id
stringlengths
36
36
text
stringlengths
1
400
source
stringclasses
10 values
a9d74f54-477a-4d87-9daf-cee7e8717026
. The temporal proximity of relevant events can be significant where evidence is authenticated through circumstantial evidence under Maryland Rule 5-901(b)(4). In Sample, 468 Md. at 567-68, 228 A
Mooney_v_State_2024-08-13.txt
79c6f32d-12c0-477c-953f-35e5401c94ee
.3d at 176, we determined that “the temporal proximity of the attempted armed robbery to the unfriending” was one of the circumstances that authenticated social media evidence indicating that the defendant unfriended his accomplice after the offense. In Sublet, 442 Md. at 676, 113 A
Mooney_v_State_2024-08-13.txt
68761f40-e817-4f90-ab59-5c205009e189
.3d at 721, we concluded that a reasonable juror could have found that tweets were authentic, in part, because of “the temporal proximity” between the tweets and direct messages that had already been authenticated. Similarly, in this case, the temporal proximity of the shooting to the events before and after that were depicted on the video and that Mr
Mooney_v_State_2024-08-13.txt
63b044c4-19f8-49dd-bd46-58fb5c166631
. Zimmerman had personal knowledge of gives rise to a reasonable inference that the video more likely than not fairly and accurately showed the shooting. Mr. Zimmerman testified that he reviewed the video in preparation for trial and that - 34 - the video truthfully and accurately depicted the events that occurred and did not appear to have been edited or altered.14 Because Mr
Mooney_v_State_2024-08-13.txt
04713d29-487e-49cf-a9b6-753a49bc8acc
. Zimmerman had personal knowledge of events that occurred within seconds before and after the shooting and testified that the video accurately depicted those events, a reasonable inference can be drawn that the video also fairly and accurately depicted the shooting.15 And, although the burden was on the State to authenticate the video, it is worth observing that, while Mr
Mooney_v_State_2024-08-13.txt
9dea4549-4fd9-48ce-97bf-17072494c1b3
. Mooney’s counsel argued in the circuit court that “there’s no way to know if that video’s been altered[,]” Mr. Mooney did not allege that the video was altered or tampered with. Another important circumstance supporting the conclusion that a reasonable juror could have found that the video fairly and accurately depicted the shooting involves the nature and origin of the video
Mooney_v_State_2024-08-13.txt
ba085c4e-20d7-4221-8248-134b5f302692
. Detective Liu testified that, when officers arrive at a crime scene, the first thing they do is look for witnesses and cameras, and that he obtained the video from an individual with a camera mounted on the exterior wall of his residence
Mooney_v_State_2024-08-13.txt
cbac38c3-0c34-48c8-987a-1d60fe9a8107
. Although the record does not reveal the identity of the individual who provided the video to Detective Liu, there was sufficient evidence to infer that the video was recorded by a camera belonging to a local resident and that it was obtained the same night as the shooting. 14Mr
Mooney_v_State_2024-08-13.txt
4d21bb83-199c-4db1-a70b-3192b94d4098
. Zimmerman’s testimony that the video did not appear to be altered or edited constituted testimony that the content of the video did not vary or contradict his observations of the events that occurred. Although Mr
Mooney_v_State_2024-08-13.txt
4594dd51-fc33-44db-b81d-df9db01205e6
. Zimmerman’s testimony did not verify the manner of production of the video and was not the equivalent of testimony required for authentication of a video under the “silent witness” theory, Mr. Zimmerman’s testimony confirmed that the events shown on the video truthfully and accurately depicted his observations of what occurred
Mooney_v_State_2024-08-13.txt
ed0f8281-6d53-421a-9331-c1c4656c4c37
. 15After the video was played, consistent with his testimony that he had watched the video and it accurately depicted the events that occurred, Mr. Zimmerman confirmed that the video showed him running to McDonald’s after the shooting. - 35 - That the video was recovered the night of the shooting from a source not connected to either Mr. Zimmerman or Mr
