal-guidance/rape-and-sexual-offences-chapter-2-sexual-offences-act-2003-principal-offences-and (for a definition of “Rape”).
169 That is, assuming that prosecution is in the public interest. A “prosecutor may…consistent with the public interest decline to prosecute, notwithstanding that sufficient evidence may exist which would support a conviction.” Standards for Criminal Justice: Prosecution and Defense Function (Am. Bar Ass’n. 3d ed. 1993) (para. 3-3.9(b)). In cases where prosecutors decline to pursue charges on grounds of supposed evidential insufficiency, however, the further question of the public interest never arises. In addition, this underscores the importance of well-trained, experienced prosecutors who will not be analyzing the evidence through the lens of bias and myth. See Dempsey, supra note 71 (citing Andrew Ashworth & Michael Redmayne, The Criminal Process (OUP 4th ed. 2010)).
170 Dempsey, supra note 71 at 6 (citing R. (on the application of Gujra) v. Crown Prosecution Service, [2013] 1 A.C. 484 (Baroness Hale)).
171 See Dempsey, supra note 71 at 6.
172 See Dempsey, supra note 71 at 6; and Owens, et al., supra note 23 at 9.
173 Prior arrests and convictions should be reviewed for similarities in perpetration and other relevant facts and circumstances. Criminal histories may also provide information about the suspect’s presence or absence from the jurisdiction, as well as a timeline of convictions or police contacts which may be helpful in cold cases of sexual assault for tolling the relevant statute of limitations. However, victims’ criminal histories should not be used as the basis for credibility concerns regarding the victim’s account of sexual violence, absent extremely rare circumstances.
174 For more on the prosecution of multidefendant or witnessed sexual violence, see Webinar recording by John Wilkinson, Challenges Multiplied: Multi-Defendant Rape and Witnessed Rape, available at https://gcs-vimeo.akamaized.net/exp=1574293802~acl=%2A%2F720677131.mp4%2A~hmac=9b7ba3c8837988a9f2f467a8b8286125ed98e0c576a0a10b40de5d8a2ac5eb2a/vimeo-prod-skyfire-std-us/01/2061/8/210305493/720677131.mp4 (recorded on Dec. 15, 2016).
175 See Garrity v. New Jersey, 385 U.S. 493 (1967) (administratively compelled statements made by officers during internal affairs investigation cannot be used against them in subsequent criminal trial).
176 See Bruton v. United States, 39 U.S. 123 (1968).
177 See #574 – Pretext Phone Calls, Int’L Associations of Chiefs of Police (2004), https://www.theiacp.org/resources/training-key/574-pretext-phone-calls; and Sexual Assault Investigation Ideas: A Series of the Sexual Violence Justice Institute, Pretext or Covert Call, Minnesota Coalition Against Sexual Assault.
178 See State v. K.W., 70 A.3d 592 (N.J. 2013) (upholding suppression of recorded pretext phone call for failure to strictly comply with the requirements of state Wiretap Act).
179 Imbler v. Pachtman, 424 U.S. 409 (1976).
180 Harlow v. Fitzgerald, 457 U.S. 800 (1982).
181 Webinar recording by Christopher Mallios, Overcoming the Consent Defense: Identifying, Investigating, and Prosecuting the Non-Stranger Rapist, available at https://gcs-vimeo.akamaized.net/exp=1574294293~acl=%2A%2F721591276.mp4%2A~hmac=e20456aff72615a9641e525ff5a2e1723950fe4c11b2f64bebab254475ff59f2/vimeo-prod-skyfire-std-us/01/2099/8/210498449/721591276.mp4 (recorded on Apr. 18, 2014).
182 See Vitauts M. Gulbis, Modern Status of Rule Regarding Necessity for Corroboration of Victim’s Testimony in Prosecution for Sexual Offense, 31 A.L.R. 4th 120 (2017).
183 See DJ Smith et. al, Frequency and Relationship of Reported Symptomology in Victims of Intimate Partner Violence: The Effects of Multiple Strangulation Attacks, 21(3) J. Emerg. Med. 323-329 (2001); and Maureen Funk and Julie Schuppel, Strangulation Injuries, 102(2) Wisconsin Med. J. 41-45 (2003).
