Digital evidence refers to any information with evidentiary value that is stored or transmitted in binary form. In cases of violence against women, such evidence is extracted from:
Smartphones: call logs, social media applications (WhatsApp, Instagram), and hidden images.
Cloud computing: recovery of synchronized data that the offender attempted to delete from their physical device.
Internet Service Provider (ISP) records: to identify the digital address (IP Address) used by the offender to send threats.
2. Criminal Handling Procedures for Digital Violence
For digital evidence to be admissible before the courts, it must pass through precise technical stages to ensure it has not been tampered with:
Seizure:
Confiscating the devices used (whether belonging to the victim or the offender) and placing them in Faraday bags to prevent network connection and remote data deletion.
Imaging:
Creating an exact copy of the data (bit-stream image) for examination, while preserving the original in its untouched state to ensure integrity.
Analysis:
Using advanced software to recover deleted messages and examine image metadata to determine the time and place the photos were taken.
Technical report:
Presenting the findings in legal language understandable to the judge, clearly linking the device used to the identity of the offender.
3. Confronting Common Forms of Digital Violence
Forensic evidence plays a key role in deterring offenders in the following cases:
Sexual extortion (Sextortion):
Proving the process of sending and receiving messages and identifying the extortionist, even if fake accounts are used, by tracing the device’s digital fingerprint.
Cyberstalking:
Documenting repeated harassing messages and tracing the geographic locations from which they were sent to establish the offender’s surveillance of the victim.
Deepfake content:
Using forensic image and video analysis techniques to detect manipulation aimed at damaging a woman’s reputation.
4. Technical Advice for Preserving Rights (For Female Victims)
To ensure the effectiveness of forensic evidence, the victim should observe the following:
Do not delete conversations: even if they are abusive, as they constitute the primary material evidence.
Take screenshots: as a quick precautionary measure before the offender deletes messages on their end.
Report to the competent authorities: (cybercrime units) to submit the evidence through official and legal channels.
5. The Role of Digital Evidence in Enhancing Women’s Security
The existence of a robust digital forensic system serves as a general deterrent. An offender who believes they are hidden behind a “username” mask comes to realize that every action leaves an indelible digital trace. This strengthens a safe digital environment that allows women to participate in the digital sphere without fear.
Al-Mustaqbal University, the first university in Iraq