Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
Media law for community journalists and bloggersjtownend
A presentation given to participants at the Community Journalism Conference, Cardiff University, 16 January 2013, setting out the legal landscape for online publishers and asking for responses to a survey
2014: NJ GMIS: Legal Issues Surrounding the Web and Social MediaCarol Spencer
This presentation, one of three parts for a NJ GMIS session, focuses on social media policies and first amendment issues. It discusses recent court rulings and NLRB rulings that give guidance to dealing with employee postings.
Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
Media law for community journalists and bloggersjtownend
A presentation given to participants at the Community Journalism Conference, Cardiff University, 16 January 2013, setting out the legal landscape for online publishers and asking for responses to a survey
2014: NJ GMIS: Legal Issues Surrounding the Web and Social MediaCarol Spencer
This presentation, one of three parts for a NJ GMIS session, focuses on social media policies and first amendment issues. It discusses recent court rulings and NLRB rulings that give guidance to dealing with employee postings.
Socialize Conference Toronto 2012 - FaceBook Marketing: Adler Law Group
The use of social media for marketing and advertising purposes is one of the fastest growing areas for business and marketers. The advent of social media sites like Facebook, Twitter, LinkedIn, Google+ and others provides the opportunity for authentic interaction and engagement with customers. But with every technological development and opportunity, new legal and business risks present themselves. Understanding and minimizing these risks will help you maximize the opportunities.
A best practices approach to social media marketing involves having the company's philosophy, methodology, and guidelines captured in a comprehensive written policy that is clearly and regularly communicated to the employees, and regularly updated to keep abreast of new developments, opportunities and evolving legal guidance.
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Scott Mills
2:45pm Dec1/2012 From Osgoode Hall of York University, Toronto
Social Networking Media: Crowd Sourcing the Investigation
Cst. Scott Mills, Corporate Communications, Social Media Officer, Toronto Police Service
Steven Johnston, Crown Prosecutor, Special Prosecutions Branch, Alberta Justice
• Social networking as part of the electronic footprint of a criminal case
• Discovery of evidence
• Understanding the digital profile of your witness
• Using essential "old school" investigative techniques
Program on social media nad mobile device management issues facing employers in 2013, including use of social media in the hiring process from recruiting to background checks; BYOD and other mobile device management policies; drafting social media policies in light of NLRB guidance and enforcement action and protecting your social media assets.
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Walter Neary
These are slides from a 75-minute presentation sponsored by the Association of Washington Cities and the cities of Everett and Lakewood. You can hear the webinar recording through a link at http://www.awcnet.org/portal/studionew.asp?Mode=b1&WebID=1&UID=&MenuActionTypeID=81&MenuActionParm=31&OriginPage=/portal/studionew.asp&EDate=&ChannelLinkID=8716
The YouTube video that is referenced in the segment is at http://www.youtube.com/watch?v=AcW1OebCf-w
These slides were prepared by Ramsey Ramerman, assistant city attorney, Everett, and Walter Neary, city councilman in Lakewood, Washington. The slides were designed by the folks at http://cornerstoneleadershiponline.com/
The March conference referenced toward the end is OpenGovWest: http://opengovwest.wordpress.com/
Socialize Conference Toronto 2012 - FaceBook Marketing: Adler Law Group
The use of social media for marketing and advertising purposes is one of the fastest growing areas for business and marketers. The advent of social media sites like Facebook, Twitter, LinkedIn, Google+ and others provides the opportunity for authentic interaction and engagement with customers. But with every technological development and opportunity, new legal and business risks present themselves. Understanding and minimizing these risks will help you maximize the opportunities.
A best practices approach to social media marketing involves having the company's philosophy, methodology, and guidelines captured in a comprehensive written policy that is clearly and regularly communicated to the employees, and regularly updated to keep abreast of new developments, opportunities and evolving legal guidance.
Crowdsourcing The Investigation Technology & Digital Evidence Symposium Osgoo...Scott Mills
2:45pm Dec1/2012 From Osgoode Hall of York University, Toronto
Social Networking Media: Crowd Sourcing the Investigation
Cst. Scott Mills, Corporate Communications, Social Media Officer, Toronto Police Service
Steven Johnston, Crown Prosecutor, Special Prosecutions Branch, Alberta Justice
• Social networking as part of the electronic footprint of a criminal case
• Discovery of evidence
• Understanding the digital profile of your witness
• Using essential "old school" investigative techniques
Program on social media nad mobile device management issues facing employers in 2013, including use of social media in the hiring process from recruiting to background checks; BYOD and other mobile device management policies; drafting social media policies in light of NLRB guidance and enforcement action and protecting your social media assets.
