Total Tayangan Halaman

Kamis, 05 Januari 2012

Cyber Crime


Emails, Authentication and Filing a False Report


This post deals with an issue I’ve discussed before – authenticating emails – but this time the issue arises in a context quite different from the ones I’ve written about before.
As I’ve noted, the rules of evidence that apply in trials in U.S. federal and state courts all require that, in order for a prosecutor or defense attorney to introduce evidence, the evidence must first be “authenticated.” As I’ve also noted, to “authenticate” evidence, a prosecutor or defense attorney must, basically, show that it is what it purports to be.
And that brings us to State v. Ruggiero, __ A.3d __, 2011 WL 6792616 (New Hampshire Supreme Court 2011). Kristin Ruggiero was convicted of “twelve counts of falsifying physical evidence” in violation of New Hampshire Revised Statutes § 641:6 and “one count of false report” in violation of New Hampshire Revised Statutes § 641:4. State v. Ruggiero, supra.
She appealed her conviction, arguing, among other things, that the trial judge erred in admitting into evidence “without proper authentication, certain email messages she purportedly sent”. State v. Ruggiero, supra.
This, according to the state Supreme Court, is the case arose: Kristin married Jeffrey Ruggiero in August of 2001 and “divorce proceedings commenced” in 2007. State v. Ruggiero, supra. In November of 2007, she and her boyfriend, Brendan Bisbee” moved to San Jose, California; and in 2007 Jeffrey Ruggiero, “a member of the United States Coast Guard, was stationed in Charleston, South Carolina”, where he met Jean Backus (“Jean”). State v. Ruggiero, supra.

“Shortly before” the divorce action began, Kristin filed “a domestic violence petition against Jeffrey” and the domestic court judge issued a restraining order that prohibited Jeffrey from “engaging in any contact with” Kristin. State v. Ruggiero, supra. After the order was entered, Jeffrey initiated no further contact with” Kristin. State v. Ruggiero, supra.
Kristin, on the other hand, contacted Jeffrey and Jean in South Carolina through
text messages, telephone calls and e-mails. Jeffrey also received anonymous text messages from `811.com,’ as well as telephone calls from `843–298–1057 (the `1057 phone’), a prepaid T–Mobile cellular telephone. Although Jeffrey and Jean did not recognize the 1057 number, they recognized the caller's voice as [Kristin’s]. On several occasions, Jean used a video camera to capture the image of the 1057 number on Jeffrey's cell phone screen and record [Kristin’s] voice.

Later investigation of the 1057 number revealed that the person who activated the phone did not supply an address, but did provide the name `Jeffrey’ and Jeffrey's birth date during activation. As a result of [Kristin’s] repeated contact, Jeffrey changed his cell phone number several times, but he continued to receive communications from [Kristin].

In December 2007, Jeffrey was charged with certain offenses relating to violation of the restraining order. After a trial in April 2008, he was found guilty, but sentencing was delayed pending a pre-sentence investigation report. [Kristin] was upset that Jeffrey was not jailed immediately after his conviction, and claimed she was `terrified’ he might kill her. Eventually, Jeffrey was sentenced to a term in jail.

On May 4, 2008, within a thirty-minute period, twelve text messages were sent from the 1057 phone to `617–833–9495,’ [Kristin’s] Verizon Wireless cell phone number. Shortly after receiving the last text message, [Kristin] called the police from her parents' home in East Kingston and reported that Jeffrey had violated the restraining order. . . . East Kingston Police Officer Iannuccillo was dispatched.

