home

Zimmerman: BAE, Y U Always Fighting?

The hearing in the George Zimmerman trial ran until 10 pm last night. It ended with the judge kicking the can down the road again, this time on the admission text messages recovered from Trayvon Martin's phone.

The hearing, like the one on computer animation that preceded it, is the best example yet of how the Judge's stubborn insistence that this case proceed to trial before the parties had even finished discovery, was a decision that will come home to bite her if it is necessary for Zimmerman to appeal.

It's not just the parties who are not prepared on the law, it's also the judge. Towards the end of the hearing, she started reading from a book she called Ehrenhart, which is a "horn book" on Florida evidence. It's a book that references Florida evidentiary decisions, kind of like Cliff Notes. She read off some case names cited in the book along with their one paragraph description of the case ruling. The book is intended as a guide to case law dealing with specific rules of evidence. It isn't a substitute for reading the opinions themselves. Had she read them, she would have known: [More...]

The first case she cited, a Maryland case named Griffen v. State pertains to social media webpages like My Space, not text messages. In footnote 13, Griffen says:

We further note that authentication concerns attendant to e-mails, instant messaging correspondence, and text messages differ significantly from those involving a MySpace profile and posting printout, because such correspondences is sent directly from one party to an intended recipient or recipients, rather than published for all to see.

The next case she gets from her book is Elack v. Conn. Had she looked it up rather than just read a blurb about it, she would know that the Conn. Supreme Court granted cert on it, oral argument was held in May, and it's ripe for a decision. It may not be good law after the next court reviews it.

She quotes a Mass. case which again deals with my space type social media. Mass. has a case for dealing with text messages, and it too doesn't say what Griffen and Elack say.

Commonwealth v. Amaral, 2011 Mass. App. LEXIS 107, at *7 (Mass. App. Ct. Jan. 26, 2011: The court reasons that "[t]he actions of the defendant himself served to authenticate the e-mails,” because one e-mail indicated that defendant would be at a certain place at a certain time and the defendant appeared at that place and time, and in another email, defendant provided his telephone number and immediately answered when the investigator called that number);

In fact, most cases make the distinction, likes those cited in Footnote 13 of Griffen:

We further note that authentication concerns attendant to e-mails, instant messaging correspondence, and text messages differ significantly from those involving a MySpace profile and posting printout, because such correspondences is sent directly from one party to an intended recipient or recipients, rather than published for all to see. See Independent Newspapers, Inc. v. Brodie, 407 Md. 415, 423, 966 A.2d 432, 437 (2009)(contrasting emails and instant messages with a “different category of Internet communications, in which users post statements to the world at large without specification,” such as on social networking sites). See also States v. Safavian, 435 F. Supp. 2d 36, 41 (D.D.C. 2006) (reasoning e-mails could be authenticated by comparison by the jury with those e-mails that had already been independently authenticated through the contents or in the email heading itself); Commonwealth v. Amaral, No. 09-P-2284, 2011 Mass. App. LEXIS 107, at *7 (Mass. App. Ct. Jan. 26, 2011) (reasoning that “[t]he actions of the defendant himself served to authenticate the e-mails,” because one e-mail indicated that defendant would be at a certain place at a certain time and the defendant appeared at that place and time, and in another email, defendant provided his telephone number and immediately answered when the investigator called that number); Dickens v. State, 175 Md. App. 231,238-40, 927 A.2d 32, 36-37 (2007) (reasoning text messages received on victim’s cell phone were properly authenticated because the phone number on one message showed that it had come from defendant’s phone and other messages referenced the defendant’s right to see the couple’s minor child and their wedding vows).

When it comes to text messages, courts around the country have been developing a less restrictive test for authentication.

As another case puts it:

Rule 901 “does not erect a particularly high hurdle, and that hurdle may be cleared by circumstantial evidence.” Peter T. Hoffman, Texas Rules of Evidence Handbook, Article IX at 948 (8th ed. 2008-09) (quoting United States v. Chin, 371 F.3d 31, 37 (2d Cir. 2004)). The proponent of evidence does not need to “rule out all possibilities inconsistent with authenticity, or to prove beyond any doubt that the evidence is what it purports to be.” Id. In fact, in performing its gate-keeping function under rule 104, the trial court itself need not be persuaded that the proffered evidence is authentic. Tienda, 358 S.W.3d at 638. Rather, the ultimate question of whether an item of evidence is what the proponent claims is a question for the fact finder. Id. In a jury trial, the preliminary question for the trial court to decide is simply whether the proponent of the proffered evidence has supplied facts that are sufficient to support a reasonable jury determination that the evidence is authentic. Id.; see also Manuel v. State, 357 S.W.3d 66, 74 (Tex. App.—Tyler 2011, pet. ref’d) (“The proponent must only produce sufficient evidence that a reasonable fact finder could properly find genuineness.”).

