United States v. Bertram

259 F. Supp. 3d 638
CourtDistrict Court, E.D. Kentucky
DecidedApril 14, 2017
DocketCriminal No. 3:15-cr-14-GFVT-REW
StatusPublished
Cited by5 cases

This text of 259 F. Supp. 3d 638 (United States v. Bertram) is published on Counsel Stack Legal Research, covering District Court, E.D. Kentucky primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Bertram, 259 F. Supp. 3d 638 (E.D. Ky. 2017).

Opinion

OPINION

Gregory F. Van Tatenhove, United States District Judge ■

This case presents a recurring evidentia-ry concern in an age of advancing technology; Simply put, may emails be authenticated under the Federal Rules of Evidence by someone other than the sender or recipient? This Court answered “yes” to that question on' several occasions throughout the course of trial. What follows is a more detailed articulation of the reasons why, as a supplement to the Court’s rulings from the bench. Also addressed is one of the more frequently used substantive grounds for admission — co-conspirator statements.

Federal Rule of Evidence 901 requires records to be properly authenticated before they are admitted into evidence at trial. To satisfy the requirement of authenticating a certain record, the proponent of the record “must produce evidence sufficient to support a finding that the item is what the proponent claims it is.” Fed. R. Evid. 901(a). The Sixth Circuit permits authenticity to be established through the introduction of circumstantial evidence. See United States v. Crosgrove, 637 F.3d 646, 658 (6th Cir. 2011). And Federal Rule of Evidence 901(b) provides a non-exhaustive list of ways in which the requirements of Rule 901(a) may be satisfied.

Despite the prevalence of email communication in this day and age, case law in the Sixth Circuit regarding how Rule 901 relates to the authentication of emails is sparse. A number of other courts, however, have suggested the key factor in the Rule 901(b) list when it comes to email authentication is Rule 901(b)(4). That provision explains that records may be authenticated by the introduction of testimony regarding their unique characteristics: i.e., the “appearance, contents, substance, internal,patterns, or other distinctive characteristics of the item, taken together with all the circumstances.” Fed. R. Evid. 901(b)(4). In fact, Rule 901(b)(4) is “one of the most frequently used to authenticate email and other electronic records.” Lorraine v. Market Am. Ins. Co., 241 F.R.D. 534, 546 (D. Md. 2007).

For example, the Eleventh Circuit found a .number of emails to be properly authenticated under Rule 901(b)(4) in United States v. Siddiqui, 235 F.3d 1318 (11th Cir. 2000). In Siddiqui, the Government sought to introduce emails purportedly from Sid-diqui, the defendant, through the individuals who received those emails. 235 F.3d at 1322. Siddiqui objected, but the Eleventh Circuit noted the emails’ contents, patterns, and distinctive characteristics satisfied the authentication requirements in Rule 901(b)(4). For example, the emails bore an email address which included a portion of Siddiqui’s name as well as the university at which he was employed. Id. The emails referred to the author as “Mo,” a nickname the Government witnesses could attribute to Siddiqui. Id. at 1323. Further, the content of the emails bolstered the idea that defendant Siddiqui was, in fact, the sender, because the content included information about which Sid-diqui would know and because the Government witnesses could testify to related phone conversations with Siddiqui about the email content. Id. at 1322-23.

[641]*641The same rationale has been employed by other courts ruling on the authenticity of both emails and text messages. For example, the D.C. Circuit, Court found emails to be properly authenticated under Rule 901(b)(4) where the email addresses at issue contained the name of the person connected to the address; where the names of the senders or recipients of the emails were frequently included in either the email content or signature blocks; and where the email content involved “discussions of various identifiable matters.” United States v. Safavian, 435 F.Supp.2d 36 (D.C.C. 2006). And in United States v. Fluker, the Seventh Circuit found emails to be properly authenticated even though neither the author nor anyone who saw the author write the emails testified. 698 F.3d 988, 998-1000 (7th Cir. 2012). In that case, there was sufficient circumstantial evidence- to authenticate the emails under Rule 901(b)(4), such as the email addresses at issue and the content of the communication. See also United States v. Kilpatrick, No. 10-20403, 2012 WL 3236727 (E.D. Mich. Aug. 7, 2012) (noting the text messages in question had “distinctive characteristics” under Rule 901(b)(4) such as distinct auto-signatures, nicknames, unique PIN numbers, and distinctive language patterns).

These cases stand in contrast with two cases submitted by the Defendants, where emails were properly found unauthenticated under various Rules of Evidence, including Rule 901(b)(4). For - instance, in Jimena v. UBS AG Bank, Inc., an Eastern District of California court excluded emails one party sought to introduce through the email recipient. See No. 1:07-cv-00367, 2011 WL 2551413 (E.D. Cal. June 27, 2011). The court noted that there was no evidence the recipient actually knew the purported sender or had prior communication with the sender. Also, there were no unique characteristics linking the received emails to the purported sender. Id. Similarly, in In re Second Chance Body Armor, Inc., the Western District of Michigan Bankruptcy Court excluded emails because they were “neither self-authenticating, authenticated by a witness.with knowledge, nor authenticated through any other permissible means.” See 434 B.R. 502, 505 (Bankr. W.D. Mich. 2010). In that case, one party attempted to authenticate certain emails, through a witness with no personal knowledge of the conversation, who had never seen the email before, and who was not present at a meeting described in the contents of the email. Id. The Defendants emphasize the fact that the--witness was not a sender or recipient of the excluded emails. But a reading -of the Bankruptcy Court case in its entirety suggests that the court’s decision did not rest on the witness’s lack of participation in the communication but on the fact that the emails could not be “authenticated through any other permissible means,” such as Rule 901(b)(4). Id.

None of these- cases specifically speak to whether an email may be authenticated under Rule 901(b)(4) by an individual that is neither a recipient nor a sender of the communication. But the weight of the case law suggests participation in a particular email is not a prerequisite to authenticating it. .The case law on the whole suggests that the key consideration in email authentication is not simply whether the witness on the stand was a sender or recipient of the email, but whether the testifying witness can speak to the email’s unique characteristics, contents, and appearance. After all, Federal Rule of Evidence

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
259 F. Supp. 3d 638, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-bertram-kyed-2017.