U.S. District Judge Xavier Rodriguez Former U.S. Magistrate Judge Ron Hedges Kiran Raj, Senior Counsel to the Deputy AG, U.S. Department of Justice Jeff.

Slides:



Advertisements
Similar presentations
Chapter Nine: Ethical Issues for Criminal Prosecutors
Advertisements

Professor Vivek Sankaran Child Advocacy Law Clinic Michigan Law School Ann Arbor, MI
The New Criminal Discovery Rules James P. Cooney III Frank R. Parrish Ripley Rand Conference of Superior Court Judges – November 2004.
© The McCoy Law Firm 2012 James McCoy The McCoy Law Firm Coit Rd., Ste. 560 Dallas, Texas (214)
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Interviewing & Investigation Foundations of Investigating.
© 2007 Morrison & Foerster LLP All Rights Reserved Attorney Advertising The Global Law Firm for Israeli Companies Dispute Resolution in the United States.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
INFORMATION WITHOUT BORDERS CONFERENCE February 7, 2013 e-DISCOVERY AND INFORMATION MANAGEMENT.
E-Discovery in Government Investigations and Criminal Law JOLT Symposium February 22,
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Litigation and Procedure Discovery: Overview and Interrogatories Litigation and Procedure.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Ethical Issues in the Electronic Age Ethical Issues in the Electronic Age Frost Brown Todd LLC Seminar May 24, 2007 Frost Brown.
Pretrial Matters: Pleadings & Motions © Professor Mathis-Rutledge.
Chapter 13: Criminal Justice Process ~ Proceedings Before Trial Objective: The student should be able to identify the required procedures before a trial.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Interviewing & Investigation LAW-123 Introduction to Interviewing and Investigating.
CRIMINAL DISCOVERY AND INSPECTION March “There is no constitutional right to general discovery in a criminal case.” Pennsylvania v. Ritchie, 480.
Scott F. Johnson Maureen MacFarlane.  Attorneys have a myriad of ethical obligations  This presentation covers some of those obligations and considers.
17th Annual ARMA Metro Maryland Spring Seminar Confidentiality, Access, and Use of Electronic Records.
The Roles of Judge and Jury Court controls legal rulings in the trial Court controls legal rulings in the trial Jury decides factual issues Jury decides.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Legal Follow-Up Chapter 18.
CJ227 Criminal Procedure Welcome to our Seminar!!! (We will begin shortly) Tonight – Unit 4 (Chapter 9 – Pretrial Motions, Hearings and Pleas) (Chapter.
American Tort Law Carolyn McAllaster Clinical Professor of Law Duke University School of Law.
Chapter 17 The Pretrial Process.
Legal Ethics and Social Networks Prof. David W. Opderbeck Seton Hall University Law School © 2011 David W. Opderbeck Licensed Under Creative Commons Attribution.
Rules of Discovery and Privileged Communications Court Systems and Practices.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
 Judge  Prosecutor  Defense Attorney 2 Copyright Texas Education Agency (TEA)
2 Copyright and Terms of Service Copyright © Texas Education Agency, These materials are copyrighted © and trademarked ™ as the property of the.
The Sedona Principles 1-7
EVIDENCE Some Basics Spring Overview The cases you read involve facts and law Most often appellate courts decide legal issues based on the facts.
1 Agenda for 7th Class Admin –Slides –Name plates out Work Product Experts Introduction to Sanctions.
Computer Forensics Principles and Practices
Court Procedures Chapter 3.
Chapter 13: Criminal Justice Process- Proceedings before the Trial
The Trial Process and the Investigator as a Witness.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
Against: The Liberal Definition and use of Litigation Holds Team 9.
Public Review Committee Linda Sullivan-Colglazier Assistant Attorney General July 28, 2011.
P RINCIPLES 1-7 FOR E LECTRONIC D OCUMENT P RODUCTION Maryanne Post.
Mon. Nov. 26. Work Product “Privilege” A witness, X, who is friendly to the D was interviewed by P’s attorney and a statement was drawn up Is there any.
The Challenge of Rule 26(f) Magistrate Judge Craig B. Shaffer July 15, 2011.
Unit 6 The Trial: Players, Motions, Hearings, and Pleas Or I am getting my day in court.
537 F. Supp. 2d 14 (D.D.C. 2008). PARTIES Plaintiff: United States – Q-P-Q charges against USDOS employee Michael O’Keefe & VISA applicant STS Jewelers.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
1 PRESENTATION OF EVIDENCE Learning Domain PURPOSE FOR THE RULES OF EVIDENCE Protect the jury from seeing or hearing evidence that is: (w/b p. 1-3)
ABA CRIMINAL JUSTICE SECTION INTERNAL INVESTIGATIONS: NAVIGATING THE ETHICAL MINEFIELD.
Unit 6  What needs to be done this week SeminarSeminar QuizQuiz Discussion boardDiscussion board Unit 9 Analysis and ApplicationUnit 9 Analysis and Application.
Digital Government Summit
Understanding the Criminal Justice System CJUS 101 Chapter 9: The Court Process From First Appearance through Trial.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
CJ305 Criminal Evidence Welcome to our Seminar!!! (We will begin shortly) Tonight – Unit 9 (Chapter 12 – Documents and the Right of Discovery) (Chapter.
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
Motions and Challenges to Evidence
YOU GOT THEM, NOW WHAT DO YOU DO?.  Facebook began in 2004  Facebook, LinkedIn, Twitter, Snapchat, Kik, Instagram, Youtube, Tumbler, Text ‘em  Given.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Residential Funding Corp. v. DeGeorge Financial Corp., 306 F.3d 99 (2d. Cir. 2002).
Electronic Discovery Guidelines FRCP 26(f) mandates that parties “meaningfully meet and confer” to consider the nature of their respective claims and defenses.
Criminal Justice Process: The Investigation
Outline of the U.S. and Arizona Criminal Justice Systems
WHAT THE LAW REQUIRES YOU TO PRESERVE AND TURN OVER
Chicago, Illinois – August 4, 2012
PRE-SUIT CONSIDERATIONS
Presented by: Rachael Zichella of Taylor English Duma LLP
Rules of Discovery and Privileged Communications
Class III Objectives Subject Matter:
Sadi R. Antonmattei-Goitia Sullo & Sullo, LLP February 16, 2019
On-Site Investigations
Presentation transcript:

U.S. District Judge Xavier Rodriguez Former U.S. Magistrate Judge Ron Hedges Kiran Raj, Senior Counsel to the Deputy AG, U.S. Department of Justice Jeff Shaffer, PwC “What the Hell Is a Terabyte?” Or Conquering the Technical Challenges of E-Discovery Competently and Ethically

Array of evidence –blogs, social media, etc. can support charges or defenses and call into question credibility and motives of witnesses Digital devices record information – what an individual was doing, whom they did it with, what the person was thinking Metadata includes details such as creation date, date of last modification, last access All this data potentially implicates proof of actions, identity, motive and conspiracy ESI and criminal cases: 2

Cameras record faces and license plates GPS chips, radio-frequency identification (RFID) chips and sensors (phones, access badges, toll collection stations, OnStar, passports track and record movements ESI and criminal cases: 3

ABA Model Rule of Professional Conduct 1.1 A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. Competence With Electronically Stored Information: What Does It Mean In the Context of Criminal Cases and How Can Defense Counsel Achieve It? 4

Comment 8: To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Competence With Electronically Stored Information: What Does It Mean In the Context of Criminal Cases and How Can Defense Counsel Achieve It? 5

Defense Counsel should know what constitutes ESI and electronic locations where potentially relevant ESI can be found. Defense Counsel should be capable of investigating the potentially relevant sources of ESI in the possession, custody or control of the Government and law enforcement. In addition, Defense Counsel should assess the potentially relevant sources of ESI in the possession, custody and control of her client. An attorney should understand the right questions to pose, both to her client and the opposing party, as well as the information provided in response to those inquiries. Competence With Electronically Stored Information: What Does It Mean In the Context of Criminal Cases and How Can Defense Counsel Achieve It? 6

Preserve potentially relevant information when a government investigation is threatened, pending or can be reasonably anticipated, even though no subpoena has been issued Practical considerations E-Discovery impact on corporations and corporate officials 7

– Obstruction of justice provisions in Sarbanes- Oxley – Failure to preserve may influence or shape the views of investigators and prosecutors about culpability – Obstruction of justice enhancements may be applied in the sentencing E-Discovery impact on corporations and corporate officials 8

