SlideShare a Scribd company logo
Social Media in Legal
Investigations
Ian Tausig, CSMIE
Brian J. Kramer, CFLS
California Association of Licensed Investigators, 2016 Annual Conference
June 11th, 2016 – Rancho Mirage, California
Agenda
•Working with counsel to identify issues in the case
•Identifying likely sources of evidence
•Investigative techniques
•Social Media Forensics
•Legal and Evidentiary Issues
•Case Study: Michelle Ghent v Terrence Howard
About
Ian A. Tausig, CSMIE
•Ian Tausig is a licensed private investigator and
the President of Tausig & Associates, a full-
service professional investigation agency which
specializes in providing litigation support and
legal investigation services to law firms and
insurance carriers throughout California. Ian is a
former law enforcement professional,
establishing his agency in 2013. He is a board
certified Social Media Intelligence Expert, as
well as a subject matter expert and court-
testified expert witness in the field of social
media investigative techniques, and the
authenticity of social media evidence.
About
Brian J. Kramer, CFLS
•Brian Kramer is certified by the California
Board of Legal Specialization as a family law
specialist, has been recognized as a Super
Lawyer in the practice of family law, and he is
widely regarded to be one of the top divorce
attorneys among his class of peers in Los
Angeles. In recognition of some of the
outstanding results he has secured for his
clients, Brian’s family law practice has been the
subject of both local and national news
coverage. Most recently and notably, Brian
successfully worked to vacate a large spousal
support judgment against academy award
nominee, actor Terrence Howard.
Introduction
•100 million hours of video watched per day
•1 billion users on Groups
•80 million users on Facebook Lite
•500 million users on Events
•123 million events created in 2015
•50 million small and medium sized business on Facebook Business Pages
Why social media should be reviewed in every case
Image From http://www.technewstoday.com/
Introduction
Why social media should be reviewed in every case
January 24th, 2016 – 1 Billion individual logins on Facebook
Working with Counsel
Why use social media evidence?
•Evidence of state of mind
•Evidence of communication
•Evidence of time and place
•Evidence of actions
•Rebuttal and Impeachment Evidence
Identifying Sources of Evidence
1. Facebook
1.1 billion unique users per month
2. YouTube
1 billion unique users per month
3. Twitter
310 million unique users per month
4. LinkedIn
255 million unique users per month
5. Pinterest
255 million unique users per month
6. Google+
120 million unique users per month
7. Tumblr
110 million unique users per month
8. Instagram
100 million unique users per month
9. Reddit
85 million unique users per month
6. VK
80 million unique users per month
Social Media Forensics
• Forensic Preservation and Chain of Custody
• Just because it’s on the internet, the same basic principals for collecting and
storing evidentiary material applies.
• Best practices for forensically preserving social media evidence include:
• Use of forensic software for preservation. Forensic software will create an
audit trail and preserve relevant metadata behind preserved content.
• X1 Social Discovery for social media content
• WebPreserver for content outside of X1’s support social media platforms,
or websites.
• Bottom line: Screen shots, printing to PDF, or printing a paper copy is not
a forensic preservation and can potentially lead to significant evidentiary
challenges and authentication issues.
Authentication
• Personal knowledge - "Yes, I know that is his/her Facebook page."
• Distinctive Appearance - appearance, content, substance, internal
patterns, specific indicia
• Deposition or interrogatories - "Do you maintain the Facebook
account in this name?"
• Expert witness testimony - "In my opinion, this Facebook page is
maintained by him/her“
• Basic Subscriber Information - Obtained from subpoena
Experts construct the integrity of a document. Utilize as many of these as
possible to authenticate social media evidence:
Legal Aspects of Social Media
• Statutes and Case Law
• The Stored Communications Act (SCA)
• Formal Discovery: Special Interrogatories, Demands for
Production, and Subpoenas
Case Law, Ethics, Preservation and Authentication
California Evidence Code
•California Evidence Code 1400
•Authentication of a writing means (a) the introduction of evidence sufficient to sustain a
finding that it is the writing that the proponent of the evidence claims it is or (b) the
establishment of such facts by any other means provided by law.
•California Evidence Code 1552(a)
•A printed representation of computer information or a computer program is presumed to
be an accurate representation of the computer information or computer program that it
purports to represent. This presumption is a presumption affecting the burden of
producing evidence. If a party to an action introduces evidence that a printed
representation of computer information or computer program is inaccurate or unreliable,
the party introducing the printed representation into evidence has the burden of proving,
by a preponderance of evidence, that the printed representation is an accurate
representation of the existence and content of the computer information or computer