184 Murphy, et al., supra note 116.
185 More information on the utilization of forensic evidence for sexual assaults can be found at sakitta.org, a project on which AEquitas is a partner. See, e.g., RTI International, Prioritizing Cold Case Hit Follow-Up: Strategies for Sexual Assault Investigators, available at https://www.nationalpublicsafetypartnership.org/clearinghouse/Content/ResourceDocuments/Prioritizing%20Cold%20Case%20CODIS%20Hit%20Follow%20Up.pdf; and RTI Forensic Technical Center of Excellence, In Brief Report Series: Beyond DNA – Sexual Assault Investigations Parts I, II, and III, available at https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=274799.
186 See Anderson, supra note 96.
187 See Sarah Ben-David & Ofra Schneider, Rape Perceptions, Gender Role Attitudes, and Victim-Perpetrator Acquaintance, 53(5/6) Sex Roles 385 (Sept. 2005); Ellison & Munro, supra note 65; Louise Ellison & Vanessa E. Munro, Turning Mirrors into Windows?: Assessing the Impact of (Mock) Juror Education in Rape Trials, 49 Brit. J. Crim. 363 (2009); Kim Lonsway & Louise Fitzgerald, Rape Myths in Review, 18 Psychol. Women Q. 133-64 (1994); and Jennifer Gentile Long, Introducing Expert Testimony to Explain Victim Behavior in Sexual and Domestic Violence Prosecutions, Nat’l District Att’y Ass’n (2007), https://www.forensichealth.com/wp-content/uploads/2016/10/pub_introducing_expert_testimony.pdf.
188 See, e.g., Berger, 295 U.S. at 88.
189 See Wayne LaFave, Jerold Israel, Nancy King, and Orin Kerr, Pretrial Release Procedures in Criminal Procedure 4, § 12.1(b) (2d ed.) (2012); Wayne LaFave, Jerold Israel, Nancy King, and Orin Kerr, Pretrial Release Procedures in Criminal Procedure 6, § 22.3(a) (3d ed.) (2014).
190Id.
191 See Section 3.1-C on Making Charging Decisions Consistent with Research and Ethical Considerations and counter defense arguments that play into myths.
192 Support for this argument may include the defendant’s lengthy or serious criminal history (including failure to appear); violation of no-contact orders; and violation of probation or parole, suggesting that a defendant will disregard court orders to appear.
193 See, e.g., Why Testing Rape Kits Matters, End the Backlog, http://endthebacklog.org/backlog/why-testing-matters (last visited May 21, 2017); and Test Rape Kits. Stop Serial Rapists, supra note 1.
194 Studies show a “‘crossover effect’ of sex offenders admitting to multiple victims and offenses atypical of criminal classification. Specifically, studies have shown that rapists often sexually assault children and incest offenders often sexually assault children both within and outside their family. These findings are consistent among populations (e.g., community, prison, parole, probation) and methodologies (e.g., guaranteed confidentiality, polygraph testing). This section reviews the evidence of crossover offending, which challenges the validity of traditional sex offender typologies (those that are based on a known victim type).” Dominique Simons, Chapter 3: Sex Offender Typologies, Sex Offender Mgmt. Assessment and Planning Initiative, https://www.smart.gov/SOMAPI/sec1/ch3_typology.html (last visited June 9, 2017) (internal citations omitted).
195 See Jacquelyn C. Campbell, Danger Assessment (2001), www.ncdsv.org/images/dangerassessment.pdf (forced sex has been found to be a lethality indicator when conducting risk assessments of domestic violence victims).
196 “Sexual assault occurred repeatedly within these intimate relationships—almost 80 percent of sexually assaulted women reported more than one incident of forced sex.” Lauren Taylor & Nicole Gaskin-Laniyan, Sexual Assault in Abusive Relationships, Nat’l Inst. of Just., www.nij.gov/journals/256/sexual-assault.html (last visited June 2, 2017 (referencing McFarlane, J., and A. Malecha, Sexual Assault Among Intimates: Frequency, Consequences, and Treatments (2005), www.ncjrs.gov/pdffiles1/nij/grants/211678.pdf.
197 See Jennifer G. Long, & Jenifer Markowitz, Intimate Partner Sexual Violence: Prosecution and Medical Issues in Violence Against Women: Contemporary Examination of Intimate Partner Violence (2015).
198 See Finkelhor & Kersti Yllo, License to Rape: Sexual Abuse of Wives (N.Y. Free Press 1985); and D.E.H. Russell, Rape in Marriage (Ind. U. Press. 1990).
199 In the event the victim objects to the issuing of a protection order, see Jennifer Long, Christopher Mallios, & Sandra Tibbetts Murphy, Model Policy for Prosecutors and Judges on Imposing, Moving, and Lifting Criminal No-Contact Orders, AEquitas (2010), available at https://aequitasresource.org/wp-content/uploads/2018/09/Model-Policy-for-Prosecutors-and-Judges-on-Imposing-Modifying-and-Lifting-Criminal-No-Contact-Orders.pdf.
