COMMONWEALTH OF PENNSYLVANIA v. DANIEL TALLEY
No. 2627 EDA 2018
Superior Court of Pennsylvania
July 17, 2020
2020 PA Super 171
Appeal from the Judgment of Sentence Entered August 24, 2018 In the Court of Common Pleas of Montgomery County Criminal Division at No(s): CP-46-CR-0005241-2017
BEFORE: BOWES, J., OLSON, J., and FORD ELLIOTT, P.J.E.
FILED JULY 17, 2020
Appellant, Daniel Talley, appeals from the judgment of sentence entered on August 24, 2018 in the Criminal Division of the Court of Common Pleas of Montgomery County. We affirm.
The trial court summarized the factual and procedural history of this case as follows.
In March 2016, Christa Nesbitt met [Appellant] while working as a waitress at the Whistle Stop diner in Oreland, Pennsylvania. [Appellant] regularly frequented the diner and began a romantic relationship with Ms. Nesbitt in the spring of 2016. In September 2016, Ms. Nesbitt and her daughter, [R.N.], moved into [Appellant‘s] house. Ms. Nesbitt eventually broke up with [Appellant] and moved out of [Appellant‘s] home on May 27, 2017. The following day[,] Ms. Nesbitt began to receive threatening and harassing text messages and [electronic-mails (“e-mails“)] from unfamiliar addresses. The messages came from e-mail addresses including, inter alia, “maxkillin@gmx.com” and “nastybtch@cumof... .” Ms. Nesbitt stated that she had never received such messages prior to leaving [Appellant] and did not know of any grudges that anyone else might hold toward her at that time.
The subject messages repeatedly referred to Ms. Nesbitt in a vulgar and derogatory manner and included threats such as “I was up da stret from ur hous my gun was loaded nd I was going to end everythin we cld die 2getter,” “ur time is runin out slut u stole dat kid from me u never be safe u slut.” The sender of these messages ostensibly intended for Ms. Nesbitt to believe the messages were being sent from [R.N.‘s] biological father, [Korey McClellan]. Ms. Nesbitt testified there was no animosity between her and Mr. McClellan at the time these messages were sent. Some of the messages were received while Mr. McClellan was in her presence and she did not observe him sending any
messages at those times. Mr. McClellan also denied sending any such messages. Mr. McClellan stated that he harbored no ill will or animosity toward Ms. Nesbitt after their relationship ended. On June 2, 2017, Ms. Nesbitt received a text message saying that the sender was observing her at a Friendly‘s restaurant. Ms. Nesbitt was, in fact, at a Friendly‘s restaurant with her daughter and a friend when she received this text message. Ms. Nesbitt went to the Springfield Police Department to report this incident. An investigation of her [telephone] by Detective Robert Chiarlanza revealed that an application on her [telephone], unbeknownst to her, was sharing her location with “Daniel Talley.”
Ms. Nesbitt continued to receive vulgar, harassing and, at times, threatening text messages every day, multiple times a day until approximately mid-July 2017. She estimated that she received hundreds of messages of this nature during that time. The messages referenced elements of [Appellant‘s] and Ms. Nesbitt‘s prior sexual relationship that only [Appellant] knew about, such as when [Appellant] would pressure Ms. Nesbitt to have anal sex with him. The messages also used expressions that were specific to [Appellant], such as “fake love,” an expression [Appellant] would often use when accusing Ms. Nesbitt of cheating on him. Ms. Nesbitt repeatedly asked the sender of the messages to stop sending her messages. On June 14, 2017, Detective Chiarlanza confronted [Appellant] at his home and warned him to stop sending Ms. Nesbitt threatening and harassing text messages.
