130 Conn. App. 632 | Conn. App. Ct. | 2011
Opinion
The defendant, Robert Eleck, appeals from the judgment of conviction, rendered after a jury trial, of assault in the first degree by means of a dangerous instrument in violation of General Statutes § 53a-59 (a) (1). On appeal, the defendant claims that (1) the trial court improperly failed to admit into evidence a document that properly was authenticated and (2) the statutory scheme mandating a nonsuspendable, five year minimum term of imprisonment violates his rights to equal protection and due process under the federal constitution. We affirm the judgment of the trial court.
The following facts, which the jury reasonably could have found, are relevant to this appeal. The defendant attended a party at 16 Charles Street in Norwalk in the early morning hours of December 9, 2007. All of the approximately twenty teens and young adults who attended were consuming alcoholic beverages, and many were intoxicated. While inside the house, the defendant was involved in at least two verbal confrontations with one guest, Matthew Peacock. The defendant also conversed on several occasions with another guest, Simone Judway. Shortly after 2:30 a.m., outside the house, the defendant and Peacock engaged in a physical altercation that included punching and grappling. Three other guests, including Zachary Finch, joined the fight
The defendant subsequently was arrested and charged with assault in the first degree with a dangerous instrument in violation of § 53a-59 (a) (1) in connection with the injury to Peacock and assault in the second degree in violation of General Statutes § 53a-60 (a) (2) in connection with the injury to Finch. Following a trial to the jury, the defendant was convicted of assault in the first degree regarding the assault on Peacock and acquitted of assaulting Finch. Because the defendant’s assault conviction involved the use of a dangerous instrument, he faced a mandatory minimum sentence of five years. He was, in fact, sentenced to the mandatory minimum sentence of five years incarceration with an additional ten years of special parole. This appeal followed. Additional facts and procedural history will be set forth as necessary.
I
The defendant first claims that the court abused its discretion in excluding from evidence a printout from his Facebook account documenting electronic messages purportedly sent to him by Judway from her Face-book account.
The following additional facts and procedural history are relevant to our resolution of the defendant’s claim.
The following standard of review and principles of law govern our resolution of the defendant’s claim. “[T]he trial court has broad discretion in ruling on the admissibility ... of evidence .... The trial court’s ruling on evidentiary matters will be overturned only upon a showing of a clear abuse of the court’s discretion. . . . We will make every reasonable presumption in favor of upholding the trial court’s ruling, and . . . upset it [only] for a manifest abuse of discretion. ” (Internal quotation marks omitted.) State v. Garcia, 299 Conn. 39, 56-57, 7 A.3d 355 (2010).
Codifying these principles, § 1-3 (a) of the Connecticut Code of Evidence provides in relevant part: “Questions of admissibility generally. Preliminary questions concerning . . . the admissibility of evidence shall be determined by the court.” Additionally, § 9-1 (a) of the Connecticut Code of Evidence provides: “Requirement of authentication. The requirement of authentication as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the offered evidence is what its proponent claims it to be.” Where documents are not self-authenticating,
Although we have not found any Connecticut appellate opinions directly on point regarding the authentication of electronic messages from social networking websites, we are aware that federal courts as well as sister jurisdictions have written on this subject. We know, as well, that “[w]here a state rule is similar to a federal rule we review the federal case law to assist our interpretation of our rule.” (Internal quotation marks omitted.) Jacobs v. General Electric Co., 275 Conn. 395, 407, 880 A.2d 151 (2005). Rule 901 of the Federal Rules of Evidence is consistent with § 9-1 (a) of the Connecticut Code of Evidence, except that rule 901 (b) contains an additional list of illustrations. See State v. Swinton, 268 Conn. 781, 811 n.28, 847 A.2d 921 (2004). Accordingly, it is helpful to consider relevant federal case law, as well as the opinions of sister states whose rules of evidentiary authentication are similar.
The precise issue raised here is whether the defendant adequately authenticated the authorship of certain messages generated via Judway’s Facebook account.
As a word of caution, however, we note that some have opined that the present lexicon and body of rules for authenticating the authorship of traditional documents is adequate with respect to electronic documents.
We agree that the emergence of social media such as e-mail, text messaging and networking sites like Facebook may not require the creation of new rules of authentication with respect to authorship.
Nevertheless, we recognize that the circumstantial evidence that tends to authenticate a communication is somewhat unique to each medium. For example, in the context of a telephone call, our Supreme Court has instructed that “[a] sufficient foundation is laid when
In the present case, the defendant proffered evidence as to the accuracy of the copy and Judway’s connection to the Facebook account. He also proffered evidence that Judway had added him to her list of Facebook “friends” shortly before allegedly sending the messages, and then removed him as a friend after testifying against him at the trial. Specifically in regard to authorship, however, the direct testimony of the purported author,
The defendant claims, nevertheless, that he did offer circumstantial evidence that Judway sent the messages. Specifically, he argues that the content of the messages identified Judway as the author. For example, when he sent the message asking “why would you wanna talk to me,” the other party replied, “The past is the past.” The defendant contends that this indicated that the author knew of the criminal case and, therefore, must have been Judway.
