People v Price |
2017 NY Slip Op 05174 [29 NY3d 472] |
June 27, 2017 |
Stein, J. |
Court of Appeals |
Published by New York State Law Reporting Bureau pursuant to Judiciary Law § 431. |
As corrected through Wednesday, September 6, 2017 |
The People of the State of New York, Respondent, v Chris Price, Appellant. |
Argued April 26, 2017; decided June 27, 2017
People v Price, 127 AD3d 995, reversed.
On this appeal, we are asked to determine whether the People proffered a sufficient foundation at trial to authenticate{**29 NY3d at 474} a photograph—purportedly of defendant holding a firearm and money—that was obtained from an Internet profile page allegedly belonging to defendant. We conclude that the People's proof fell short of establishing the requisite [*2]authentication to render the photograph admissible in evidence.
Defendant was convicted by a jury of two counts of robbery (Penal Law §§ 160.15 [4]; 160.10 [1]). At the trial, a witness testified that he was conducting milk deliveries with the victim when he noticed—from his vantage point inside the delivery truck—that someone was holding a gun about a foot away from the chest of the victim, who was standing outside the truck. After exchanging words with the gunman, the victim threw a handful of cash from his pocket to the ground. The gunman's accomplice gathered the money and the two robbers fled. The witness never saw the gunman's face and was unable to identify defendant at trial as either of the perpetrators.
Following this testimony, the People informed the court that they intended to introduce a photograph that was "found on the internet," which purportedly depicted defendant holding a handgun.[FN1] According to the People, the victim would identify the gun in the photograph as the weapon used during the robbery, and a detective would identify defendant as the individual holding the gun in the picture. Defendant objected to the admission of the photograph in evidence, arguing that the People had not proffered a sufficient foundation establishing the authenticity of the photograph as a fair and accurate representation of defendant holding a gun and that the photograph had not been altered. In response, the People contended that the necessary foundation would be established through proof that the photograph was obtained from a publicly available web page that bore an Internet profile associated with defendant's surname and photographs of him. Over defendant's renewed objection to the sufficiency of the proffered authentication, the court ruled that the photograph would be admissible in connection with the proposed testimony.
Thereafter, the victim testified to the circumstances of the robbery, and he identified defendant as the gunman. The victim{**29 NY3d at 475} described the firearm used in the robbery as a 9 millimeter automatic with a silver rectangular feature on the top of the barrel, but he admitted that he had no prior familiarity with firearms. When shown the portion of the photograph obtained from the website depicting the gun, the victim testified that the gun looked "similar" to the gun used in the robbery, but he could not identify the gun in the photograph as the one held by the robber.
[*3]A police detective subsequently testified that she found the photograph in question on the website "BlackPlanet.com." The detective had searched defendant's surname "Price" and, after scrolling through several pages of results containing approximately 50 Internet profiles—the usernames of which incorporated the term "Price"—the detective saw a public profile that contained several photographs of defendant and had the user name "Price_OneofKind." There was no reference to defendant's full name on the profile page and, while the detective testified that the profile page listed the purported user's age and hometown, she did not testify as to whether any of this information matched defendant's pedigree information. Nor were any of the pages containing this pedigree information introduced to connect defendant to the specific user of this website.
The photograph at issue was posted to the Internet profile page several months before the robbery. The detective testified that the individual in the photograph holding the handgun "look[ed] like" defendant. She explained that she had printed the photograph from the Internet website, and she asserted that the printout was a true and accurate depiction of the photograph she observed on the website. However, the detective admitted that she did not know who took the photograph, when it was taken, where it was taken, or under what circumstances it was taken. Nor did she know whether the photograph had been altered or was a genuine depiction of that which it appeared to depict. Nevertheless, after the photograph was admitted into evidence over defendant's objection, the detective identified defendant as the individual in the picture.
During summations, the People urged the jury to conclude that the photograph was taken from an Internet profile page belonging to defendant, and they emphasized that the victim "recognized" the gun depicted in the photograph as the one held by the gunman. Following deliberations, the jury found defendant guilty of both counts of robbery.{**29 NY3d at 476}
Upon defendant's appeal, the Appellate Division affirmed the judgment of conviction, holding that "the People laid a proper foundation for admission of the photograph, it was relevant to the issue of the defendant's identity as the gunman, and its probative value outweighed any prejudicial effect" (127 AD3d 995, 996 [2d Dept 2015]). A Judge of this Court granted defendant leave to appeal (25 NY3d 1206 [2015]).
