Skip to main content
Tag

Authentication

Video Footage Evidence Fowler

Is a Video of a Video Admissible in a Criminal Trial?

By Evidence

Video Footage Evidence FowlerTechnology has dramatically changed the landscape of criminal law procedure, and ultimately criminal convictions, in Texas. Updated DNA testing exonerates the wrongly-accused, while incriminating the guilty. Traffic cameras are commonplace on Main Street, clocking speeding motorists who are subject to fines and penalties—and bad feelings. Recently in Arkansas, recordings from Amazon’s Echo artificial intelligence device have been used by prosecutors as evidence in a murder trial. As digital evidence evolves rapidly, so must the evidentiary rules supporting admissibility. In this late-breaking case, the Texas Court of Criminal Appeals considers one man’s conviction for theft and burglary vis a vis the admissibility of “picture only” video footage.

State v. Fowler (Tex. Crim. App. 2018)

Fresh Tire Marks Lead to a Suspicious Dollar Store Receipt

Law enforcement was called to the scene of a burglary at a business in Royse City, Texas. Police discovered disarray; cut wires, mangled cables, and bolt cutters were seized as evidence, but no suspects were apprehended. One month later, police were called to investigate the same scene for another burglary. This time, ATV tracks led police to a nearby field where they found a receipt from the local Family Dollar store mere feet away from a stolen ATV. Even more curious were the items listed on the receipt, which included duct tape and utility knives. Police used the date, time stamp, and the address on the receipt to request video footage from inside the store. Employees at Family Dollar provided investigators with time and date-stamped footage that corresponded with the receipt found at the scene of the crime. Police recorded the incriminating footage on their body cameras, as recording from a VHS cassette proved time-consuming and clunky. Although the footage was non-audio “picture only,” it showed a suspect purchasing the items that were reflected on the receipt found at the crime scene. Further, the footage time and date stamps placed the individual inside of Family Dollar at a certain time, on a particular day.

Leveraging all of the information learned from the receipts, the fact that the ATV was stolen, and the video footage, law enforcement soon had a suspect—Jamel Fowler. Fowler was convicted of theft of property for stealing the ATV and was sentenced by a jury to two years imprisonment. Fowler appealed. On appeal, the court reversed the trial court’s conviction and sentencing, holding that “trial court committed reversible error by admitting an unauthenticated videotape exhibit into evidence.” The State of Texas appealed to the Court of Criminal Appeals to determine whether prosecutors may prove authenticity of video footage without the testimony of someone who either witnessed what the video depicts or is familiar with the functioning of the recording device. In other words, is the video of a video at Family Dollar admissible as evidence against Fowler? In order to answer that question, the CCA looked to Texas Rule of Evidence 901.

Texas Rule of Evidence 901 and the Authenticity Requirement

Texas Rule of Evidence 901 governs the authentication requirement for the admissibility of evidence. Typically, to satisfy the requirement of authenticating evidence, the person offering the evidence must produce items or data sufficient to support a finding that the item or data is what the proponent claims it is.

“Authenticity may be established with evidence of distinctive characteristics and the like, which include [t]he appearance, contents, substance, internal patterns, or other distinctive characteristics of the item, taken together with all the circumstances.”

TEX. R. EVID. 901(b)(4); see Druery v. State, 225 S.W.3d 491, 502 (Tex. Crim. App. 2007). Conclusive proof of authenticity before allowing admission of disputed evidence is not required.

Applying Rule 901 to a “Picture Only” Video of a Video

May the proponent of a video sufficiently prove its authenticity without the testimony of someone who either witnessed what the video depicts or is familiar with the functioning of the recording device? The Court answers that, yes, it is possible, given the facts.

Here, the Court acknowledged the argument of the defense in the appeal: “The court of appeals’s point is well-taken—the State could have done more [to prove up the evidence presented]. However, even though the most common way to authenticate a video is through the testimony of a witness with personal knowledge who observed the scene, that is not the only way.”

The Court reasoned that video recordings without audio are treated as photographs and are properly authenticated when it can be proven that the images accurately represent the scene in question and are relevant to a disputed issue. Huffman v. State, 746 S.W.2d 212, 222 (Tex. Crim. App. 1988). The Court stated that (1) the officer’s in-person request of the manager of the Family Dollar store to pull the surveillance video on a certain date at a certain time; (2) that the distinctive characteristic that there is a date and time stamp on the videotape; and (3) the fact that the date and time on the videotape correspond to the date and time on the receipt that was found within three feet of the ATV; (4) the fact that the videotape pulled by the manager reveals Fowler at the store on that date at that time purchasing the items listed on the receipt that was found near the stolen ATV, were enough, together, to authenticate the video. The video was sufficiently authenticated to be admissible into evidence. The evidence strongly pointed to Fowler and, accordingly, his conviction was upheld.