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Walter Neary
These are slides from a 75-minute presentation sponsored by the Association of Washington Cities and the cities of Everett and Lakewood. You can hear the webinar recording through a link at http://www.awcnet.org/portal/studionew.asp?Mode=b1&WebID=1&UID=&MenuActionTypeID=81&MenuActionParm=31&OriginPage=/portal/studionew.asp&EDate=&ChannelLinkID=8716
The YouTube video that is referenced in the segment is at http://www.youtube.com/watch?v=AcW1OebCf-w
These slides were prepared by Ramsey Ramerman, assistant city attorney, Everett, and Walter Neary, city councilman in Lakewood, Washington. The slides were designed by the folks at http://cornerstoneleadershiponline.com/
The March conference referenced toward the end is OpenGovWest: http://opengovwest.wordpress.com/
An overview of the way the law profession's rules of professional responsibility/conduct apply to the use of social media platforms and tools, including advertising, searching, and use of social media information in investigation, discovery, and at trial.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
Many of today's artists are streaming on popular music sites like Google Play. Attorney Howard Collens shares his knowledge of Fiduciary Access to Digital Assets and how it pertains different music streaming sites and social media.
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
Attorney Howard Collens presents on Fiduciary Access to Digital Assets, where he focuses on photo sharing and storage sites such as Picasa, Dropbox and Flickr. #FADA4MI. Howard is working on getting a new law enacted in Michigan.
Benjamin Wright, Texas attorney and Senior Instructor at the SANS Institute, shares tips for gathering social media evidence in an investigation. Check out the webinar recording: http://i-sight.com/gathering-social-media-evidence/
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
Slides from an academic paper presentation. Paper at: http://rconversation.blogs.com/YahooShiTaoLessons.pdf">Download YahooShiTaoLessons.pdf
ABSTRACT: In 2005, Chinese journalist Shi Tao was convicted and sentenced to ten years in prison for leaking state secrets abroad. Key evidence cited in Chinese court documents included information about Shi’s account supplied by Yahoo! to the Chinese State Security Bureau. Condemnation by human rights groups and investors, U.S. congressional hearings, a Hong Kong government investigation, and a U.S. lawsuit followed. This paper documents the core facts, events, issues and debates involved. The Shi Tao case highlights the complex challenges of corporate social responsibility for Internet and telecommunications companies: They are caught between demands of governments on one hand and rights of users on the other – not only in authoritarian countries such as China but in virtually all countries around the world. While there are no simple or quick solutions, Internet and telecoms companies seeking to establish trustworthy reputations across a global customer base cannot afford to ignore the human rights implications of their business practices. Users and investors have a right to demand that user rights be respected. If companies fail to respect user rights, the need to develop non-commercial, grassroots alternatives will become increasingly important if privacy and free expression are to be possible anywhere.
Similar to Social Media in Legal Investigations (20)
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
1. Social Media in Legal
Investigations
Ian Tausig, CSMIE
Brian J. Kramer, CFLS
California Association of Licensed Investigators, 2016 Annual Conference
June 11th, 2016 – Rancho Mirage, California
2. Agenda
•Working with counsel to identify issues in the case
•Identifying likely sources of evidence
•Investigative techniques
•Social Media Forensics
•Legal and Evidentiary Issues
•Case Study: Michelle Ghent v Terrence Howard
3. About
Ian A. Tausig, CSMIE
•Ian Tausig is a licensed private investigator and
the President of Tausig & Associates, a full-
service professional investigation agency which
specializes in providing litigation support and
legal investigation services to law firms and
insurance carriers throughout California. Ian is a
former law enforcement professional,
establishing his agency in 2013. He is a board
certified Social Media Intelligence Expert, as
well as a subject matter expert and court-
testified expert witness in the field of social
media investigative techniques, and the
authenticity of social media evidence.
4. About
Brian J. Kramer, CFLS
•Brian Kramer is certified by the California
Board of Legal Specialization as a family law
specialist, has been recognized as a Super
Lawyer in the practice of family law, and he is
widely regarded to be one of the top divorce
attorneys among his class of peers in Los
Angeles. In recognition of some of the
outstanding results he has secured for his
clients, Brian’s family law practice has been the
subject of both local and national news
coverage. Most recently and notably, Brian
successfully worked to vacate a large spousal
support judgment against academy award
nominee, actor Terrence Howard.