Defendant argues that the trial court erred by admitting into evidence the photograph obtained from the Internet because the People failed to sufficiently authenticate it. Defendant contends that the People's authentication proffer was lacking because the victim could not identify the firearm in the image and because the People presented no evidence that the photograph was genuine and had not been altered. The People argue in response that the photograph was sufficiently authenticated by the detective's testimony that the printout was a fair and accurate representation of the image shown on the Internet profile page, combined with the [*4]indicia suggesting that the profile belonged to defendant.
"In order for a piece of evidence to be of probative value, there must be proof that it is what its proponent says it is. The requirement of authentication is thus a condition precedent to admitting evidence" (United States v Sliker, 751 F2d 477, 497 [2d Cir 1984]; see 1-4 David M. Epstein et al., New York Evidentiary Foundations § A [2016]). "Accuracy or authenticity is established by proof that the offered evidence is genuine and that there has been no tampering with it" (People v McGee, 49 NY2d 48, 59 [1979]). We have explained that "[t]he foundation necessary to establish [authenticity] may differ according to the nature of the evidence sought to be admitted" (id.). For example, mere identification by one familiar with an item of evidence may suffice where the item is distinct or unique (see People v Julian, 41 NY2d 340, 343 [1977]; see e.g. People v Flanigan, 174 NY 356, 368 [1903]). Where a party seeks to admit tape recordings, authenticity may often be established by testimony from a participant in the conversation attesting to the fact that the recording is a fair and accurate reproduction of the conversation (see People v Ely, 68 NY2d 520, 527 [1986]; People v Arena, 48 NY2d 944, 945 [1979]). In addition, testimony establishing a chain of custody may suffice to demonstrate authenticity in other circumstances (see e.g. Julian, 41 NY2d at 343;{**29 NY3d at 477} Amaro v City of New York, 40 NY2d 30, 35 [1976]; People v Connelly, 35 NY2d 171, 174 [1974]; see also People v Patterson, 93 NY2d 80, 84 [1999]; Ely, 68 NY2d at 528). Ultimately, "[t]he availability of these recognized means of authentication should ordinarily allow for and promote the general, fair and proper use of new technologies, which can be pertinent truth-yielding forms of evidence" (Patterson, 93 NY2d at 84).
With respect to photographs, we have long held that the proper foundation should be established through testimony that the photograph "accurately represent[s] the subject matter depicted" (People v Byrnes, 33 NY2d 343, 347 [1974]; see Patterson, 93 NY2d at 84; 1-4 David M. Epstein et al., New York Evidentiary Foundations § I [2016]; Prince, Richardson on Evidence § 4-212 [2008]; Fisch on New York Evidence § 142 at 82-83 [2d ed 1977]). "Rarely is it required that the identity and accuracy of a photograph be proved by the photographer. Rather, since the ultimate object of the authentication requirement is to insure the accuracy of the photograph sought to be admitted into evidence, any person having the requisite knowledge of the facts may verify," or an expert may testify that the photograph has not been altered (Byrnes, 33 NY2d at 347 [citations omitted]; see Patterson, 93 NY2d at 84).
The People failed to authenticate the photograph through any of these methods at trial, as the victim was unable to identify the weapon as that which was used in the robbery,[FN2] and [*5]no other witnesses testified that the photograph was a fair {**29 NY3d at 478}and accurate representation of the scene depicted (see People v Marra, 21 NY3d 979, 981 [2013], affg 96 AD3d 1623, 1625-1626 [4th Dept 2012]; Byrnes, 33 NY2d at 347; Alberti v New York, Lake Erie & W. R.R. Co., 118 NY 77, 88 [1889]; see also Zegarelli v Hughes, 3 NY3d 64, 69 [2004]) or that it was unaltered. Indeed, the People do not claim, on appeal, to have satisfied the traditional authentication requirements.
Rather, the People argue that authentication of the photograph by a witness with personal knowledge of the scene depicted or through expert testimony is unnecessary in cases such as this, where the photograph at issue is obtained from an Internet profile page that the People claim is controlled by defendant. To that end, the People point out that courts of several other jurisdictions have adopted a two-pronged analysis for authenticating evidence obtained from Internet profiles or social media accounts. This approach allows for admission of the proffered evidence upon proof that the printout of the web page is an accurate depiction thereof, [*6]and that the web page is attributable to and controlled by a certain person, often the defendant (see e.g. State v Jones, 318 P3d 1020, *5-6 [Kan Ct App 2014]; Smoot v State, 316 Ga App 102, 109-111, 729 SE2d 416, 425-426 [2012]; United States v Bansal, 663 F3d 634, 667 [3d Cir 2011]; Tienda v State, 358 SW3d 633, 642 [Tex Crim App 2012]). The courts that have adopted this approach have generally held that circumstantial evidence, such as identifying information and pictures, may be used to authenticate a profile page or social media account as belonging to the defendant. Relying on these out-of-state cases, the People contend that the detective's testimony identifying and describing the profile page she found on BlackPlanet.com, combined with her testimony that the printout was an accurate representation of the photograph displayed thereon, provided sufficient authentication evidence to allow admission of the photograph. We disagree.
