People v Johnson

Annotate this Case
[*1] People v Johnson 2015 NY Slip Op 25431 Decided on December 31, 2015 County Court, Sullivan County LaBuda, J. Published by New York State Law Reporting Bureau pursuant to Judiciary Law § 431. This opinion is uncorrected and subject to revision before publication in the printed Official Reports.

Decided on December 31, 2015
County Court, Sullivan County

The People of the State of New York, Plaintiff,

against

Robert Johnson, Defendant.



64-2015
Frank J. LaBuda, J.

The issue of the admissibility for Facebook and other electronically stored information evidence (ESI) is novel in U.S. Courts and has little statutory or judicial precedent guidance. This issue before this Court at a Criminal Jury Trial is to what extent is "ESI" evidence admissible at trial, and then to what extent is the proffered "ESI" evidence in this trial admissible.

The instant matter before the Court concerns the admissibility of ESI at the jury trial of Sullivan County Indictment #64-15, in which Defendant was charged with one count of Predatory Sexual Assault Against A Child, in violation of Penal Law §130.96. The charges stemmed from allegations by the victim, Cassidy Doe,[FN1] that for over a period of years, beginning when she was approximately 11 years old and continuing until she was approximately 13 years old her step father, the Defendant herein, subjected her to touching of her breasts and vagina over the course of extended period of time (more than three months), having oral sex over the course of an extended period of time, and having intercourse on two occasions during the spring of 2014. The child witness indicated the alleged incidents occurred in her bedroom at the family residence in the Town of Mamakaing, Sullivan County, New York.[FN2]

Pre-Trial Disclosure of Purported Facebook Information

As a threshold matter, the "ESI" evidence regarding Facebook items of the sexual abuse child witness, in this case was first disclosed by the Prosecutor to defendant during the course of pre-trial discovery and omnibus motion practice in connection with this case. The "ESI" items were disclosed as part of discovery because this defendant himself brought the victim's Facebook materials to the New York State Police barracks in Wurtsboro, New York, when first interviewed, in an apparent effort to assail the character of this child victim in the weeks following the girl's initial disclosure of his abuses of her.

The People did not represent, concede, or consent that these items are authentic, nor [*2]generated by the child witness, Cassidy Doe, associated with the Facebook materials.[FN3]

The People argued that these items must be precluded from evidence in this case, as they are irrelevant, have not been authenticated, and constitute inadmissible hearsay.

Facebook as Electronically Stored Information (ESI)

A brief description of the material now proffered for admission into evidence by defendant is warranted, in connection with the instant analysis of its authentication, relevance and admissibility at trial.

The defendant seeks to admit five separate exhibits. The first exhibit is a photograph which defendant alleges is a picture taken of Cassidy Mann's Facebook page. It is alleged that the photograph is a picture of Facebook pages, created by third parties, which Cassidy has, according to defendant, "Liked." One of those "likes" appears to be a Spanish language page entitled, "Sexo Infinito," and may be considered "mildly" pornographic and sexually suggestive, as are all the proffered exhibits.

Today Facebook is a major communication and identification media. Generally, a person using a Facebook account can "like" a third party page by clicking a "Thumbs up" icon located next to content posted by the third party.[FN4] This then has the page appear on the receiver's Facebook page, and in this case the child/witness'.

The next two exhibits submitted by the defendant purport to be photographs taken not of Cassidy Doe's purported Facebook page, but of images alleged by defendant to have been posted from the aforementioned third party site "Sexo Infinito" which are observable by any person who views that site. Both of these exhibits appear to depict couples simulating exotic sexual contact.

The remaining two exhibits depict images of enhanced male genitalia. It appears that these images were printed from a "comment" section, meaning that they can only be accessed by clicking the term "comment," which is adjacent to content posted at a third party site, which in this case was allegedly done again by the child/witness.



