Admissibility of Evidence from Electronic Sources

MySpace, Facebook Evidence Hub

  1. Dramatic Changes in Electronic Discovery
  2. In 1999, judicial resistance to webpage evidence that might have been altered was so great that it was outright excluded
  3. By 2007 its authenticity was deemed to be presumptively correct.
  4. Recent surveys confirm that more than 90 percent of all documents produced since 1999 were created in digital form.
  5. Surprisingly, many attorneys fail to do any electronic discovery because of concerns that it is costly, time-consuming and complicated. The irony: It is usually dramatically cheaper to conduct discovery electronically.
  6. New computer forensic techniques allow the cost effective and safe recovery of evidence normally invisible to the user. What used to cost tens of thousands of dollars can now be done for less than $5,000 using trained computer forensic examiners.
  7. Law firms are now seeking computer-generated evidence, especially in cases related to defamation, trade secret and intellectual property theft, sexual harassment in the workplace, fraud, breach of contract, divorce proceedings and spoliation of evidence. Even in small personal injury auto cases, defense attorneys are going after e-mail and other electronic evidence related to wage and injury claims.
  8. Federal Rules of Civil Procedure
  9. Through Rule 34(a), Congress added electronically stored information (ESI) as a category of discoverable information.
  10. To ensure that this amendment maintained its relevance as new technologies are invented, ESI was defined to be “writings, drawings, graphs, charts, photographs, sound recordings, images, and other data or data compilations stored in any medium from which information can be obtained.”
  11. By purposefully using the language, “in any medium,” in the future, the federal courts can require data from technology not even invented yet.
  12. The corresponding Federal Rule 34(b) measure, passed at the same time as Federal Rule 34(a), allows the requesting party to determine the form in which evidence is presented.
  13. Maybe a paper printout is enough to meet your goals in a particular instance.
  14. In other circumstances, you may decide that the electronic version must be produced in order to include all background and transmission information.
  15. Often times, the full electronic record will be the preferred choice of attorneys and clients alike as a hard copy will not tell the complete story behind a piece of evidence.
  16. Only with the information that is stored on a computer or other electronic device will you be able to extract the time at which a particular transaction occurred, any information deleted from the current text, or possibly the date and time at which an online correspondence occurred.
  17. What is Electronic Discovery
  18. Electronic discovery (also called e-discovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
  19. E-discovery can be carried out offline on a particular computer or it can be done in a network.
  20. Examples of E-discovery Evidence
  21. text, images, calendar files, databases, spreadsheets, audio files, animation, Web sites (i.e Myspace, Facebook, YouTube, E-Bay etc.) and computer programs.
  22. malware such as viruses, Trojans and spyware can be secured and investigated.
  23. Email can be an especially valuable source of evidence in civil or criminal litigation, because people are often less careful in these exchanges than in hard copy correspondence such as written memos and postal letters.
  24. Phone Records
  25. E-Z Pass and SunPass Records
  26. GPS Records
  27. Importance of E-Discovery
  28. The nature of digital data makes it extremely well-suited to investigation.
  29. Digital data can be electronically searched with ease, whereas paper documents must be scrutinized manually.
  30. Digital data is difficult or impossible to completely destroy, particularly if it gets into a network. This is because the data appears on multiple hard drives and because digital files, even if deleted, can be undeleted.
  31. The only reliable way to destroy a computer file is to physically destroy every hard drive where the file has been stored.
  32. What to do when Computer Evidence May be Relevant
  33. Recent case law has helped define procedures that counsel should consider when computer evidence may be relevant:
  34. 1. Send a preservation letter.
  35. 2. Appoint a neutral forensic expert.
  36. 3. Prepare an order detailing the inspection protocol.
  37. 4. Hire a forensic expert to acquire and preserve computer data for examination.
  38. 5. Examine and analyze image data files for evidence.
  39. 6. Document the findings.
    See Playboy Enterprises v. Welles, 60 F.Supp.2d 1050, 1054 (S.D. CA 1999); Simon Property Group v. mySimon, Inc. 2000 WL 963035 (S.D.); Trigon Insurance Company v. United States, 204 F.R.D. 277 (E.D. Va 2001); and Rowe Entertainment v. The William Morris Agency, 2002 WL 63190 (S.D.N.Y.).
  40. Cyberforensics
  41. Computer forensics, also called cyberforensics, is a specialized form of e-discovery in which an investigation is carried out on the contents of the hard drive of a specific computer.
  42. After physically isolating the computer, investigators make a digital copy of the hard drive. Then the original computer is locked in a secure facility to maintain its pristine condition.