On June 19, 2017, Ms. Nesbitt received a message with the subject “Tick tock” which read, in part, “It gonna happen, slut. You gonna pay. Comin’ soon mybe on Fox stet. You seem to like it der.” Ashley-Lynn Donnelly, a friend and neighbor of Ms. Nesbitt, testified that on the night of June 19, 2017, between 11:30 p.m. and midnight, she was sitting on a neighbor‘s porch on Plymouth Avenue when she saw [Appellant‘s] truck idling [without its headlights]. It began driving up and down Plymouth Avenue. After passing her a third time, she heard two loud bangs and she then went inside. She suspected these bangs may have been gunshots. Ms. Donnelly sent Ms. Nesbitt a text that night [saying] that [Appellant‘s] truck was near Ms. Nesbitt‘s parent‘s house where Ms. Nesbitt was staying. The following day, June 20, 2017, Ms. Nesbitt noticed a bullet hole in her vehicle.
On June 20, 2017, Detective Chiarlanza went to investigate a report that a car was shot on Plymouth Avenue. His investigation revealed that “there was a bullet hole on the driver‘s side that entered into the passenger compartment behind the rear door.” A small bullet fragment was recovered from the rear passenger compartment of the vehicle. That same day the police obtained and executed two search warrants for [Appellant‘s] home and an arrest warrant for [Appellant]. [Appellant] was in the driveway of his residence next to his truck armed with a loaded Kel-Tec .380 semiautomatic pistol when the police arrived. Detective Chiarlanza testified the gun in [Appellant‘s] possession was capable of producing a bullet hole similar to the one found in Ms. Nesbitt‘s vehicle.
Investigation of [Appellant‘s] home revealed a security camera. The video from the night of June 19, 2017 showed [Appellant] entering his home at 11:56 p.m., shortly after the time Ms. Donnelly testified [Appellant] was driving his truck on Plymouth Avenue when she heard two loud bangs. [Appellant] lived only a few blocks from where the shooting
occurred and had time to return home within a few minutes of the shooting. A search of [Appellant‘s] computer revealed that he had searched the internet for terms including, inter alia, “VPN [Virtual Private Network],” “Torproject.org” and “Private Internet access.” [Appellant] had searched for these terms on June 16, 2017, two days after Detective Chiarlanza first visited [Appellant‘s] house. Using a VPN and Tor, a web browser, allows a person to [conduct anonymous searches] or hide their online presence and activity. [Appellant] also had a virtual machine installed on his computer allowing him to conceal any activity conducted on that computer by completely compartmentalizing that activity within the virtual machine so that it could later be deleted without a trace. Analysis of [Appellant‘s] computer further revealed that he had been learning how to send e-mails from fictionalized e-mail addresses to cellular telephone numbers using a website. There was also evidence that on June 20, 2017, [Appellant] accessed the online schedule that Ms. Nesbitt used for her job.
An extraction of [Appellant‘s cellular telephone] data revealed deleted text messages to a David Wolf which included, inter alia, a message asking “Is there a way to spam a [cellular telephone] with so many texts and call[s] it just totally fucks it up?” When Mr. Wolf responded that this would likely be illegal and could easily be traced, [Appellant] stated “That‘s what TOR is for.” Mr. Wolf then responded, “I guess. Then you‘d have to find an online script that sends SMS [short message service] anonymously, and will accept input from an anonymized browser.”
Ms. Nesbitt did not receive any more threatening or harassing messages after [Appellant‘s] arrest on July 18, 2017 when he no longer had access to [cellular telephones] or computers.
[Appellant testified in his own defense and] denied sending any of the subject messages[. He also] testified that such messages had been coming from Mr. McClellan for months before [Appellant‘s] breakup with Ms. Nesbitt. He testified that there was animosity between Ms. Nesbitt and Mr. McClellan and that Ms. Nesbitt was afraid of Mr. McClellan. [Appellant] also testified that the virtual machine installed on his computer was to avoid viruses when his daughter used the computer to play games. The VPN, he explained, was required for work. Detective Chiarlanza testified in rebuttal that based on his experience and similar investigations it was not feasible the VPN software [Appellant] installed on his computer was being used for [Appellant‘s] employment.
On July 26, 2018, the jury found [Appellant] guilty of [two counts of] stalking[, pursuant to
18 Pa.C.S.A. § 2709.1(a)(1) and§ 2709.1(a)(2) ,] and [one count each of] terroristic threats [(18 Pa.C.S.A. § 2706(a)(1) )] and harassment [(18 Pa.C.S.A. § 2709(a)(2) ),] but deadlocked on the charges of recklessly endangering another person and simple assault. [Appellant] was sentenced on August 24, 2018. On August 30, 2018, [Appellant] filed a notice of appeal to [this Court]. On September 5, 2018, the [trial] court ordered [Appellant] to file a concise statement of [errors] complained of on appeal in accordance withPa.R.A.P. 1925(b) . On October 1, 2018, the [trial] court granted [Appellant] an extension of time to file his [Rule 1925(b) ] concise statement. On October 23, 2018, [Appellant] filed a concise statement of [errors] complained of on appeal. On October 25, 2018, [Appellant] filed an amended concisestatement. [The trial court issued its opinion on December 14, 2018.]
Trial Court Opinion, 12/14/18, at 1-6.
Appellant‘s brief identifies three issues for our review:
Does Article 1, § 14 of the Pennsylvania Constitution violate the Due Process Clauses of the United States Constitution both facially and as applied against [Appellant]?
[Do] concurrent sentences based upon [convictions under] the two subsections of
18 Pa.C.S.A. [§] 2709.1(a) [(proscribing differing forms of stalking)] constitute double punishment [for] the same statutorily proscribed conduct and thus an illegal sentence?Was the admission of screenshots of text messages and emails an abuse of discretion and a misapplication of the Best Evidence Rule as codified by the
Pennsylvania Rules of Evidence 1001 -1004 ?
Appellant‘s Brief at 2-3.1
Appellant‘s first issue alleges that he was wrongfully detained prior to trial pursuant to Article 1, § 14 of the Pennsylvania Constitution.2 Specifically, Appellant asserts that Article 1, § 14 of the Pennsylvania Constitution3 violates, both facially and as applied, the procedural and substantive components of the due process clauses of the Fifth and Fourteenth Amendments of the United States Constitution. Appellant maintains that Article 1, § 14 affords insufficient procedures to enable a judicial officer to evaluate the likelihood of potential danger posed by a detainee. See Appellant‘s Brief at 32-44 and 45-47. Because of these procedural deficiencies, Appellant further contends that Article 1, § 14 is excessive in relation to the regulatory goal of pre-trial detention predicated upon an identified threat an arrestee poses toward an individual or the community. See id. at 47-54. The Commonwealth asserts that Appellant waived his federal due process claims. See Commonwealth Brief at 8-9 and 20-24. After careful consideration, we agree with the Commonwealth that Appellant failed to preserve his federal due process challenges for appellate review.
A brief review of the relevant factual history is essential to our resolution of this claim. Police officials arrested Appellant on July 18, 2017 and a criminal complaint was filed on August 7, 2017. Appellant‘s bail was set at $250,000.00. On January 8, 2018, Appellant moved for release on nominal bail. The motion alleged that Appellant was entitled to relief pursuant to
The trial court heard oral argument on Appellant‘s nominal bail motion on May 1, 2018. At oral argument, the Commonwealth conceded that Appellant had been incarcerated for more than 180 days since the filing of the criminal complaint. In addition, defense counsel conceded that the court, in deciding the motion, could consider the affidavit of probable cause filed in support of the charges against Appellant. On May 9, 2018, the trial court denied Appellant‘s motion for release on nominal bail, concluding that no condition, or combination of conditions, could ensure the safety of the community or Ms. Nesbitt. See Trial Court Opinion, 12/14/18, at 7. Appellant, on May 11, 2018, moved for reconsideration of the trial court‘s denial of his nominal bail motion. Among other contentions, Appellant‘s motion for reconsideration raised constitutional challenges based upon Article 1, § 13 of the Pennsylvania Constitution (prohibiting excessive bail and fines and infliction of cruel punishments) and the Eighth Amendment to the United States Constitution (prohibiting cruel and unusual punishments). The trial court entertained argument on Appellant‘s reconsidered motion on June 28, 2018 and denied the motion on July 11, 2018.