5. Introduction
•100 million hours of video watched per day
•1 billion users on Groups
•80 million users on Facebook Lite
•500 million users on Events
•123 million events created in 2015
•50 million small and medium sized business on Facebook Business Pages
Why social media should be reviewed in every case
7. Working with Counsel
Why use social media evidence?
•Evidence of state of mind
•Evidence of communication
•Evidence of time and place
•Evidence of actions
•Rebuttal and Impeachment Evidence
8. Identifying Sources of Evidence
1. Facebook
1.1 billion unique users per month
2. YouTube
1 billion unique users per month
3. Twitter
310 million unique users per month
4. LinkedIn
255 million unique users per month
5. Pinterest
255 million unique users per month
6. Google+
120 million unique users per month
7. Tumblr
110 million unique users per month
8. Instagram
100 million unique users per month
9. Reddit
85 million unique users per month
6. VK
80 million unique users per month
9. Social Media Forensics
• Forensic Preservation and Chain of Custody
• Just because it’s on the internet, the same basic principals for collecting and
storing evidentiary material applies.
• Best practices for forensically preserving social media evidence include:
• Use of forensic software for preservation. Forensic software will create an
audit trail and preserve relevant metadata behind preserved content.
• X1 Social Discovery for social media content
• WebPreserver for content outside of X1’s support social media platforms,
or websites.
• Bottom line: Screen shots, printing to PDF, or printing a paper copy is not
a forensic preservation and can potentially lead to significant evidentiary
challenges and authentication issues.
10. Authentication
• Personal knowledge - "Yes, I know that is his/her Facebook page."
• Distinctive Appearance - appearance, content, substance, internal
patterns, specific indicia
• Deposition or interrogatories - "Do you maintain the Facebook
account in this name?"
• Expert witness testimony - "In my opinion, this Facebook page is
maintained by him/her“
• Basic Subscriber Information - Obtained from subpoena
Experts construct the integrity of a document. Utilize as many of these as
possible to authenticate social media evidence:
11. Legal Aspects of Social Media
• Statutes and Case Law
• The Stored Communications Act (SCA)
• Formal Discovery: Special Interrogatories, Demands for
Production, and Subpoenas
Case Law, Ethics, Preservation and Authentication
12. California Evidence Code
•California Evidence Code 1400
•Authentication of a writing means (a) the introduction of evidence sufficient to sustain a
finding that it is the writing that the proponent of the evidence claims it is or (b) the
establishment of such facts by any other means provided by law.
•California Evidence Code 1552(a)
•A printed representation of computer information or a computer program is presumed to
be an accurate representation of the computer information or computer program that it
purports to represent. This presumption is a presumption affecting the burden of
producing evidence. If a party to an action introduces evidence that a printed
representation of computer information or computer program is inaccurate or unreliable,
the party introducing the printed representation into evidence has the burden of proving,
by a preponderance of evidence, that the printed representation is an accurate
representation of the existence and content of the computer information or computer
program that it purports to represent.
•California Evidence Code 352
•The court in its discretion may exclude evidence if its probative value is substantially
outweighed by the probability that its admission will (a) necessitate undue consumption of
time or (b) create substantial danger of undue prejudice, of confusing the issues, or of
misleading the jury.
13. California Case Law
•People v. Beckley (2010) 185 Cal.App.4th 509
•Evidence from Social Media sources must be properly
authenticated.
•Also cites People v. Doggett (1948) 83 Cal.App.2d 405 that “no
expert testified that the photo was not a composite or fake”
•“Such expert testimony is even more critical today to prevent the
admission of manipulated images. . . . [W]ith the advent of
computer software programs such as Adobe Photoshop it does
not always take skill, experience, or even cognizance to alter a
digital”
14. California Case Law
•People v. Valdez (2011) 201 Cal.App.4th 1429
•Trial court admitted MySpace “printouts,” upheld on appeal
•Provided guidance on use of “specific indicia” to authenticate social media evidence
•MySpace page icon identifying the owner of the page displayed a photograph of Defendant’s face.