Other cases with similar rulings:

As another case says: For emails and text messages, the question is one for the jury

Methods of authentication include presenting a witness with personal knowledge of the information (they wrote it, they received it, or they copied it), searching the computer itself to see if it was used to post or create the information, or attempting to obtain the information in question from the actual social media company that maintained the information the ordinary course of their business. Courts largely seem to be erring on the side of admissibility and leaving any concerns about the evidence itself, such as who authored the evidence or whether the evidence is legitimate, to jurors to decide what weight to give that evidence.

Courts distinguish between authentication of social networking evidence and authentication of "e-mails, instant messaging correspondence, and text messages." because it is "sent directly from one party to an intended recipient or recipients, rather than published for all to see.")

There's also People v. Pierre,41 A.D.3d 289, 838 N.Y.S.2d 546, 548-49 (N.Y.App. Div. 2007) (where person sent instant message to screen name and received reply, content on reply supported conclusion that message was sent by defendant, and no evidence was admitted to show anyone else had motive or opportunity to impersonate defendant by using his screen name).

A federal case that is often cited in many jurisdictions is United States v. Safavian, 435 F. Supp. 2d 36, 38 (D.D.C. 2006))

The possibility of alteration does not and cannot be the basis for excluding e-mails as unidentified or unauthenticated as a matter of course, any more than it can be the rationale for excluding paper documents (and copies of those documents). We live in an age of technology and computer use where e-mail communication now is a normal and frequent fact for the majority of this nation’s population, and is of particular importance in the professional world. The defendant is free to raise this issue with the jury and put on evidence that e-mails are capable of being altered before they are passed on. Absent specific evidence showing alteration, however, the Court will not exclude any embedded e-mails because of the mere possibility that it can be done.

("The burden of proof for authentication is slight, and the court 'need not find that the evidence is necessarily what the proponent claims, but only that there is sufficient evidence that the jury ultimately might do so.' ")

Also:

If testimony is unavailable, courts have permitted electronic data to be admitted under FRE 901(b)(4), which permits authentication through distinctive characteristics such as the document’s “[a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.”

Florida's authentication rule states:

90.901 Requirement of authentication or identification.--

Authentication or identification of evidence is required as a condition precedent to its admissibility. The requirements of this section are satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.

In the 2012 Florida case State v Symonette,

"Evidence may be authenticated by appearance, content, substance, internal patterns, or other distinctive characteristics taken in conjunction with the circumstances. In addition, the evidence may be authenticated either by using extrinsic evidence, or by showing that it meets the requirements for self-authentication.".... "And, unless #39;clearly erroneous,' the trial court's determination must stand."

In the month old Florida decision in Jean-Philippe v. State, 2013 Fla. LEXIS 1183, 19-20 (Fla. June 13, 2013), the court said:

Finally, some of appellant's statements in the text messages were admissible under HN4section 90.803(18)(a), Florida Statutes (2009), which provides that regardless of the availability of the declarant, "[a] statement that is offered against a party and is . . . [t]he party's own statement" is admissible

In the Florida case of State v. Lumarque, 44 So. 3d 171, 172-173 (Fla. Dist. Ct. App. 3d Dist. 2010. the court said:

At an in limine hearing, the trial court found the two images and one text message the ex-wife testified to admissible, but concluded the remaining exhibits inadmissible as the ex-wife could not authenticate them. The court erred. The images and text messages were found on the defendant's cellular telephone, seized pursuant to a search of the defendant's home through a warrant shortly after the alleged incident. This fact, testified by the State's forensics expert, is sufficient to authenticate these exhibits. U.S. v. Caldwell, 776 F. 2d 989, 1001-02 (11th Cir. 1985) (holding that authentication of evidence merely requires a finding that the evidence is what it purports to be). It also is immaterial that the ex-wife could not identify each of the messages being shown to her on the night of the incident. Regardless how these images and text messages might have found their way onto the defendant's cellular telephone, the State has presented sufficient evidence at this stage that these exhibits constitute evidence of motive. Craig v. State, 510 So. 2d 857, 863 (Fla. 1987) (stating that evidence of motive is admissible when it would help the jury understand other evidence). Accordingly, they are admissible into evidence at the trial of this case upon the State laying the proper predicates as indicated by this opinion. In all other respects, we summarily affirm the order on appeal.

In the Maryland case of Carpenter v. State and the PA case of In re F.P., 2005 PA Super 220, P 5, 878 A.2d 91, 93 (Pa. Super. Ct. 2005)

[the court] reject[ed] a contention that "it was incumbent upon the Commonwealth [of Pennsylvania] to authenticate [computerized instant messages] by introducing evidence of their source from [an] internet service provider or presenting the testimony of a computer forensics expert".

Unless the state can prove the texts were not sent to or written by Trayvon, since they were on his phone (and needed a double password to delete) the fact that someone else might have used his phone to send them is a matter that goes to the weight the jury gives the evidence. If otherwise admissible as a state of mind hearsay exception, or some other exception, they should come in.

Don West, in oral argument, gave Nelson far more circumstantial evidence than necessary to get these texts in. I won't repeat his arguments, you can watch the last 20 minutes of last night's hearing.