program that it purports to represent.
•California Evidence Code 352
•The court in its discretion may exclude evidence if its probative value is substantially
outweighed by the probability that its admission will (a) necessitate undue consumption of
time or (b) create substantial danger of undue prejudice, of confusing the issues, or of
misleading the jury.
California Case Law
•People v. Beckley (2010) 185 Cal.App.4th 509
•Evidence from Social Media sources must be properly
authenticated.
•Also cites People v. Doggett (1948) 83 Cal.App.2d 405 that “no
expert testified that the photo was not a composite or fake”
•“Such expert testimony is even more critical today to prevent the
admission of manipulated images. . . . [W]ith the advent of
computer software programs such as Adobe Photoshop it does
not always take skill, experience, or even cognizance to alter a
digital”
California Case Law
•People v. Valdez (2011) 201 Cal.App.4th 1429
•Trial court admitted MySpace “printouts,” upheld on appeal
•Provided guidance on use of “specific indicia” to authenticate social media evidence
•MySpace page icon identifying the owner of the page displayed a photograph of Defendant’s face.
•Defendant’s Myspace page included greetings addressed to him by name and by relation
•Defendant’s sister left a "big brother" salutation on his MySpace page, accompanied by a user icon
consisting of her photograph
•Greeting from Defendant’s sister was one of many posts by friends and by the page owner that included
personal details
•Page owner's stated interests, including an interest in gangs generally and specifically, matched what the
police otherwise knew of Defendant’s interests from their field contacts with him
•“The writings on the page and the photograph corroborated each other by showing a pervading interest in
gang matters, rather than an anomalous gesture.”
•“Other key factors include that the evidence strongly suggested the page was Defendant’s personal
site…and that the page was password protected for posting and deleting content, which tended to
suggest Defendant, as the owner of the page, controlled the posted material.”
Stored Communications Act (SCA)
• SCA creates Fourth Amendment-like privacy protection for email
and other digital communications (content) stored on the
internet.
• Limits the ability of “electronic communications holders” to reveal
content information to nongovernment entities.
18 U.S.C. §2701, et. seq
• Social media and email providers are defined as “electronic
communication services” (ECS) within SCA.
Legal Requests
• Special Interrogatories
• Demands for Production (DFP)
• Subpoenas
• Alternate methods
Special Interrogatories,
Demands for Production,
and Subpoenas
Subpoenas
• Response by a social media platform to a criminal or civil subpoena, requesting
content is PROHIBITED by SCA.
• Basic subscriber information is not protected by SCA and may be obtained via
subpoena to the platform.
• Basic subscriber information is:
• Account holder’s name
• Account holder’s address
• Local and long distance telephone connection records, or records of session times
and durations
• Length of service (including start date) and types of service utilized;
• Telephone or instrument number or other subscriber number or identity, including
any temporarily assigned network address [which would include IP addresses]
• Means and source of payment for such service (including any credit card or bank
account number)
Subpoenas (Continued)
• Use specific, narrow verbiage in subpoenas
• Identify specific user name’s and/or account numbers in the request
• Party must be given notice prior to service of the subpoena
• For obtaining content – SCA does NOT apply to individual parties, just the platforms.
Demand for Production
CCP§2031.010
• Specific, narrow verbiage
• Avoid fishing expeditions - “Any/All,“ “Complete account”
• Specific date range
• In regards to messages between parties, specify the other party
• In regards to pictures, specify pictures of who
• If already available, utilize the username/number of the account
Legal Requests
Alternate Methods
• In any formal discovery, SCA becomes a strongly controlling factor. However – SCA only controls content held
by the provider, not by the party.
• Alternative: Requesting the court compel the party to consent under SCA; or compel the party to provide their
login (username / password) information
• “If the court can compel Juror Number One to produce the information, it can likewise compel Juror Number
One to consent to the disclosure by Facebook. The SCA has no bearing on this issue.” -Juror Number One v.
Superior Court, 206 Cal. App. 4th 854, 142 Cal. Rptr. 3d 151 (Ct. App. 2012).
• A court may compel a party consent to disclosure of communications under 18 U.S.C. §2702(b)(3) - Negro v.
Superior Court, 230 Cal. App. 4th 879, 179 Cal. Rptr. 3d 215 (Ct. App. 2014).
• Federal court requires a party to respond to interrogatories “requesting her to list all user names and
passwords for every social media site she utilizes” - Howell v. Buckeye Ranch, Inc., No. 2:11–cv–1014, 2012 WL
5265170 (S.D. Ohio Oct. 1, 2012)
• The courts have widely disagreed on the reasonableness of these approaches, awarding sanctions against
requesting parties, as they should be considered secondary or last-resort.
Ethics in Social Media Investigations
Agent of Counsel