The certified record confirms that Appellant waived appellate review of his federal due process claims challenging the validity of Article 1, § 14 of the Pennsylvania Constitution. Critically, the record reflects that Appellant never raised these federal constitutional challenges in his original motion for nominal bail, the hearing on that motion, his motion for reconsideration, or at argument on the reconsidered motion. In fact, Appellant first raised his procedural and substantive due process claims in his October 23, 2018 concise statement, which he filed after his notice of appeal. Because Appellant did not properly preserve his federal due process challenges before the trial court, he cannot litigate them for the first time on appeal. See
To the extent Appellant‘s brief develops a claim alleging that the trial court improperly denied nominal bail pursuant to
“In evaluating Rule 600 issues, our standard of review of a trial court‘s decision is whether the trial court abused its discretion.” Commonwealth v. Hunt, 858 A.2d 1234, 1238 (Pa. Super. 2004) (en banc). Our scope of review is limited to the findings of the trial court and the evidence of record generated at the Rule 600 evidentiary hearing, which we view in the light most favorable to the prevailing party. Id. at 1238-1239.
[W]hen a defendant is held in pretrial incarceration beyond the time set forth in paragraph (B), at any time before trial, the defendant‘s attorney, or the defendant if unrepresented, may file a written motion requesting that the defendant be released immediately on nominal bail subject to any nonmonetary conditions of bail imposed by the court as permitted by law. A copy of the motion shall be served on the attorney for the Commonwealth concurrently with filing. The judge shall conduct a hearing on the motion.
In its
Given the nature of the allegations in this case and the substantial evidence that appeared in the affidavit of probable cause supporting the complaint, the court determined that no combination of conditions could ensure the safety of the community and in particular the victim, Christa Nesbitt. This was based on the escalating pattern of threatening and harassing messages received by Ms. Nesbitt, including mention of firearms and death threats against Ms. Nesbitt. There was substantial circumstantial evidence in the affidavit of probable cause linking [Appellant] to these messages, including forensic analysis of his computer and [cellular telephones] that revealed research into “spamming” a [telephone] with text messages, researching online when text messages become criminal harassment, and concerted efforts to anonymize his online activity. More significantly, Ms. Nesbitt‘s vehicle was shot on the night of June 19, 2017 and a witness placed [Appellant‘s] vehicle at the scene immediately before a loud bang was heard. [Appellant] was arrested on June 20, 2017 and released on bail on June 22, 2017. The harassing and threatening messages stopped while [Appellant] was in jail but resumed
within an hour of [Appellant‘s] release on bail. The vulgar and threatening messages continued until July 12, 2017, just days before [Appellant] was again arrested on July 18, 2017. The court concluded the totality of circumstances indicated that [Appellant] likely was the author of these threatening messages, was physically stalking [Ms. Nesbitt,] and fired a bullet into her car. There was no combination of conditions within the court‘s power that could ensure the safety of Ms. Nesbitt and the community.A Accordingly, the court properly denied [Appellant‘s] motion for release on nominal bail.
Trial Court Opinion, 12/14/18, at 7-8.
We cannot agree with Appellant that the Commonwealth failed to demonstrate that no condition or combination of conditions could ensure the safety of the community or Ms. Nesbitt. Appellant‘s claim that the Commonwealth failed to meet its burden rests on his contention that the prosecution produced no witnesses or other evidence at the
In his second claim, Appellant asserts that he received an illegal sentence when the trial court imposed separate punishments for each of his two stalking convictions. Following trial, the jury found Appellant guilty of one count of stalking pursuant to
The merger of crimes for sentencing purposes is governed by the following principles and standard of review.
