In England, a criminal defendant proclaims, I think I got away with it, before the close of trial and is forced to take a plea. In Texas, a murder conviction is upheld based on the accuseds knowledge of intimate details about the killing and subsequent investigation. In California and Colorado, employee plaintiffs are required to disclose conversations with other employees related to a suit against the employer. In each of these cases, the crucial evidence was drawn from Facebook and other social networking sites.
Messages and postings on social networks have become a fundamental means of communication. By 2009, more conversations took place over social networks than by email. Lawyers have seized on social networking sites as a deep well of valuable information, resulting in an evidentiary debate in courtrooms nationwide surrounding the admissibility of social media evidence.
Two key issues for courts and attorneys faced with social media evidence have been: (1) proper authentication of the evidence, and (2) access to that evidence in the face of digital privacy laws. As recently as a few years ago, authentication and access each proved to be a substantial hurdle for an attorney seeking to admit social network communications into evidence. Recent decisions, however, reveal a trend toward admission, with the cooperation of social media sites themselves necessary to both authentication and access.
Authentication
Does a name and photograph on a Facebook page authenticate the identity of the individual associated with the accounts activity? In an instance of what Judge Glenn T. Harrell Jr. of Marylands highest court has described as the technological heebie jeebies, several recent courts have required more, expressing concern with false profiles, account hacking, and Photoshopping.
The ability of technology to deceive, however, is counterbalanced by the indelible digital trail left by users of social media. Accordingly, standards for authentication are emerging. Evidence of a users Internet history, gleaned from an examination of their digital devices or obtained directly from the social media provider, now appears sufficient to establish, in the language of Federal Rule of Evidence 901, that the [social media] item is what the proponent claims it is.
The paradigmatic case arises from messages or postings whose authenticity is disputed by the apparent account owner. Several decisions of recent yearsincluding Griffin v. State, 19 A.3d 415 (Md. 2011) and State v. Eleck, 23 A.3d 818 (Conn. App. Ct. 2011)have been sympathetic to claims of falsely created accounts or hacked messages. The Griffin court held that the date of birth of the creator and her visage in a photograph on the site was insufficient to authenticate the purported owners authorship of a message. Similarly, Eleck held that authenticity was not established by the fact that [the claimed author] held and managed the account.
Nevertheless, as Eleck noted, the circumstantial evidence that tends to authenticate a communication is somewhat unique to each medium; both cases pointed to forensic examination of devices or validation by social media providers as potential means of authenticating such evidence. As use of these methods of authentication becomes more widespread, it seems likely that courts will not look favorably upon evidence put forth without forensic support.
At the same time, traditional means of authentication, such as the distinctive content of a statement, retain force in the world of social media. In Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. 2012), Texass highest criminal court upheld a murder conviction that relied heavily on postings from several MySpace accounts attributed to the defendantdespite the lack of any forensic evidence or outside authentication. After describing in detail several dozen messages, photographs, and other details linking the profiles to the defendant, the court ruled that the remote possibility that the [defendant] was the victim of some elaborate and ongoing conspiracy went to the weight of the evidence, not its admissibility. The Tienda court did cite Griffin, however, for the suggestion that in future cases, proponents of social media evidence would be well advised to include extrinsic proof of authenticity.
Access
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]