• Things you can do that will can your attorney / law firm clients in trouble with the
State Bar:
• Attorney / Law Firm clients have professional responsibility to supervise the work of
their “employees or agents” – Professional Rules of Conduct 3-110
• Communicate directly or indirectly about the subject of the representation with a
party (ex-parte communication) – Professional Rules of Conduct 2-100
• Attorney sends Facebook friend requests to two high-ranking company
employees of the opposing party in an action.
• SDCBA opined “[CalBar]…rules bar an attorney from making an ex parte friend
request of a represented party.” – SDCBA Legal Ethics Opinion 2011-2
Private Profiles & Ethics
Expectation of Privacy
• Is there a reasonable expectation of privacy on social media?
• Courts are generally saying NO.
• “…material posted on a “private” Facebook page, that is accessible to a selected
group of recipients but not available for viewing by the general public, is
generally not privileged, nor is it protected by common law or civil law notions of
privacy. Nevertheless, the Defendant does not have a generalized right to
rummage at will through information that Plaintiff has limited from public view”
Tompkins v. Detroit Metropolitan Airport, 278 F.R.D. 387, 388
• Juror Number One argues forced disclosure of his Facebook posts violates his
privacy rights. However, Juror Number One has not shown he has any expectation
of privacy in the posts -Juror Number One v. Superior Court, 206 Cal. App. 4th
854, 142 Cal. Rptr. 3d 151 (Ct. App. 2012).
Case Study
Michelle Ghent v Terrence Howard
• Parties signed a marital settlement agreement (MSA) after private mediation, the
MSA was then entered as a judgment.
• Terrence filed request for order to set aside the judgment, Michelle engaged in
“conduct amounting to criminal extortion or blackmail.”
Video credit: AP via YouTube
Case Study
Michelle Ghent v Terrence Howard
• Highly publicized 4 day trial began August 13, 2015; overseen by widely respected
LA County Superior Court Family Law Judge, Hon. Thomas Trent Lewis
• First witness, Terrence’s sister Yvonne Howard. Testified that Michelle had made
threats against Terrence to reveal person information about him.
• Second witness, Charles McBride, was Terrence’s business manager and
accountant. McBride testified he wired “hush money” to Michelle.
• Third witness, Ian Tausig, reviewed and provided expert testimony on social media
posts and private messages made to Terrence and his (now) ex-wife Mira.
Case Study
Michelle Ghent v Terrence Howard
• Review of 491 pages of social media postings and related
evidence
• 61 pages of screenshots of Instagram posts and direct
messages
• 152 pages of documents pertaining to a search warrant (and the
SW return) relating to Instagram accounts.
• 86 pages of text messages exchanged between Terrence and
Michelle
• 192 pages of deposition transcript, from Michelle’s deposition
Case Study
Michelle Ghent v Terrence Howard
• Search warrant was issued 1/15/2015 in
response to a criminal investigation
(stalking)
• Search warrant identified Michelle’s
known Instagram account, as well as 3
others which had sent threatening
messages to Terrence.
• All 3 suspect accounts were deactivated
at the time of warrant service.
• Search warrant author failed to identify or
include a 4th, still active suspect account,
as well as a still active Twitter account.
Case Study
Michelle Ghent v Terrence Howard
• 61 pages of Instagram posts and direct
messages reviewed
• Several posts and messages displayed specific
indicia with one another, providing a reasonable
belief and conclusion they were being authored
by the same individual.
• Several posts and messages also included
private, personal information not available in the
public domain – and only known to an
extremely small group of individuals – including
Michelle.
Case Study
Michelle Ghent v Terrence Howard
• 86 pages of text messages exchanged
between Terrence and Michelle
• Threats made of “pictures will all be up”
and “Start googling”
Case Study
Michelle Ghent v Terrence Howard
• 192 pages of Michelle’s deposition
transcript
• Michelle denied generally and
specifically operating any of the
accounts which were sending
harassing and threatening messages
Case Study
Michelle Ghent v Terrence Howard
• On social media evidence:
• 5 hours of direct testimony
• 2 hours of cross-examination
• “Rebuttal expert” had experience as
a network engineer. Not applicable
here. He also identified his most
recent employment at Robbins
Brothers. (Yes, the engagement ring
experts.)
• Trial preparation was CRITICAL
Case Study
Michelle Ghent v Terrence Howard
• Judge Lewis found the testimony and
evidence regarding social media
postings to be “credible” and further
found “that Michelle was making
Instagram and Twitter posts about
Terrence”
• Ultimately, the court found Terrence
“had no choice but to sign the
agreement” and the Agreement as
well as the judgment were set aside.
Case Study
Michelle Ghent v Terrence Howard
Contacts
Ian A. Tausig, CSMIE
Tausig & Associates
1000 Paseo Camarillo, Suite 227
Camarillo, CA 93010
Phone: 805-293-1409
Email: ITausig@TausigPI.com
http://www.TausigPI.com
Brian J. Kramer, CFLS
Brian J. Kramer, PC
12100 Wilshire Blvd, Suite 800
Los Angeles, CA 90025
Phone: 424-228-4133
Email: BKramer@bjkpc.com
http://www.bjkpc.com