200 Develop a strategy where the victim and offender live or receive care in the same group home or facility.
201 See Victim Privilege Statutes by Practitioner, AEquitas (2011) (available upon request); and State Law Database, RAINN, https://apps.rainn.org/policy/ (last visited May 18, 2017).
202 See Recording by Teresa Garvey, Criminal Meets Civil: Coordinating Our Response, https://gcs-vimeo.akamaized.net/exp=1574296004~acl=%2A%2F720677334.mp4%2A~hmac=4165a8787723e66c212880449c6f609783dda2d1f431783b2467217e777396af/vimeo-prod-skyfire-std-us/01/2061/8/210305578/720677334.mp4 (recorded Nov. 30, 2015); and National Crime Victim Law Institute, https://gcs-vimeo.akamaized.net/exp=1574296106~acl=%2A%2F756667832.mp4%2A~hmac=778ed846f04910b8b44fffdb35450776b2aa80522bd2e3aa8389046c1006ed0d/vimeo-prod-skyfire-std-us/01/3640/8/218200340/756667832.mp4 (last visited May 21, 2017).
203 See Jane Anderson & Meg Garvin, Safeguarding Victim Privacy in a Digital World: Ethical Considerations for Prosecutors, https://aequitasresource.org/resources/ (recorded on May 18, 2017).
204 Generally, defendants have to meet a certain threshold showing of relevance and materiality of a victim’s records before an in camera review is appropriate.
205 Persons with disabilities, especially those with communication and cognitive difficulties, are particularly vulnerable to the harms resulting from defense delay tactics.
206 See Gulbis, supra note 182.
207 See The Prosecutors’ Resource on Witness Intimidation, AEquitas (Mar. 2014), available at https://aequitasresource.org/wp-content/uploads/2018/09/The-Prosecutors-Resource-Intimidation.pdf.
208 Recognize that caretakers or employees of agencies caring for individual with disabilities may engage in intimidation.
209 See, e.g., id.
210 See The Neurobiology of Sexual Assault, supra note 62.
211 See The Prosecutors’ Resource on Forfeiture by Wrongdoing, AEquitas (Oct. 2012), available at https://aequitasresource.org/wp-content/uploads/2018/09/The_Prosecutors_Resource_Forfeiture_by_Wrongdoing.pdf.
212 See Safety Net Project, National Network to End Domestic Violence, https://nnedv.org/content/safety-net/ (last visited May 21, 2017).
213 See Anderson, supra note 96.
214 See id.
215 Kristiansson & Whitman-Barr, supra note 7. For information on how law enforcement’s trauma-informed interviewing practices can positively impact the victim’s experience in the criminal justice process, see Patrick Meacham, Trauma Informed Investigation of Adult Sexual Assault Cases, presented at West Virginia University (Apr. 20-21, 2016) (citing D. Patterson, The Impact of Detective’s Manner of Questioning of Rape Victims’ Disclosure, 17(11) Violence Against Women (2012)).
216 See The Neurobiology of Sexual Assault, supra note 62; Rebecca Campbell et al., Preventing the “Second Rape:” Rape Survivors’ Experiences with Community Service Providers, 16(2) J. Interpersonal Violence 1239-59 (Dec. 2001), http://jiv.sagepub.com/content/16/12/1239.short?rss=1&ssource=mfc (majority of sexual violence survivors who reported their assault to the legal or medical system did not receive needed services. This study suggests that the trauma of sexual violence extends far beyond the assault itself, as negative community responses can significantly elevate distress); and Courtney E. Ahrens, et al., Deciding Whom to Tell: Expectations and Outcomes of Rape Survivors’ First Disclosures, 31 Psychol. Women 38-49 (2007) (qualitative analysis revealed that nearly 75% of first disclosures were to informal support providers (friends and family), and over one third of the disclosures were not initiated by the survivors themselves. Survivors who disclosed to informal support providers had a more positive experience and when survivors sought out formal support providers had more negative experiences).