Whether [a]ppellant‘s convictions merge for sentencing is a question implicating the legality of [a]ppellant‘s sentence. Consequently, our standard of review is de novo and the scope of our review is plenary. See Commonwealth v. Collins, 764 A.2d 1056, 1057, n.1 (Pa. 2001)[.]
[
42 Pa.C.S.A. § 9765 ] provides:§ 9765. Merger of sentences
No crimes shall merge for sentencing purposes unless the crimes arise from a single criminal act and all of the statutory elements of one offense are included in the statutory elements of the other offense. Where crimes merge for sentencing purposes, the court may sentence the defendant only on the higher graded offense.
42 Pa.C.S.[A.] § 9765 .
The statute‘s mandate is clear. It prohibits merger unless two distinct facts
In relevant part, the Crimes Code defines the offense of stalking as follows:
§ 2709.1. Stalking
(a) Offense defined.--A person commits the crime of stalking when the person either:
(1) engages in a course of conduct or repeatedly commits acts toward another person, including following the person without proper authority, under circumstances which demonstrate either an intent to place such other person in reasonable fear of bodily injury or to cause substantial emotional distress to such other person; or
(2) engages in a course of conduct or repeatedly communicates to another person under circumstances which demonstrate or communicate either an intent to place such other person in reasonable fear of bodily injury or to cause substantial emotional distress to such other person.
Here, the two variants of stalking defined at
As the plain language of
In addition, the plain text of
We have carefully reviewed the notes of testimony from Appellant‘s trial, together with the statutory language defining the offense of stalking at
Appellant‘s final claim asserts that the trial court erred and/or abused its discretion in admitting “screenshots,” or photographs of the text messages depicted on Ms. Nesbitt‘s cellular telephone, in contravention of the best evidence rule as adopted in
We apply the following standard and scope of review when reviewing a challenge to a trial court‘s evidentiary rulings.
When we review a trial court ruling on admission of evidence, we must acknowledge that decisions on admissibility are within the sound discretion of the trial court and will not be overturned absent an abuse of discretion or misapplication of law. In addition, for a ruling on evidence to constitute reversible error, it must have been harmful or prejudicial to the complaining party.
An abuse of discretion is not merely an error of judgment, but if in reaching a conclusion the law is overridden or misapplied, or the judgment exercised is manifestly unreasonable, or the result of partiality, prejudice, bias or ill-will, as shown by the evidence or the record, discretion is abused.
Geise v. Nationwide Life and Annuity Co. of America, 939 A.2d 409, 417 (Pa. Super. 2007) (internal citations and quotations omitted).
We begin with an overview of the relevant principles that govern Appellant‘s challenge. The common law best evidence rule is presently codified at
This rule corresponds to the common law “best evidence rule.” See Hera v. McCormick, 625 A.2d 682 (Pa. Super. 1993). [C]ommentators have [identified] four reasons justifying the rule.
(1) The exact words of many documents, especially operative or dispositive documents, such as deeds, wills or contracts, are so important in determining a party‘s rights accruing under those documents.
(2) Secondary evidence of the contents of documents, whether copies or testimony, is susceptible to inaccuracy.
(3) The rule inhibits fraud because it allows the parties to examine the original documents to detect alterations and erroneous testimony about the contents of the document.
Although no definitive test determines when a writing is related to a controlling issue because a party must prove its contents, writings that are viewed as “operative or dispositive” have usually been considered subject to the rule. See
Here, the Commonwealth offered the screenshots to prove Appellant‘s culpability in harassing and stalking Ms. Nesbitt. For this reason, as discussed more fully below, we conclude that the screenshots were central to certain controlling issues in the case and that the best evidence rule governed their admission relevant to those issues at trial.
(4) The appearance of the original may furnish information as to its authenticity.
