THE PEOPLE OF THE STATE OF COLORADO v. N.T.B.
No. 18CA1613
Colorado Court of Appeals
October 3, 2019
2019COA150
Opinion by JUDGE WEBB; Dunn and Lipinsky, JJ., concur
El Pаso County District Court No. 16CR4823; Honorable Robert L. Lowrey, Judge
The summaries of the Colorado Court of Appeals published opinions constitute no part of the opinion of the division but have been prepared by the division for the convenience of the reader. The summaries may not be cited or relied upon as they are not the official language of the division. Any discrepancy between the language in the summary and in the opinion should be resolved in favor of the language in the opinion.
SUMMARY
October 3, 2019
2019COA150
No. 18CA1613, People v. N.T.B. — Evidence — Admissibility — Authentication — Hearsay — Machine-generated Records — Hearsay Exceptions — Records of Regularly Conducted Activity
A division of the court of appeals addresses the admissibility of evidence from a cloud storage account. First, the division holds that an investigating detective could provide sufficient background to authenticate records produced in response to a search warrant served on the cloud storage and internet service providers under
Division III
Opinion by JUDGE WEBB
Dunn and Lipinsky, JJ., concur
Announced October 3, 2019
Daniel H. May, District Attorney, Oliver Robinson, Deputy District Attorney, Tanya A. Karimi, Deputy District Attorney, Colorado Springs, Colorado, for Plaintiff-Appellant
No Appearance for Defendant-Appellee
¶ 1 Evidence stored in an account on a remote cloud server raises novel questions of authentication and the business-records exception to the hearsay rule. The district attorney appeals the trial court‘s pretrial order dismissing all charges against N.T.B.1 The court held that the prosecutor failed to present a witness to authenticate records of the cloud storage custodian and internet service provider, which were necessary to link N.T.B. to sexually exploitative material stored in the cloud. And even if the prosecution could have authenticated these records, the court held that they contained inadmissible hearsay. Because the prosecutor provided no basis for admitting them under the business-records exception, the trial court refused to admit them. We agree with the district attorney that the prosеcutor proffered sufficient evidence of authenticity but reject his contention that the documents were not hearsay. Therefore, we approve the trial court‘s ruling.
I. Background
¶ 2 Dropbox flagged a cloud-storage account that it suspected contained child pornography. The company provided the National Center for Missing and Exploited Children with a video and an account identification number, an email address, account activity log, and internet protocol (IP) address tied to the upload.2 The Center forwarded this information to local police.
¶ 3 The police served a search warrant on Dropbox, which produced everything stored in the account, and viewed the original video. They also viewed other videos that they believed contained sexually exploitative material, along with two still pictures of N.T.B., all of which were in the account.3 The police traced the IP address to Comcast, the internet service provider, which identified a physical address for the internet account in response to a search warrant. The account was owned by N.T.B.‘s then-girlfriend and his roommate.
¶ 5 The prosecution charged N.T.B. with three counts of sexual exploitation of a child under
¶ 6 Before jury selection on the morning of trial, N.T.B. moved in limine to exclude all records obtained from Dropbox and Comcast, but not the videos. He argued that these documents were business records that contained hearsay, which would be admissible only if authentiсated under either
¶ 7 The prosecutor responded that the records could be authenticated under
¶ 8 After hearing arguments from defense counsel and the prosecutor, which included a proffer of the investigating detective‘s anticipated testimony, and taking a short recess to research the issue, the court ruled that the records would not be admissible at trial. It explained that “[t]here was no one to authenticate th[e] documents“; additionally, the court held that thеse documents were business records which contained hearsay.4 And because the
prosecutor had not endorsed a custodian to testify nor provided an affidavit and notice, the trial court would not admit them.
¶ 9 The prosecutor conceded that without this evidence, the case could not be proven, and only twelve days remained before the speedy trial deadline would lapse. Then the court granted N.T.B.‘s motion to dismiss and sealed the case.
II. Jurisdiction and Standard of Review
¶ 10
¶ 11 “Because we must always satisfy ourselves that we have jurisdiction to hear an appeal, we may raise jurisdictional defects sua sponte, regardless of whether the parties have raised the issue.” People v. S.X.G., 2012 CO 5, ¶ 9. We review questions of law de novo. See People v. Ross, 2019 COA 79, ¶¶ 2-10, 26.