After Iannuccillo arrived at the house, [Kristin] gave him a handwritten log of the text messages she claimed Jeffrey sent her from the 1057 phone. Iannuccillo called the 1057 number, but received a computer-generated voicemail message. Because [Kristin] expressed fear that Jeffrey might be in New Hampshire, the officer tried to locate him, but was unsuccessful. The next day, after further investigation by Police Chief Simpson, Jeffrey was located in South Carolina. He denied violating the restraining order. After additional investigation, Chief Simpson obtained an arrest warrant for Jeffrey.
State v. Ruggiero, supra.
After the May 4 incident, Kristin emailed “a number of people including . . . Kingston prosecutor, Attorney Heather Newell, Assistant Attorney General Lucy Carrillo, and various Coast Guard officials.” State v. Ruggiero, supra. The emails repeated her “allegations about the May 4 text messages and sought assistance in pursuing her case against Jeffrey.” State v. Ruggiero, supra.
In July of 2008, Jean sent East Kingston Police Chief Simpson three packages
containing `a CD video disk, some e-mails, police reports and . . . pictures.’ Jeffrey and Jean also authorized Simpson to access their online cell phone accounts. Simpson recognized the 1057 number in the video recordings from Jean as the number from which [Kristin] allegedly received the twelve May 4 text messages.

After further investigation, including searches of cell phone tower locations, additional records for the 1057 phone, and [Kristin’s] travel records, a warrant was issued for [her] arrest in September 2008. The warrant against Jeffrey was rescinded, and his April 2008 conviction was later vacated.
State v. Ruggiero, supra.
As noted above, Kristin was charged with falsifying evidence and with filing a false police report, convicted and appealed. State v. Ruggiero, supra. At trial and again on appeal, she claimed the trial judge improperly allowed the prosecutor to introduce “four email messages attributed to” her into evidence. State v. Ruggiero, supra.
More precisely, her defense attorney argued, at trial, that under New Hampshire’s Rule of Evidence 901,
[all of the e-mail messages . . .] should have been authenticated by either obtaining the [e-mails] directly off [Kirstin’s] computer, by obtaining them from the server through which the [e-mails] were sent, or through other means of proper authentication to include, in fact, evidence that [Kristin] spoke about in e-mails and the subject matter in the [e-mails], or that someone witnessed [her] sending [e-mails].
State v. Ruggiero, supra. The prosecution argued, in response, that the emails were “properly authenticated by testimony regarding their appearance, contents and substance.” State v. Ruggiero, supra. Both sides made essentially the same arguments before the New Hampshire Supreme Court. State v. Ruggiero, supra.
The Supreme Court began its analysis of both parties’ arguments by noting that New Hampshire Rule of Evidence 901(a) states that “[t]he requirement of authentication . . . as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.” State v. Ruggiero, supra. It explained that “[t]he proof necessary to authenticate e-mail messages is an issue of first impression in New Hampshire”, but since “the federal rule of evidence is identical to our State rule, . . . we therefore look to federal cases for guidance.” State v. Ruggiero, supra.
The Supreme Court then reviewed federal cases addressing the authentication of emails. State v. Ruggiero, supra. It noted that federal courts have held that emails, like other evidence, can be authenticated by relying on circumstantial evidence and that the proponent of such evidence need not “`prove beyond any doubt that the evidence is what it purports to be’”. State v. Ruggiero, supra (quoting U.S. v. Gagliardi, 506 F.3d 140 (U.S. Court of Appeals for the 2d Circuit 2007)). The Supreme Court found that under this standard the prosecution was only required to “demonstrate a rational basis from which to conclude that the exhibit did, in fact, belong to the defendant.” State v. Ruggiero, supra.
The Supreme Court then summarized how, precisely, emails can be authenticated:
`An e-mail message's distinctive characteristics, including its contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances may be sufficient for authentication.’ Lorraine v. Markel American Ins. Co., 241 F.R.D. 534 (U.S. District Court for the District of Maryland 2007); see also New Hampshire Rule of Evidence 901(b)(4) (examples of authentication include, `[a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances’).

