HB Ad Slot
HB Mobile Ad Slot
Social Media: From Computer to Courtroom
Saturday, March 9, 2013

Introduction

Social networks are more than tools to make “friends” and find “connections.” They provide business and government with an investigative source that is readily available and easily accessible. Indeed, both private industry and government alike are utilizing social media as a source to build or break a case.[1] Widespread use of social media and the variation in site protocols create concern regarding the reliability of evidence.[2] This, together with added issues like inaccurate postings, phantom profiles[3] and imposter accounts, renders social media evidence controversial in the courtroom. For lawyers and investigators alike, social media must be carefully mined and cautiously used. Understanding the manner in which social media is collected and the methods by which it can be admitted at trial are vital skills for any litigator.[4]

Collecting Social Media

Because of its widespread use and accessibility, social media provides an attractive portal of information for investigators, attorneys and even judges. Government entities have successfully obtained evidence from social media sites to establish motives, to verify alibis, and to prove a crime or criminal enterprise. From targeting Facebook photos and viewing YouTube videos, social media sites have provided law enforcement with access to incriminating evidence without leaving their desks.[5] In fact, the U.S. Department of Justice prepared an internal presentation entitled Obtaining and Using Evidence from Social Networking Sites,[6] describing techniques for uncovering information from these sites.[7] A recent survey of over 1,200 federal, state and local law enforcement professionals confirms that social media is a widely accepted and frequently used resource for investigating crimes.[8]

Attorneys may seek to utilize social media to prove claimsor defenses, or to provide impeachment evidence, but some state bar associations impose ethical boundaries on procuring such information. The New York State Bar Association limits attorneys to public information of an adverse party’s social networking site.[9] The Pennsylvania and California bars also impose similar restrictions, and there is currently a case pending before the New Jersey Office of Attorney Ethics against two attorneys for allegedly misusing Facebook.[10] Imposing ethical restrictions on attorneys curtails the discovery and admission of social media evidence, but it also staves off potential improprieties.

With the stroke of a key and the click of a mouse, the judiciary has access to the same social media information. In the case of Purvis v. Comm'r of Soc. Sec., a disability matter was remanded, but in so doing, the court noted that “in the course of its own research, it discovered one profile picture on what i[t] believed to be Plaintiff’s Facebook page where she appear[ed] to be smoking…,” and “[i]f accurately depicted, Plaintiff’s credibility is justifiably suspect.”[11] Litigators must remain mindful that even if such harmful information is not highlighted by an adversary, the court can still learn of such information independently.

Authenticating Social Media

Social media has peculiar characteristics that render authentication more challenging than other forms of evidence. The proponent of such evidence bears the burden of establishing that an item is what it purports to be and originates from the proposed source. It is at this point – the nexus between the post and author – that authentication may become troublesome because such evidence could be derived from: 1) a false/parody account (meaning that the profile holder is not who the account represents); or 2) a false post on a legitimate account (meaning the poster of the material is not the account holder). Social media sites do not prohibit parody or phantom accounts.[12] As such, care should be exercised to ensure that information is authentic.

Because of the potential for fabrication and impersonation, skepticism surrounds the admission of social media evidence at trial.[13] As a result, although social media sites present an abundance of information in the form of photos, posts, friend lists, tags, messages, tweets and videos, using it at trial requires an understanding of the applicable rules of evidence and the evidential issues surrounding social media.

Authentication of electronic and hard copy documents is governed by the Federal Rules of Evidence (“FRE”) 901(a), 104 and analogous state rules.[14] To date, however, neither the FRE nor applicable state rules specifically address social media as a unique form of electronic evidence.[15]