  43. All investigation is done on the digital copy.
  44. Admissibility
  45. To ensure admissibility, the lawyer must focus on five issues:
  46. Investigation
  47. Discovery
  48. Authentication
  49. Hearsay
  50. Best Evidence Rule
  51. Investigation;
  52. Locating electronic evidence will be dependent on several factors.
  53. If the investigator is a state official, her/his searches will be governed by Fourth Amendment strictures,
  54. Private actors will be restricted by state privacy and electronic communications [wiretap] laws.
  55. Privacy principles will govern when one spouse ‘searches’ a partner’s computer, or when an employer checks that of an employee.
  56. The same is true when accessing e-mails or similar electronic communications.
  57. Once litigation has commenced, subpoena power and other discovery tools come into play. To this end, the Federal Rules of Civil Procedure come into play
  58. Discovery;
  59. Federal Rule of Civil Procedure 26(a) requires a party to disclose all documents, including electronically stored information that the party may use to supportits claims or defenses without awaiting a discovery request. Fed.R.Civ.P. 26(a)(1)(A)(ii)
  60. Rule 26(b)(2) only limits the discovery ofelectronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. Fed.R.Civ.P. 26(b)(2)(B)
  61. Authentication;
  62. The evidence (e-mail, webpage, digital photograph) must be “authenticated,” or shown to be the proof at issue “by evidence sufficient to support a finding that the matter in question is what its proponent claims.”
  63. Federal Rule of Evidence 901(a)
  64. Requires that evidence be authenticated before a trier of fact will be permitted to consider the evidence.
  65. Usually taken in the form of testimony by an individual with direct knowledge that the produced evidence is what is purports to be
  66. Witness who testifies on the authenticity does not need to present any special qualifications or expertise on the programming or technical operation of the program, but merely requires first-hand knowledge of the program or technology presented
  67. General rule: inaccuracies or suspicions of alteration of the electronic record are an issue for the trier of fact to consider when weighing the evidence, not in determining admissibility
  68. Example: Digital photographs
  69. Although easily subject to manipulation with readily availablecomputer software programs, the evidentiary standard for admissibility is low.
  70. The photograph may be authenticated by the photographer or someone familiar with the scene depicted; and where the digital photo has been enhanced or is a converted image, testimony of an expert is an essential addition to explain the process used and the proven track record of generating reliable results.
  71. Challenges to Authentication:
  72. Questioning if the evidence was altered or manipulated after they were created and raise issues relating to the chain of custody of the evidence
  73. If a specific programming function is introduced, a party may challenge the reliability of this function
  74. A party may question whether the author’s identity of the post can definitely be attributed to the defendant
  75. Account was fraudulently hacked into
  76. Hearsay
  77. Federal Rules of Evidence, Rule 801(c), Out of court statements being introduced for the truth of the matter asserted.
  78. Hearsay Exclusions and Exemptions
  79. Rule 801(d)(2), Admission of a party opponent
  80. Rule 803(2), an excited utterance
  81. Rule 803(1), present sense impression(consider, in this regard, instance messages, text messages, and e-mails)
  82. Rule 803(3), a declaration of state of mind
  83. Rule 803(4), one made for purposes of medical diagnosis or treatment
  84. declaration against interest
  85. business record
  86. E-Discovery that is NOT Hearsay
  87. Records generated by a system or process, such as a print-out of dialed telephone numbers or a toll booth receipt showing the date and time of payment, do not implicate the hearsay rule, as there is no assertion and there was no ‘person’ who originated the data.
  88. These records are the products of a process, and require authentication of the process’ mechanism and reliability.
  89. Chatroom dialogues (often utilized in internet sexual enticement prosecutions) will contain assertions not only by the accused but by others in the exchange. The latter will not be hearsay, as they are not admitted to prove the truth of what the third parties stated, but to provide context to the defendant’s words.
  90. Best Evidence Rule
  91. Federal Rules of Evidence Rule 1002, To prove the content of a writing, recording, or photograph, the original writing, recording, or photograph is required, except as otherwise provided in these rules or by Act of Congress.
  92. Federal Rules of Evidence Rule 1003, A duplicate is admissible to the same extent as an original unless (1) a genuine question is raised as to the authenticity of the original or (2) in the circumstances it would be unfair to admit the duplicate in lieu of the original.
  93. Because the contents of the writing are at issue, this rule requires production of an original. As duplicates are approved under the rule, however, this should rarely be a barrier to admission.
  94. Limitations on E-Discovery
  95. U.S. v. Comprehensive Drug Testing, Inc., (9th Cir. 2009).
  96. This case is about a federal investigation into steroid use by professional baseball players.
  97. Arising from the BALCO-related seizure of drug tests and urine samples of hundreds ofmajor league baseballplayers obtained in the supposedly confidential 2003 drug testing program, e.g. A-Rod, Big Papi, Sosa, etc.
