Stored Communication Act (SCA) & Admissibility of Text Messages

A Defendant convicted of murder and attempted murder challenged the admission of three text messages at his trial. The Supreme Court of Arkansas found no error in admitting the text messages.

Texting-Hand

The Stored Communication Act

The Defendant challenged the admission of the text message content based on the Stored Communication Act. The SCA challenge included three separate arguments:

The State incorrectly used a prosecutor’s subpoena to obtain the text messages rather than a search warrant, as required by the SCA;

The Government’s acquisition of the substance of the text messages via subpoena violated his constitutional rights under the Fourth Amendment to the United States Constitution;

The State conducted an illegal search under the Arkansas Constitution.

Gulley, at *3.

The State argued the Defendant failed to preserve his claims under the SCA and State Constitution for appellate review. As to the 4th Amendment argument, the State claimed the argument was without merit because the text messages were procured by prosecutor’s subpoena pursuant to a statutory power granted to state prosecutors without any allegations of abuse of power. Gulley, at *4.

The Court agreed the Defendant failed to preserve the Stored Communication Act and the State illegal-search arguments for appeal. Gulley, at *4.

Admissibility of Text Messages

The Defendant challenged the admissibility of the text messages on hearsay and authentication grounds.

The hearsay argument quickly failed, because the issue preserved from the trial was another sender’s text messages on hearsay grounds, not from the Defendant’s text messages. As such, the Defendant could not change arguments on appeal, thus resulting in the hearsay argument being barred from review. Gulley, at *17-18.

However, there was enough of a challenge as to whether the Defendant sent the messages to preserve an authentication argument.

Arkansas Rule of Evidence 901(a) states that the “requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what the proponent claims.” Gulley, at *18. Moreover, “the testimony of a witness with knowledge that a matter is what it is claimed to be is sufficient to authenticate evidence, and also that appearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances can be used to authenticate evidence.” Gulley, at *19, citing Ark.R. Evid. 901(b)(1) &(4).

The Court reviewed each text message and held each was properly authentication by witnesses with knowledge, plus other circumstances showing authenticity. Gulley, at *19.

The first text message was properly admitted based on the testimony of three witnesses and the contents of the message, which demonstrated sufficient facts to authenticate the text message. Gulley, at *19-20.

The second message stated, “I’m getting dropped off over there.” One witness testified that the phone number was assigned to the Defendant and another witness testified to seeing the Defendant dropped off near the victim’s apartment before the murder. Based on the testimony and the timing of the message to the victim’s murder, the Court held authentication was proper. Gulley, at *20-21.

The third text message focused on the content of the message and witness testimony. The message included in part, “Dat’s okay too, I got a car out of the deal…” Gulley, at *21.

The witness testified that the Defendant had called her from the phone number that also sent her the text messages. Moreover, the witness knew the victim assisted the Defendant in financing a car, which was evidenced in the statement, “I got a car out of the deal.”

The Court held all the evidence was sufficient to authenticate the text messages were sent from the Defendant and each was properly admitted at trial. Gulley, at *21-22.

Bow Tie Thoughts

How we live surfaces in how we litigate. Additionally, while civil cases have addressed many eDiscovery issues, criminal cases have addressed admissibility issues of ESI.

Here is a very important take away from admissibility: the same rules of evidence apply to ESI just as they have applied to everything else for 200 years.

Text messages are one of the most common forms of ESI today. For example, teens are estimated to send 60 text messages a day (boys around 50; older girls around 100). Put in other terms, approximately 1.5 trillion text messages were sent in 2009. That number will only go up as more people have smartphones.

What does this mean for civil and criminal litigation? First, the ESI must be preserved. There are many technologies that can preserve text messages, from a collection directly off the phone, to texts backed up to a computer, to screen shots, to photos of the phone, to from the service provider. Second, attorneys cannot forget to request the ESI if text messages are relevant to a case. Third, the same rules of admissibility apply, just as they have applied for the last 200 years.

Text Messages as Party Admissions to Prove a Prima Facie Case

The Plaintiff in a sexual harassment case was able to demonstrate a prima facie case to overturn a summary judgment on the narrow issue whether she was retaliated against for filing her lawsuit.  Magiera v. City of Dallas, 2010 U.S. App. LEXIS 16802 (5th Cir. Tex. Aug. 11, 2010).

The key evidence? A text message.

One of the challenges to the summary judgment was whether there was sufficient evidence for a jury to find that the Plaintiff was removed from her field training officer (FTO) duties because of her sexual harassment complaint.  Magiera, at *9-10.

The Plaintiff’s removal from FTO duties meant she received less compensation.    Id.

The Defendant conceded in oral argument that the Plaintiff being removed from her FTO duties was a material adverse action. Id.  