•Defendant’s Myspace page included greetings addressed to him by name and by relation
•Defendant’s sister left a "big brother" salutation on his MySpace page, accompanied by a user icon
consisting of her photograph
•Greeting from Defendant’s sister was one of many posts by friends and by the page owner that included
personal details
•Page owner's stated interests, including an interest in gangs generally and specifically, matched what the
police otherwise knew of Defendant’s interests from their field contacts with him
•“The writings on the page and the photograph corroborated each other by showing a pervading interest in
gang matters, rather than an anomalous gesture.”
•“Other key factors include that the evidence strongly suggested the page was Defendant’s personal
site…and that the page was password protected for posting and deleting content, which tended to
suggest Defendant, as the owner of the page, controlled the posted material.”
15. Stored Communications Act (SCA)
• SCA creates Fourth Amendment-like privacy protection for email
and other digital communications (content) stored on the
internet.
• Limits the ability of “electronic communications holders” to reveal
content information to nongovernment entities.
18 U.S.C. §2701, et. seq
• Social media and email providers are defined as “electronic
communication services” (ECS) within SCA.
16. Legal Requests
• Special Interrogatories
• Demands for Production (DFP)
• Subpoenas
• Alternate methods
Special Interrogatories,
Demands for Production,
and Subpoenas
17. Subpoenas
• Response by a social media platform to a criminal or civil subpoena, requesting
content is PROHIBITED by SCA.
• Basic subscriber information is not protected by SCA and may be obtained via
subpoena to the platform.
• Basic subscriber information is:
• Account holder’s name
• Account holder’s address
• Local and long distance telephone connection records, or records of session times
and durations
• Length of service (including start date) and types of service utilized;
• Telephone or instrument number or other subscriber number or identity, including
any temporarily assigned network address [which would include IP addresses]
• Means and source of payment for such service (including any credit card or bank
account number)
18. Subpoenas (Continued)
• Use specific, narrow verbiage in subpoenas
• Identify specific user name’s and/or account numbers in the request
• Party must be given notice prior to service of the subpoena
• For obtaining content – SCA does NOT apply to individual parties, just the platforms.
19. Demand for Production
CCP§2031.010
• Specific, narrow verbiage
• Avoid fishing expeditions - “Any/All,“ “Complete account”
• Specific date range
• In regards to messages between parties, specify the other party
• In regards to pictures, specify pictures of who
• If already available, utilize the username/number of the account
20. Legal Requests
Alternate Methods
• In any formal discovery, SCA becomes a strongly controlling factor. However – SCA only controls content held
by the provider, not by the party.
• Alternative: Requesting the court compel the party to consent under SCA; or compel the party to provide their
login (username / password) information
• “If the court can compel Juror Number One to produce the information, it can likewise compel Juror Number
One to consent to the disclosure by Facebook. The SCA has no bearing on this issue.” -Juror Number One v.
Superior Court, 206 Cal. App. 4th 854, 142 Cal. Rptr. 3d 151 (Ct. App. 2012).
• A court may compel a party consent to disclosure of communications under 18 U.S.C. §2702(b)(3) - Negro v.
Superior Court, 230 Cal. App. 4th 879, 179 Cal. Rptr. 3d 215 (Ct. App. 2014).
• Federal court requires a party to respond to interrogatories “requesting her to list all user names and
passwords for every social media site she utilizes” - Howell v. Buckeye Ranch, Inc., No. 2:11–cv–1014, 2012 WL
5265170 (S.D. Ohio Oct. 1, 2012)
• The courts have widely disagreed on the reasonableness of these approaches, awarding sanctions against
requesting parties, as they should be considered secondary or last-resort.
21. Ethics in Social Media Investigations
Agent of Counsel
• Things you can do that will can your attorney / law firm clients in trouble with the
State Bar:
• Attorney / Law Firm clients have professional responsibility to supervise the work of
their “employees or agents” – Professional Rules of Conduct 3-110
• Communicate directly or indirectly about the subject of the representation with a
party (ex-parte communication) – Professional Rules of Conduct 2-100
• Attorney sends Facebook friend requests to two high-ranking company
employees of the opposing party in an action.
• SDCBA opined “[CalBar]…rules bar an attorney from making an ex parte friend
request of a represented party.” – SDCBA Legal Ethics Opinion 2011-2
22. Private Profiles & Ethics
Expectation of Privacy
• Is there a reasonable expectation of privacy on social media?
• Courts are generally saying NO.