More Related Content

What's hot

Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
Mark Jhon Oxillo
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
Adler Law Group
 
Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10
bkawamura
 
Polinter07
Polinter07Polinter07
Polinter07
Jeffrey Hart
 
Social media – a key component of e discovery litigation
Social media – a key component of e discovery litigationSocial media – a key component of e discovery litigation
Social media – a key component of e discovery litigation
James Cortopassi
 
Polinter07
Polinter07Polinter07
Polinter07
Jeffrey Hart
 
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Scott Mills
 
Deloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerationsDeloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerations
kamalesl
 
Activism
ActivismActivism
Activismsunnyuf
 
Communications4 staff1 15-13
Communications4 staff1 15-13Communications4 staff1 15-13
Communications4 staff1 15-13jan4tarheels
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anitafin
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
mkeane
 
IIW-11 NSTIC Update
IIW-11 NSTIC UpdateIIW-11 NSTIC Update
IIW-11 NSTIC Update
JayUnger
 
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Walter Neary
 

What's hot (16)

Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10Chinafinal Letter To Clinton Internet Frdom 2 3 10
Chinafinal Letter To Clinton Internet Frdom 2 3 10
 
Polinter07
Polinter07Polinter07
Polinter07
 
Social media – a key component of e discovery litigation
Social media – a key component of e discovery litigationSocial media – a key component of e discovery litigation
Social media – a key component of e discovery litigation
 
Polinter07
Polinter07Polinter07
Polinter07
 
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...
 
File000160
File000160File000160
File000160
 
Deloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerationsDeloitte Social Media Analytics Event: Social Media legal considerations
Deloitte Social Media Analytics Event: Social Media legal considerations
 
Activism
ActivismActivism
Activism
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Communications4 staff1 15-13
Communications4 staff1 15-13Communications4 staff1 15-13
Communications4 staff1 15-13
 
Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12Anita Fineberg Step 2012 Branch Sept. 19. 12
Anita Fineberg Step 2012 Branch Sept. 19. 12
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 
IIW-11 NSTIC Update
IIW-11 NSTIC UpdateIIW-11 NSTIC Update
IIW-11 NSTIC Update
 
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
 

Viewers also liked

Portafolio andres moreno_resumen
Portafolio andres moreno_resumenPortafolio andres moreno_resumen
Portafolio andres moreno_resumenAndres Moreno
 
Keripik rumput laut
Keripik rumput lautKeripik rumput laut
Keripik rumput laut
dodolan
 
капуоваазиза+кафе+идея
капуоваазиза+кафе+идеякапуоваазиза+кафе+идея
капуоваазиза+кафе+идея
Азиза Капуова
 
쿠니 제안서
쿠니 제안서쿠니 제안서
쿠니 제안서
Yongwoo Cho
 
Fauna de Cuyo
Fauna de CuyoFauna de Cuyo
Fauna de Cuyo
Victor Cabral
 
Riviera Cedar Homes, Inc.
Riviera Cedar Homes, Inc.Riviera Cedar Homes, Inc.
Riviera Cedar Homes, Inc.
Jennifer Piotter
 
Musica en el aula
Musica en el aulaMusica en el aula
Musica en el aula
pimasan
 
Criminalistica aav
Criminalistica aavCriminalistica aav
Criminalistica aav
ana mesia
 
Modalidad primitiva.hm
Modalidad primitiva.hmModalidad primitiva.hm
Modalidad primitiva.hm
Atrami Díaz Muñoz
 
Workwear Presentation ( DGL)
Workwear Presentation ( DGL)Workwear Presentation ( DGL)
Workwear Presentation ( DGL)DGL BD. LTD
 
Visita al zoológico
Visita al zoológicoVisita al zoológico
Visita al zoológico
pimasan
 
Manual fotonovela
Manual fotonovelaManual fotonovela
Manual fotonovela
Universidad Minuto de Dios
 
Energi
EnergiEnergi
EnergiTsets
 
Portafolio Jonathan Steven Rua Gil
Portafolio Jonathan Steven Rua GilPortafolio Jonathan Steven Rua Gil
Portafolio Jonathan Steven Rua Gil
jonathan rua
 
Patrones radiologicos
Patrones radiologicosPatrones radiologicos
Patrones radiologicos
eddynoy velasquez
 

Viewers also liked (15)

Portafolio andres moreno_resumen
Portafolio andres moreno_resumenPortafolio andres moreno_resumen
Portafolio andres moreno_resumen
 