Here is how the Plaintiff was able to show a prima facie case:  A sergeant testified that her supervising lieutenant stated that the Plaintiff was not on FTO because another lieutenant was “angry” the Plaintiff had filed her lawsuit.  Magiera, at *10.

The same sergeant sent the Plaintiff the following text message:    

“I was told by [W]oodbury that [B]arnard said you had a law suit against the city and you shouldnt [sic] train because of the suit.”

Magiera, at *10.

The Plaintiff argued that the statements in text message evidenced the retaliation for her lawsuit.  Magiera, at *10.

The Defendant challenged the text message as not competent summary judgment evidence, because it was hearsay.  Magiera, at *10-11. 

The Plaintiff argued that the statement was admissible as a party admission, under Federal Rule of Evidence Rule 801(d)(2)(D).

The Party Admission Rule states that an admission by a party-opponent is not hearsay, if “[t]he statement is offered against a party and is . . . a statement by the party’s agent or servant concerning a matter within the scope of the agency or employment, made during the existence of the relationship.”  Magiera, at *11, citing Federal Rule of Evidence Rule 801(d)(2)(D).

The Court agreed.  The Lieutenant who made the statement (if it was true) was speaking in the course of his employment, which would make the statement admissible as a party admission.  Magiera, at *11.

The Court held that the Plaintiff made a prima facie case on the retaliation claim and reversed and remanded on those specific grounds.  Magiera, at *15-16. 

Bow Tie Thoughts

Text messages are quick and easy to send.  Attorneys should not overlook requesting text messages in discovery, there could be a smoking gun to make your case…or at least survive a motion for summary judgment.

5150 Texting, Drinking & Guns Don’t Match

A man was prohibited from owning fire arms and appealed the decision.  The road leading up to the gun ban started on November 2, 2008…after fighting and texting with his girlfriend.  People v. Akers, 2010 Cal. App. Unpub. LEXIS 102 (Cal. App. 4th Dist. Jan. 7, 2010).

The Petitioner, while drinking and having a history of bipolar disorder, sent his girlfriend text messages where he threatened to kill himself. 

The girlfriend called the police after getting the text messages.  Akers, at *1.

The Police found the Petitioner walking the streets very late at night with a loaded .40-caliber handgun.  Akers, at *1-2. 

The Petitioner was held over night in a  psychiatric hospital pursuant to the California “5150” statute, which allows the police to take someone into custody who is a danger to himself or others for up to 72 hours at a state approved mental hospital.  Akers, at *2. (For the 1980s music fans, the statute inspired the title to the first Van Halen album with Sammy Hagar).

The police confiscated the Petitioner’s handgun…along with three other guns in his apartment. 

Johnny Get Your Guns

The Petitioner moved the court to return his guns, six weeks after being detained, claiming he was on his bipolar medication and his text messages were an “error of judgment” to get attention from his girlfriend.  Akers, at *4. 

The Trial Court did not agree.  The Trial Court found the petition to return the Moving Party’s guns, being only weeks after the 5150 texting episode, as being premature to determine if it was safe for him to have four guns.  Akers, at *5. 

The Court of Appeals upheld the Trial Court’s findings.  The Court of Appeals found that just not enough time had passed since the  Petitioner’s texts threatening suicide, him walking the streets armed with a load gun while intoxicated and the ending of his stressful relationship.  Akers, at *6-8. 

To put it bluntly, six weeks was not enough time to give him back four guns.

Bow Tie Thoughts

The key evidence alerting the Petitioner’s former girlfriend and police that the Petitioner was possibly a danger to himself were his text messages.  While the opinion is silent on how the text messages were collected, it most likely was with a device seizure tool or produced by the cell phone provider. 

More importantly, the Court of Appeals did not simply refer to the text messages as text messages, but as “communications.”  Akers, at *7.  Seeing a Court recognize the data not merely as electronically stored information but as a communication continues the judicial recognition of our society’s digital evolution.

Classy Text Messages from a Collection Agency

In Hartung v J.D. Byrider of Chandler, et al., 2009 U.S. Dist. Lexis 54415 (2009), the Plaintiff got behind on car payments.  As one would expect, a collection agency became involved. 

As one would not expect, the representative from the Collection agency called T-Mobile, claimed he was Plaintiff’s father and asked to be added to her cell phone account.

The Collection agency representative then began making harassing phone calls and texting to Plaintiff. A total of 17 text messages over 5 days that were sent, that the Court called angry, menacing & intimidating. The representative also claimed he was a lawyer and would have her arrested. 

Below are selected text messages from the Collection Agency Representative:

“[Y]ou have various bills going to crows landing. I can tell by talking to you you’re smarter than this. So [sic] I guess we’ll see.”

“you [sic] might want to tell your amigo Rudy to get a job, I just faxed maricopa [sic] paperwork to stanislaus sheriff department [sic].”

