Commercial Litigation and Arbitration

Texts on Decedent’s Facebook Page Authenticated by Other Person’s Screen Name, Contents, Timing of Messages and Decedent’s Actions Consistent with Them

 State v. Green, 2019 S.C. App. LEXIS 55 (S.C. Ct. App. June 26, 2019):

Convicted by a jury of murder and desecration of human remains, Fabian Lamichael R. Green appeals, challenging the trial court's admission of a series of direct messages from the victim's Facebook account into evidence and the denial of his motion for a mistrial due to a bailiff's comments to a juror. Because we conclude the Facebook messages were properly authenticated and the bailiff's misconduct did not affect the impartiality of the jury, we affirm.

I.

On the late afternoon of May 8, 2016, seventeen-year-old Edwin Diaz Charinos (Victim) left his parents' home driving a Ford Mustang and never returned. After his family filed a missing [*2]  persons report, police reviewed direct messages Victim's father—who had his son's password—discovered on Victim's Facebook page. The messages were exchanged on May 7 and the afternoon of May 8 and appeared to be between Victim and a user named "Ruby Rina." Among other things, the messages revealed Ruby Rina invited Victim to her home at 108 Queens Circle in Laurens on the afternoon of May 8 for a sexual rendezvous. After reviewing the messages, officers visited 108 Queens Circle and looked for Victim's car to no avail.

On May 26, a landscaper disposing of hedge clippings in woods off Taylor Road in Clinton discovered a Ford Mustang with its doors open and what appeared to be burned human remains beside it. The landscaper called 911 and responding officers processed the scene. Investigators also returned to 108 Queens Circle, where they encountered Green and Karina Galarza, Green's sometime girlfriend. Based on discussions with Galarza, investigators obtained arrest warrants for her and Green. A search of the residence revealed blood stains and other physical evidence. Davian Holman, Green's cousin, was also identified as a suspect. He was later apprehended after being found by police [*3]  asleep under Galarza's bed at the Queens Circle residence. Green, Galarza, and Holman were all charged with Victim's murder.

At Green's trial, expert evidence demonstrated the remains found in the woods matched Victim's DNA. Forensic testing conducted on a blood stain taken from 108 Queens Circle determined the odds were one in thirty-eight quadrillion that the blood belonged to someone other than Victim. The State also introduced a piece of bedding found where Victim's remains were located that appeared to be identical to bedding collected from Galarza's home.

Holman testified Galarza's Facebook name was "Ruby Rina." He stated the morning of May 8, 2016, he was at Galarza's home at 108 Queens Circle with Green and Galarza. Holman explained Green and Galarza were laughing while texting, but he could not see the screens of the cell phones and did not know who they were messaging. Later that afternoon, Victim arrived at Galarza's home. When Victim tried to leave, Holman witnessed Galarza push Victim towards her sister's room. Green then emerged from the sister's room and struck Victim several times in the head with a hammer. Green told Holman to help him move Victim's body, which had been [*4]  wrapped in bedding, into the backseat of Victim's Mustang. They drove Victim's car to the location off Taylor Road where Victim's remains were found. Holman stated Green removed Victim's body and a bucket with lighter fluid from the car. Holman testified he walked away from the car while Green sprayed the lighter fluid, so he did not see what happened to Victim's body, but he smelled smoke.

An acquaintance of Green's who lived in Clinton testified Green and Holman walked up to his house around 9:00 or 10:00 p.m. on the night of May 8, 2016. The acquaintance stated Green was carrying a bucket and looking for lighter fluid or alcohol. An autopsy found Victim's death was caused by blunt force trauma to the head, resulting from seven blows to the head with a flat, circular object consistent with the head of a hammer.

Over Green's hearsay and authentication objections, the trial court admitted printouts of the Facebook messages into evidence. The State also presented a letter Green wrote while in jail awaiting trial. In the letter, Green admitted he and "his girl" used Facebook messages to lure Victim to Galarza's home where Green hit him in the head with a hammer. Green testified the letter [*5]  was false, and he had written it to intimidate inmates who had been bullying him.

