Skip to main content
Tag

Social Media

Facebook Evidence in a Criminal Case

Facebook Likes and Twitter Tweets as Evidence in a Criminal Case

By Criminal Defense

Facebook Evidence in a Criminal CaseIn the age of social media it seems more and more that our identities are being fast tied to what we post, like, love, or retweet on social media. Our firm handles criminal cases on a daily basis and in the course of our work we’ve seen an increasing reliance by law enforcement and prosecutors on social media websites like Facebook, Twitter, and Instagram. More often than not, investigators are scrolling through the entirety of a person’s social media profiles scouring the information for incriminating statements, pictures or conversations. A Facebook picture or an Instagram post that one might consider innocent, humorous, or obscure could end up being a key piece of evidence used against that person in a court of law.

Here’s what you need to know about social media and the law.

Anything you post on Facebook, Twitter, and Instagram can and will be used against you.

Period. The general rule that citizens need to know is that by exposing information about yourself on social media you are essentially waiving your privacy rights. A person can’t scream at the top of their lungs in an open room the most private fact about themselves and then expect it to go unheard. The same is true about social media. By posting on sites like Facebook, Twitter,and Instagram, you are essentially consenting to whatever information you disclose to be made public.  Even if your profile is set to private, your friends could end up sharing your content. Once public, that information is now available to everyone…including the government. If you are under investigation or suspect you might be under investigation for a criminal offense, and you have social media profiles, never post anything if you think it has even a remote possibility of hurting your case.

What can be done to protect my privacy on sites like Facebook, Twitter, and Instagram?

Don’t post! The first thing you can do is to place a limit and a premium on your social media activity. Some people feel like social media websites are the perfect forum for venting frustrations, making off-color jokes or personally attacking others. If you think about what you are posting in terms of who might potentially see your post, then you should limit the things you say. Remember, anything you post will be considered public information.  If the temptation is too strong to post on social media, then you should really consider disabling your account altogether (at least while your criminal case is pending).

Can Social Media Privacy Settings be used to protect my information?

Privacy settings are the second step in preventing the government or any other unwanted viewers from obtaining your social media information. The majority of the more popular social media websites allow you to limit who can see your information and what can be seen. Putting strict limits on who and what can be seen on your Facebook, Twitter, and Instagram pages can be very effective in preventing unwanted eyes. But is it enough? For the general public, yes, it is. Further, law enforcement agents typically do not have special privileges to see information that has been set to “private” either. But, there are other ways of getting your information and viewing your profiles. Law enforcement has been known to create fake profiles with attractive pictures to entice users into accepting friend requests and allowing them to view information intended for friends only. There is nothing that legally prevents law enforcement from taking such actions.

If my Facebook, Twitter, and Instagram accounts are set to “Private,” is that enough to protect my information?

Ultimately, no. Even if a person hasn’t unwittingly accepted a friend request from an officer or agent and has limited access to their profile via privacy settings, law enforcement can still get a subpoena, court order or search warrant for your social media information.

According to their website, Facebook will only disclose records in accordance with the Stored Communications Act (“SCA”), 18 U.S.C. Sections 2701-2712 and in response to:

  • A valid subpoena issued in connection with an official criminal investigation is required to compel the disclosure of basic subscriber records (defined in 18 U.S.C. Section 2703(c)(2)), which may include: name, length of service, credit card information, email address(es), and a recent login/logout IP address(es), if available.
  • A court order issued under 18 U.S.C. Section 2703(d) is required to compel the disclosure of certain records or other information pertaining to the account, not including contents of communications, which may include message headers and IP addresses, in addition to the basic subscriber records identified above.
  • A search warrant issued under the procedures described in the Federal Rules of Criminal Procedure or equivalent state warrant procedures upon a showing of probable cause is required to compel the disclosure of the stored contents of any account, which may include messages, photos, videos, wall posts, and location information.

So, even if your privacy settings won’t allow anyone to view your profile, law enforcement agencies may still be able to get that information by way of a subpoena, court order or search warrant.

Assume that unwanted eyes will see what you post on Twitter, Facebook, and Instagram.

If you’re under investigation for a criminal offense or charged with a criminal offense, you need to assume that unwanted eyes will see what you post on Twitter, Facebook, and Instagram. Our attorneys have handled cases involving cases where the government has used Facebook, Twitter, and Instagram postings against our clients. We don’t want that to happen to you. Call one of our attorneys and speak to us about what you can do to protect your information and ultimately your rights.