The Prosecutor's Argument1. The Prosecutor maintains Cassidy Doe was the person who caused a "like" associated with "Sexo Infinito" to appear on the first proffered page;

2. Cassidy Doe never viewed the content depicted upon any of the proffered exhibits.

3. Cassidy Doe did not identify the exhibits during direct or cross-examination.

4. The exhibits defendant has offered into evidence are not relevant to the material issues of this case.

The Prosecutor's last argument regarding relevancy will be addressed first by this Court. The Court of Appeals has stated, "as a general rule, evidence is relevant if it tends to prove the existence or non-existence of a material fact, i.e., a fact directly at issue in the case" (People v. [*3]Primo, 96 NY2d 351 [2001]). Thus, where evidence offered does not tend to prove the existence or non-existence of a material fact directly at issue in a case, it is not relevant. Assuming arguendo the exhibits are legally admissible, they would only tend to show the sexual penchant the alleged victim may or may not have. Consent in this case is not an issue under the law and the material elements of a Predatory Sexual Act Against a child (P.L. 130.96). In fact, a child under the age of 13 is deemed to be incapable of consenting to sexual conduct by definition of law.

The ESI images sought to be introduced by the defendant do not tend to prove the existence or non-existence of any material fact at issue in the case. The purported sexual content is irrelevant, both factually and legally to whether or not this defendant engaged in a course of sexual conduct against Cassidy Doe from the Summer of 2011 to on or about May 2013.

Defendant has not offered a scintilla of evidence that would support materiality or relevancy in this case.

Additionally, there has been no evidence that Cassidy Doe ever operated the purported Facebook account or "liked" the third-party site in question, nor is there any evidence that the victim ever viewed any of the pictures contained on that third-party site, including those purportedly added to that site by its administrator or an operator thereof, nor the images appearing in the "comment" section thereof. These exhibits cannot be construed as relevant because there is no evidence to suggest a nexus between the images contained on the "Sexo Infinito" page and the elements of Predatorial Sexual Act Against a Child. (PL 130.96)

Assuming arguendo, that the "like" choice was made on the Facebook page by the witness, any question as to what she may have liked on Facebook and pictures associated with any third party account do not tend to prove or disprove any material fact that relates to this defendant's guilt. Whether the victim "liked" or did not "like" a third-party site that posts sexualized content is irrelevant to the guilt or non-guilt issues at trial.[FN5]



Facebook to Impeach the Witnesses Credibility

The Defendant's argument to use the exhibits to impeach the witness' credibility also fails under the law. Defendant chose not to examine the victim, Cassidy Doe, with respect to the association of her purported Facebook page with the third-party site, and furthermore, never questioned the victim as to whether she viewed the third-party site ESI images now offered by defendant into evidence. A Facebook page associated with sexualized content, purported to have been accessed well after defendant's access to abuse the victim had been foreclosed by the removal of the victim from defendant's home, does not go to this witness's credibility. Furthermore, no foundation was made by the Defendant to use the ESI as an inconsistent statement.

"A cross-examiner is bound by the answers of a witness to questions concerning collateral matters (see People v. Pavao, 59 NY2d 282, 288 [1983]). Thus, a party who is cross-examining the witness cannot introduce extrinsic documentary evidence or call other witnesses to [*4]contradict the witness' testimony concerning collateral matters solely for the purpose of impeaching that witness' credibility' (Pavao, supra, 59 NY2d at 288-289)." People v. Inniss, 192 AD2d 553, 554 [2d Dept 1993], affirmed 83 NY2d 653 [1994]. Thus, the collateral estoppel rule, which is binding upon this Court, precludes defendant from now offering the material at issue.

"The general rule of evidence in this State concerning the impeachment of witnesses with respect to collateral matters is that the cross-examiner is bound by the answers of the witness to questions concerning collateral matters inquired into solely to affect credibility." (Richardson, Evidence [Prince, 10th ed], §491, p 477.) It is well established that the party who is cross-examining a witness cannot introduce extrinsic documentary evidence or call other witnesses to contradict a witness' answers concerning collateral matters solely for the purpose of impeaching that witness' credibility. (People v. Zabrocky, 26 NY2d 530, 535 [1970]; People v. Schwartzman, 24 NY2d 241, 245 [1969], cert den 396 US 846; People v. Duncan, 13 NY2d 37, 41 [1963]; People v. Sorge, 301 NY 198, 201 [1950])" Pavao, supra, 59 NY2d at 288-289.