To recount, Appellant‘s claim is that the best evidence rule required the Commonwealth to produce original versions of the text messages or, failing that, duplicate copies that accurately reproduced the originals. Appellant contrasts the screenshots of Ms. Nesbitt‘s telephone against full forensic downloads such as those performed on Appellant‘s cellular telephone.10 Appellant points out that while the forensic downloads showed the status of a message (e.g. read or not read), the date and time the messages was read, from whom and to whom the messages was sent (including the name and telephone number), the source (e.g. iMessage), the name of the
In the alternative, Appellant argues that even if the challenged screenshots qualified as duplicates, they nevertheless should not have been admitted. Citing
The trial court held that the screenshots constituted “original writings” within the definition of
The trial court also rejected Appellant‘s claim that only access to full downloads of the text messages received by Ms. Nesbitt, with accompanying access to related metadata, would facilitate authentication of the screenshots as accurate reproductions of original material. While the court acknowledged that metadata might aid in verifying the source or sender of the messages, the court expressed skepticism as to how the metadata could verify the accuracy of the screenshots in depicting the content of the
Finally, the trial court tacitly approved admission of the screenshots as duplicates under
We conclude that the trial court neither erred nor abused its discretion in admitting the screenshots. As a preliminary matter, the record confirms that the Commonwealth properly authenticated the
Pursuant to Pennsylvania Rule of Evidence 901, authentication is required prior to admission of evidence. The proponent of the evidence must introduce sufficient evidence that the matter is what it purports to be. See
Pa.R.E. 901(a) . Testimony of a witness with personal knowledge that a matter is what it is claimed to be can be sufficient. SeePa.R.E. 901(b)(1) . Evidence that cannot be authenticated by a knowledgeable person, pursuant to subsection (b)(1), may be authenticated by other parts of subsection (b), including circumstantial evidence pursuant to subsection (b)(4). SeePa.R.E. 901(b)(4) .Pennsylvania appellate courts have considered the authentication of computerized instant messages and cell[ular tele]phone text messages. See In the Interest of F.P., a Minor, 878 A.2d 91, 96 (Pa. Super. 2005) (computerized instant messages); Commonwealth v. Koch, 39 A.3d 996, 1005 (Pa. Super. 2011),
affirmed by an equally divided court, 106 A.3d 705 (Pa. 2014) (cell phone text messages)[.] [In Koch, this Court held that text messages are documents and subject to the same requirements for authenticity as non-electronic documents generally. Koch, 39 A.3d at 1004 (citations omitted). The Koch Court additionally observed that “electronic writings typically show their source, so they can be authenticated by contents in the same way that a communication by postal mail can be authenticated.” Id. at 1003. The panel in Koch was mindful, however, of the difficulty with establishing authorship of text message in certain cases. Because more than one individual can access an electronic device without permission, the Koch Court ruled, “authentication of electronic communications, like documents, requires more than mere confirmation that the number or address belonged to a particular person. Circumstantial evidence, which tends to corroborate the identity of the sender, is required.” Id. at 1005.]
Commonwealth v. Mangel, 181 A.3d 1154, 1160 (Pa. Super. 2018). The Commonwealth must provide sufficient evidence from which a factfinder could reasonably ascertain the authenticity of the records (i.e. identity of the sender and confirmation that the document is what it purports to be) by a preponderance of the evidence. See id. at 1161.
