Authentication Flashcards

(27 cards)

1
Q

What is the basic idea behind authentication?

A

If you want to bring in some evidence, you have to prove it is what you say it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the standard of proof for authentication?

A

If a rational jury could find the evidence is what the proponent says it is

Standard is low - lower than a preponderance of the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who determines whether evidence is authentic?

A

The Judge!

Case example: Johnson
* D charged with assault with an axe
* At trial, the prosecution introduced the axe
* The victim identified the axe, but hesitantly (duh—the victim only saw it while being attacked)
* D argued that this wasn’t enough for authentication
* Holding: judge deemed the axe authentic –> axe came in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is circumstantial evidence sufficient for authentication?

A

Yes!

Case example: Bagaric

  • 6 Ds were charged with conspiracy
  • At trial, the government wanted to offer evidence of a letter from one co-defendant to another
  • Circumstantial evidence supported authentication (nicknames were used, specific references, etc.)
  • Holding: this evidence was enough for the judge to authenticate the letter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is a missing link in the chain of custody enough, on its own, to disallow admission?

A

No, a missing link in the chain of custody is not alone fatal to admissibility.

Case Example: Howard-Arias

  • The coast guard towed a boat and found marijuana on it
  • At trial, the government wanted to introduce the bale of marijuana
  • D argued that since one DEA agent who had possessions of it at one point didn’t testify at trial, the chain of custody was incomplete, so the bale could not be authenticated.
  • Holding: evidence was admissible; one missing linke isn’t enough to defeat admissibility - what would be necessary would be an additional reason to think the evidence was unreliable (E.g., basis to believe there was inference or tampering)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In addition to a missing link in the chain of custody, what else is needed to disallow admission on authentication grounds?

A

There needs to be an additional reason to think the evidence was unreliable (e.g., basis to believe tampering or interference)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is something you can do when you object to the authenticity of the exhibit, but it gets admitted anyway?

A

You can still argue to the jury with respect to the weight the evidence should be given.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 11 bases for authentication?

A
  1. Testimony of a witness with knowledge
  2. non-expert opinion on handwriting
  3. comparison to other pieces of evidence
  4. distinctive characteristics
  5. voice identification (person or machine)
  6. Telephone conversations
  7. Public records or reports
  8. Ancient documents presumed reliable
  9. Process or system
  10. Methods provided by statute or rule
  11. Congress can create new methods of authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bases for authentication

What are the three most common ways to authenticate evidence?

A
  1. Testimony with knowledge
  2. Public records or reports
  3. Methods provided by statute or rule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bases to authenticate evidence

What is an example of a non-expert opinion on handwriting

A

a unique letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bases to authenticate evidence

What does comparison to other pieces of evidence mean?

A

Comparison of the new exhibit with other exhibits that have already been authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bases to authenticate evidence

What is an example of comparison to other pieces of evidence?

A

A toxic water bottle gets entered; there are 60 others at issue - after the first few get entered into evidence, makes sense to show the rest are the same and admit them all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bases to authenticate evidence

Can you authenticate telephone conversations by tracking the number called and when?

A

Yes!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bases to authenticate evidence

How do you authenticate evidence using public records or reports?

A

By evidence that a document was recorded or filed in a public office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bases to authenticate evidence

What is an example of authenticating evidence using public records or reports?

A

Deeds from the County Recorder of Deeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bases to authenticate evidence

What does Methods provided by statute or rule mean?

A

Any method of authentication or identification allowed by a federal statute or a prescribed rule by the supreme court is allowed.

17
Q

Bases to authenticate evidence

What is an example of a method provided by statute or rule to authenticate evidence?

A

While questioning witness on the stand:
1. Do you recognize this?
2. What is it?
3. Do you know whose it is?
4. Do you have any reason to believe this item has been altered?
5. Then the proponent will move to admit the evidence.

18
Q

What is self-authentication, generally?

A

Some evidence that is intrinsically reliable “authenticates itself”

19
Q

What if self-authenticated evidence is prejudicial?

A
  1. It can still be excluded OR
  2. an opponent can still argue that the exhibit should be accorded little weight by the jury
20
Q

What are the 9 categories of self-authenticating evidence?

A
  1. Notarizecd documents
  2. Original public documents
  3. Trade inscriptions
  4. Newspapers and periodicals
  5. Official publications
  6. Certified copies of public records
  7. Certified copies of business records
  8. Electronic data
  9. commerical paper
21
Q

self-authenticating evidence

What are 3 examples of trade inscriptions

A
  1. Brand logo on a product
  2. label indicating country of origin
  3. Barcode that can be traced back to a specific company
22
Q

Self-authenticating evidence categories

What is required to be considered an “official publication?”

A

It must be published by a public agency/authority (e.g., books, pamphlets, newletters, etc.)

Federal, state, or city agencies count

23
Q

Self-authenticating evidence categories

Who certifies a copy of a public record?

A

the custodian or other authorized person can make the certification

24
Q

Self-authenticating evidence categories

What is required for a certified copy of a business record from a domestic organization?

A
  1. The coversheet must be filled out under perjury laws of the US
  2. Proponent must give adverse party written notice of intent to offer the record
  3. Adverse party must have opportunity to inspect record
25
# Self-authenticating evidence categories What is required for a certified copy of a business record from a foreign organization?
1. **Coversheet** must be filled out under perjury laws of the **foreign** country 2. Proponent must give adverse party written **notice** of intent to offer the record 3. The adverse party must have an opportunity to **inspect** the record
26
Can you stipulate to admitting evidence, avoiding hearsay and authentication hurdles?
Yes! If both parties "raise a white flag," the evidence can go straight to the jury. The only thing that could stand in its way is relevancy.
27
# Self-authenticating evidence categories Is testimony of the subscribing witness necessary?
No, we don't need the person who filled out the coversheet (subscribing witness) to come in and testify.