In this context, defendant's proffer of the ESI material is an attempt to assail the credibility of his victim in violation of the collateral estoppel rule precluding such extrinsic documentary evidence material from admission into evidence at trial for impeachment purposes and not a prior inconsistent statement.

The defendant has argued that the instant material is relevant with respect to the victim's credibility, yet defendant has failed, in toto, to confront the victim with the existence of the "like" at issue, nor has he confronted the victim with any question as to whether she viewed the seemingly pornographic images on the third-party site. The only testimony elicited from the witness on the issue of Facebook is not called into question by the evidence proffered; that is , the victim testified that she did not have pornographic images on her Facebook site, and the proffered material does not suggest otherwise. Instead, the proffered material confuses that issue by offering into evidence images on a third party site neither controlled nor demonstrably accessed or viewed by the victim, who was never questioned with respect to her knowledge of the site. Furthermore, defendant has not demonstrated that the material as issue "show[s] moral turpitude to be relevant on the credibility issue" (Badr v. Hogan, 75 NY2d 629, 634 [1990]). For all of these reasons, defendant is now barred from moving into evidence extrinsic documentary evidence assuming arguendo the defendant's argument that such material bears in some way on the victim's credibility. Badr, id., 75 NY2d at 635-636 ("It was error to admit this extrinsic proof for the sole purpose of contradicting [a witness's] testimony on [a] collateral issue (see Schwartzman, supra, 24 NY2d at 245; Sorge, supra, 301 NY at 201)".); accord People v. Blanchard, 279 AD2d 808, 811 [3d Dept 2001], Iv denied 96 NY2d 826 [2001]; People v. St. Louis, 20 AD3d 592, 593 [3d Dept 2005].

Accordingly, the law of this State is clear that the ESI material proffered by defendant must be relevant and material before other pertinent issues of admissibility can be met. Otherwise it is precluded from admission into evidence at trial. Nonetheless, the Court will also address the fundamental evidentiary issues of ESI.



Electronically Stored Information (ESI)

Electronically stored information ("ESI") is a broad term generally used to describe information stored on computers, including e-mail, internet sites, computer logs, documents, [*5]digital recordings, and various other media; the Federal rules o f Civil Procedure, in 2006, were amended to include provisions for the preservation and civil discovery of such information.



Authentication of Electronically Stored Information

ESI may, in certain contexts, be properly admitted into evidence. Such information may be authenticated according to the same principles governing authentication of other types of evidence. For example, the creator of such information may testify as to its authenticity (Thompson v Workmen's Circle Multicare Ctr, 2015 USDist Ct LEXIS 74528 [SDNY 2015]). However, although circumstantial evidence of authenticity may, in some cases, be sufficient to provide an adequate foundation upon which digital evidence may be admitted, circumstantial evidence is an insufficient foundation for admissibility where there is no evidence establishing the security of a website from which purported information has been accessed or that a purported author had exclusive access thereto. Commonwealth v. Williams, 456 Mass 857, 869 [2010]. Indeed, "courts have recognized that authentication of ESI may require greater scrutiny than that required for the authentication of hard copy' documents..." (Lorraine, supra, 241 FRD at 542-543), and that decisions as to the admissibility of such items "are to be evaluated on a case-by case basis as any other document to determine whether or not there has been an adequate foundational showing of their relevance and authenticity" (Lorraine, id., 241 FRD at 543, quoting In the Interest of F.P., 878 A2d 91, 96 [Sup Ct PA 2005]). "Indeed, courts increasingly are demanding that proponents of evidence obtained from electronically stored information pay more attention to the foundational requirements than has been customary for introducing evidence not produced from electronic sources." Lorraine, supra, 241 FRD at 543.



Lorraine v Markel am. Ins. Co.

This Court's reliance upon a 2007 holding of the United States District Court for the District of Maryland, in Lorraine v Markel Am. Ins. Co., 241 FRD 534 [US Dist Ct MD 2007] and the Federal Rules of Evidence 803(8), supports a finding, in the case at bar, that defendant has failed to adequately authenticate the items he now proffers as evidence.