Assuming without deciding that a photograph may be authenticated through the method proposed by the People, the evidence presented here of defendant's connection to the website or the particular profile was exceedingly sparse.[FN3] For example, notably absent was any [*7]evidence regarding whether{**29 NY3d at 479} defendant was known to use an account on the website in question, whether he had ever communicated with anyone through the account, or whether the account could be traced to electronic devices owned by him. Nor did the People proffer any evidence indicating whether the account was password protected or accessible by others, whether non-account holders could post pictures to the account, or whether the website permitted defendant to remove pictures from his account if he objected to what was depicted therein. Without suggesting that all of the foregoing information would be required or sufficient in each case, or that different information might not be relevant in others, we are convinced that the authentication requirement cannot be satisfied solely by proof that defendant's surname and picture appears on the profile page. Thus, even if we were to accept that the photograph could be authenticated through proof that the web page on which it was found was attributable to defendant, the People's proffered authentication evidence failed to actually demonstrate that defendant was aware of—let alone exercised dominion or control over—the profile page in question (see United States v Vayner, 769 F3d 125, 132-133 [2d Cir 2014]; Commonwealth v Williams, 456 Mass 857, 869, 926 NE2d 1162, 1172-1173 [2010];{**29 NY3d at 480} compare Jones, 318 P3d at *6; Moore v State, 295 Ga 709, 713, 763 SE2d 670, 674 [2014]).
In sum, the People failed to demonstrate that the photograph was a fair and accurate representation of that which it purported to depict. Nor—assuming adoption of the test urged by the People (or some variation thereof)—did the People present sufficient evidence to establish that the web page belonged to, and was controlled by, defendant. Thus, although the decision of whether to admit or preclude evidence generally rests within the discretion of the trial court (see Patterson, 93 NY2d at 84), admission of the photograph here lacked a proper foundation and, as such, constituted error as a matter of law. Furthermore, on the facts of this case, we cannot conclude that the error was harmless (see generally People v Crimmins, 36 NY2d 230, 242 [1975]).
[*8]Accordingly, the order of the Appellate Division should be reversed and a new trial ordered.
Rivera, J. (concurring). I agree with the majority that the People failed to authenticate the computer printout and its admission was reversible error, entitling defendant to a new trial (majority op at 474). The case presents a novel question as to how a party may authenticate a printout of a digital image found on a social media website.[FN1] However, the majority does not adopt a test to apply in determining that the foundational proof was insufficient. I write to clarify why the People's authentication proof comes up short.
At defendant's trial on two counts of armed robbery (Penal Law §§ 160.15 [4]; 160.10 [1]), the People sought to admit a printout of a digital image obtained on a website called "BlackPlanet.com." The People argued that the printout depicted defendant holding the gun used in the robbery. There is no dispute that the printout depicts a person holding a gun and money. The court admitted the evidence, concluding that a proper foundation had been laid after a detective identified defendant's face in the top half of the printout, and the victim{**29 NY3d at 481} identified the gun in the bottom half as a gun that "looks similar to the gun that took place in the robbery." The Appellate Division affirmed the judgment, specifically rejecting defendant's argument that the People failed to adequately authenticate the printout (People v Price, 127 AD3d 995, 996 [2d Dept 2015]).
Before this Court, defendant renews his authentication challenge. Defendant and the People propose different tests for authenticating social media evidence, each claiming their respective test best reflects the requirements of our prior case law and accounts for the risk of tampering associated with social media images. Although I do not adopt defendant's proposed test, he is correct that the People's proof was inadequate in this case.
The decision whether to admit or exclude evidence "may be disturbed by this Court only when no legal foundation has been proffered or when an abuse of discretion as a matter of law is demonstrated" (People v Patterson, 93 NY2d 80, 84 [1999]). "In determining whether a proper foundation has been laid for the introduction of real evidence, the accuracy of the object itself is the focus of inquiry" (People v McGee, 49 NY2d 48, 59 [1979]). "Accuracy or authenticity is established by proof that the offered evidence is genuine and that there has been [*9]no tampering with it" (id.).