The Commonwealth offered sufficient direct and circumstantial evidence to establish the authenticity of the screenshots. Ms. Nesbitt, as the recipient of the text messages depicted in the screenshots, offered direct authenticating testimony in which she confirmed that the screenshots accurately reflected the messages she received. See Mangel, 181 A.3d at 1162 (recognizing recipient or sender testimony as direct evidence of authenticity). In addition, the Commonwealth proffered circumstantial evidence that identified Appellant as the sender of the messages. Ms. Nesbitt testified that she never received harassing test messages before terminating her relationship with Appellant. N.T. Trial, 7/23/18, at 82. Ms. Nesbitt also testified that she received a harassing text message stating that the sender was observing her in a restaurant and police officials were later able to determine that an application installed on her cellular telephone was sharing her location with an individual named “Daniel Talley.” Id. at 86-89. In addition, the text messages received by Ms. Nesbitt referred to specific sexual acts that occurred during intimate moments in the relationship between Appellant and Ms. Nesbitt. Id. at 123-124. Apart from Ms. Nesbitt, only Appellant possessed knowledge of those acts. Id. The text messages received by Ms. Nesbitt also included phrases such as “fake love,” an idiom commonly used by Appellant. Id. at 133-134. Lastly, police officials uncovered software on Appellant‘s computer that enabled him to send anonymous text messages. N.T. Trial, 7/24/18, at 306-309. In sum, the Commonwealth introduced direct testimony showing that the screenshots accurately reflected the text messages Ms. Nesbitt received. In addition, the Commonwealth produced circumstantial evidence linking Appellant to the messages received by Ms. Nesbitt, including Appellant‘s access to a device capable of sending anonymous text messages, displays of knowledge known only to Appellant and Ms. Nesbitt, and the use of distinct linguistic phrases commonly used by Appellant. The Commonwealth therefore met its burden of authenticating the screenshots.
Having concluded that the Commonwealth properly authenticated the screenshots, we turn now to Appellant‘s claim that the best evidence rule nevertheless
“Nevertheless[, the best evidence rule embodied at
Pa.R.E. 1002 ] is applicable only in circumstances where the contents of the writing, recording or photograph are integral to proving the central issue in a trial[.] Consequently, if the Commonwealth is introducing a writing, recording, or photograph at trial,Rule 1002 requires that the original be introduced only if the Commonwealth must prove the contents of the writing, recording or photograph to establish the elements of its case.” [Commonwealth v. Fisher, 764 A.2d 82, 88 (Pa. Super. 2000) (“The best evidence rule is controlling only if the terms of [the proposed evidence] must be proved to make a case or provide a defense[.]“) (citation omitted), appeal denied, 759 A.2d 385 (Pa. 2000)]. “The rule is not implicated just because evidence is relevant;” the rule applies if the writing, recording, or photograph is necessary to prove the elements of a case. [Commonwealth v. Townsend, 747 A.2d 376, 380-381 (Pa. Super. 2000)]. In other words, the content of the video must be material to, and not just mere evidence of, the issues at bar for the best evidence rule to apply. [Lewis, 623 A.2d at 358.] “If the Commonwealth does not need to prove the content of the writing or recording to prove the elements of the offense charged, then the Commonwealth is not required to introduce the original writing or recording.” Commonwealth v. Dent, 837 A.2d 571, 590 (Pa. Super. 2003)[;] see also Fisher, supra ([no] violation of best evidence rule occurs with admission of duplicate tape recordings of defendant‘s taunting voice mail messages, where tapes did not establish fundamental components of any offenses charged); Townsend, supra ([no] violation of best evidence rule occurred where trial court allowed detective to testify regarding content of defendant‘s written confession, even though written confession was not admitted into evidence; content of confession made persuasive evidence for Commonwealth‘s case but was not necessary to establish elements of crimes of burglary and assault, which had no elements requiring proof of content of confession or any other writing). The Comment toRule 1002 suggests “recordings and photographs are usually only evidence of the transaction, thing or event. It is rare that a recording or photograph would be operative or dispositive[.]”Pa.R.E. 1002 , [cmt].
Commonwealth v. Green, 162 A.3d 509, 518-519 (Pa. Super. 2017) (en banc).
Because Appellant‘s claims surrounding the features omitted from the screenshots implicate only the identity of the individual who sent the messages, and not the accuracy with which the screenshots depicted the contents of the original communications, we conclude that Appellant‘s claims fall outside the scope of the best evidence rule. We explain.