Introducing Social Media Electronic Evidence at Trial

By Evidence

Laying the foundation for the admission of evidence can be tricky.  Often quite technical.  Even hypertechnical.  Depending on what you are trying to admit, you might need affidavits, chain of custody records, etc.  With the advancement of the internet, something trial lawyers of old did not even think about, there is more evidence out there.  Good evidence.  Sometimes really good evidence. Social media sites can provide a wealth of evidence for criminal trial lawyers on both sides of the aisle.

There are Facebook and MySpace friend lists and wall posts that can establish relationships and demonstrate motive or bias. Twitter feeds.  There is also a “check-in” feature on some sites that can show where someone was at a certain time.  What’s more, if you dig deep enough (usually with the help of a subpoena) a person’s private messages on Facebook or MySpace can be a treasure trove of information.  And let’s face it, many people on Facebook and MySpace have absolutely no filter.  Evidence galore.

One of the main problems with using social network media at trial is that ANYONE can create an account purporting to be anyone else.  Just check out the purported profiles for celebrities and you’ll see for yourself.  I seriously doubt Justin Timberlake has time to manage 20 different Facebook and MySpace profiles.

So, with this significant potential for fraud, how does a trial attorney go about authenticating and admitting this evidence at trial.  You might think that you need an affidavit from the social media company and the IP logs from the computer that created the account.  Indeed, you could get that sophisticated if you like.  But you don’t have too.   At least not in Texas.

The Texas Court of Criminal Appeals recently decided Tienda v. State, a case that dealt with this issue.  At trial, the State tried to introduce pieces of evidence obtained from the appellant’s purported MySpace accounts.  However, the state did not have IP logs showing which computer created the accounts or the hard drive of appellant’s computer or any other sophisticated computer evidence.  The State took the simple route.  It presented evidence obtained from MySpace showing which email address created the accounts. Then it presented evidence obtained from the MySpace profiles themselves (posts, music, photos, messages), which linked appellant (circumstantially) to the MySpace profiles.  They used a sponsoring witness that had been on the MySpace profiles and had seen the postings and pictures.  The trial court allowed the evidence over defense objection.

The CCA held that “a combination of facts…[was] sufficient to support a finding by a rational jury that the MySpace pages that the State offered into evidence were created by the appellant.” The CCA noted that under TRE 901(a), the proponent of the evidence need only make a threshold showing that would be sufficient to support a finding that the matter in question is what its proponent claims. “The ultimate question whether an item of evidence is what its proponent claims then becomes a question for the fact-finder – the jury, in a jury trial.” Electronic evidence, the CCA explained, may be authenticated in a number of different ways.  However, “simply showing than an email [or other electronic message] purports to come from a certain person’s email address…or that a text message emanates from a cell phone number assigned to the purported author…without more, has typically been regarded as [insufficient] to support a finding of authenticity.”

Ultimately, the CCA held in Tienda that there is no formula for admission of electronic evidence.  Each case should turn on its particular facts and the amount of circumstantial indicia of authenticity that is present.  The CCA cited a Maryland Court of Appeals opinion and seems to adopt the Maryland Court’s rationale regarding three instances that would satisfy the test for authenticity, but notes that the methods are not exclusive.

[T]he Maryland Court of Appeals recognized that such postings may readily be authenticated, explicitly identifying three non-exclusive methods. First, the proponent could present the testimony of a witness with knowledge; or, in other words, “ask the purported creator if she indeed created the profile and also if she added the posting in question.” That may not be possible where, as here, the State offers the evidence to be authenticated and the purported author is the defendant.  Second, the proponent could offer the results of an examination of the internet history or hard drive of the person who is claimed to have created the profile in question to determine whether that person’s personal computer was used to originate the evidence at issue.  Or, third, the proponent could produce information that would link the profile to the alleged person from the appropriate employee of the social networking website corporation.”

While that State failed, in the Tienda case, to use any of the methods articulated by the Maryland Court of Appeals, the CCA nonetheless held, that based on the circumstantial indicia of authenticity, the State created a prima facie case that would justify submitting the ultimate question of authenticity to the jury.

If you are thinking about introducing social network evidence or other electronic evidence, this case is a good one to read. As always, the war is waged at the trial level, because on appeal, the standard is abuse of discretion, which means, of course, that the trial court’s ruling is given great deference.