Mooney_v_State_2024-08-13.txt
9fbf0e30-33c3-4732-ad40-6e94b842a879
. Mooney, or the police, supports the conclusion that there was sufficient circumstantial evidence for a reasonable juror to find by a preponderance of the evidence that the video was what it was claimed to be—a fair and accurate depiction of the shooting
Mooney_v_State_2024-08-13.txt
1981f39a-d700-43f5-8db0-16cbc81a5113
. While there was sufficient evidence for a reasonable juror to find in favor of authentication in this case, authentication of video footage through circumstantial evidence under Maryland Rule 5-901(b)(4) will generally require more fulsome questioning than the type of inquiry typically used to establish the necessary foundation for authentication under Maryland Rule 5-901(b)(1), where a witness
Mooney_v_State_2024-08-13.txt
4ca68121-4379-48f3-86c7-682a014c20df
may be asked if the item is a fair an accurate depiction of what it purports to be
Mooney_v_State_2024-08-13.txt
3dec89e0-0e09-49d4-bcd1-3a8c8618e596
. To be sure, in this case, the prosecutor asked Mr. Zimmerman whether the video showed what he knew to be the 3900 block of Falls Road and confirmed with Mr. Zimmerman that the video showed him in his vehicle. And, after a bench conference at which the circuit court questioned whether a proper foundation had been laid for admission of the video, the prosecutor asked Mr
Mooney_v_State_2024-08-13.txt
5b95ec12-ab5c-4495-8be7-111df2a59f34
. Zimmerman if he had watched the video and if the video was a true and accurate depiction of the events that occurred on the night of the shooting
Mooney_v_State_2024-08-13.txt
037f589b-9445-49cf-8d9b-6563b5ae6569
. Although these were certainly valid questions and are the type of questions typically associated with authenticating evidence under Maryland Rule 5-901(b)(1), authentication of video footage through circumstantial evidence will generally require more specific questioning tailored to the particular circumstances of the case to establish a sufficient foundation for admission of evidence under
Mooney_v_State_2024-08-13.txt
64577099-8f9b-442d-8b6c-d60030920831
Maryland Rule 5- 901(b)(4)
Mooney_v_State_2024-08-13.txt
d1ff935a-fed0-47bd-ba05-c379dfae2b2d
. - 36 - In this case, given the extremely close temporal proximity of the shooting to the events before and after the shooting (of which Mr. Zimmerman had personal knowledge), Mr
Mooney_v_State_2024-08-13.txt
06f01775-3f06-44f2-bfee-0f4bcf8e0002
. Zimmerman’s testimony that the video was a true and accurate depiction of the events that occurred, and the nature and origin of the video, the absence of more specific questioning, generating additional circumstantial evidence to corroborate events in the video, does not detract from our ability to conclude that the video was properly authenticated. G
Mooney_v_State_2024-08-13.txt
41c75ae2-5427-4443-ba2a-48ddded1d3c9
. Conclusion Video footage, like social media evidence, is susceptible to alteration, and the increased availability of new technology, particularly the advent of image-generating artificial intelligence, may present unique challenges in authenticating videos and photographs
Mooney_v_State_2024-08-13.txt
d41504b2-8ca9-4ccd-8fd5-db7cc9b8da48
. As we have noted, “[p]hotographic manipulation, alterations and fabrications are nothing new, nor are such changes unique to digital imaging, although it might be easier in this digital age.” Washington, 406 Md. at 651, 961 A.2d at 1115. Nonetheless, at this time, video footage can be authenticated through vigilant application of existing methods for authentication of evidence
Mooney_v_State_2024-08-13.txt
de0499e6-edc1-453c-a384-f67127bf953f
. Like other evidence, video footage can be authenticated by circumstantial evidence sufficient for a reasonable juror to find by a preponderance of the evidence that the video is what it purports to be
Mooney_v_State_2024-08-13.txt
8d3a147a-221c-4a48-87c7-7b273ee92e2f