¶ 12 The trial court held the Dropbox and Comcast records were business records
¶ 13 In sum, we have jurisdiction to hear this appeal.
III. Law
¶ 14 Principles of relevancy, authenticity, and hearsay govern the admissibility of computer-generated records. People v. Huehn, 53 P.3d 733, 736 (Colo. App. 2002).
A. Relevancy
¶ 15 Only relevant evidence is admissible.
B. Authenticity
¶ 16 Authenticity is also a threshold requirement for admissibility. People v. Baca, 2015 COA 153, ¶ 26. The proponent may satisfy this requirement by presenting extrinsic evidence to show that the proffered evidence is what the proponent claims it to be under
¶ 17
¶ 18 As relevant here, where a law enforcement investigator possesses personal knowledge that proffered evidence was produced in response to a search warrant, courts have allowed the investigator to authenticate that evidence. See, e.g., United States v. Whitaker, 127 F.3d 595, 601 (7th Cir. 1997) (holding that the prosecution properly authenticated computer records seized during the execution of a search warrant through the testimony of the officer who retrieved them); United States v. Sliker, 751 F.2d 477, 488 (2d Cir. 1984) (allowing an investigating officer to authenticate bank documents obtained through a search warrant); see also People v. Marciano, 2014 COA 92M-2, ¶ 28 (cases from other jurisdictions with similar rules of evidence are instructive for interpreting Colorado Rules of Evidence).
¶ 19 Proponents tend to rely on
¶
C. Hearsay
¶ 21 Authenticity does not guarantee admissibility. See People v. Morise, 859 P.2d 247, 250 (Colo. App. 1993) (“[T]he mere fact that a document is authentic does not mean that it is also competent evidence of the facts contained in that document.“); see also Fed. R. Evid. 901(b) advisory committee‘s note to 1972 proposed rules (“[C]ompliance with requirements of authentication ... by no means assures admission of an item into evidence, as оther bars, hearsay for example, may remain[.]“).
¶ 22 As relevant here, authentic evidence may be excluded on the basis that it is hearsay. See
¶ 23 In contrast to the low threshold for authentication, under which a court allows the jury to weigh questionably authentic evidence, a hearsay objection presents a binary choice — courts must exclude hearsay unless its proponent satisfies an exception. Glover, ¶ 37.
¶ 24 Our rules of evidence recognize exceрtions to the general prohibition against admitting hearsay for certain inherently reliable out-of-court statements. See
[a] . . . report, record, or data compilation, in any form, of acts [or] events . . . made at or near the time by, or from information transmitted by, a person with knowledge, if kept in the course of regularly conducted business activity, and if it was the regular practice of that business activity to make the report, record, or data compilation . . . .
¶ 25 Examples of computer-generated records that have satisfied the business-records exception include invoicing data from billing software, activity records of an automated
¶ 26 Business records may contain statements made by third parties. Courts do not grant the same presumption of reliability to these statements because the third party does not have a duty to the business to report the information accurately. Henderson, 70 P.3d at 617. Still, third-party statements contained in business records are admissible under the business-records exception when the third party‘s information is provided as “part of a business relationship” between the business and third party, and evidence shows that the business “substantially relied” on the information. People in Interest of R.D.H., 944 P.2d 660, 665 (Colo. App. 1997). But in Glover, ¶ 21, a division of this court held that Facebook messages were not admissible as a third-party statement in a business record because “even though an arguable business relationship exists between Facebook and its users, there was no evidence presented that Facebook substantially relies for any business purpose on information contained in its users’ . . . communications.”