“Calling [sic] me will not help you. Park the car [sic] tell Rudy to warm up the Impala.“

“[I]t upsets me a smart girl like you is iwith [sic] a guy is [sic] doing nothing at 11:30 a.m. but when he doesn’t have a free car he’ll leave.”

“[M]ake sure and have the [sic] deputy call me, nad [sic] show him your DL too.”

“[T]he guy in [G]eorgia has been removed from the case. Now its my entire staff versus you.”

As for how the Court handled the disposition of the case, watch the summary from “Textual Relations,” presented at the Paraben Forensic Innovation Conference.

The Low Speed Chase that Gives Us Admissible Cell Phone Photo after a Warrantless Search

A police officer stopped a car driving with a flat tire, cracked windshield and its bright lights on.  People v. Gorostiza, 2009 Cal. App. Unpub. Lexis 9494 at *1.  

The passengers might have been hoping, “There is nothing to see here.” 

After stopping the car with the Defendant and two passengers, the Defendant drove away from the stopping officer while the police officer opened the car door.  As one can suspect, the police officer engaged in a low speed chase.

The Defendant again tried to start another low speed chase after being stopped a second time, but the car would not re-start.  One passenger escaped on foot after the car was stopped.  Gorostiza, at *2.  The owner of the car, one of the passengers but not the driver, gave consent to search the car. 

Search Incident of Arrest of Cell Phone Photos

The police found a loaded pistol-grip 12-shot gun during the search of the car.  Two cell phones were also found, one with a dead battery and the other in the driver’s area. Gorostiza, at *3.

The police officer opened the working cell phone and saw a photo that resembled the Defendant holding the shotgun found in the car.  Gorostiza, at *3. 

The police officer accessed the cell phone menu and opened the “My Albums” folder.  Id.   The police officer found two additional photos of the Defendant holding the gun.  Id.

The Defendant claimed the photos were not of him and he was being framed when questioned on the cell phone photos. Gorostiza, at *3-4.

 

Investigation and Search of the Cell Phone

Another investigating police officer sent the cell phone photos via MSS message to another investigating officer’s email.  The cell phone photos were printed and used at the criminal trial of the Defendant.  Gorostiza, at *5. 

Where the Cell Phone Photos Properly Admitted?

The Defendant tried to suppress the cell phone photos, claiming an improper search incident of arrest because the cell phone was “not a container” or part of a person.  Gorostiza, at *5.   The Defense further argued the cell phone deserved “heighten protection.”  Gorostiza, at *5.

The Court, as a preliminary matter, found the Defendant had a reasonable expectation of privacy in one of the cell phones because the police officer had knowledge the phone belonged to the Defendant.  Gorostiza, at *6-7.

The Court found the search of the car that found the shotgun was proper, because the police officer had permission to search the car by the owner. Gorostiza, at *7. 

The cell phone was found in a leather case, which at the time had unknown contents.  The image of the Defendant holding the gun was visible once removed from the leather case.  Gorostiza, at *7.

The Court held that the photo that was seen on the cell phone screen was a proper search, because it was found in a “closed container” during a valid search after the owner gave permission to search. Gorostiza, at *8.

Dodging the Bigger Issue

The bigger issue was whether the police officer conducted a proper search of the cell phone by exploring the menu items and additional photos in a sub-folder.  Did the consensual search of the car allow the police officer to search for additional photos on the phone? 

The Court dodged these issues, noting that two additional photos were very similar to the first photo found pursuant to a valid search.  The Court stated:

Because the admission of the additional photographs seized during the further search of the cell phone was not prejudicial, we need not determine additional questions raised by the defendant in his argument. For example, we need not determine if the consent extended to a search of the electronic contents of the telephone, we need not determine if cell phones are subject to heightened privacy interests, and we need not determine if Preis’s [the police officer] knowledge that the telephone belonged to defendant should have curtailed his search of the interior of the cell phone. Gorostiza, at *13.

Bow Tie Thoughts

The issue of whether a cell phone has heightened protection during a search will one day be decided.  More importantly, whether searching the menu features of a cell phone would be a valid search in similar facts.  This case may have addressed these issues if the photos had been different, such as firing the gun in a different location, or perhaps committing an act of vandalism or other crime. 

I am very glad this is an unpublished opinion because of the preservation methods used by the police. The collection was potentially problematic because the State used no forensic or defensible tools to collect the cell phone photos.  While the State’s actions were likely acceptable in sending the photos to a police officer, it carried risk. 

The collection methodology of sending a MSS message of the photo from the defendant’s phone to an investigating officer can open an ugly can of worms of destroying data, which could cause a mistrial or severely undermine a prosecutor’s case.  It could provide an entertaining cross-examination by a defense attorney on what procedures were undertaken to ensure the defensibility of the evidence, especially if the defense offered a collection expert to discuss proper procedures to preserve cell phone evidence. 