• “…material posted on a “private” Facebook page, that is accessible to a selected
group of recipients but not available for viewing by the general public, is
generally not privileged, nor is it protected by common law or civil law notions of
privacy. Nevertheless, the Defendant does not have a generalized right to
rummage at will through information that Plaintiff has limited from public view”
Tompkins v. Detroit Metropolitan Airport, 278 F.R.D. 387, 388
• Juror Number One argues forced disclosure of his Facebook posts violates his
privacy rights. However, Juror Number One has not shown he has any expectation
of privacy in the posts -Juror Number One v. Superior Court, 206 Cal. App. 4th
854, 142 Cal. Rptr. 3d 151 (Ct. App. 2012).
23. Case Study
Michelle Ghent v Terrence Howard
• Parties signed a marital settlement agreement (MSA) after private mediation, the
MSA was then entered as a judgment.
• Terrence filed request for order to set aside the judgment, Michelle engaged in
“conduct amounting to criminal extortion or blackmail.”
Video credit: AP via YouTube
24. Case Study
Michelle Ghent v Terrence Howard
• Highly publicized 4 day trial began August 13, 2015; overseen by widely respected
LA County Superior Court Family Law Judge, Hon. Thomas Trent Lewis
• First witness, Terrence’s sister Yvonne Howard. Testified that Michelle had made
threats against Terrence to reveal person information about him.
• Second witness, Charles McBride, was Terrence’s business manager and
accountant. McBride testified he wired “hush money” to Michelle.
• Third witness, Ian Tausig, reviewed and provided expert testimony on social media
posts and private messages made to Terrence and his (now) ex-wife Mira.
25. Case Study
Michelle Ghent v Terrence Howard
• Review of 491 pages of social media postings and related
evidence
• 61 pages of screenshots of Instagram posts and direct
messages
• 152 pages of documents pertaining to a search warrant (and the
SW return) relating to Instagram accounts.
• 86 pages of text messages exchanged between Terrence and
Michelle
• 192 pages of deposition transcript, from Michelle’s deposition
26. Case Study
Michelle Ghent v Terrence Howard
• Search warrant was issued 1/15/2015 in
response to a criminal investigation
(stalking)
• Search warrant identified Michelle’s
known Instagram account, as well as 3
others which had sent threatening
messages to Terrence.
• All 3 suspect accounts were deactivated
at the time of warrant service.
• Search warrant author failed to identify or
include a 4th, still active suspect account,
as well as a still active Twitter account.
27. Case Study
Michelle Ghent v Terrence Howard
• 61 pages of Instagram posts and direct
messages reviewed
• Several posts and messages displayed specific
indicia with one another, providing a reasonable
belief and conclusion they were being authored
by the same individual.
• Several posts and messages also included
private, personal information not available in the
public domain – and only known to an
extremely small group of individuals – including
Michelle.
28. Case Study
Michelle Ghent v Terrence Howard
• 86 pages of text messages exchanged
between Terrence and Michelle
• Threats made of “pictures will all be up”
and “Start googling”
29. Case Study
Michelle Ghent v Terrence Howard
• 192 pages of Michelle’s deposition
transcript
• Michelle denied generally and
specifically operating any of the
accounts which were sending
harassing and threatening messages
30. Case Study
Michelle Ghent v Terrence Howard
• On social media evidence:
• 5 hours of direct testimony
• 2 hours of cross-examination
• “Rebuttal expert” had experience as
a network engineer. Not applicable
here. He also identified his most
recent employment at Robbins
Brothers. (Yes, the engagement ring
experts.)
• Trial preparation was CRITICAL
31. Case Study
Michelle Ghent v Terrence Howard
• Judge Lewis found the testimony and
evidence regarding social media
postings to be “credible” and further
found “that Michelle was making
Instagram and Twitter posts about
Terrence”
• Ultimately, the court found Terrence
“had no choice but to sign the
agreement” and the Agreement as
well as the judgment were set aside.
33. Contacts
Ian A. Tausig, CSMIE
Tausig & Associates
1000 Paseo Camarillo, Suite 227
Camarillo, CA 93010
Phone: 805-293-1409
Email: ITausig@TausigPI.com
http://www.TausigPI.com
Brian J. Kramer, CFLS
Brian J. Kramer, PC
12100 Wilshire Blvd, Suite 800
Los Angeles, CA 90025
Phone: 424-228-4133
Email: BKramer@bjkpc.com
http://www.bjkpc.com