After the jury deliberated for close to four hours, the trial court was alerted to questionable contact between a bailiff and a juror. While the trial court conferred with counsel about the contact, the jury reached a verdict. The trial court received the verdict in open court and sent the jury back to the jury room. The trial court then brought each juror out separately for individual questioning on the record. All denied any improper conversation with the bailiff. Bailiff Johnny Bolt testified a juror had asked him what would happen in the event of a deadlock, and he responded the judge would likely give them an Allen1 charge and ask if they could stay later.

Green moved for a mistrial, asserting the bailiff's comments improperly influenced the jury. The trial court denied Green's motion and sentenced him to forty-five years' imprisonment on the murder charge and ten years' imprisonment on the desecration of human remains charge.

II.

We first take up Green's challenge to the admission of the Facebook messages. Green does not appeal the trial court's ruling that the messages were co-conspirator statements [*6]  and, therefore, not hearsay. Instead, he zeroes in on the trial court's ruling that the messages were properly authenticated, claiming there was not enough proof to support such a finding. We review evidentiary rulings to see whether the trial court abused its discretion, meaning the ruling was based on an error of law or lacked evidence to support it. See State v. Byers, 392 S.C. 438, 444, 710 S.E.2d 55, 57-58 (2011).

A. The Requirement of Authentication

All evidence must be authenticated. State v. Brown, 424 S.C. 479, 488, 818 S.E.2d 735, 740 (2018); 2 McCormick On Evid. § 221 (7th ed. 2016) ("[I]n all jurisdictions the requirement of authentication applies to all tangible and demonstrative exhibits."). Authentication is a subspecies of relevance, for something that cannot be connected to the case carries no probative force. The trial judge acts as the authentication gatekeeper, and a party may open the gate by laying a foundation from which a reasonable juror could find the evidence is what the party claims. Rule 901(a), SCRE ("The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims."). The authentication standard is not high, Deep Keel, LLC v. Atlantic Private Equity Group., LLC, 413 S.C. 58, 64-65, 773 S.E.2d 607, 610 (Ct. App. 2015), and a party need not rule out any possibility [*7]  the evidence is not authentic. In the realm of authentication, the law, like science, is content with probabilities.

The court decides whether a reasonable jury could find the evidence authentic; therefore, the proponent need only make "a prima facie showing that the 'true author' is who the proponent claims it to be." United States v. Davis, 918 F.3d 397, 402 (4th Cir. 2019). Once the trial court determines the prima facie showing has been met, the evidence is admitted, and the jury decides whether to accept the evidence as genuine and, if so, what weight it carries. Rule 104(b), SCRE; see United States v. Branch, 970 F.2d 1368, 1370-72 (4th Cir. 1992); 5 Weinstein et al., Weinstein's Federal Evidence § 901.02[3] (2d ed. 2019).

Green argues the State's authentication showing fell short. He points to the potential that social media can be manipulated and the ease with which a hacker could access another's account or create a fictitious account. Green notes neither the sender nor the recipient of the messages corroborated they were authentic, and there was evidence both accounts were not secure.

Social media messages and other content may appear to pose unique authentication problems, but these problems dissolve against the framework of Rule 901, SCRE. Social media messages and content are writings, and evidence law has always viewed the authorship of writings with a skeptical [*8]  eye. See 2 McCormick On Evidence § 221 (evidence law does not assume authorship of a writing, "[i]nstead it adopts the position that the purported signature or recital of authorship on the face of a writing is not sufficient proof of authenticity to secure the admission of the writing into evidence").

The requirement of authentication cannot be met by merely offering the writing on its own. See Williams v. Milling-Nelson Motors, Inc., 209 S.C. 407, 410, 40 S.E.2d 633, 634 (1946). Something more must be set forth connecting the writing to the person the proponent claims the author to be. Rule 901, SCRE, does not care what form the writing takes, be it a letter, a telegram, a postcard, a fax, an email, a text, graffiti, a billboard, or a Facebook message. All that matters is whether it can be authenticated, for the rule was put in place to deter fraud. 2 McCormick On Evidence § 221. The vulnerability of the written word to fraud did not begin with the arrival of the internet, for history has shown a quill pen can forge as easily as a keystroke, letterhead stationery can be stolen or manipulated, documents can be tricked up, and telegrams can be sent by posers. Viewed against this history, the argument that social media should bear a heavier authentication burden because such a "modern" medium [*9]  is particularly vulnerable to fraudsters may be seen for what it is: old wine in a new bottle.