Keripik rumput laut
Keripik rumput lautKeripik rumput laut
Keripik rumput laut
 
капуоваазиза+кафе+идея
капуоваазиза+кафе+идеякапуоваазиза+кафе+идея
капуоваазиза+кафе+идея
 
쿠니 제안서
쿠니 제안서쿠니 제안서
쿠니 제안서
 
Fauna de Cuyo
Fauna de CuyoFauna de Cuyo
Fauna de Cuyo
 
Riviera Cedar Homes, Inc.
Riviera Cedar Homes, Inc.Riviera Cedar Homes, Inc.
Riviera Cedar Homes, Inc.
 
Musica en el aula
Musica en el aulaMusica en el aula
Musica en el aula
 
Criminalistica aav
Criminalistica aavCriminalistica aav
Criminalistica aav
 
Modalidad primitiva.hm
Modalidad primitiva.hmModalidad primitiva.hm
Modalidad primitiva.hm
 
Workwear Presentation ( DGL)
Workwear Presentation ( DGL)Workwear Presentation ( DGL)
Workwear Presentation ( DGL)
 
Visita al zoológico
Visita al zoológicoVisita al zoológico
Visita al zoológico
 
Manual fotonovela
Manual fotonovelaManual fotonovela
Manual fotonovela
 
Energi
EnergiEnergi
Energi
 
Portafolio Jonathan Steven Rua Gil
Portafolio Jonathan Steven Rua GilPortafolio Jonathan Steven Rua Gil
Portafolio Jonathan Steven Rua Gil
 
Patrones radiologicos
Patrones radiologicosPatrones radiologicos
Patrones radiologicos
 

Similar to Social Media in Legal Investigations

Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
Logikcull.com
 
TexasBarCLE Advanced Appellate Social Media Presentation
TexasBarCLE Advanced Appellate Social Media PresentationTexasBarCLE Advanced Appellate Social Media Presentation
TexasBarCLE Advanced Appellate Social Media Presentation
D. Todd Smith
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
Jack Pringle
 
FOLRAC Social Media for Legal Research
FOLRAC Social Media for Legal ResearchFOLRAC Social Media for Legal Research
FOLRAC Social Media for Legal Research
Shaunna Mireau
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
gallowayandcollens
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
Medpricer
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationsMedpricer
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
gallowayandcollens
 
How Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHow Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims Handling
HNI Risk Services
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
HB Litigation Conferences
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
gallowayandcollens
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
Pod Legal
 
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
gallowayandcollens
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
BoyarMiller
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
Case IQ
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
SquareOne|Consulting
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
gallowayandcollens
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
rmackinnon
 

Similar to Social Media in Legal Investigations (20)

Social media and the future of e-discovery
Social media and the future of e-discoverySocial media and the future of e-discovery
Social media and the future of e-discovery
 
TexasBarCLE Advanced Appellate Social Media Presentation
TexasBarCLE Advanced Appellate Social Media PresentationTexasBarCLE Advanced Appellate Social Media Presentation
TexasBarCLE Advanced Appellate Social Media Presentation
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
 
FOLRAC Social Media for Legal Research
FOLRAC Social Media for Legal ResearchFOLRAC Social Media for Legal Research
FOLRAC Social Media for Legal Research
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
White Paper: Social Media for Litigation
White Paper: Social Media for LitigationWhite Paper: Social Media for Litigation
White Paper: Social Media for Litigation
 
smiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigationssmiAware-WhitePaper-LegalInvestigations
smiAware-WhitePaper-LegalInvestigations
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
How Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHow Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims Handling
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
Big Data & Wrongful Collection
Big Data & Wrongful CollectionBig Data & Wrongful Collection
Big Data & Wrongful Collection
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
 
UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)UPDATED Social Media - the legal risks (AIM)
UPDATED Social Media - the legal risks (AIM)
 
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
Social media for attorneys 2.0
Social media for attorneys 2.0Social media for attorneys 2.0
Social media for attorneys 2.0
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 

Recently uploaded

Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
Purushottam Jha
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
SidharthKashyap5
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
AHRP Law Firm
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
patrons legal
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
shweeta209
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
OmGod1
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 

Recently uploaded (20)

Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.Law Commission Report. Commercial Court Act.
Law Commission Report. Commercial Court Act.
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Cold War - 1, talks about cold water bro
Cold War - 1, talks about cold water broCold War - 1, talks about cold water bro
Cold War - 1, talks about cold water bro
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Introducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdfIntroducing New Government Regulation on Toll Road.pdf
Introducing New Government Regulation on Toll Road.pdf
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
 
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxPRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptx
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 

