III. Admissibility of
Social Networking Website Evidence
Social media users are surprisingly indiscrete
and their statements are generally easy to find.[1] Not surprisingly, attorneys are
increasingly seeking to introduce evidence from social networking sites in both
civil and criminal cases.[2] Although electronic evidence may
present unique challenges to admissibility, authenticity, and foundation, it
does not require the proponent to discard his knowledge of traditional
evidentiary principles or learn anything truly new.[3] As methods of communication have
expanded, the Federal Rules of Evidence have essentially remained the same,
however, application of those rules have varied with new modes of
communication.[4] Despite the interesting questions
raised about the hearsay rule and its exceptions in relation to the
admissibility of Facebook posts, little concern has been raised about applying
the hearsay doctrine.[5] By contrast, social media has triggered
what could be characterized as a judicial “freak-out” in response to the need
to authenticate statements made via social media.[6]
Authentication questions are by far the most
interesting issues raised by new social media,[7]
and an attorney seeking to admit evidence from a social networking site must first
overcome the hurdle of authentication.[8]
Essentially, the authentication question
is a simple one: is the item what
its proponent claims it to be?[9]
The process of authentication requires two steps; the first entails the
gate-keeping role of the judge, who must determine whether a reasonable jury
could find the item authentic; and second step requires the jury to revisit the
question of authenticity as a matter of conditional relevance.[10] Under existing rules, the relevant
examples for methods of authentication include testimony of a witness with
knowledge,[11]
and distinctive characteristics.[12] In civil cases, parties frequently use
pretrial stipulations to satisfy both steps of the authentication process; in
criminal cases, however, such stipulations are less common.[13]
Despite the potential authenticity issues
surrounding social media evidence, judges have been applying the existing rules
to matters concerning evolved technology where no new and definitive bright
line rule exists.[14] Therefore, it appears that no definitive
bright line rule may actually be necessary. [15] Although there has been little push to
alter the rules,[16] courts have
instead focused on uniformly applying existing rules to new media, which is what
has proved to be sometimes tricky.[17] Authentication is easy where the party
admits that the page or post is her and that she made the post.[18] In the absence of such testimony, however,
courts have been forced to address four major types of authentication concerns:
(1) a general lack of proper foundation; (2) the possibility that the entire
social networking page is fake; (3) the possibility that a genuine existing
page has been hacked; and (4) the possibility that someone has appropriated the
site of another by obtaining the password through friendship, phishing, or a
computer left logged on and unattended in a place where third parties could
post in the owner’s name.[19]
Similar to initial judicial opposition to
photographs as evidence and concerns about “intentional and skillful
manipulation” by the proponent,[20]
are the current judicial suspicions regarding social media evidence.[21] Evidence law has been slow to adapt to
new forms of technology, and courts have been initially struggling to uniformly
apply the existing rules.[22] Regarding social media evidence, authentication
has proved to be especially difficult in criminal cases; as a result, courts
have been less likely to allow admission.[23] Unlike in civil litigation, criminal
defendants have the Fifth Amendment privilege against self-incrimination.[24] Therefore, in cases where the
government has gained access to non-public Facebook content, the chances of
actually presenting this evidence at trial appear to be slim.[25]
Recently, in reversing a lower court’s
admission of a criminal defendant’s MySpace pages, the Maryland Supreme Court [26]
articulated three specific avenues for authenticating printouts from
social media sites: (1) seeking testimony from a witness with knowledge, either
the profile creator or someone who had observed the social-media activity first
hand; (2) searching the computer of the person who allegedly created the
profile and the posting to examine its hard drive and Internet history; and (3)
obtaining information directly from the social networking site itself.[27] However, as discussed earlier, a
criminal defendant cannot be forced to testify so as to satisfy the first
avenue, while the SCA limits the availability of the third avenue for
authenticating social media content in civil cases.[28] This strict approach to authentication
was based on the court’s concerns that, “anyone can create a fictitious account
and masquerade under another person’s name or can gain access to another’s
account by obtaining the user’s username and password.”[29]
Those who prefer the stricter approach adopted
by the Maryland Supreme Court claim that reliability issues should not be going
straight to the jury.[30] Some argue that a jury is unable to
interpret the reliability of the social-networking evidence because all
evidence offered to support authenticity was a preliminary matter determined by
the judge beforehand. The gate-keeping function of the judge in making the
determination about authenticity serves to prevent a jury from hearing
untrustworthy or unreliable evidence.[31] This position is problematic because it
assumes that a jury would not be given proper evidence to help determine its
weight. For example, when
authorship of a Facebook post is denied by a defendant, it is well within the
province of the jury to determine, in light of their own life experience, and based
on the evidence, who they find credible and whether someone other than the
defendant actually made the post.
This hyper-wariness of authenticating social
media is bad policy that will someday appear to be quaint in the same way that
initial opposition to photographic evidence is now viewed as quaint.[32]
Because social networking has become ubiquitous and may soon be the primary
means of communication, this stingy approach to authentication will lead to the
unnecessary loss of valuable evidence.[33] Fears about this new form of
communication technology has led some courts to demand unreasonable levels of
assurance, ignoring that judges’ initial screens for authenticity should not
present such a great hurdle to admissibility. Instead, the better approach is to allow such questions to
go toward the weight of the evidence and not the admissibility. It must be observed that the same types
of uncertainties exist with traditional written documents: a signature can be
forged, a letter can be typed on another’s typewriter, and distinctive letter
head can be copied or stolen.
Historically, those are exactly the sorts of questions that have been
left for the fact-finder to determine.
Similar to the way that a jury would determine whether or not a
signature has been forged should the jury figure out whether or not the
electronic post was forged.
[1] Merritt, supra note 7, at 46.
[2] Orenstein, supra note 5, at 186.
[3] Jonathan D. Frieden and Leigh M. Murray, The Admissibility of Electronic Evidence Under the Federal Rules of Evidence, 17 Rich. J. L. & Tech. 1, 2 (2011), available at http://jolt.richmond.edu/v17i2/article5.pdf.
[4] Orenstein, supra note 5, at 186.
[5] Id..
[6] Id.
[7] Orenstein, supra note 5, at 202.
[8] Heather Griffith, Understanding and Authenticating Evidence From Social Network Sites, 7 WASH J. L. Tech. & Arts 209, 214 (2012), available at http://digital.law.washington.edu/dspace=law/handle/1773.1/1111.
[9] FED. R. EVID. 901(a); the question is one of conditional relevance under FED. R. EVID. 104(b).
[10] Orenstein, supra note 5, at 202-203.
[11] FED. R. EVID. 901(b)(1) (“Testimony of a Witness with Knowledge: Testimony that an item is what it is claimed to be.”)
[12] FED. R. EVID. 901(b)(4)(“Distinctive characteristics and the Like: The appearance, contents, substance, internal patterns, or other distinctive characteristics of the item, when taken together with all the circumstances.”)
[13] Merritt, supra note 7, at 53.
[14] Hornberger, supra note 8, at 292.
[15] Hornberger, supra note 8, at 292.
[16] See e.g. State v. Eleck, 23 A.3d 818, 823 (Conn. App. Ct. 2011) (“The emergence of social media such as e-mail, text messaging and networking sites like Facebook may not require the creation of new rules of authentication with respect to authorship); see also Commonwealth v. Purdy, 945 N.E.2d 372, 378, 381 (Mass. App. Ct. 2011) (“While e-mails and other forms of electronic communication present their own opportunities for false claims of authorship, the basic principles of authentication are the same.”)
[17] Orenstein, supra note 5, at 202.
[18] Id. at 208.
[19] Id. at 207.
[20] Steven Goode, The Admissibility of Electronic Evidence, 29 Rev. Litig. 1, 2 (2009) (quoting Cunningham v. Fair Haven & W. R. Co., 43 A. 1047, 1049 (Conn. 1899)).
[21] See Orenstein, supra note 5, at 204 (comparing judicial suspicion of photographic evidence in the late 1800’s with newly available social media evidence.)
[22] Goode, supra note 114.
[23] Caren Myers Morrison, Passwords, Profiles, and the Privilege Against Self-Incrimination: Facebook and the Fifth Amendment, 65 Ark. L. Rev. 133, 141 (2012).
[24] U.S. Const. amend. V.
[25] See generally Morrison, supra note 117, at 139-142 (discussing the problem of authentication of Facebook messages, profiles, and postings).
[26] Griffin v. Maryland, 19 A.3d 415 (Md. 2011).
[27] Id. at 427-428.
[28] See supra Part I.
[29] Griffin, 19 A.3d at 421.
[30] See Ira Robbins, Writings on the Wall: The Need for an Authorship-Centric Approach to the Authentication of Social-Networking Evidence, 13 Minn. J. L. Sci. & Tech. 1, 20 (Winter, 2012) (discussing shortcomings of judicial approaches to authentication when questions of reliability are put before the fact finder).