In Lorraine, the US District Court of Maryland denied summary judgment motions which were purportedly supported by e-mails which were not authenticated, and failed, therefore, to comply with the requirements of Rule 56(3) of the Federal Rule of Evidence. Lorraine v Markel, id, 241 FRD 534. Indeed, the Lorraine court found that the documents submitted to it for consideration in that case had not been properly authenticated. In the case at bar the Defendant failed to have the witness, or anyone accept or deny the third party Facebook page.

The Lorraine court engaged in an analysis of the rules governing admissibility of ESI, under the Federal Rules of Evidence, summarized and applied to the instant situation as follows.



Authentication by Personal Knowledge

"Courts considering the admissibility of electronic evidence frequently have acknowledged that it may be authenticated by a witness with personal knowledge, United States v Kassimu, 188 FedAppx 264 [5th Cir 2006] (ruling that copies of a post office's computer records could be authenticated by a custodian or other qualified witness with personal knowledge of the procedure that generated the records); St. Luke's Cataract and Laser Institute PA v Sanderson, 2006 US Dist LEXIS 28873, *3-4 [MD Fla May 12, 2006] ( To authenticate printouts from a website, the party proffering the evidence must produce some statement or affidavit from [*6]someone with knowledge [of the website]...for example [a] web master or someone else with personal knowledge would be sufficient.' (citation omitted)); United States v Safavian, 435 FSupp2d 36 at 40 n.2 [DDC 2006] (noting that e-mail may be authenticated by a witness with knowledge that the exhibit is what it is claimed to be); Wady v Provident Life and Accident Ins. Co. of Am., 216 FSupp 2d 1060 [CD Cal 2002] (sustaining objection to affidavit of plaintiff's witness attempting to authenticate documents taken from the defendant's website because the affiant lacked personal knowledge of who maintained the website or authored the documents). Although Rule 901(b)(1) certainly is met by testimony of a witness that actually drafted the exhibit, it is not required that the authenticating witness have personal knowledge of the making of a particular exhibit if he or she has personal knowledge of how that type of exhibit is routinely made. (See JACK B. WEINSTEIN & MARGARET A. BERGER, WEINSTEIN'S FEDERAL EVIDENCE §901.03[2] (Joseph M. McLaughlin ed., Matthew Bender 2d ed. 1997)) hereinafter WEINSTEIN. It is necessary, however, that the authenticating witness provide factual specificity about the process by which the electronically stored information is created, acquired, maintained, and preserved without alteration or change, or the process by which it is produced if the result of a system or process that does so, as opposed to "boilerplate" or conclusory statements that simply parrot the elements of the business record exception to the hearsay rule, (Federal) Rule 803(6), or public record exception, Rule 803(8)." Lorraine, supra 241 FRD at 545-546.

In the case at bar the defendant has no personal knowledge with respect to the management, security or corporate records of Facebook, nor does he have any personal knowledge that the proffered materials were created by the person to whom he has attributed them: his child victim. Defendant has not and cannot testify with respect to the maintenance of Facebook records, nor has he (or can he ) testify with respect to the routine creation of such records, as he has failed to demonstrate any knowledge of the corporate policy or computer programs comprising Facebook. Because there has been no factual specificity offered in this case with respect to how the ESI at issue is created, acquired, maintained and preserved without alteration or change, he cannot authenticate the proffered materials in this manner.



Authentication by Comparison to Known Authentic Samples

The Lorraine court also explained that the ESI may be authenticated by comparisons made, by a fact-finder or expert witness, to known and authentic ESI, Lorraine, id., 241 FRD at 546.

Defendant has not authenticated the materials now at issue in this way, by calling an expert or other witness with comparisons.



Authentication Circumstantial Evidence Couple with Distinctive Characteristics

Nonetheless, the Lorraine court further described a method "most frequently used to authenticate e-mail and other electronic records." Lorraine, id., 241 FRD at 546.