Moreover, `[t]he contents of the e-mail may help show authentication by revealing details known only to the sender and the person receiving the message.’ Lorraine v. Markel American, supra. However, `[b]ecause of the potential for unauthorized transmission of e-mail messages, authentication requires testimony from a person with personal knowledge of the transmission or receipt to ensure its trustworthiness.’ Lorraine v. Markel American, supra.
State v. Ruggiero, supra.
The Supreme Court then explained precisely how the prosecution authenticated each of the four e-mail messages at issue: State’s Exhibits 19, 20, 21 and 22. State v. Ruggiero, supra. It began with Exhibit 22, an email “describing the May 4, 2008 incident”:
Assistant Attorney General Carrillo testified that: (1) she was `CC'd’ on the e-mail message; (2) the message `was from [Kristin], and . . . [it] talked about some of the issues that [Carrillo and Kristin]] had talked about’; and (3) the message came from `kvpoperations@gmail.com,’ an e-mail address [Kristin] had previously used to communicate with her. [Kristin] testified that `kvpoperations@gmail.com’ was one of her many e-mail addresses.

In addition, Attorney Newell testified about the contents of the e-mail. She explained that the reference in the e-mail to the text messages being from Jeffrey's personal cell phone number rather than an 811.com number was because they `had dealt with that issue in the past, that text messages had seemed to have come from an 811.com.’ She testified that State's Exhibit 22 was basically `follow up to what [Kristin] reported on May 4’ to the East Kingston police.
State v. Ruggiero, supra.
As to Exhibit 21, the court explained that Carrillo also testified that she received it, an
(e-mail regarding `BM 1 Eppright’) from [Kristin’s] `kvpoperations @gmail.com’ e-mail address. Carrillo `remember[ed] the substance’ of the e-mail message, `that . . . a friend of Jeffrey . . . was going to, quote, “screw [the defendant] over.”’ Carrillo also identified the various recipients of the e-mail, noting that these were `the type of people that would get CC'd on a lot of these [e-mails] from [Kristin]. Additionally, Attorney Newell confirmed that she received State's Exhibit 21 and testified as to its contents.
State v. Ruggiero, supra.
As to Exhibit 19, Carrillo testified that although she was not familiar with the
top portion of Exhibit 19 (e-mail regarding alleged additional restraining order violations by Jeffrey), which contained an e-mail to Attorney Newell that Carrillo was not copied on, she did recognize the bottom half of the e-mail. She testified that the e-mail was sent from `kvpoperations @gmail.com’ to her business e-mail address, as well as to the email addresses of Attorneys Newell and Theroux.

In addition, Carrillo described the content of the message, and testified that the e-mail discussed the report [Kristin] recently made to the East Kingston police regarding email messages she received. Further, Attorney Newell testified that she recalled answering [Kristin’s] inquiry in the e-mail about `getting a case number for the [May 4] report that she made.’
State v. Ruggiero, supra.
Finally, as to Exhibit 20,
Attorney Theroux testified that she found in her client files an email resembling State's Exhibit 20. She testified that although the format of the printed exhibit was different from the format that was in her electronic files, the content was the same. The e-mail was sent to her business e-mail address by `K. MacDonald Ruggiero,’ whom she understood was the defendant. Theroux testified that she did not have reason to believe someone other than [Kristin] sent the e-mail. Further, Attorney Newell testified that she recalled responding to this e-mail. Moreover, [Kristin] admitted to sending the e-mail.
State v. Ruggiero, supra.
Since the Supreme Court found that the emails were properly authenticated and therefore properly admitted into evidence at trial, and since it rejected Kristin’s other arguments on appeal, it affirmed her conviction. State v. Ruggiero, supra.
If you’d like to read a news story about this case and about additional charges that were brought against Kristin based conduct apparently intended to influence the outcome of her trial, check out the story you can find here. And the blog entry you can find here says Kristin is serving a 7-15 year prison sentence and that Jeffrey received a promotion and is trying to regain custody of his daughter.


Artikel Terkait:

0 komentar:

Posting Komentar