43
judge serves as gatekeeper, but it is up to the jury to determine how much if any
value to place on the evidence.
Tienda v. Texas, 358 S.W.3d 633 (Tex. Crim. App. 2012). “Evidence may be
authenticated in a number of ways, including by direct testimony from a witness
with personal knowledge, by comparison with other authenticated evidence, or by
circumstantial evidence.” The court details methods of authentication, giving
particular attention to a unique characteristics approach. “Printouts of e-mails,
internet chat room dialogues, and cellular phone text messages have all been
admitted into evidence when found to be sufficiently linked to the purported author
so as to justify submission to the jury for its ultimate determination of authenticity.
Such prima facie authentication has taken various forms. In some cases, the
purported sender actually admitted to authorship, either in whole or in part, or was
seen composing it. In others, the business records of an internet service provider
or a cell phone company have shown that the message originated with the purported
sender’s personal computer or cell phone under circumstances in which it is
reasonable to believe that only the purported sender would have had access to the
computer or cell phone. Sometimes the communication has contained information
that only the purported sender would be expected to know. Sometimes the
purported sender has responded to an exchange of electronic communications in
such a way as to indicate circumstantially that he was in fact the author of the
particular communication, the authentication of which is in issue. And sometimes
other circumstances, peculiar to the facts of the particular case, have sufficed to
establish at least a prima facie showing of authentication.”
But see Griffin v. Maryland, 419 Md. 343, 19 A.3d 415 (2011). Here the
prosecution was seeking to impeach the defendant’s girlfriend by using a printout
purportedly from her Myspace page. Instead of confronting the witness with the
printout and asking her to authenticate it, the prosecution used a law enforcement
officer for authentication. He testified he printed out the page and that it had her
photo and birthday on the Myspace profile to the “snitches get stiches” comment
could be attributed to her. The Court of Appeals reversed due to lack of proper
authentication. The court said the proper ways to authenticate a social media post
like this included: asking the witness who has firsthand knowledge; examining the
Internet history and/or drive of the purported poster; or obtaining testimony directly
from the social media website (in this case Myspace).
32. CELL TOWER LOCATION RESULTS
Phone company records can also be used to establish the location of a person’s
phone (and thereby most likely that person) at any given time. This can be hugely
helpful in a criminal prosecution. In a homicide case, for instance, the victim’s
phone might be lying next to his dead body. Phone records can show the phone
number of the last person he spoke to. A search warrant for that person’s phone