This method, pursuant to Rule 901(b)(4) of the Federal Rules of Evidence, "permits exhibits to be authenticated or identified by [a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.' The commentary to Rule 901(b)(4) observes [t]he characteristics of the offered item itself, considered in the light of circumstances, afford authentication techniques in great variety,' including authenticating an exhibit by showing that it came from a particular person by virtue of its disclosing knowledge of facts known peculiarly to him,' or authenticating by content and circumstances indicating it was [*7]in reply to a duly authenticated' document. FED. R. EVID. 901(b)(4) advisory committee's note.[FN6] Use of this rule often is characterized as authentication solely by circumstantial evidence.' WEINSTEIN at §901.03[8]. Courts have recognized this rule as a means to authenticate ESI, including e-mail, text messages and the content of websites. In United States v. Siddiqui, 235 F3d 1318, 1322-23 the 11th Cir in 2000 allowed the authentication of an e-mail entirely by circumstantial evidence, including the presence of the defendant's work e-mail address, content of which the defendant was familiar with, use of the defendant's nickname, and testimony by witnesses that the defendant spoke to them about the subjects contained in the e-mail. See Safavian supra, 435 Fsupp2d at 40(same result regarding em-mail); In Re F.P., supra,878 A2d at 94 (noting that authentication could be accomplished by direct evidence, circumstantial evidence, or both, but ultimately holding that transcripts of instant messaging conversation circumstantially were authenticated based on presence of defendant's screen name, use of defendant's first name and content of threatening message, which other witnesses had corroborated); Perfect 10, Inc. v Cybernet Ventures, Inc., 213 FSupp2d 1146, 1153-54 [CD Cal 2002] (admitting website postings as evidence due to circumstantial indicia of authenticity, including dates and presence of identifying web addresses)." Lorraine, supra, 241 FRD at 546.

The Lorraine court explained modes of circumstantial authentication that could support the admissibility of ESI, including "hash values" (241 FRD at 546-547) and "metadata"[FN7] (241 FRD at 547-548), neither of which have been offered in support of the instant defendant's proffer of the material at issue in the case at bar.

Here the defendant has failed to authenticate the materials at issue by circumstantial evidence. Indeed, defendant, during his trial testimony, had denied knowledge that his victim had a Facebook account. Defendant's only claim to have associated the instant exhibit purportedly depicting an image of that account based upon the appearance of the victim's name and photograph thereupon. Federal courts have described these kinds of materials as "inherently untrustworthy," and that "hackers can adulterate the content on any web-site from any location at any time." (emphasis added). For these reasons, any evidence procured off the Internet is adequate for almost nothing, even under the most liberal interpretation of the hearsay exception rules..." St. Clair v. Johnny's Oyster & Shrimp, Inc., 76 FSupp2d 733, 744-775 [SD Tex 1999]. Taken in conjunction with all of the circumstances attendant to defendant's testimony with respect thereto, defendant's purported authentication of the "likes" section of what he purports to be a previously-unknown to him Facebook page of the victim via a name, which may be entered by any person creating an account and is not verified in any way by the operators of Facebook, and a picture (again, entered by any user and not verified in any way by the operators of Facebook), without any verification from any source that the victim was the operator of that specific Facebook account at any time, including at the time defendant purportedly captured an image thereof, weeks after his access to abuse the victim had been cut off, is wholly insufficient to authenticate that image. Furthermore, the remaining exhibits offered by defendant have not [*8]been authenticated by him that can in any way attribute or connect those images to the victim, including because of this inability to authenticate the purported image of the victim's Facebook page, as well as because those images do not appear, anywhere, on the purported image of the victim's Facebook page, and, instead, appear on a third-party site, and defendant has failed to establish that the victim ever viewed any of those images on the likes' sites. There is no circumstantial evidence demonstrating that the victim ever visited the third party site.

Thus, defendant has failed to demonstrate any circumstances supporting a conclusion that the Facebook page he attributes to the victim is authentic, having not established any indicia of reliability, such as the existence of disclosed knowledge of any fact particularly known to the victim, nor any content nor circumstances indicting the victim was replying to any other known, authentic communication or document. Therefore, defendant has not satisfied his burden pursuant to this method of authentication as established by Courts in the U.S..



Public Record or Reports as Authentication

The Lorraine court recognized tht the public filing or recording of ESI may support its admissibility. Lorraine, id., 241 FRD at 548-549.

Defendant has not, and cannot, advance this method as a means of authenticating the proffered materials.



Accuracy and Reliability of a Process or System as Authentication

The Lorraine Court further described authentication via proof that a particular computer process or system produces an accurate and reliable result (for example, computer-generated evidence). Lorraine, id., 241 FRD at 549.

