The Proof Is in the Technology
Tracy Webb (bio) describes the various ways that law enforcement establishes proof of cyberbullying.
When you're talking about technology, we usually have pretty good forensic evidence, whether it's text messages, whether it's a website, whether it's inappropriate posts on a social networking site. We usually have pretty good cooperation from the Internet service providers or the social networking sites to provide us with the chat logs or the posts or the time or the account information and things like that.
So we have our ways of finding the information. Then, of course, most — at least most digital natives, if you will, know how to do screenshots and they know how to save URLs and they know how to memorialize the evidence for us. So they're sometimes our eyes and ears on things like that.
But a lot of what we have had to do from a law enforcement standpoint is either change the existing laws and update them for the new technology or write new laws that have to do with whatever the day-to-day, up to date technology is. But then again, it changes so often that we can write a law and three months from now, there's some brand new, super malware or something like that that we then have to account for.
We have to write the law broad enough that it covers it, but narrow enough that it's specific enough that it's not too broad or too vague.
Excerpted from an interview at CBITS Summit 2013 in Santa Monica, CA.