We are not convinced that the content of this exchange provided distinctive evidence of the interpersonal conflict between the defendant and Judway. To the contrary, this exchange could have been generated by any person using Judway’s account as it does not reflect distinct information that only Judway would have possessed regarding the defendant or the character of their relationship. In other cases in which a message has been held to be authenticated by its content,
Finally, the defendant argues that the messages could be authenticated under the “reply letter” doctrine. We are not convinced. Under that doctrine, “letter B is authenticated merely by reference to its content and circumstances suggesting it was in reply to earlier letter A and sent by addressee of letter A . . . .” Conn. Code Evid. § 9-1 (a), commentary (4). We note, however, that “[t]he mere fact that a letter was sent and a reply received does not automatically authenticate the reply; circumstances must indicate that the reply probably came from the addressee of the letter.” C. Tait & E. Prescott, Connecticut Evidence (4th Ed. 2008) § 9.7, p. 630; see also Connecticut Limousine Service, Inc. v. Powers, 7 Conn. App. 398, 401, 508 A.2d 836 (1986). Here, there was a lack of circumstantial evidence to verify the identity of the person with whom the defendant was messaging. Consequently, the reply letter doctrine is inapposite.
We conclude, therefore, that the court did not abuse its discretion in declining to admit the document into evidence.
II
The defendant also claims that the statutory scheme mandating a nonsuspendable, five year minimum term
The judgment is affirmed.
In this opinion the other judges concurred.
Facebook is a social networking website that allows private individuals to upload photographs and enter personal information and commentary on a password protected “profile.” An individual chooses a name under which the Facebook profile will be listed (user name). Users create networks of “friends” by sending and accepting friend requests. Subject to privacy settings that each user can adjust, a user’s friends can see aspects of the user’s profile, including the user’s list of friends, and can write comments that appear on the profile. Additionally, any Facebook user can send a private message to any other Facebook user in a manner similar to e-mail. The defendant’s claim concerns the latter type of message.
The document contains the following exchange of unaltered messages from April 28, 2009:
“Simone Danielle: Hey I saw you the other day and I just want to say nice bike.
“[The Defendant]: why would you wanna talk to me
“Simone Danielle: I’m just saying that you have a nice bike that’s all. The past is the past.
“[The Defendant]: yup thanks
“Simone Danielle: No problems”
The defendant’s counsel appears to have transposed the user name; she repeatedly referred to the user name as “Danielle Simone” although the user name that appears on the document is “Simone Danielle.” As stated in the transcript, counsel requested that Judway examine the document and then asked her: “This is your Facebook name; is that correct, ‘Danielle Simone’?” Judway responded, “Yes.” Thereafter, when defense counsel asked the defendant whether he had received Facebook messages from “Danielle Simone,” he corrected her, clarifying that he received the messages from “Simone Danielle.” Neither the state nor the defendant took issue with counsel’s verbal miscue, either at the trial or in their appellate briefs, and the court did not mention it in ruling on the objection. In light of these facts, we conclude that the miscue has no bearing on our consideration of this appeal.
The defendant does not argue that the Facebook messages were self-authenticating. Typically, electronic messages do have self-identifying features. For example, e-mail messages are marked with the sender’s e-mail address, text messages are marked with the sender’s cell phone number, and Facebook messages are marked with a user name and profile picture. Nonetheless, given that such messages could be generated by a third party under the guise of the named sender, opinions from other jurisdictions have not equated evidence of these account user names or numbers with self-authentication. Rather, user names have been treated as circumstantial evidence of authenticity that may be considered in conjunction with other circumstantial evidence. See, e.g., Commonwealth v. Purdy, 459 Mass. 442, 450, 945 N.E.2d 372 (2011) (evidence that electronic communication originates from e-mail or social networking website that bears puiported author’s name is not sufficient alone to authenticate it).
In regard to authenticity, the state did not question whether the printout was a true and accurate copy, nor did it dispute that Judway held and managed the Facebook account from which the messages were sent.
MySpace, like Facebook, is a social networking website.
There are other issues concerning the admissibility of electronically stored information, however, that may test the limits of current rules more acutely. For example, in the case of a website that is frequently updated, issues may arise as to how to authenticate the content of the website as it appeared at a particular moment in the past. See Lorraine v. Market American Ins. Co., 241 F.R.D. 534, 553 (D. Md. 2007). Additionally, besides authentication issues, the evidentiary use of electronically stored information may raise novel issues regarding the rules on hearsay and original writings. See, e.g., Connecticut Light & Power Co. v. Gilmore, 289 Conn. 88, 116-17, 956 A.2d 1145 (2008) (articulating guidelines for the admissibility of printouts of electronic records under the business records exception).
That is not to say that it might not be useful to the orderly development of the law of evidence to investigate the appropriateness of new rules specifically pertaining to electronic evidence. It is enough to say at this juncture that our present rules permit a reasoned determination of whether the document presently in question properly was excluded as inadequately authenticated.
A chat room is a public or private Internet site that allows individuals to send real time typed messages to others who are simultaneously connected to that Internet site.
We note that we need not and do not opine on the applicability of the reply letter doctrine to electronic messaging. See 2 C. McCormick, Evidence (6th Ed. 2006) § 227, p. 73.