Defendant has not, advanced this method as a means of authenticating the proffered materials.



Self-Authentication

The Lorraine court further described the variety of documents which are self-authenticating, and which include various forms of ESI, none of which have been advanced by this defendant in support of his application. 241 FRD at 549-553. Examples of self-authenticating records include public records or reports stored in a public office: tax returns, weather bureau records, military records, social security records, INS records, VA records, judicial records, correctional records, law enforcement records, domestic public documents under and not under seal, foreign public documents, certified copies of public records, official publications of public authorities, newspapers and periodicals, trade inscriptions, acknowledged documents (for example by a notary public), commercial paper and related documents, and certified domestic records of regularly conducted activity.



Internet Postings, Test Message/Chat Room Content

Important to the law of evidence in New York the Lorraine court further engaged in a theoretical analysis of the authentication required to admit internet postings and text message or chat room content, concluding that "[b]ased on the ]relevant] cases, the rules most likely to be used to authenticate chat room and text messages, alone or in combination, appear to be 901(b)(1) (witness with personal knowledge) and 901(b)(4) (circumstantial evidence of distinctive characteristics)." Lorraine, id., 241 FRD at 556. Further, "authentication rules most likely to apply, singly or in combination, [to internet website postings] are 901(b)(1) (witness [*9]with personal knowledge) 901(b)(3) (expert testimony) 901(b)(4) (distinctive characteristics), 901(b)(7) (public records), 901(b)(9) (system or process capable of producing a reliable result), and 902(5) (official publications)." Lorraine, id., 241 FRD at 556.

Because the instant defendant has failed to demonstrate the existence of any evidence supporting any of the methods of authentication described by the Lorraine court, or the Federal Rules, he cannot meet any of the authentication burdens contemplated by the court for the admission of the purported Facebook "likes" of the victim, nor for the admission of the far more attenuated, third party sites. Therefore, because defendant cannot demonstrate the authenticity of the proffered material, and because the material is utterly irrelevant with respect to any material fact at issue in this case, his application to admit those materials must be denied; additionally, the Court should preclude these items as inadmissible hearsay.[FN8]



Hearsay Objection to ESI

Internet postings are out of court declarations and present a hearsay issue.

"Where postings from internet websites are not statements made by declarants testifying at trial and are offered to prove the truth of the matter asserted, such postings generally constitute hearsay under Fed. R. Evid. 801. United States v. Jackson, 208 F3d 633, 638 [7th Cir 2000] (declining to admit web postings where defendant was unable to show that the postings were authentic, and holding that even if such documents qualified under a hearsay exception, they are inadmissible if the source of information or the method or circumstances of preparation indicate a lack of trustworthiness') (quoting United States v Croft, 750 F2d 1354, 1367 [7th Cir. 1984]); see also St. Clair v. Johnny's Oyster & Shrimp, Inc., supra, 76, FSupp 2d at 775 ( [A]ny evidence procured off the Internet is adequate for almost nothing, even under the most liberal interpretation of the hearsay exception rules.')." Novak v Tucows, Inc., 2007 US Dist LEXIS 21269, * 15-16 [ED NY Mar. 26, 2007].

The victim/witness in the case at bar was not confronted with the "likes" now attributed to her, nor was she questioned with respect to whether she has viewed the images purported to exist on a third party site. Therefore, the "like" now attributed to her, now offered to prove, purportedly, that she did cause that "like" to exist, constitutes impermissible hearsay which falls within no existing exception and, therefore, must be precluded. The proffered material purporting to be the victim's "likes" on Facebook pages is akin to a written statement "which may be just as much hearsay as oral testimony" (Boschen v Stockwell, 244 NY 356 [1918]). Furthermore, there is no evidence suggesting that the victim ever viewed the additional sexually [*10]suggestive images offered by defendant. These images do not exist even upon the purported Facebook page of Cassidy Doe offered by defendant as that of the victim, and, thus, in addition to constituting hearsay, they remain unauthenticated.



Rape Shield Law

Defendant's offer of these materials further violates Section 60.42 of the Criminal Procedure Law, generally known as New York's "Rape Shield" law.