Social Media in Legal Investigations

  • 1. Social Media in Legal Investigations Ian Tausig, CSMIE Brian J. Kramer, CFLS California Association of Licensed Investigators, 2016 Annual Conference June 11th, 2016 – Rancho Mirage, California
  • 2. Agenda •Working with counsel to identify issues in the case •Identifying likely sources of evidence •Investigative techniques •Social Media Forensics •Legal and Evidentiary Issues •Case Study: Michelle Ghent v Terrence Howard
  • 3. About Ian A. Tausig, CSMIE •Ian Tausig is a licensed private investigator and the President of Tausig & Associates, a full- service professional investigation agency which specializes in providing litigation support and legal investigation services to law firms and insurance carriers throughout California. Ian is a former law enforcement professional, establishing his agency in 2013. He is a board certified Social Media Intelligence Expert, as well as a subject matter expert and court- testified expert witness in the field of social media investigative techniques, and the authenticity of social media evidence.
  • 4. About Brian J. Kramer, CFLS •Brian Kramer is certified by the California Board of Legal Specialization as a family law specialist, has been recognized as a Super Lawyer in the practice of family law, and he is widely regarded to be one of the top divorce attorneys among his class of peers in Los Angeles. In recognition of some of the outstanding results he has secured for his clients, Brian’s family law practice has been the subject of both local and national news coverage. Most recently and notably, Brian successfully worked to vacate a large spousal support judgment against academy award nominee, actor Terrence Howard.
  • 5. Introduction •100 million hours of video watched per day •1 billion users on Groups •80 million users on Facebook Lite •500 million users on Events •123 million events created in 2015 •50 million small and medium sized business on Facebook Business Pages Why social media should be reviewed in every case
  • 6. Image From http://www.technewstoday.com/ Introduction Why social media should be reviewed in every case January 24th, 2016 – 1 Billion individual logins on Facebook
  • 7. Working with Counsel Why use social media evidence? •Evidence of state of mind •Evidence of communication •Evidence of time and place •Evidence of actions •Rebuttal and Impeachment Evidence
  • 8. Identifying Sources of Evidence 1. Facebook 1.1 billion unique users per month 2. YouTube 1 billion unique users per month 3. Twitter 310 million unique users per month 4. LinkedIn 255 million unique users per month 5. Pinterest 255 million unique users per month 6. Google+ 120 million unique users per month 7. Tumblr 110 million unique users per month 8. Instagram 100 million unique users per month 9. Reddit 85 million unique users per month 6. VK 80 million unique users per month
  • 9. Social Media Forensics • Forensic Preservation and Chain of Custody • Just because it’s on the internet, the same basic principals for collecting and storing evidentiary material applies. • Best practices for forensically preserving social media evidence include: • Use of forensic software for preservation. Forensic software will create an audit trail and preserve relevant metadata behind preserved content. • X1 Social Discovery for social media content • WebPreserver for content outside of X1’s support social media platforms, or websites. • Bottom line: Screen shots, printing to PDF, or printing a paper copy is not a forensic preservation and can potentially lead to significant evidentiary challenges and authentication issues.
  • 10. Authentication • Personal knowledge - "Yes, I know that is his/her Facebook page." • Distinctive Appearance - appearance, content, substance, internal patterns, specific indicia • Deposition or interrogatories - "Do you maintain the Facebook account in this name?" • Expert witness testimony - "In my opinion, this Facebook page is maintained by him/her“ • Basic Subscriber Information - Obtained from subpoena Experts construct the integrity of a document. Utilize as many of these as possible to authenticate social media evidence:
  • 11. Legal Aspects of Social Media • Statutes and Case Law • The Stored Communications Act (SCA) • Formal Discovery: Special Interrogatories, Demands for Production, and Subpoenas Case Law, Ethics, Preservation and Authentication
  • 12. California Evidence Code •California Evidence Code 1400 •Authentication of a writing means (a) the introduction of evidence sufficient to sustain a finding that it is the writing that the proponent of the evidence claims it is or (b) the establishment of such facts by any other means provided by law. •California Evidence Code 1552(a) •A printed representation of computer information or a computer program is presumed to be an accurate representation of the computer information or computer program that it purports to represent. This presumption is a presumption affecting the burden of producing evidence. If a party to an action introduces evidence that a printed representation of computer information or computer program is inaccurate or unreliable, the party introducing the printed representation into evidence has the burden of proving, by a preponderance of evidence, that the printed representation is an accurate representation of the existence and content of the computer information or computer program that it purports to represent. •California Evidence Code 352 •The court in its discretion may exclude evidence if its probative value is substantially outweighed by the probability that its admission will (a) necessitate undue consumption of time or (b) create substantial danger of undue prejudice, of confusing the issues, or of misleading the jury.