NOTE: The United States Supreme Court has confirmed that the police CANNOT search your cell phone to discover Social Media evidence, text messages, phone call, or anything else without a proper search warrant.

Introducing Social Media Electronic Evidence at Trial

By Evidence

Laying the foundation for the admission of evidence can be tricky.  Often quite technical.  Even hypertechnical.  Depending on what you are trying to admit, you might need affidavits, chain of custody records, etc.  With the advancement of the internet, something trial lawyers of old did not even think about, there is more evidence out there.  Good evidence.  Sometimes really good evidence. Social media sites can provide a wealth of evidence for criminal trial lawyers on both sides of the aisle.

There are Facebook and MySpace friend lists and wall posts that can establish relationships and demonstrate motive or bias. Twitter feeds.  There is also a “check-in” feature on some sites that can show where someone was at a certain time.  What’s more, if you dig deep enough (usually with the help of a subpoena) a person’s private messages on Facebook or MySpace can be a treasure trove of information.  And let’s face it, many people on Facebook and MySpace have absolutely no filter.  Evidence galore.

One of the main problems with using social network media at trial is that ANYONE can create an account purporting to be anyone else.  Just check out the purported profiles for celebrities and you’ll see for yourself.  I seriously doubt Justin Timberlake has time to manage 20 different Facebook and MySpace profiles.

So, with this significant potential for fraud, how does a trial attorney go about authenticating and admitting this evidence at trial.  You might think that you need an affidavit from the social media company and the IP logs from the computer that created the account.  Indeed, you could get that sophisticated if you like.  But you don’t have too.   At least not in Texas.

The Texas Court of Criminal Appeals recently decided Tienda v. State, a case that dealt with this issue.  At trial, the State tried to introduce pieces of evidence obtained from the appellant’s purported MySpace accounts.  However, the state did not have IP logs showing which computer created the accounts or the hard drive of appellant’s computer or any other sophisticated computer evidence.  The State took the simple route.  It presented evidence obtained from MySpace showing which email address created the accounts. Then it presented evidence obtained from the MySpace profiles themselves (posts, music, photos, messages), which linked appellant (circumstantially) to the MySpace profiles.  They used a sponsoring witness that had been on the MySpace profiles and had seen the postings and pictures.  The trial court allowed the evidence over defense objection.

The CCA held that “a combination of facts…[was] sufficient to support a finding by a rational jury that the MySpace pages that the State offered into evidence were created by the appellant.” The CCA noted that under TRE 901(a), the proponent of the evidence need only make a threshold showing that would be sufficient to support a finding that the matter in question is what its proponent claims. “The ultimate question whether an item of evidence is what its proponent claims then becomes a question for the fact-finder – the jury, in a jury trial.” Electronic evidence, the CCA explained, may be authenticated in a number of different ways.  However, “simply showing than an email [or other electronic message] purports to come from a certain person’s email address…or that a text message emanates from a cell phone number assigned to the purported author…without more, has typically been regarded as [insufficient] to support a finding of authenticity.”

Ultimately, the CCA held in Tienda that there is no formula for admission of electronic evidence.  Each case should turn on its particular facts and the amount of circumstantial indicia of authenticity that is present.  The CCA cited a Maryland Court of Appeals opinion and seems to adopt the Maryland Court’s rationale regarding three instances that would satisfy the test for authenticity, but notes that the methods are not exclusive.

[T]he Maryland Court of Appeals recognized that such postings may readily be authenticated, explicitly identifying three non-exclusive methods. First, the proponent could present the testimony of a witness with knowledge; or, in other words, “ask the purported creator if she indeed created the profile and also if she added the posting in question.” That may not be possible where, as here, the State offers the evidence to be authenticated and the purported author is the defendant.  Second, the proponent could offer the results of an examination of the internet history or hard drive of the person who is claimed to have created the profile in question to determine whether that person’s personal computer was used to originate the evidence at issue.  Or, third, the proponent could produce information that would link the profile to the alleged person from the appropriate employee of the social networking website corporation.”

While that State failed, in the Tienda case, to use any of the methods articulated by the Maryland Court of Appeals, the CCA nonetheless held, that based on the circumstantial indicia of authenticity, the State created a prima facie case that would justify submitting the ultimate question of authenticity to the jury.

If you are thinking about introducing social network evidence or other electronic evidence, this case is a good one to read. As always, the war is waged at the trial level, because on appeal, the standard is abuse of discretion, which means, of course, that the trial court’s ruling is given great deference.