Products from Paraben Corporation are specifically designed for forensically imaging cell phone contents [Bow Tie Note: D4 is business partners with Paraben Corporation].  These products are currently being used by electronic discovery specialists, law enforcement, and even the US military in Iraq imaging the cell phones of insurgents who use cell phones to trigger road side bombs.  Other products are also on the market.  When proper tools are commercially available, why risk destroying key evidence by sending text messages from the defendant’s phone during an investigation?

Bad Romance e-Discovery Style: Text Messages in an Ugly Break Up

Discussion of In re C. C., 2009 Cal. App. LEXIS 1715 (Cal. App. 3d Dist. Oct. 27, 2009) at the Paraben Forensic Innovation Conference.

The case involved a bad high school break-up, where the teenage boy sent vulgar text messages venting anger to ex-girlfriend.

The Juvenile Court took words from the text messages out of contents and found texts were 1) threatening and 2) obscene.

The Court on appeal held text messages were neither threatening nor obscene.  The Court found the texts did not threaten any physical harm, as required by statute. Furthermore, the text messages in context did not qualify as obscene. As such, the case was reversed for lack of substantial evidence.

Bribing Witnesses with Text Messages, Cell Phones and Fake Email Accounts

Sometimes there are fact patterns that surprise you how far we have come with technology and the foolishness of people. 

In People v. McInnis, the Defendant was convicted of attempted witness bribery.  The Defendant attempted to keep witnesses from testifying against the Defendant’s nephew, in the nephew’s trial for robbery and kidnapping.  People v. McInnis, 2009 Cal. App. Unpub. LEXIS 9046 (California Unpublished Opinions 2009).

The basis of the Defendant’s appeal was based on alleged “outrageous governmental conduct” by a police investigating officer. 

The Court upheld the conviction. 

The Bribe

One of the victims in the robbery and kidnapping case received the following letter with a cell phone number to call:

“The purpose of this letter and its contents is to compensate you for your initial loss that occurred as a result of the robbery. I believe you have at least 1 Thousand reasons to be compensated for your pain and suffering. However, I feel that because you are the true victim in this crime, you deserve much more compensation for your pain and suffering. While it’s obvious that the defendants don’t have the ability to adequately compensate you, I do have the ability to do so on their behalf.”

“Obviously this correspondence and agreement has to be kept confidential and not disclosed or shared with the District Attorney or Police. . . . Remember the District Attorney works for the people (you & me) and you have every right to tell the DA you don’t want to testify and he can’t force or threaten you to.” McInnis, at *2-3.

The letter ended with “there are at least 25 thousand reasons why you would like to immediately settle the case in a civil manner instead of being a witness in a criminal court.” McInnis, at *3.

The victim turned over the letter to the authorities who launched an investigation.

Other letters were sent to the two victims offering $50,000 to settle the criminal suit against the Defendant’s nephew.  McInnis, at *5 (which should send ethics lawyers into orbit).

The investigating police officer left multiple phone messages with the number on the letter. A text message was sent to the investigating officer saying, “Leave me a message with your questions. I am going to send the money, I swear.”  McInnis, at *6.

Tracking Down a Cell Phone

The police investigation in tracking down the Defendant’s cell phone was a case study of how far we have come with technology.

The police officer was able to trace the exact sale date of the cell phone, the cell phone carrier (Virgin Mobile), the fake purchase name (Joe Gift), the store it was purchased from (Radio Shack), and that it was activated at a FedEx Kinko’s near the store where the Defendant purchased the phone.  McInnis, at *6-7.

Virgin Mobile indicated the specific time, down to the minute, the cell phone number had been activated, including the fake name used for the Yahoo! email address.  McInnis, at *7.

The police officer used “Yahoo! Emergency Disclosure Request Form” to determine the identity of the Yahoo! subscriber. McInnis, at *7.

The investigation showed the IP address where the account was activated was a FedEx Kinko’s in Los Gatos, California.  McInnis, at *7.  From there, the police were able to review the store security cameras and identify the Defendant later in Court. McInnis, at *7.

“Outrageous Conduct”

The “outrageous conduct” was the police officer overstating the threat against the victims on  “Yahoo! Emergency Disclosure Request Form.”  While the officer exaggerated the danger, the Court found this was not shocking conduct that rose to the level of “outrageous conduct.”  McInnis, at *21-21. 

What is Interesting about This Case…

Tracking down a suspect by IP addresses, fake email names and security video sounds like something out of “24.” These electronic finger prints are all markers of electronically stored information.  Just as civil litigation is dealing with “forms of production,” criminal law have also adopted to the Digital Age.