Fed. R. Crim. P. 16(a)(1)(E): Discovery and Inspection – Government's Disclosure – Information Subject to Disclosure – Documents and Objects. Upon a defendant’s request, the government must permit the defendant to inspect and to copy or photograph books, papers, documents, data, photographs, tangible objects, buildings or places, or copies or portions of any of these items, if the item is within the government’s possession, custody, or control and: (i) the item is material to preparing the defense; (ii) the government intends to use the item in its case-in-chief at trial; or (iii) the item was obtained from or belongs to the defendant. Rule 16 9

Fed. R. Crim. P. 16(b)(1)(A): Discovery and Inspection – Defendant's Disclosure – Information Subject to Disclosure – Documents and Objects. If a defendant requests disclosure under Rule 16(a)(1)(E) and the government complies, then the defendant must permit the government, upon request, to inspect and to copy or photograph books, papers, documents, data, photographs, tangible objects, buildings or places, or copies or portions of any of these items if: (i) the item is within the defendant's possession, custody, or control; and (ii) the defendant intends to use the item in the defendant's case-in- chief at trial. Rule 16 10

Government obligations comes into play: Criminal Rule 16(a) Brady Giglio Jencks Act Defendant’s obligations set forth in Rule 16(b) Possible remedies for failure to comply: ESI IN CRIMINAL ACTIONS POST-INDICTMENT 11

“order that party to permit the discovery or inspection; specify its time, place, and manner; and prescribe other just terms and conditions” (Rule 16(d)(2)(A)) “grant a continuance” (Rule 16(d)(2)(B)) “prohibit that party from introducing the undisclosed evidence” (Rule 16(d)(2)(C)) “enter any other order that is just under the circumstances” (Rule 16(d)(2)(D)) ESI IN CRIMINAL ACTIONS POST-INDICTMENT 12

In a case involving the FBI’s failure to preserve text messages, a court relying on the civil discovery rules, issued an adverse inference instruction that permitted the jury to infer that the missing text messages were relevant and favorable to the defendants. See U.S. v. Suarez, 2010 WL (D. N.J. 2010). Government’s obligation to preserve 13

Rule 16 “is entirely silent on the issue of the form that discovery must take; it contains no indication that documents must be organized or indexed.” U.S. v. Warshak, 621 F. 3d 266 (6th Cir. 2010). Form of production 14

But see U.S. v. O’Keefe, 537 F. Supp. 2d 14 (D. D.C. 2008)(court held that document production by the government should adhere to Fed. R. Civ. P. 34 standards) and U.S. v. Briggs, 2011 WL (W.D. N.Y. 2011)(applying FRCP 34 and Fed. R. Crim. P. 16(d) and ordering government to re-produce ESI in reasonably useable form or forms following a data dump; government was the party “better able to bear the burden of organizing these records”). Form of production 15

In U.S. v. Skilling, 554 F. 3d 529 (5th Cir. 2009), the defendant argued that the government’s massive production of documents was a data dump that violated Brady’s obligations because it effectively suppressed exculpatory evidence. The Fifth Circuit disagreed noting this was not a data dump, the government’s open file production was electronic and searchable, the government produced a set of “hot documents”, and the government created and provided the defendant indices to these documents). Brady issues and ESI 16

See also U.S. v. Lewis, 594 F. 3d 1270 (10th Cir. 2010) (defense not entitled to a govt created database which constitutes work product); U.S. v. Ohle, 2011 WL (S.D. N.Y. 2011)(govt produced several gigabytes of data; court stated that Brady “does not place any burden on the Government to conduct a defendant’s investigation or assist in the preparation of the defense’s case.”) But see U.S. v. Salyer, 271 F.R.D. 148 (E.D. Cal. 2010)(court ordered govt to specifically identify Rule 16, Brady and Giglio materials) Brady issues and ESI 17

U.S. v. W.R. Grace (D. Mont. 2009)(midway during the cross-examination of a cooperating witness the defendant became aware of 200 s exchanged between the cooperating witness and case agent; court instructed jury that the s showed significant bias in the relationship between the witness and govt and animus towards the defendant) U.S. v. Malone, 49 F. 3d 393 (8th Cir. 1995) ( s between prosecutors and agents not discoverable; these were impressions of a witness’ interview not statements of the witness) and text exchanges between cooperating witnesses and prosecution/law enforcement 18

