Following his initial sentencing in 2014, Oscar Pistorius, double-amputee and former Olympic sprinter convicted in the shooting death of his girlfriend, Reeva Steenkamp, saw his sentence more than doubled in 2017. If not for that, and under the initial sentence, Pistorius could have been released on parole in mid-2019. Now, the earliest he will be eligible for parole is 2023.
Looking back at this case from 2014, we can see the significance of mobile forensics and digital evidence in building a complete picture of the fateful crime on Valentine’s Day 2013.
In cases of shooting deaths, physical evidence such as ballistics, bullet trajectory, blood spatter patterns etc. can often help investigators understand what happened and who did what, which can be enough to convict a suspect. But in cases like this one, in which Pistorius admitted shooting the victim, there is no need to prove that he was responsible for her death. Instead, the question becomes whether the shooting was in self-defense, an accident, a crime of passion or a premeditated action. And digital evidence of communications between the suspect and victim can be absolutely critical in reaching a trial verdict.
Smartphone evidence a critical key in Pistorius case
On Valentine’s Day 2013, the blade runner became “the blade gunner” (as the media called him), and in 2014 he was convicted of manslaughter. Amongst the evidence revealed during Pistorius’ murder trial in South Africa were encrypted WhatsApp messages extracted from mobile phones using XRY software from MSAB.
Captain Francois Moller of the South African Police testified at the high court in Pretoria that he was able to access some 35,000 pages worth of messages between the couple. The evidence was extracted and shown to the court.
Among the messages were ones that had been deleted, but that XRY was able to recover.
“I’m scared of u sometimes and how u snap at me and of how u will react to me,” Reeva had texted Pistorius, in a message read out in court by Captain Moller.