IV. Application
A. Relevancy
¶ 27 Although the videos are not in the record, the probable cause affidavit describes the sexually explicit content of six of them and observes that the females depicted appear to be between five and thirteen years old. Thus, the relevancy of the Dropbox and Comcast records that identify the account containing the videos and connect N.T.B. to that account could not be disputed. See
B. Authenticity
¶ 28 The district attorney asserts that the trial court “found the Dropbox records would not be admissible because there was no one to authenticate” them, but that it erred “in failing to consider the prosecution‘s argument” about authentication. Whether the investigating officer‘s testimony provided a sufficient foundation from which the jury could reasonably find that the Dropbox and Comcast records were what the prosecution purported — documents generated by these entities — presents a close question.7
¶ 29 The scant record shows that the trial court analyzed the pertinent rules and acknowledged that the prosecution might have authenticated the Dropbоx and Comcast records under either
¶ 30 Turning to the merits of the argument, we agree with the district attorney that the investigating officer‘s proffered testimony sufficed to support a finding that the records were what the prosecution asserted them to be, although we do so on different grounds than those argued by the district attorney on appeal. See Thyssenkrupp Safway, Inc. v. Hyland Hills Parks & Recreation Dist., 271 P.3d 587, 589 (Colo. App. 2011) (An appellatе court may affirm a trial court‘s ruling on “any grounds that are supported by the record.“).
¶ 31 The district attorney‘s brief leans heavily on the holding in Glover that Facebook messages may not be authenticated and admitted under
¶ 32 True, the pictures of N.T.B. and N.T.B.‘s email address are arguably like Facebook messages insofar as they are all user-generated. But N.T.B. specifically objected to
¶ 33 But recall that
¶ 34 In this case, the prosecution proffered such evidence. The prosecutor made an offer of proof that the investigating detеctive would testify that he caused search warrants to be issued and served on Dropbox and Comcast; these entities provided him with the records in response to the warrants; and N.T.B. acknowledged to the detective that he owned a Dropbox account tied to his work email address. So, the investigating detective had sufficient personal knowledge indicating that the Dropbox and Comcast records were authentic. See
¶ 35 Even so, the court properly recognizеd that the prosecution must overcome the hearsay objection.
C. Hearsay
¶ 36 The Dropbox account identification number, activity log, and associated IP address, as well as the Comcast records connecting the IP address to the physical address where N.T.B. resided, were offered for the truth of the information. Through these records, Dropbox and Comcast asserted that these accounts existed, the Dropbox account was associated with N.T.B.‘s email address, vidеos had been uploaded into that account at various times from a specific IP address, and the IP address was assigned to a Comcast account at a residential street address. Simply put, what these records say provided essential links between N.T.B. and the videos in the Dropbox account.
¶ 37 Recall, the district attorney asserts that these records do not constitute hearsay because “[t]here [was] no declarant.” To the extent the district attorney is arguing that Dropbox and Comcast created the records automatically without human input or interpretation, this argument falls short for two reasons. First, as indicated, the Dropbox and Comcast records were not included in the record on appeal. When material portions of the record are omitted, we presume that they support the trial court‘s ruling. See People v. Duran, 2015 COA 141, ¶ 12. Second, and more importantly, the prosecutor‘s proffer before the trial court did not identify any basis for concluding that the records had been generated automatically.8 Thus, the records provided by Dropbox and Comcast may have included human-generated input and interpretation.
¶ 38 The district attorney argues that the trial court “misapplied the law” by holding that the Dropbox and Comcast records were business records “because they are content created by users, not the business” and because the substance of that content is not something upon which Dropbox “substаntially relies.” But Dropbox — not N.T.B. — generated the account identification number and account activity log in which it recorded the IP address. Like bank and credit card statements in Marciano and Berger-Levy, these records were a compilation of data created in the regular course of Dropbox‘s business.
¶ 39 On this basis, the records at issue here can be distinguished from the Facebook messages in Glover. There, the court relied on the party-admission exception to overcome the defеndant‘s hearsay objection. By contrast, N.T.B. admitted only to owning a Dropbox account associated with his work email address.
¶ 41 The second part of the district attorney‘s argument — that Dropbox and Comcast do not “substantially rely” on their records — misapplies that legal test. This facet of the business record analysis applies only to information generated by a third-party. And of course, to maintain the integrity of numerous separate accounts, Dropbox and Comcast must rely on unique account numbers and IP addresses.
¶ 42 In the end, the trial court correctly held that the Dropbox and Comcast records contained inadmissible hearsay, essential to the prosecutor‘s “possesses or controls” theory, which it could not admit without testimony from the records custodians or an affidavit.
V. Conclusion
¶ 43 We approve the trial court‘s ruling.
JUDGE DUNN and JUDGE LIPINSKY concur.