  • 13. California Case Law •People v. Beckley (2010) 185 Cal.App.4th 509 •Evidence from Social Media sources must be properly authenticated. •Also cites People v. Doggett (1948) 83 Cal.App.2d 405 that “no expert testified that the photo was not a composite or fake” •“Such expert testimony is even more critical today to prevent the admission of manipulated images. . . . [W]ith the advent of computer software programs such as Adobe Photoshop it does not always take skill, experience, or even cognizance to alter a digital”
  • 14. California Case Law •People v. Valdez (2011) 201 Cal.App.4th 1429 •Trial court admitted MySpace “printouts,” upheld on appeal •Provided guidance on use of “specific indicia” to authenticate social media evidence •MySpace page icon identifying the owner of the page displayed a photograph of Defendant’s face. •Defendant’s Myspace page included greetings addressed to him by name and by relation •Defendant’s sister left a "big brother" salutation on his MySpace page, accompanied by a user icon consisting of her photograph •Greeting from Defendant’s sister was one of many posts by friends and by the page owner that included personal details •Page owner's stated interests, including an interest in gangs generally and specifically, matched what the police otherwise knew of Defendant’s interests from their field contacts with him •“The writings on the page and the photograph corroborated each other by showing a pervading interest in gang matters, rather than an anomalous gesture.” •“Other key factors include that the evidence strongly suggested the page was Defendant’s personal site…and that the page was password protected for posting and deleting content, which tended to suggest Defendant, as the owner of the page, controlled the posted material.”
  • 15. Stored Communications Act (SCA) • SCA creates Fourth Amendment-like privacy protection for email and other digital communications (content) stored on the internet. • Limits the ability of “electronic communications holders” to reveal content information to nongovernment entities. 18 U.S.C. §2701, et. seq • Social media and email providers are defined as “electronic communication services” (ECS) within SCA.
  • 16. Legal Requests • Special Interrogatories • Demands for Production (DFP) • Subpoenas • Alternate methods Special Interrogatories, Demands for Production, and Subpoenas
  • 17. Subpoenas • Response by a social media platform to a criminal or civil subpoena, requesting content is PROHIBITED by SCA. • Basic subscriber information is not protected by SCA and may be obtained via subpoena to the platform. • Basic subscriber information is: • Account holder’s name • Account holder’s address • Local and long distance telephone connection records, or records of session times and durations • Length of service (including start date) and types of service utilized; • Telephone or instrument number or other subscriber number or identity, including any temporarily assigned network address [which would include IP addresses] • Means and source of payment for such service (including any credit card or bank account number)
  • 18. Subpoenas (Continued) • Use specific, narrow verbiage in subpoenas • Identify specific user name’s and/or account numbers in the request • Party must be given notice prior to service of the subpoena • For obtaining content – SCA does NOT apply to individual parties, just the platforms.
  • 19. Demand for Production CCP§2031.010 • Specific, narrow verbiage • Avoid fishing expeditions - “Any/All,“ “Complete account” • Specific date range • In regards to messages between parties, specify the other party • In regards to pictures, specify pictures of who • If already available, utilize the username/number of the account
  • 20. Legal Requests Alternate Methods • In any formal discovery, SCA becomes a strongly controlling factor. However – SCA only controls content held by the provider, not by the party. • Alternative: Requesting the court compel the party to consent under SCA; or compel the party to provide their login (username / password) information • “If the court can compel Juror Number One to produce the information, it can likewise compel Juror Number One to consent to the disclosure by Facebook. The SCA has no bearing on this issue.” -Juror Number One v. Superior Court, 206 Cal. App. 4th 854, 142 Cal. Rptr. 3d 151 (Ct. App. 2012). • A court may compel a party consent to disclosure of communications under 18 U.S.C. §2702(b)(3) - Negro v. Superior Court, 230 Cal. App. 4th 879, 179 Cal. Rptr. 3d 215 (Ct. App. 2014). • Federal court requires a party to respond to interrogatories “requesting her to list all user names and passwords for every social media site she utilizes” - Howell v. Buckeye Ranch, Inc., No. 2:11–cv–1014, 2012 WL 5265170 (S.D. Ohio Oct. 1, 2012) • The courts have widely disagreed on the reasonableness of these approaches, awarding sanctions against requesting parties, as they should be considered secondary or last-resort.