B. Rule 901(b)(1), SCRE: Authentication by Personal Knowledge

Rule 901(b), SCRE, lists ten non-exclusive methods of authentication. The first method is the easiest and most direct way to authenticate a writing: having someone with personal knowledge about the writing testify the matter is what it is claimed to be. Rule 901(b)(1), SCRE. This method may be accomplished by testimony from a person who sent or received the writing. Because it is the easiest method, it is also uncommon, for the sender and the recipient are often unavailable, as here. One who witnessed the creation or signing of the writing also has the personal knowledge Rule 901(b)(1), SCRE, demands. We cannot say Holman's observation of Green and Galarza texting, without more, meets Rule 901(b)(1), SCRE.

C. Rule 901(b)(4), SCRE: Authentication by Circumstantial Evidence of Distinctive Characteristics

Most writings meet the authenticity test through Rule 901(b)(4), SCRE, which enables authentication to be proven by: "[a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances." Courts lag behind technology for good reason. As society adapts to the digital age, courts are growing more comfortable [*10]  with using circumstantial evidence to authenticate social media content. 2 McCormick On Evidence § 227; 5 Mueller & Kirkpatrick, Federal Evidence § 9.9 (4th ed. 2018) (noting most common way to authenticate social media is by evidence of distinctive characteristics); see also Grimm, et al., Authentication of Social Media Evidence, 36 Am. J. Trial Advoc. 433, 469 (2013) (Rule 901(b)(4) is "one of the most successful methods used to authenticate all evidence, including social media evidence").

Rule 901(b)(4), SCRE, meshes with prior South Carolina law, which has long endorsed authentication by circumstantial proof. See Kershaw Cty. Bd. of Educ. v. U.S. Gypsum Co., 302 S.C. 390, 398, 396 S.E.2d 369, 373-74 (1990). As our supreme court explained in State v. Hightower, 221 S.C. 91, 105, 69 S.E.2d 363, 370 (1952):

Like any other material fact, the genuineness of a letter may be established by circumstantial evidence if its tenor, subject-matter, and the parties between whom it purports to have passed make it fairly fit into an approved course of conduct, and manifests the probability that the subject-matter of its contents was known only to the apparent writer and the person to whom it was written . . . .

See also Singleton v. Bremar, 16 S.C.L. 201, 210 (Harp. 1824) (letter authenticated by reference to unique facts relating to writer "and her situation"). A writing may also be authenticated if it is made in reply to an earlier communication from a source known to be genuine. [*11]  See Kershaw Cty. Bd. of Educ., 302 S.C. at 398, 396 S.E.2d at 373-74; Leesville Mfg. Co. v. Morgan Wood & Iron Works, 75 S.C. 342, 344, 55 S.E. 768, 768-69 (1906); see also 7 Wigmore et al., Evidence in Trials at Common Law § 2153 at 753 (Chadbourn rev. ed. 1978). This has been termed the "reply letter doctrine"—though today it might be better called the "reply email2 doctrine."

We find the content of the messages was distinctive enough that a reasonable jury could find Galarza wrote them. Numerous facts link the Facebook messages to Galarza and, consequently, Green: the use of the screen name "Ruby Rina," which Holman testified was Galarza's; reference to "Julissa" on the messages, which testimony showed was Galarza's sister's name; Ruby Rina's invitation to her home, which she stated was at 108 Queens Circle; Victim's reference to Ruby Rina as "Karina," Galarza's real first name; comments throughout the messages about Ruby Rina's erstwhile boyfriend that were consistent with her relationship with Green; the timing of the messages; and the tragic fact that Victim disappeared shortly after Ruby Rina invited him to 108 Queens Circle, where his blood was later discovered. Taken together, these circumstances serve as sufficient authentication to meet the low bar Rule 901(b)(4), SCRE, sets. See United States v. Siddiqui, 235 F.3d 1318, 1322-23 (11th Cir. 2000) (emails authenticated by circumstantial evidence related to content, including [*12]  reference to defendant's nickname and facts known only to limited group); see generally Grimm et. al., Authenticating Digital Evidence, 69 Baylor L. Rev. 1 (2017).