We have long recognized that authentication is not subject to a one-size-fits all approach but, rather, the proof necessary to establish the reliability of the proposed evidence "may differ according to the nature of the evidence sought to be admitted" (id.). Authentication may be established by direct or circumstantial evidence, and "reasonable inferential linkages can ordinarily supply foundational prerequisites" so long as the "tie-in effort" is not "too tenuous and amorphous" (Patterson, 93 NY2d at 85). In other words, the party seeking to admit evidence may rely on a variety of proof, alone or in combination, to meet its burden of establishing the reliability of the evidence (see People v Ely, 68 NY2d 520, 527 [1986] ["The necessary foundation may be provided in a number of different ways"]). While certain types of proof by their nature may establish authentication for categories of evidence, previously "noted methods of authentication are not exclusive" (Patterson, 93 NY2d at 84). A court's determination as to the sufficiency of proof in any particular case is a fact-specific enterprise, which turns on the purpose of the evidence sought to be admitted (see{**29 NY3d at 482} e.g. People v Julian, 41 NY2d 340, 343 [1977] ["Proof of a complete chain of custody is one accepted technique for showing the authenticity of a fungible item of real evidence"]; People v Kinne, 71 NY2d 879, 880 [1988] [authentication certificate on a business record may "replace( ) the testimony of a live witness"]; People v Lynes, 49 NY2d 286, 293 [1980] ["substance of the conversation" may supply "criteria of reliability"]). Thus, our precedent establishes that the test for authentication is flexible and responds to the factual nuances of each case.
As with other evidentiary matters, when presented with a question of authentication, the trial court's task is to determine whether the party offering the evidence has made a sufficient threshold showing of reliability so that the evidence may be submitted to the jury (see Lynes, 49 NY2d at 293 [a judge may leave it to the jury to decide whether the evidence implicates defendant or some other person]; People v Dunbar Contr. Co., 215 NY 416, 422-423 [1915] [trial judge did not err in allowing the jury to determine whether defendant was the speaker in a telephone conversation submitted as evidence]). It is for the jury then to determine the weight of the evidence and whether it implicates the defendant in the crime charged (Dunbar, 215 NY at 423 ["The question before the trial judge was whether he would exclude the conversation altogether, or receive it and allow the jury to say whether (defendant) was the speaker"]; Lynes, 49 NY2d at 293 ["(I)t cannot be said as a matter of law that the Trial Judge erred in leaving it to the jury—aided as it could be by the instruments of cross-examination, counsels' arguments and other fact-finding tools available at the trial level—to decide whether . . . the speaker was sufficiently identified" (internal quotation marks omitted)]).
Given the general population's mass consumption and use of social media, "[p]redictably, social media postings are becoming an important source of evidence" (Imwinkelried, Evidentiary Foundations § 4.02 [6] [9th ed 2014]; see also Hon. Paul W. Grimm,[*10]Authentication of Social Media Evidence, 36 Am J Trial Advoc 433 [2013]). Courts have recognized that this evidence presents unique challenges (see e.g. Lorraine v Markel Am. Ins. Co., 241 FRD 534, 537 [D Md 2007]; Tienda v State, 358 SW3d 633, 639 [Tex Crim App 2012]; Parker v State, 85 A3d 682, 685-686 [Del 2014]). As some commentators have noted, "social media is often stored on remote servers, is accessed through unique interfaces, can be dynamic and collaborative in nature, and is uniquely susceptible to alteration and fabrication" (H. Christopher Boehning & Daniel J. Toal, Authenticating Social {**29 NY3d at 483}Media Evidence, NYLJ, Oct. 2, 2012 at 5 [2012]). Arguably, traditional approaches to authentication are inadequate because these new online platforms "can complicate the application of those traditional concepts, and we must be prepared to deal with these complications" (David I. Schoen, The Authentication of Social Media Postings, ABA Trial Evidence Committee [May 17, 2011], available at https://apps.americanbar.org/litigation/committees/trialevidence/articles/051711-authentication-social-media.html). On this appeal, we are squarely presented with the question of how our flexible authentication standard applies to social media images. Therefore, we have the opportunity to resolve an evidentiary issue of growing concern given the proliferation and ubiquitousness of social media.[FN2]
Here, the People sought to establish that the printout was a digital image from defendant's web page. The majority concludes that the People failed to submit testimony that courts have previously found sufficient to authenticate a photograph: testimony from a forensic computer expert, the person who took the picture, or a third party who either was present at the time or who has personal knowledge about the accuracy of the image (majority op at 477-478). The majority does not decide whether the People may only rely on this type of proof, or whether other evidence would suffice. In response to the People's proposed test for the authentication of social media evidence, the majority states that, "[a]ssuming without deciding that a photograph may be authenticated through the method proposed by the People, the evidence presented here . . . was exceedingly sparse," and then concludes that "the authentication requirement cannot be satisfied solely by proof that defendant's surname and picture appears on the profile page" (majority op at 478-479). This approach hints at, but does not confirm, the proof that would satisfy the People's burden. However, we cannot know whether the printout of the digital image was authenticated without knowing how to measure the adequacy of the People's proof (see Stop the Beach Renourishment,{**29 NY3d at 484} Inc. v Florida Dept. of Environmental Protection, 560 US 702, 716, 737 [2010] [rejecting the concurrence's insistence that "this case does not require those questions to be addressed" because "(o)ne cannot know whether a takings claim is invalid without knowing what standard it has failed to meet"]).[FN3]
Turning to the merits, whether the People's evidence was sufficient to authenticate the social media digital image depends on the purpose for which it was offered. The People argued that the printout was an accurate representation of an image from defendant's web page, and that it depicted him with the gun used in the crime. Essentially, the People sought to establish the reliability of the image by connecting defendant to a web page that belonged to him.