The limited case law addressing authentication of social media evidence highlights the somewhat subjective analysis of circumstantial evidence relating to the allegedly distinctive characteristics of the communication being offered.[16] Where direct testimony of a witness with knowledge is unavailable, authenticity may be established through circumstantial evidence, such as “the testimony of a witness with knowledge that a matter is what it is claimed to be,”[17] but care must be taken to establish sufficient circumstantial evidence to reasonably attest to the authenticity of the social media evidence being proffered.[18] Circumstantial proofs that can help create a nexus between the user’s profile and the post are photographs, date of birth, location, nicknames, language distinctive to the user and distinguishable content. Such proofs, however, should still be corroborated with direct testimony and, if possible, with evidence directly from the social media site.[19] Another alternative is obtaining testimony of a forensic computer expert who, after examining the user’s computer, can testify that the post being proffered was retrieved from the hard drive of the account holder. The weight of this type of cumulative circumstantial evidence may provide a court with the confidence necessary to find that the social media evidence being offered is what it purports to be and that it originates from the source identified by the proponent.

Other Evidential Issues – Relevancy, Hearsay And Best Evidence

Once authenticated, the proponent must overcome other possible objections such as relevancy, hearsay and best evidence. The threshold requirements of relevancy under FRE 401 are satisfied when the evidence has sufficient probative value to warrant admission. Overcoming hearsay objections requires more effort. Hearsay is defined as an out-of-court statement that is offered for its truth.[20] Hearsay rules are applied to ensure that the trier of fact can evaluate the credibility of the declarant when the declarant’s purported words are offered for their truth.[21] By its very nature, electronic evidence is riddled with hearsay issues.[22] Social media evidence is admissible, however, when a hearsay exception applies or when the evidence is not offered for its truth.[23] As a practical matter, social media evidence is often not utilized to prove the truth of the words but to establish state of mind, impeachment or inconsistencies.[24] Status updates, posts and tweets may be particularly useful for such purposes. Moreover, where the statement is offered as an admission or adoptive admission, the hearsay objection is overcome. For instance, a statement made by a party’s corporate officer or employee may be considered an admission by a party’s agent under FRE 801(d)(2)(D).[25] Nonetheless, even if social media evidence is not admissible, such information may still form a basis of cross-examination or impeachment.[26] Finally, where information is constantly in flux, as with Facebook, FRE 1002 – the best evidence rule – may create difficulties. However, if the information is no longer available, FRE 1004, permits the admissibility of secondary evidence.

Conclusion

Hundreds of millions of people subscribe to and actively use social media websites such as Facebook, LinkedIn and Twitter.[27] With so many people subscribing to and using social media sites, the personal information that can be uncovered from these sites is overwhelming. To disregard the value of social media evidence would cause an injustice and deprive litigants of a fair disposition of their claims. Litigators that seek to admit or challenge such information must be prepared to combat the cornerstone objections of authenticity and hearsay. Practitioners are encouraged to discover and present such evidence, thereby enabling the courts to address such issues with sufficient frequency to facilitate even clearer criteria for admission.




[1] Laura Saunders, Is ‘Friending’ in Your Future? Better Pay Your Taxes First, The Wall Street Journal (August 27, 2009), http://online.wsj.com/article/SB125132627009861985.html.

[2] David I. Schoen, The Authentication of Social Media Postings, 19 Com. Tr. Evid. 6 (May 17, 2011).

[3] Consider “Freddi Staur” a toy frog with a Facebook account. Samantha L. Miller, The Facebook Frontier: Responding to the Changing Face of Privacy on the Internet, 97 Ky. L.J. 541, 542 (2009).

[4] David R. Barnard, Searching For Social Media Evidence, Law360 (October 27, 2011), http://www.law360.com/media/articles/279114/searching-for-social-media-evidence.

[5] Molly McDonough, First Thing Lawyer Tells New Clients: Shut Down Facebook Account, ABA Journal (February 9, 2010), http://www.abajournal.com/news/article/first_thing_lawyer_tells_new_clients_shut_down_facebook_account.

[6] John Lynch, Obtaining and Using Evidence from Social Networking Sites, http://www.wired.com/images_blogs/threatlevel/2010/03/social-networking-for-law-enforcement.pdf.

[7] Kim Zetter, Undercover Feds on Social Networking Sites Raise Questions, Wired (March 16, 2010), http://www.wired.com/threatlevel/2010/03/undercover-feds-on-facebook/.