The gravamen of the Commonwealth‘s case against Appellant alleged that he harassed and stalked Ms. Nesbitt by sending her volumes of threatening text messages. Because those messages were the basis of the charges leveled by the Commonwealth against Appellant, the Commonwealth needed to prove that the “substantive content”13 of the messages established the
Although Appellant repeatedly takes aim at “genuine issues of authenticity” involving the original text messages and the resultant unfairness of admitting the screenshots as originals or as duplicates in their place, in point of fact Appellant‘s challenge is wholly focused on the potential probative value of the omitted features in showing the source of the offending communications.14 Appellant does not claim that omissions in the screenshots lead to inaccuracies in their depiction of the substantive content of the original text messages. In addition, Appellant does not allege that the omitted features rendered the screenshots incapable of showing that the original communications established the elements of the charged offenses. Most importantly, Appellant does not claim that the hyperlinks, metadata, and other content found in the original text messages, but omitted from the screenshots, were material or essential in proving the identity of the individual who authored or sent the text messages. Put differently, Appellant does not allege that either he or the Commonwealth needed to prove the content of the original text messages in order to show who sent the original communications. Instead, Appellant‘s claim is only that the omitted features may have facilitated an assessment of the authorship of the messages and, therefore, may have some relevance in determining the identity of the sender. While Appellant may be correct that the omitted features possessed some probative value in identifying the author of the original communications, he has not alleged, much less shown, that the content of those communications was essential in proving who sent the messages. In the absence of such a showing, the original messages, along with the hyperlinks, metadata, and other content omitted from the screenshots, possessed only potential relevance concerning the messages sent to Ms. Nesbitt. The best evidence rule is triggered, however, only when the contents of a writing are essential, not merely relevant, in proving a claim or defense. See Townsend, 747 A.2d at 380-381. As such, the trial court did not violate the best evidence rule in admitting the screenshots. Accordingly, Appellant is not entitled to relief.
Judgment of sentence affirmed.
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 7/17/20
Notes
Pennsylvania Constitution Article 1, § 14.All prisoners shall be bailable by sufficient sureties . . . unless no condition or combination of conditions other than imprisonment will reasonably assure the safety of any person and the community when the proof is evident or presumption great.
Baldwin, 985 A.2d at 837 n.6.[W]hile Section 9765 indeed focuses on an examination of “statutory elements,” [the Court cautioned against ignoring] the simple legislative reality that individual criminal statutes often overlap, and proscribe in the alternative several different categories of conduct under a single banner. See, e.g., Aggravated Assault,
18 Pa.C.S.[A.] § 2702 (defining seven distinct violations of law); Involuntary Deviate Sexual Intercourse,18 Pa.C.S.[A.] § 3123 (setting forth eight separate violations). Consequently, in such cases, [the Supreme Court admonished] that [] courts must take care to determine which particular “offenses,” i.e. violations of law, are at issue in a particular case. See, e.g., Commonwealth v. Johnson, 874 A.2d 66, 71 n.2 (Pa. Super. 2005) (recognizing that a particular subsection of a criminal statute may merge with another crime as a lesser-included offense even though a different subsection of that same statute may not).
Effective October 1, 2020, a new provision of the Pennsylvania Rules of Evidence,
Rule 901. Authenticating or identifying evidence
(a) In General. Unless stipulated, to satisfy the requirement of authenticating or identifying an item of evidence, the proponent must produce evidence sufficient to support a finding that the item is what the proponent claims it is.
(b) Examples. The following are examples only—not a complete list—of evidence that satisfies the requirement:
* * *
(11) Digital Evidence. To connect digital evidence with a person or entity:
(A) direct evidence such as testimony of a person with personal knowledge; or
(B) circumstantial evidence such as:
(i) identifying content; or
(ii) proof of ownership, possession, control, or access to a device or account at the relevant time when corroborated by circumstances indicating authorship.
The proponent of digital evidence is not required to prove that no one else could be the author. Rather, the proponent must produce sufficient evidence to support a finding that a particular person or entity was the author. See
Direct evidence under
Circumstantial evidence of identifying content under
Circumstantial evidence of ownership, possession, control, or access to a device or account alone is insufficient for authentication of authorship of digital evidence under
Expert testimony may also be used for authentication purposes. See, e.g., Commonwealth v. Manivannan, 186 A.3d 472 (Pa. Super. 2018).
