07.02.2014 Views

MLJ Volume 36-1.pdf - Robson Hall Faculty of Law

MLJ Volume 36-1.pdf - Robson Hall Faculty of Law

MLJ Volume 36-1.pdf - Robson Hall Faculty of Law

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

240 MANITOBA LAW JOURNAL|VOLUME <strong>36</strong> ISSUE 1<br />

4. Importance <strong>of</strong> proper authentication<br />

The importance <strong>of</strong> corroborative evidence and proper authentication<br />

should not be understated. Basic content such as a photograph <strong>of</strong> an<br />

accused or a basic pr<strong>of</strong>ile are insufficient; they leave the door open for<br />

reasonable doubt. In the US, a number <strong>of</strong> cases have been overturned<br />

because <strong>of</strong> the role speculation played.<br />

In Griffin v State, the Maryland Court <strong>of</strong> Appeal overturned a murder<br />

conviction because a trial court allowed a MySpace account to be admitted<br />

without authenticating it. 74 The lead investigator printed out a copy <strong>of</strong> the<br />

pr<strong>of</strong>ile that they assumed belonged to the girlfriend <strong>of</strong> the suspect and<br />

tried to use the photo <strong>of</strong> the girlfriend and her birth date as<br />

authentication. The court ruled that the police should have attempted to<br />

introduce more confirming evidence such as cookies or physical<br />

authentication.<br />

Shared computers can also raise problems. In R v Johnson, 75 the<br />

Ontario Superior Court found the accused not guilty <strong>of</strong> sexual trafficking<br />

in part because there were questions about whether it was the accused or<br />

his girlfriend who was accessing and posting to a Facebook account. In any<br />

case where key evidence exists as a result <strong>of</strong> online activities, law<br />

enforcement will need to collect sufficient evidence to infer that the<br />

accused was in fact the user <strong>of</strong> the computer. Many web browsers save<br />

passwords on a computer so that anyone with physical access to a<br />

computer may log onto an account and make posts without the consent <strong>of</strong><br />

the user. This is particularly problematic in <strong>of</strong>fices, where a computer may<br />

be in an unsecure environment, or in a residence, where parents,<br />

roommates or children may have access to the same computer.<br />

Where possible, enough confirming evidence should be gathered to<br />

ensure the judge or jury can infer that there is no reasonable doubt or<br />

alternative explanation as to who created or used a particular social<br />

networking account.<br />

5. Determining admissibility<br />

When a criminal court is dealing with social networking evidence,<br />

they are primarily dealing with either incriminating statements or with<br />

photographs that reveal some insight into the crime. With the<br />

74<br />

Griffin v State, 19 A (3d) 415 (Md App 2011).<br />

75<br />

R v Johnson, 2011 ONSC 195 (available on WL Can).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!