[8] LexisNexis, Role of Social Media in Law Enforcement Significant and Growing (July 18, 2012), http://www.lexisnexis.com/media/press-release.aspx?id=1342623085481181.

[9] H. Christopher Boehning, Ethical Bounds of Using Evidence From Social Networks, New York Law Journal (August 4, 2011), http://www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id=1202509472767&Ethical_Bounds_of_Using_Evidence_From_Social_Networks&slreturn=1&hbxlogin=1.

[10] Mary P. Gallagher, When ‘Friending’ is Hostile, Daily Report (September 6, 2012), http://www.dailyreportonline.com/PubArticleDRO.jsp?id=1202570272827&thepage=1.

[11]Purvis v. Comm'r of Soc. Sec., 2011 U.S. Dist. LEXIS 18175, at 19-20, n.4 (D.N.J. Feb. 23, 2011).

[12] All social media providers have established procedures for reporting deceptive accounts and seeking removal of such accounts. See, e.g., http://www.facebook.com/help/263149623790594.

[13] Griffin v. State, 419 Md. 343, 354 (Md. 2011).

[14] Loporcaro v. City of New York, 35 Misc. 3d 1209A (N.Y. Sup. Ct. 2012); Richard Raysman, Authentication of Social Media Evidence, New York Law Journal (November 8, 2011); Martha L. Arias, INTERNET LAW – Authenticating Evidence Obtained from a Social Networking Profile, Internet Business Law Services, http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=2363.

[15] Katherine Minotti, The Advent of Digital Diaries: Implications of Social Networking Web Sites for the Legal Profession, 60 S.C. L. Rev. 1057, 1061 (2009); Allison L. Pannozzo, Uploading Guilt: Adding a Virtual Records Exception to the Federal Rules of Evidence, 44 Conn. L. Rev. 1695, 1697 (2012).

[16] Compare Griffin, 419 Md., at 363-365 (evidence not authenticated) and State v. Eleck, 130 Conn. App. 632, 642-644 (Conn. App. Ct. 2011) (evidence not authenticated) with Tienda v. State, 358 S.W.3d 633, 645 (Tex. Crim. App. 2012) (evidence properly authenticated) and Campbell v. State, 382 S.W.3d 545, 552 (Tex. App. Austin 2012) (evidence properly authenticated).

[17] United States v. Gagliardi, 506 F.3d 140, 151 (2d Cir. 2007).

[18] Tienda v. State, 358 S.W.3d 633.

[19] Griffin, 419 Md., at 357-358.

[20] FRE 801(c).

[21] Jack B. Weinstein, Weinstein’s Federal Evidence § 801.11[1], Matthew Bender 2d ed. (1999).

[22] Lorraine v. Markel Am. Ins. Co., 241 F.R.D. 534, 562 (D. Md. 2007).

[23] Lorraine, 241 F.R.D., at 565.

[24] FRE 803(3) and 801(d)(1)(A).

[25] Zachary G. Newman, The Reliability, Admissibility, and Power of Electronic Evidence, American Bar Association (January 25, 2011), http://apps.americanbar.org/litigation/committees/trialevidence/articles/012511-electronic-evidence.html.

[26] Kendall K. Hayden, The Proof is in the Posting: How Social Media is Changing the Law, 73 TEX. B. J. 188, 190 (2010).

[27] Schoen, 19 Com. Tr. Evid. 6. 

This article appeared in the March 2013 issue of The Metropolitan Corporate Counsel. 

The views and opinions expressed in this article are those of the author and do not necessarily reflect those of Sills Cummis & Gross P.C.  

HB Ad Slot
HB Ad Slot
HB Mobile Ad Slot
HB Ad Slot
HB Mobile Ad Slot
 
NLR Logo
We collaborate with the world's leading lawyers to deliver news tailored for you. Sign Up to receive our free e-Newsbulletins

 

Sign Up for e-NewsBulletins