§ 28.06 DISTINCTIVE CHARACTERISTICS: FRE 901(B)(4)

JurisdictionUnited States

§ 28.06. DISTINCTIVE CHARACTERISTICS: FRE 901(b)(4)

The "appearance, contents, substance, internal patterns, or other distinctive characteristics, taken together with circumstances" may satisfy the authentication requirement.24 For example, the contents of a letter may disclose information "known peculiarly" to a person (knowledge principle).25 Similarly, "language patterns" may indicate the identity of the writer.26 In short, any circumstantial method of proof may be used — e.g., postmark, letterhead, contents, and circumstances of discovery.27 One case listed the following circumstances:

The written materials were found in an isolated and remote area where law enforcement agents observed no one other than Harvey. The materials were within Harvey's campsite; indeed, they were next to Harvey's own bed. The writings also make numerous references to Harvey's beloved dog, Drigo. These distinctive characteristics and circumstances are sufficient to support a finding that the materials were written by Harvey.28

[A] E-mails, Text Messages, Internet

E-mails have also been authenticated under Rule 901(b)(4), for example, by using (1) the consistency with the e-mail address on another e-mail sent by the defendant; (2) the author's awareness through the e-mail of the details of defendant's conduct; (3) the e-mail's inclusion of similar requests that the defendant had made by phone during the same time period; and (4) the e-mail's reference to the author by the defendant's nickname.29 Text messages can be authenticated in a similar fashion.30 For example, identifying details in text messages that could have been known by only a small number of persons, including the defendant, defendant's conduct after the messages were sent, and nickname used in one message constituted circumstantial evidence sufficient to link defendant to the messages.31

Social networking. A number of cases involve postings on MySpace. Authentication is more difficult in this context because, unlike e-mails and text messages that are sent directly from one party to an intended recipient, MySpace is published for all to see. Thus, in one case the authentication of MySpace messages was deemed inadequate because the prosecution failed to offer any evidence regarding who had access to the MySpace page and whether a person other than the accused could have penned the messages.32 In contrast, in another case the evidence was admitted because the legal compliance officer for MySpace testified that the messages had been exchanged by users of accounts created by the defendant and the rape victims.33

Chat rooms. Data posted on a Web site may have been posted by anyone, with or without the owner's consent.34 Traditional methods of authentication may solve these problems,35 even with material downloaded from chat rooms.36

[B] Reply Rule

The federal drafters specifically mentioned the reply doctrine as a method of authentication under Rule 901(b)(4). The method works this way: I properly address and mail a letter to a person. My letter is not returned though I included my return address. Then, in due course, I receive a letter back purportedly from the person to whom I wrote, responding to the content of my letter. The return letter is authenticated circumstantially by the reply rule. This method is not foolproof, but few people would have knowledge of my letter's content. Besides, authentication only requires a prima facie showing.


--------

Notes:

[24] Fed. R. Evid. 901 advisory committee's note.

[25] See United States v. Thompson, 449 F.3d 267 (1st Cir. 2006) (an anonymouse handwritten letter sent to jail; "The anonymous letter's content precisely fits Thompson's circumstances and predicament in May 2004. Coming only one week after the Thompson and Canney joint arrests, the...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT