Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Rejecting the appeal of a convicted child molester who used Facebook to exchange explicit photos of minors, a federal appeals court clarified how online chats can be authenticated as criminal evidence.
Grappling with an issue of first impression, the U.S. Court of Appeals for the Third Circuit held that a preponderance of the evidence ' including testimony from federal agents and victims ' showed that defendant Tony Browne did create messages containing nude photos of minors obtained through coercion. Browne, of the U.S. Virgin Islands, claimed that prosecutors couldn't prove he authored the messages. See, U.S. v. Tony Jefferson Browne, No. 14-1798 (3d Cir. Aug. 25, 2016).
The court, however, shot down the prosecution's argument that Browne's Facebook chat messages between 18-year-old Nicole Dalmida and four of her underage friends could be authenticated by a certificate from Facebook's records custodian, admissible under the same federal rules that allow business records into evidence.
“At most, the records custodian employed by the social media platform can attest to the accuracy of only certain aspects of the communications exchanged over that platform, that is, confirmation that the depicted communications took place between certain Facebook accounts, on particular dates, or at particular times,” Third Circuit Judge Cheryl Ann Krause wrote in the court's opinion. “This is no more sufficient to confirm the accuracy or reliability of the contents of the Facebook chats than a postal receipt would be to attest to the accuracy or reliability of the contents of the enclosed mailed letter.”
Browne was convicted of 12 criminal counts, including child pornography and coercion charges. According to Krause, Browne used the Facebook alias “Billy Button” to solicit nude photos from Dalmida and the minors. Afterward, Browne threatened to publicly expose the photos unless Dalmida and the minors agreed to provide him with sexual favors. He met with three of the minors and sexually assaulted one, according to Krause.
Browne's public defender, Omodare B. Jupiter, declined to comment.
Discussing the preponderance of the evidence that pointed toward Browne's authorship of the messages, Krause said that examining additional evidence is critical in cases where digital records could be easily doctored.
“We hold today that it is no less proper to consider a wide range of evidence for the authentication of social media records than it is for more traditional documentary evidence,” Krause said. “The authentication of electronically stored information in general requires consideration of the ways in which such data can be manipulated or corrupted, and the authentication of social media evidence in particular presents some special challenges because of the great ease with which a social media account may be falsified or a legitimate account may be accessed by an imposter.”
Criminal defense attorney Steven Fairlie says the Third Circuit's ruling is illuminating because it shows the court will treat authentication of Facebook chats as it would any other evidence. This is especially useful, he said, given the increasing use of social media evidence in court.
“These issues do come up quite a bit,” Fairlie says.
Relying on a records custodian in the social media context, Fairlie adds, is precarious when it comes to proving authorship.
“Facebook has no idea if those communications were accurate if they were reliable and who made the posts,” Fairlie says. “They can say the accounts made the posts, but not who was in control of the phone.”
P.J. D'Annunzio writes for The Legal Intelligencer, the Philadelphia-based ALM sibling of this newsletter. He can be contacted at 215-557-2315 or [email protected]. Follow him on Twitter @PJDannunzioTLI.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.