217 For implications to victim confidentiality and privilege when communications to victim advocate are made in front of third parties, see Viktoria Kristiansson, Walking A Tightrope: Balancing Victim Privacy and Offender Accountability in Domestic Violence and Sexual Assault Prosecutions, Parts I and II, 9/10 Strategies (May 2013), available at https://aequitasresource.org/wp-content/uploads/2018/09/Issue_9_Walking_A_Tightrope_Balancing_Victim_Privacy_and_Offender_Accountability_in_Domestic_Violence_and_Sexual_Assault_Prosecutions_Part_I_May_2013.pdf and https://aequitasresource.org/wp-content/uploads/2018/09/Issue_10_Walking_A_Tightrope_Balancing_Victim_Privacy_and_Offender_Accountability_in_Domestic_Violence_and_Sexual_Assault_Prosecutions_Part_II_May_2013.pdf.
218 Where possible, have a colleague conduct the mock cross-examination to preserve the relationship.
219 See Erin S. Gaddy, Why the Abused Should Not be the Accused, 1(8) The Voice (2006), http://www.ncdsv.org/images/NDAA_WhyAbusedShouldNotBecomeAccused_TheVoice_vol_1_no_8_2006.pdf (summarizing the impact of arresting victims).
220 See The Prosecutors’ Resource on Forfeiture by Wrongdoing, AEquitas (Oct. 2012), available at https://aequitasresource.org/wp-content/uploads/2018/09/The_Prosecutors_Resource_Forfeiture_by_Wrongdoing.pdf; The Prosecutors’ Resource on Crawford, AEquitas (Oct. 2012), available at https://aequitasresource.org/wp-content/uploads/2018/09/The_Prosecutors_Resource_Crawford.pdf (another tool that can be used to introduce a witness’s or victim’s out of court statements where the defendant has procured their unavailability for trial in order to prevent them from testifying); and You Have Options Program, Sexual Assault Reporting, http://www.reportingoptions.org (last visited May 22, 2017) (focuses on supporting victims in a way that is believed to ultimately increase their ability to participate in the criminal justice system).
221 The Department of Justice, Office on Violence Against Women (OVW) deems it a sufficiently dangerous practice that the routine arrest of victims may result in a loss of federal funding. Two of the primary grant programs under the Violence Against Women Act to improve criminal justice response to intimate partner violence have identified forced testimony by victims of domestic violence against their abuser as an “activit[y] that compromise[s] victim safety and recovery.” See OVW Fiscal Year 2016 STOP Formula Grant Solicitation, Office on Violence Against Women 5-6 (Apr. 2016), https://www.justice.gov/ovw/page/file/839466/download; and OVW Fiscal Year 2016 Improving Criminal Justice Responses to Sexual Assault, Domestic Violence, Dating Violence, and Stalking Grant Program, (also known as the Grants to Encourage Arrest and Enforcement of Protection Orders Program), Office on Violence Against Women 7-8 (Jan. 2016), https://www.justice.gov/ovw/page/file/1124261/download (Disapproving “[p]rocedures that would penalize victims of violence for failing to testify against their abusers or impose other sanctions on victims. Instead, procedures that provide victims with the opportunity to make an informed choice about whether to testify are encouraged”). These same considerations weigh against charging victims with perjury or false swearing as a result of recantation on the stand.
222 See The Sexual Assault Kit Initiative, supra note 117; Why Testing Rape Kits Matters, supra note 193; Test Rape Kits. Stop Serial Rapists, supra note 1.
223 See Why Testing Rape Kits Matter, supra note 193.
224 See Section 3.2-B-2 on Introducing Evidence of Other Crimes and Bad Acts where Relevant.
225 This section has been adapted from two AEquitas resources: Teresa M. Garvey, Witness Intimidation: Meeting the Challenge, AEquitas (2013), available at https://aequitasresource.org/wp-content/uploads/2018/09/Witness-Intimidation-Meeting-the-Challenge.pdf; and The Prosecutors’ Resource on Witness Intimidation, AEquitas (March 2014), available at https://aequitasresource.org/wp-content/uploads/2018/09/The-Prosecutors-Resource-Intimidation.pdf. These resources provide strategies that can be employed by everyone involved in the criminal justice system throughout the investigation and prosecution of a case, as well as during post-conviction incarceration and supervision, to prevent intimidation and to respond effectively when it occurs. The monograph emphasizes the benefits of a cooperative and collaborative approach to the problem. For more information on witness intimidation, see AEquitas’ special initiative on Combating Witness Intimidation (CWI), funded by the U.S. Department of Justice Bureau of Justice Assistance (BJA), https://aequitasresource.org/singleinitiative/?initiativeId=%201; and Appendix H – Witness Intimidation Checklist.
226 See, e.g., Fla. Stat. Ann. § 741.29(6).
227 See Scalzo, supra note 63 at 8.