  • 21. Ethics in Social Media Investigations Agent of Counsel • Things you can do that will can your attorney / law firm clients in trouble with the State Bar: • Attorney / Law Firm clients have professional responsibility to supervise the work of their “employees or agents” – Professional Rules of Conduct 3-110 • Communicate directly or indirectly about the subject of the representation with a party (ex-parte communication) – Professional Rules of Conduct 2-100 • Attorney sends Facebook friend requests to two high-ranking company employees of the opposing party in an action. • SDCBA opined “[CalBar]…rules bar an attorney from making an ex parte friend request of a represented party.” – SDCBA Legal Ethics Opinion 2011-2
  • 22. Private Profiles & Ethics Expectation of Privacy • Is there a reasonable expectation of privacy on social media? • Courts are generally saying NO. • “…material posted on a “private” Facebook page, that is accessible to a selected group of recipients but not available for viewing by the general public, is generally not privileged, nor is it protected by common law or civil law notions of privacy. Nevertheless, the Defendant does not have a generalized right to rummage at will through information that Plaintiff has limited from public view” Tompkins v. Detroit Metropolitan Airport, 278 F.R.D. 387, 388 • Juror Number One argues forced disclosure of his Facebook posts violates his privacy rights. However, Juror Number One has not shown he has any expectation of privacy in the posts -Juror Number One v. Superior Court, 206 Cal. App. 4th 854, 142 Cal. Rptr. 3d 151 (Ct. App. 2012).
  • 23. Case Study Michelle Ghent v Terrence Howard • Parties signed a marital settlement agreement (MSA) after private mediation, the MSA was then entered as a judgment. • Terrence filed request for order to set aside the judgment, Michelle engaged in “conduct amounting to criminal extortion or blackmail.” Video credit: AP via YouTube
  • 24. Case Study Michelle Ghent v Terrence Howard • Highly publicized 4 day trial began August 13, 2015; overseen by widely respected LA County Superior Court Family Law Judge, Hon. Thomas Trent Lewis • First witness, Terrence’s sister Yvonne Howard. Testified that Michelle had made threats against Terrence to reveal person information about him. • Second witness, Charles McBride, was Terrence’s business manager and accountant. McBride testified he wired “hush money” to Michelle. • Third witness, Ian Tausig, reviewed and provided expert testimony on social media posts and private messages made to Terrence and his (now) ex-wife Mira.
  • 25. Case Study Michelle Ghent v Terrence Howard • Review of 491 pages of social media postings and related evidence • 61 pages of screenshots of Instagram posts and direct messages • 152 pages of documents pertaining to a search warrant (and the SW return) relating to Instagram accounts. • 86 pages of text messages exchanged between Terrence and Michelle • 192 pages of deposition transcript, from Michelle’s deposition
  • 26. Case Study Michelle Ghent v Terrence Howard • Search warrant was issued 1/15/2015 in response to a criminal investigation (stalking) • Search warrant identified Michelle’s known Instagram account, as well as 3 others which had sent threatening messages to Terrence. • All 3 suspect accounts were deactivated at the time of warrant service. • Search warrant author failed to identify or include a 4th, still active suspect account, as well as a still active Twitter account.
  • 27. Case Study Michelle Ghent v Terrence Howard • 61 pages of Instagram posts and direct messages reviewed • Several posts and messages displayed specific indicia with one another, providing a reasonable belief and conclusion they were being authored by the same individual. • Several posts and messages also included private, personal information not available in the public domain – and only known to an extremely small group of individuals – including Michelle.
  • 28. Case Study Michelle Ghent v Terrence Howard • 86 pages of text messages exchanged between Terrence and Michelle • Threats made of “pictures will all be up” and “Start googling”
  • 29. Case Study Michelle Ghent v Terrence Howard • 192 pages of Michelle’s deposition transcript • Michelle denied generally and specifically operating any of the accounts which were sending harassing and threatening messages
  • 30. Case Study Michelle Ghent v Terrence Howard • On social media evidence: • 5 hours of direct testimony • 2 hours of cross-examination • “Rebuttal expert” had experience as a network engineer. Not applicable here. He also identified his most recent employment at Robbins Brothers. (Yes, the engagement ring experts.) • Trial preparation was CRITICAL
  • 31. Case Study Michelle Ghent v Terrence Howard • Judge Lewis found the testimony and evidence regarding social media postings to be “credible” and further found “that Michelle was making Instagram and Twitter posts about Terrence” • Ultimately, the court found Terrence “had no choice but to sign the agreement” and the Agreement as well as the judgment were set aside.
  • 32. Case Study Michelle Ghent v Terrence Howard
  • 33. Contacts Ian A. Tausig, CSMIE Tausig & Associates 1000 Paseo Camarillo, Suite 227 Camarillo, CA 93010 Phone: 805-293-1409 Email: ITausig@TausigPI.com http://www.TausigPI.com Brian J. Kramer, CFLS Brian J. Kramer, PC 12100 Wilshire Blvd, Suite 800 Los Angeles, CA 90025 Phone: 424-228-4133 Email: BKramer@bjkpc.com http://www.bjkpc.com