The People's proof had to first overcome two levels of authentication. Given the People's purpose for seeking admission of the image, I would hold that the People had to establish that: (1) the printout was an accurate representation of the web page; and (2) the page was defendant's, meaning he had dominion and control over the page, allowing him to post on it. It is undisputed that the People proved, through the detective's testimony, that the printout was an accurate representation of the digital image she viewed on the BlackPlanet.com website. Crucially, however, the People failed to establish that this was defendant's web page, by direct or circumstantial evidence, or with proof establishing "reasonable inferential linkages [that] ordinarily supply foundational prerequisites" (Patterson, 93 NY2d at 85). Like in Patterson, the "tie-in effort" between the testimony relied on by the People here, and the purpose for which the printout was submitted, was "too tenuous and amorphous" (id.). In other words, the People did not submit{**29 NY3d at 485} proof by which a reasonable jury could conclude that the printout was an accurate [*11]representation of defendant's profile page. Although the majority does not expressly adopt this requirement, I agree with my colleagues' conclusion that "the authentication requirement cannot be satisfied solely by proof that defendant's surname and picture appears on the profile page" (majority op at 479).
The People had knowledge of personal information posted on the web page which might have established the necessary link to defendant, but the People did not present that evidence as part of the proffer. Other evidence arguably addresses the authentication of the web page and the depiction therein, such as proof that the defendant posted or adopted the photograph, or knew of the photograph and allowed it to remain on the profile page without objection. However, given the deficiency of the proof actually submitted, I agree with the majority (majority op at 479 n 3), we need not consider whether proof that the web page belonged to defendant could also establish that the image depicted was genuine (McGee, 49 NY2d at 59).[FN4] [*12]In other words, since the People did not link defendant to the web page{**29 NY3d at 486} where the image was found, there is no need to consider on this appeal what must be shown to satisfy McGee's requirement that "there has been no tampering with" the proffered evidence (id.). That question is left for a future case.
This approach respects the role of the judge and jury. If the People satisfy their burden then the court may exercise its discretion to admit the evidence, assuming it otherwise meets the rules for admission (i.e., relevance, whether the probativeness of the evidence outweighs any potential unfair prejudice). Once the People have met these threshold requirements, that is, once a printout from a social media web page is authenticated, it is for the jurors to decide whether they find the evidence persuasive on an issue in the case (see Lynes, 49 NY2d at 293; Dunbar Contr. Co., 215 NY at 422-423; Evidence in New York State and Federal Courts § 9:7 [2d ed 5A West's NY Prac Series] ["the judge alone determines the specimen's authenticity, subject to the jury's right to reject the judge's finding of genuineness"]; CJI2d[NY] Instructions of General Applicability—Role of Court and Jury).
As is the usual case, the defendant is free to challenge the reliability of the evidence, and suggest other inferences and interpretations of the People's proof. A defendant may submit evidence on rebuttal that the photo is unreliable, for example, with proof from the person who altered the photo, proof that the defendant disavowed the photo on the web page, or a copy of the original, unaltered photo. It is then for the jury to weigh the evidence and ultimately [*13]decide.
Chief Judge DiFiore and Judges Fahey and Wilson concur; Judge Rivera concurs in result in an opinion in which Judge Garcia concurs; Judge Feinman taking no part.
Order reversed and a new trial ordered.