Recommendations for Electronically Stored Information (ESI) Discovery Production in Federal Criminal Cases, Joint Working Group on Electronic Discovery in the Criminal Justice System (“JETWG”) (Feb. 2012) Contents: – Introduction – Recommendations – Strategy and Commentary on ESI Discovery in Federal Criminal Cases – ESI Discovery Production Checklist Discovery and exchange of ESI 19

Prosecution and defense cooperation For example, to avoid disputes as to the form or volume of production Compare United States v. Skilling, 554 F.3d 529 (5th Cir. 2009), vacated in part and remanded in part, 130 S. Ct (2010) (production as “data dump”) with United States v. Rubin/Chambers, 825 F. Supp. 2d 451 (S.D.N.Y. 2011) (denying defense request that government reproduce ESI in categorized bunches as ESI was searchable and other steps were taken to relieve burdensomeness) Discovery and exchange of ESI 20

U.S. v. Graham, 2008 WL (S.D. Ohio 2008) (court dismissed indictment for Speedy Trial Act violation where govt was slow to produce millions of documents and other media) But see U.S. v. Qadri, 2010 WL (D. Hawaii 2010) (court denied motion to dismiss based on Speedy Trial Act; any delays were attributable to complexity – 30 computer hard drives and 3 servers) Speedy Trial Issues and ESI 21

United States v. Hernandez, 14 Cr. 499, 2014 WL (S.D.N.Y. Sept. 12, 2014) Court denies defendants’ motion for appointment of Coordinating Defense Attorney (CDA) – “There are clear and obvious ethical and legal issues implicated * * *” Coordinating Discovery Attorney (CDA) 22

Any stipulation should include: 1.Defense counsel responsible for ensuring everything received 2.Defense counsel responsible for ensuring everything loaded or accessible 3.Defense counsel responsible for ensuring all in form useful to clients 4.Defense counsel responsible for tagging Coordinating Discovery Attorney (CDA) 23

5.Defense counsel responsible for reviewing 6.Defense counsel responsible for clients’ failures 7.CDA assumes no responsibilities as attorney 8.CDA does not negotiate with government 9.CDA’s communications not privileged Coordinating Discovery Attorney (CDA) 24

Fed. R. Evid. 104: Preliminary Questions on Admissibility Fed. R. Evid. 401: Test for Relevant Evidence Fed. R. Evid. 901: Authenticating of Identifying Evidence Fed. R. Evid. 403: Excluding Relevant Evidence for Prejudice, Confusion, Waste of Time, or Other Reasons Fed. R. Evid. 701: Opinion Testimony by Lay Witnesses Fed. R. Evid. 702: Testimony by Expert Witnesses Admissibility 25

Parker v. State, No. 38, 2013, 2014 WL (Del. Sup. Ct. Feb. 5, 2014) (post on defendant’s social media page sufficiently authenticated through circumstantial evidence and victim testimony) Smith v. State, 136 So.3d 424 (Miss. 2014) (affirming conviction although social media messages and notification erroneously admitted) Admissibility 26

Commonwealth v. Grace, 84 Mass. App. Ct (Feb. 19, 2014) (rejecting challenge to admission of text messages based on circumstantial evidence presented at trial) Admissibility 27

In re Jovan A., 6 N.E.3d 760 (Ill. App. Ct. 2014) (reversing adjudication of delinquency; court below erred in admitting hearsay testimony on content of craigslist.org advertisement) United States v. Vayner, 769 F.3d 125 (2d Cir. 2014) (reversing conviction; social media page erroneously admitted) Admissibility 28

Sublet v. State, 2015 WL (Md. Ct. App. 2015) (first and most obvious method for authentication “would be to ask the purported creator if she indeed created the profile and also if she added the posting in question”. The second approach is to “search the computer of the person who allegedly created the profile and posting and examine the computer's internet history and hard drive to determine whether that computer was used to originate the social networking profile and posting in question.” The third of the non-exhaustive means of authentication is to “obtain information directly from the social networking website”, which would link together the profile and the entry to the person, or persons, who had created them.) Admissibility