  98. More generally, however, it's about the procedures and safeguards that federal courts must observe in issuing and administering search warrants and subpoenas for electronically stored information
  99. the Ninth Circuit's requirements imposed on search warrants for digital evidence:
  100. Magistrates should insist that the government waive reliance upon the plain view doctrine in digital evidence cases.
  101. Segregation and redaction must be either done by specialized personnel or an independent third party.If the segregation is to be done by government computer personnel, it must agree in the warrant application that the computer personnel will not disclose to the investigators any information other than that which is the target of the warrant.
  102. Warrants and subpoenas must disclose the actual risks of destruction of information as well as prior efforts to seize that information in other judicial fora.
  103. The government’s search protocol must be designed to uncover only the information for which it has probable cause, and only that information may be examined by the case agents.
  104. The government must destroy or, if the recipient may lawfully possess it, return non-responsive data, keeping the issuing magistrate informed about when it has done so and what it has kept.
  105. Examples of E-Discovery is the Court Room
  106. In Tampa
  107. Jordan Valdez, a Davis Islands teenager charged as an adult in the hit-and-run of a homeless woman
  108. Detectives got a search warrant for the Murano and took a SunPass transponder and paint chips from the vehicle.
  109. With the SunPass transponder, detectives were able to determine that the Murano was at the Selmon Crosstown Expressway's Plant Avenue toll plaza at 8:24 p.m. Feb. 8. The driver of the Murano could not be identified from the toll booth's security cameras, but there was no crash damage visible on the vehicle.
  110. Police also searched the Valdez home and seized three computers and a cordless phone. Police said at the time there might be information on the hard drives that could be used to help build a case against the teenager.
  111. Craig’s List Killer
  112. Boston police were able to linkMarkoff to the email address used torespond to the Craigslist ads placed by his victims, link the IP address of his computer to that email address, and track his movements from his Blackberry service providerto the hotels where the robberies and the murder of Julissa Brisman took place.
  113. DUI
  114. Two weeks after Joshua Lipton was charged in a DUI crash that seriously injured a women, the college student attended a Halloween party dressed as a prisoner.
  115. Someone posted pictures of him from the party labeled “Jail Bird,” on their Facebook page.
  116. The Prosecutor used the pictures to paint Lipton as an unrepentant partier who lived it up while his victim recovered in the hospital. The Judge agreed and sentenced him to two years in prison.
  117. Violation of Probation
  118. Defendant Pressly was sentenced to a lifetime of probation. As part of the deal, he promised not to consume or drink any substance containing alcohol, and to not possess, use or have personal access to any computer or similar equipment that has internet capability without prior written permission of his Probation Officer.
  119. Pressly’s wife’s MySpace page contained a picture of Pressly holding a beer with the caption that said, “Me and my wife.”
  120. The Court found that the picture was relevant to whether Pressly violated the terms of his probation.
  121. Civil Suit
  122. A man filed the lawsuit after he suffered whiplash as a result of two car accidents in 2001 and 2003. In addition to other losses, he said the injuries affected his social life, claiming his friends no longer phoned him to go out because he continuously declined their invitations.
  123. However, defense lawyers produced evidence from the man's Facebook profile that suggested his social life had not been affected at all. Postings made on his page showed that he hosted and attended parties, went to friend's cabins, and several other activities.
  124. After being confronted with the evidence, the man shut down his Facebook page.
  125. He was awarded $40,000 in general damages and suffering, however the judge rejected his claims which sought up to $1.3 million.
  126. Divorce
  127. Confessions involving an individual’s social life;
  128. Photos with children in places they ought not be;
  129. Photos of parties to the case consuming liquor or using drugs;
  130. Income and employment information; or
  131. Inappropriate sexual content
  132. Don’t let E-Discovery Harm your Case!
  133. Warn you Clients of the admissibility of:
  134. Phone Records
  135. Text Messages
  136. Calls to Inmates
  137. Facebook and MySpace Page
  138. Friends
  139. Pictures
  140. videos
  141. Comments
  142. Status
  143. Setting your account to Private does not prevent e-discovery. A Facebook spokesperson said: “We may be required to disclose user information pursuant to lawful requests, such a subpoenas or court orders, or in a compliance with applicable laws.”
  144. Twitter
  145. E-Bay
  146. E-mails
  147. Sent and received
  148. Including deleted e-mails
  149. Visiting inappropriate websites
  150. Online Banking
  151. SunPass and EZ Pass
  152. GPS system
  153. Warn your Witnesses
  154. E-Discovery can impact their credibility
  155. Q & A Session

Page 1 of 8