Authentication of Social Networking Websites

Authentication of Social Networking Websites

American University Criminal Law Brief Volume 8 Issue 1 Article 2 2012 Facebook and MySpace in the Courtroom: Authentication of Social Networking Websites Julia Mehlman Follow this and additional works at: https://digitalcommons.wcl.american.edu/clb Part of the Criminal Law Commons Recommended Citation Mehlman, Julia. "Facebook and MySpace in the Courtroom: Authentication of Social Networking Websites." American University Criminal Law Brief 8, no. 1 (2012): 9-28. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Criminal Law Brief by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Facebook and MySpace in the Courtroom: Authentication of Social Networking Websites “As social media, or whatever you want to label it, becomes more prevalent, there will be blunders. We’re in experimental mode right now.”2 “[T]he inability to get evidence admitted because of a failure to authenticate it almost always is a self-inflicted injury which can be avoided by thoughtful advance preparation.”3 Although there are problems associated with the use I. INTRODUCTION of social networking websites at each of the aforementioned stages, this article focuses on the use of social networking eople reveal their lives online. Since 2005,4 an websites as evidence at trial and the problems of authentication, entire generation has been archiving its daily, or even particularly in criminal cases. The article will proceed in three hourly, activities for hundreds of followers on social parts. In Part II, this article will address the law of authentica- networking websites.5 Since then, users have continued tion in general, to provide a background for courts’ approaches P 6 7 to multiply, reaching people of all age groups. These sites to authenticating social networking websites. In Part III, this are “sophisticated tools of communication where the user article will describe the different methodologies courts use to voluntarily provides informa- authenticate different aspects of tion that the user wants to share social networking websites and with others.”8 Many of these will compare those approaches sites, including Facebook—the to existing case law about “behemoth of the social network- authenticating electronically ing world”9—and MySpace, stored information generally. enable members “to create on- It will begin by examining line ‘profiles,’ which are in- authentication of messages sent dividual web pages on which via social networking websites, members post photographs, and then it will analyze post- videos, and information about ings, photographs, and “tags.” their lives and interests.”10 Finally, in Part IV, this article Users connect by linking will conclude with a summary their profiles—becoming of the approaches, accompanied “friends”— joining similar fan by some recommendations and pages, similar networks, “liking” strategies for courts and parties similar things, and sharing for authenticating this growing category of potential evidence. content among their accounts.11 In addressing the issues that arise with the authentication Although social networking websites have been hugely of information from social networking websites, most courts popular for some time, they are only beginning to find their place begin by looking at the general framework for authentication, in the courtroom.12 Over the past few years, there has been “an focusing on electronically stored information in particular.18 ever increasing number of cases involving social networking Some courts feel comfortable applying the existing authentica- communications, and these cases cover a broad range of areas of tion rules to social networking evidence,19 while others seem law.”13 Indeed, social networking websites come up at various hesitant about the reliability of such evidence, and as a result, stages of litigation, ranging from civil and criminal discovery,14 to heighten existing authentication requirements.20 problems with juries,15 to use as evidence at trial,16 to sentencing proceedings17 and beyond. Criminal Law Brief 9 A. LAW OF AUTHENTICATION IN GENERAL In order to authenticate a document, the proponent of the The Federal Rules of Evidence direct trial courts to apply evidence must first establish what type of document the prof- 35 a sufficiency standard to determine whether a document is fered evidence purports to be. This, however, is generally authentic: the proponent of the evidence must produce evidence obvious from the document itself and requires no more than a 36 sufficient to support a finding that the writing is what the pro- witness’ clarification, for example that the document is a letter, 37 38 ponent claims it to be.21 There only needs to be a prima facie a ledger, or a photograph. The document’s role, and its showing of authenticity to the court to demonstrate that a rea- admissibility, more often hinges on other inferences about the 39 sonable juror could find the document to be authentic.22 “Once document. Examples of such inferences are: Who wrote it?; a prima facie case is made, the evidence goes to the jury, and Who sent it?; Who received it?; Was it altered? The answers to it is the jury who will ultimately determine the authenticity of each of these questions determine whether or not the document the evidence instead of the court.”23 Authentication is simply an is relevant. aspect of relevancy.24 The proponent’s assertion that the writing Rule 901’s most typical method of authentication is 40 is relevant determines what he claims the writing to be.25 identifying the author of the document. This, of course, is 41 Appellate courts give substantial deference to that deter- merely part of the document’s relevance. The easiest way to mination, reviewing a lower court’s decision only for an abuse identify the author is to have a witness with personal knowledge of discretion, in which the determination is not to be disturbed authenticate the document by testifying either that he authored absent a showing that there is no competent evidence in the record it, or for automatically created electronic documents, that he is 42 to support the decision.26 According to Federal Rule of Evidence familiar with the computer processes that created it. However, 43 901(a), documents must be properly authenticated “by evidence such testimony is not always feasible and is never required. sufficient to support a finding that the matter in question is what Rather, a document’s author may be identified to meet the its proponent claims” as a condition precedent to admissibility.27 authentication threshold merely by “[a]ppearance, contents, If the document is found admissible, it may be relevant. Most substance, internal patterns, or other distinctive characteristics, 44 state evidence codes echo the wording of Federal Rule 901.28 taken in conjunction with circumstances.” The traditional justification for authentication require- Indeed, circumstantial evidence alone is often enough to 45 ments is to prevent fraud or mistake.29 For example, consider satisfy the low authentication bar. For example, the Third a set of documents purported to be a series of threatening letters Circuit found that the defendant sufficiently established himself signed by the defendant in a criminal case. The requirement to as the author of a letter for authentication purposes where the 46 authenticate—or prove—that the letters were actually signed by the letter was seized from the trash outside his house. The notes defendant protects him from the possibility that a third party forged were contained in the same garbage bag as other identifying the letter to have the defendant arrested or imprisoned for stalking. information, and they were written on the stationery of a hotel 47 Authentication also protects that same defendant from the risk that where the defendant had stayed. Another example comes from the letter may have been signed by another person with the same the Fourth Circuit, in which the court found that the author was name. Beyond the need to prevent mistake and fraud, authentica- sufficiently identified for authentication purposes where the tion also serves to provide context to the jury, without which, any documents were found in military headquarters with indexing given document may be confusing or misleading.30 numbers unique to the organization reported to have created 48 On the other hand, critics of the authentication require- the documents. Every other Circuit has also followed this 49 ment complain that it demands “proof of what may correctly circumstantial authentication approach. It is clear that courts be assumed true in 99 out of 100 cases,” and makes the process are willing to infer authorship of a document for the purposes of “at best time-consuming and expensive[ ]” and at “worst . authentication through circumstantial evidence alone. indefensible.”31 In addition to authorship, relevance can also be established There are many different ways to authenticate evidence, solely by identifying the person who received or found a docu- 50 based both on the nature of the document and the purpose of ment in question. Whether a person received a document can its use.32 In fact, the Federal Rules allow for authentication be important in establishing that person’s knowledge of or methods not explicitly considered in the Rules themselves. reaction to the information contained therein, or the fact that 51 For example, although Rule 901 provides some examples and he was in communication with a given person. Inferring that illustrations for ways to authenticate some types of documents, a person received a document can be accomplished through it also explicitly states that the list is not exhaustive.33 Rather, direct testimony from that person, since that individual would 52 Rule 901 was purposefully drafted to provide flexibility and have personal knowledge of the communication.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    21 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us