"Evidence of a victim's sexual conduct shall not be admissible in a prosecution for an offense or an attempt to commit an offense defined in Article 130 of the Penal law unless such evidence:



1.Proves or tends to prove specific instances of the victim's prior sexual conduct with the accused; or

2.Proves or tends to prove that the victim has been convicted of an offense under section 230.00 of the Penal Law within three years prior to the sex offense which is the subject of the prosecution; or

3.rebuts evidence introduced by the People of the victim's failure to engage in sexual intercourse, oral sexual conduct, anal sexual conduct or sexual contact during a given period of time; or

4.Is determined by the Court after an offer of proof by the accused outside the hearing of the jury. Or such hearing as the Court may require, and a statement by the Court of its findings of fact essential to its determination, to be relevant and admissible in the interests of justice." New York CPL §60.42.

The Rape Shield "law bar[s] harassment of victims and confusion of issues through raising matters relating to the victim's sexual conduct that have no proper bearing upon the defendant's guilt or innocence' (Presler, Practice Commentaries, McKinneys Cons Laws of NY, Book 11A CPL 60.42, at 9 [emphasis added]; See also, Berger, Man's Trial, Woman's Tribulation: Rape Cases in the Courtroom, 77 Column L Rev 1, 15-22)." People v. Jovanovic, 263 AD2d 182, 192 [1st Dept 1999], app dismissed 95 NY2d 846 [2000]. This is exactly the kind of evidence defendant now seeks to introduce, after failing to demonstrate any basis upon which this Court could construe it as relevant, authenticated or non-hearsay, for the sole purpose of attacking his victim's purported and unverified "like" of a sexualized Facebook site.

Indeed, even where specific content has caused actual disagreement between a victim and a defendant, even simple cross-examination of the victim on that issue, far short of admission into evidence of purported images of graphic content, is properly limited, even where "it was obvious that the inappropriate...postings caused considerable friction between defendant and his daughter and that she resented his parental intrusion" (People v. Halter, 19 NY3d 1046, 1051 [2012]. Thus, in the case at bar where defendant failed to engage in any cross-examination of his victim on this issue and has himself denied any prior knowledge of his victim's use of Facebook prior to his separation from her and the cessation of his abuses of her, admission of the proffered material is prohibited by the rules of evidence, as set forth above, and furthermore because the defendant has totally failed to demonstrate the existence of the purported "like" prior to the cessation of his abuses, and because the introduction of such evidence violates the Rape Shield law.

"Evidence that [a] friend touched the victim sexually while at defendant's apartment does [*11]not indicate that the victim was willing to engage in sexual relations with anyone, including the friend, and is irrelevant to the issue to the issue of whether her sexual relations with defendant were consensual. ...It has been routinely held that a victim's willingness to engage in sexual conduct with one person around the time of the incident in question is not indicative of a concomitant desire to consent to such behavior with another (see People v. Wilhelm, 190 Mich App 574, 585, [1991], Iv denied 439 Mich 1013 [1992]; Ellis v State, 181 GA App 630, 632 [1987]; State v Bevins, 140 Vt 415,419 [1981];Commonwealth v Folino, 293 Pa Super 347, 355-357 [1981]; see also People v. McLaurin, 27 AD3d 1117, 1118 [2006], Iv denied 7 NY3d 759 [2006][ People v. Grantier, 295 AD2d 988 [2002], Iv denied 99 NY2d 535 [2002]). Indeed, the inference that defendant sought to establish by the proffered evidence is precisely that which the Rape Shield Law sought to prevent ( see generally People v Williams, 81 NY2d 303, 312 [1993]; PrESIer, Practice Commentaries, McKinney's Cons Laws of NY, Book 11A, CPL 60.48)." People v Simonetta, 94 AD3d 1242, 1245 [3d Dept 2012], Iv denied 19 NY3d 1029 [2012]. Thus, even if defendant were to argue that, in some way, the materials proffered demonstrate the victim's willingness to engage in sexual conduct, such testimony or evidence is exactly the kind of testimony or evidence prohibited from admission at trial by the Rape Shield law. Indeed, even where mental health records have included reports of a victim's "hypersexuality," such evidence is properly excluded. "Defendant did not introduce medical evidence or expert testimony to establish that hypersexuality is a mental illness that would impact the victim's credibility or control her behavior; indeed, all references to the victim's hypersexuality' in her medical history are to her wholly voluntary inappropriate, promiscuous behavior—conduct intentionally designed to shock and draw attention—which is precisely the kind of evidence the Rape Shield Law prohibits (see CPL 60.42; People v. Simonetta, supra 94 AD3d at 1246)." People v. Mccray, 102 AD3d 1000, 1007-1008 [3d Dept 2013], affirmed 23 NY3d 193 [2014].