We recognize some cases may require more technical methods to authenticate social media. Some courts have held, for example, that tracking a defendant's Facebook page and account to his email address by internet protocol (IP) evidence can satisfy authentication. United States v. Hassan, 742 F.3d 104, 133-34 (4th Cir. 2014); see also United States v. Recio, 884 F.3d 230, 236-37 (4th Cir. 2018) (Facebook messages authenticated by a certificate from a Facebook records custodian that record containing the message was made at or near the time it was transmitted, the user name on the account was defendant's, the email address included defendant's name, and over 100 pictures posted to the account depicted defendant, including one wishing the defendant happy birthday). We understand social media could also be authenticated by evidence related to hash values and metadata. See Lorraine v. Markel Am. Ins. Co., 241 F.R.D. 534, 547-49 (D. Md. 2007). We express no opinion on these methods of proof.

We are aware of the debates over the "Maryland Rule" and the "Texas Rule" concerning social media authentication, see, e.g., State v. Eleck, 23 A.3d 818, 821-25 (Conn. App. Ct. 2011), but these labels seem to complicate the simple concept embodied in Rule 901, SCRE, and by which writings have long been authenticated. See United States v. Farrad, 895 F.3d 859, 879-80 (6th Cir. 2018) (treating [*13]  social media evidence like any other documentary evidence for purposes of authentication "fits with common sense: it is not at all clear . . . why our rules of evidence would treat electronic photos that police stumble across on Facebook one way and physical photos that police stumble across . . . on a sidewalk a different way"); United States v. Browne, 834 F.3d 403, 412 (3rd Cir. 2016) ("We hold today that it is no less proper to consider a wide range of evidence for the authentication of social media records than it is for more traditional documentary evidence."); Parker v. State, 85 A.3d 682 (Del. 2014) (same); Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. 2012) (same); Com. v. Purdy, 945 N.E.2d 372 (Mass. 2011); United States v. Barnes, 803 F.3d 209, 217-18 (5th Cir. 2015) (Facebook messages authenticated by witness who saw defendant using Facebook, and recognized his account and writing style).

We do not downplay the fraud risk surrounding social media. The internet flattened the speed of and access to the flow of written information; documents that once sat in dusty file cabinets crammed into office corners now float in the "cloud," making them susceptible to a wider range of mischief. We are persuaded the risk is one Rule 901, SCRE, contemplates and can contain. Lawyers can always argue case-specific facts bearing on this risk and attempt to convince the jury the writing is not genuine.

 


Although the "e" in "email" is an abbreviation for "electronic," seasoned lawyers (and many surprised litigants) would agree with the interpretation attributed to former San Francisco Mayor Willie L. Brown that the "e" in "email" stands for "evidence."

Share this article:

Facebook
Twitter
LinkedIn
Email

Recent Posts

RICO and Injunctions: (1) State Court Actions Designed to Perpetuate and Monetize a RICO Violation Are Enjoinable under RICO, Even Though They Are Not Themselves Alleged to Be Predicate Acts [Note: Noerr Pennington Applies in RICO Actions] — (2) Although Civil RICO’s Text and Legislative History Fail to Reveal Any Intent to Override the Provisions of the Federal Arbitration Act, Arbitrations Are Enjoinable Under the “Effective Vindication” Doctrine Where They Operate As a Prospective Waiver of a Party’s Right to Pursue Statutory RICO Remedies — (3) Arbitration Findings May Be Given Collateral Estoppel Effect in a Civil RICO Action — (4) Injunction of Non-Corrupt State Court Litigations That Furthers a RICO Violation Are Enjoinable Under the Anti-Injunction Act’s “Expressly Authorized” Exception — (5) “The Irreparable Harm Requirement Is The Single Most Important Prerequisite For The Issuance Of A Preliminary Injunction” (Good Quote) — (6) When Injunction Is Based on “Serious Questions on the Merits” Rather Than “Likelihood of Success,” Court May Rely on Unverified Pleadings and Attached Exhibits to Assess the Merits, Unless the Opponent Has Raised Substantial Questions (Here, the Opponent Failed to Request an Evidentiary Hearing) — (7) Whether Amended Pleading Moots An Appeal Turns on Whether It Materially Changes the Substantive Basis for the Appeal — (8) Meaning of “In That” (“Used To Introduce A Statement That Explains Or Gives More Specific Information” About A Prior Statement)

Archives