The Judge needs to recess this trial until Monday, so the defense can do the research it needs as it prepares for its final witnesses, and have time to find and subpoena Lavondria and Mike F., Demetrius Martin and Rachel if need be, to have them verify these were texts they received from Martin. If they can't do that, the texts should still be allowed through all the circumstantial evidence that supports Martin sent and received the texts on his phone.

Trayon's texts about fighting are relevant to his state of mind and a hearsay exception. They also go to his physical condition. These are relevant areas for Zimmerman to bring into evidence. It's not character evidence, instances of prior bad acts or reputation evidence. Even if they don't have a live witness to authenticate them, they have an excellent expert who can do that through similarities of content.

I expect we'll see some very tired and cranky lawyers in the morning. Judge Nelson may be tired as well, if she stayed up to make the decisions as she said she would. This trial is running ahead of schedule. There's no time limit. She needs to ease up and give the lawyers time to finish their depositions, prepare their witnesses, research their issues and argue motions during the workday and make timely rulings.

< Zimmerman: Defense Animation Arguments | Zimmerman Trial Open Thread >
  • The Online Magazine with Liberal coverage of crime-related political and injustice news

  • Contribute To TalkLeft


  • Display: Sort:
    Given that there were easily (5.00 / 2) (#9)
    by Anne on Wed Jul 10, 2013 at 07:37:57 AM EST
    identifiable issues, known well before this trial ever got underway, it is appalling to me that the judge is winging it the way she is.

    I have to say, I don't think the state or the judge have distinguished themselves here - if this is the best they can do, the case seems like a colossal waste of time and money.  And honestly, I don't understand how the state didn't know, even before they trial got underway, that they didn't have enough - or if they did, why they pushed on - unless they had set themselves up to have no choice but to keep going.

    And if that's what they did, then they lost their way, and forgot or ignored what it was they were supposed to be doing.

    This latest about the judge, though - I just don't get it.  Is this how they do things in Florida?  It's inexcusable.

    Waste or not depends on the mission (3.60 / 5) (#11)
    by cboldt on Wed Jul 10, 2013 at 07:59:36 AM EST
    If the function of the criminal justice system is to bring criminals to justice, and there wasn't sufficient evidence to find Zimmerman to be a criminal, then the case is, as you suggest, a waste (at best).  In fact, if Zimmerman's use of force was justified, the guy went through the ordeal of an attack, the trauma of using deadly force to defend himself, and then being accused of murder and forced to defend his actions against a state apparatus that wants him in jail for the rest of his life.

    But, if you view the function of the criminal justice system as a tool to appease a potentially violent group, then the "justice for the criminal" aspect isn't relevant, at all.  Making false or unsupported accusations, conducting show trials, and punishing one innocent person is the price that has to be paid for the greater good.  Either the innocent accused is punished, or unknown (at this time) future innocents might be harmed, maybe killed, by violent outbreak.  Viewed this way, the trial is a waste if the accused is not convicted.

    Another function of the criminal justice system is to advance the political careers of those who run its levers of power.

    Parent

    Others would know better than I, but (5.00 / 2) (#23)
    by Anne on Wed Jul 10, 2013 at 09:07:00 AM EST
    it just seems to me that the system, in general, is not in the best of shape.  I'm sure in many cases, it works, and works well, but to a large extent, whether one does or does not get justice, or a fair trial, or even fair treatment is dependent on how much money one has.

    Which is not to say we don't have public defenders working hard, for little pay, to deliver the best representation they can - but their caseloads are ridiculous, so justice often ends up being reduced to choosing from an array of not-great options - plead guilty, plead to a lesser charge, give up.

    As I've said - I haven't been keeping up with every bit of evidence in this case, haven't been watching or listening to the trial.  If the state's case is as weak as it appears to be, we can only hope that reasonable doubt and the presumption of innocence hold.  All of my questions about the case notwithstanding, I have no interest in seeing someone convicted where the evidence doesn't support that.

    I also don't support prosecutors and judges allowing themselves to be bullied into trials for the sake of appeasement of anyone's agenda; aside from being a perversion of the meaning of "justice," it doesn't account for what happens when the verdict doesn't satisfy that agenda.

    I will be glad when it's over.  And I'm hoping the Aaron Hernandez case does not just slide into that vacancy and take up air time and focus that ought to be on other, larger and more globally important matters.

    Parent

    In addition to all of that, (5.00 / 1) (#28)
    by Leopold on Wed Jul 10, 2013 at 10:58:01 AM EST
    I've found over the last few years that I've lost all faith and respect for the judicial system, as well as the law profession. I'm sorry, but despite some lofty motivations, in practice and in its tactics and results -- it is just really messed up.

    I have to add it now to the list of things that seem to be broken, dangerous, and divorced from truth and justice in the end.

    Parent

    that is what has bothered me (5.00 / 1) (#44)
    by TeresaInPa on Wed Jul 10, 2013 at 09:21:46 PM EST
    right from the start, that