Defendant's application to admit the proffered materials should, therefore, be also denied as violative of the Rape Shield Law, as well as for all of the reasons set forth above on relevancy and ESI authentication.



Conclusion

Since the proffered ESI materials are irrelevant to the material issues at trial, and are offered solely as an impermissible collateral attack on the victim's credibility without any demonstration that such materials actual impair the credibility of the victim, rather than simply demonstrate defendant's effort to embarrass and shame his child victim/witness); and because the proffered ESI materials have not been sufficiently authenticated pursuant to any permissible mode of authentication; and because the proffered materials are inadmissible as hearsay; and because such evidence violates the Rape Shield law, the materials of ESI are precluded from evidence at this trial.



Dated: Monticello, New York

December 31, 2015



__________________________________

Hon. Frank J. LaBuda

County Court Judge and Surrogate

Acting Supreme Court Judge Footnotes

Footnote 1:Cassidy Doe, testified at trial at the age of 14 regarding incidents that first happened when she was eleven years old.

Footnote 2:Sullivan County Family Court had previously awarded Defendant custody of the victim and her younger brother after determining their biological parents were incapable of caring for the children. The authorities became aware of the allegations after the victim contacted her biological mother on FaceBook. According to the trial testimony, the biological mother, in turn, told the victim's uncle, who reported the allegations to the authorities and the New York Stated Police investigated the case.

Footnote 3:Therefore, the general rule in the context of civil cases that items produced by one party to another in the course of discovery are presumed authentic is not implicated by the People's disclosure to counsel for defendant of documents delivered by defendant himself to the police. (See, e.g., Lorraine, infra, 241 FRD at 552-553).

Footnote 4:It is important to note that on January 9, 2014, Facebook was sued in the United States District Court for the Northern District of California. The complaint alleged that Facebook falsely attributed sponsorship in the form of "likes" to items that individual users had never liked. The complaint was eventually withdrawn by the Plaintiff (Dittirro v. Facebook,5:2014cv00132).

Footnote 5:Even if the victim was an adult, the protection of the Rape Shield Law and its progeny of cases make the victim's sexual proclivity or sexual history "protected" and irrelevant as will be later discussed.

Footnote 6:In New York there is no legislative authority or Rules for ESI.

Footnote 7:"Hash" value is a word used in a message preceded by the number for a search. "Metdata" is info that is held as a description of stored data, like a Google search of keywords for a website.

Footnote 8:As Novak proffers neither testimony nor sworn statements attesting to the authenticity of the contested web page exhibits by an employee of the companies hosting the sites from which plaintiff printed the pages, such exhibits cannot be authenticated as required under the Rule of Evidence. See, e.g. Costa v. Keppel Singmarine Dockyard PTE, Ltd., No. 01-CV-11015 MMM (Ex), 2003 US Dist LEXIS 16295, at *29 n.74 [CD Cal Apr. 25, 2003] (declining to consider evidence downloaded from corporation's website in the absence of testimony from the corporation authenticating such documents) (citing Jackson, 208 F3d at 638, and St. Clair, 76 FSupp2d at 775 ( Anyone can put anything on the internet. No web-site is monitored for accuracy and nothing contained therein is under oath or even subject to independent verification absent underlying documentation.')). Therefore, in the absence of any authentication of plaintiff's internet printouts, combined with the lack of any assertion that such printouts fall under a viable exception to the hearsay rule, defendants' motion to strike Exhibits B, J, K, N-R, U and V is granted." Novak v. Tucows, Inc., 2007 US Dist LEXIS 21269, *18 [ED NY Mar. 26, 2007].



Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.