. As with social media evidence, the proponent of the evidence “‘need not rule out all possibilities that are inconsistent with authenticity, or prove beyond any doubt that the [] evidence is what it purports to be.’” Sample, 468 Md. at 599, 228 A.3d at 195 (quoting Sublet, 442 Md. at 666, 113 A.3d at 715) (brackets omitted)
Mooney_v_State_2024-08-13.txt
731e2a62-aa89-4bc7-8bbd-c0a7fbad8a2f
. What matters is that there is sufficient evidence for a reasonable - 37 - juror to find that more likely than not the video footage is what it is claimed to be. Because that test was met here, we affirm the judgment of the Appellate Court. JUDGMENT OF THE APPELLATE COURT OF MARYLAND AFFIRMED. PETITIONER TO PAY COSTS. IN THE SUPREME COURT OF MARYLAND No
Mooney_v_State_2024-08-13.txt
ab929612-abfe-4e46-8058-351b5072840d
. 32 September Term, 2023 ______________________________________ CHRISTOPHER MOONEY v. STATE OF MARYLAND ______________________________________ Fader, C.J. Watts Booth Biran Gould Eaves Hotten, Michele D. (Senior Justice, Specially Assigned), JJ. ______________________________________ Concurring Opinion by Fader, C.J
Mooney_v_State_2024-08-13.txt
26907c8a-7b0b-49c8-94c3-7ab76b528d3f
. ______________________________________ Filed: August 13, 2024 Circuit Court for Baltimore City Case No. 121280030 Argued: June 3, 2024 I join the Majority opinion in full. I write separately to express one additional thought. Justice Gould begins his thoughtful dissent with a reference to “the age of artificial intelligence” and the growing “risk of fabricated or altered evidence
Mooney_v_State_2024-08-13.txt
ed67640f-84d2-4f7c-b584-c63177cda5b7
.” The evidentiary concerns associated with the growth and proliferation of artificial intelligence, especially generative artificial intelligence, are real and pressing
Mooney_v_State_2024-08-13.txt
a117f3fd-46c4-49e2-8726-c96a19d10591
. Courts should be alert to claims that evidence has been altered by the use of artificial intelligence, and artificial intelligence technology may ultimately require us to adjust our rules and procedures for authenticating electronic evidence
Mooney_v_State_2024-08-13.txt
22b5c653-fff6-4e4d-a73e-157a0b844935
. But the record in this case does not contain any hint that artificial intelligence may have played a role, nor was there any suggestion that the video may have been altered in any way. We can expect to need to tackle issues associated with artificial intelligence soon, but this is not the case. IN THE SUPREME COURT OF MARYLAND No
Mooney_v_State_2024-08-13.txt
9bba6d51-6cda-4266-ba39-79158f2ebfcd
. 32 September Term, 2023 ______________________________________ CHRISTOPHER MOONEY v. STATE OF MARYLAND ______________________________________ Fader, C.J. Watts Booth Biran Gould Eaves Hotten, Michele D. (Senior Justice, Specially Assigned), JJ. ______________________________________ Dissenting Opinion by Gould, J
Mooney_v_State_2024-08-13.txt
07b08f78-a208-4e8d-913f-557dcf5f1f01
. ______________________________________ Filed: August 13, 2024 Circuit Court for Baltimore City Case No. 121280030 Argued: June 3, 2024 I respectfully dissent to the Majority’s well-written and thorough opinion. In the age of artificial intelligence, the risk of fabricated or altered evidence has never been greater, and that risk will only increase as technology advances
Mooney_v_State_2024-08-13.txt
bd4dc362-83d3-4572-9c71-303c6df10915
. The Majority optimistically posits that “at this time, video footage can be authenticated through vigilant application of existing methods for authentication of evidence.” Maj. Op. at 36. I hope so, but my concerns are that Maryland Rule 5-901 was not vigilantly applied here, when the trial court admitted the video into evidence over Mr
Mooney_v_State_2024-08-13.txt
1dcf20d0-2365-4929-8823-9253c8de59b6
. Mooney’s objection and that, as a result, the Majority is lowering the bar by affirming the trial court’s ruling. In my view, the trial court should not have admitted the entire video but instead should have required the State to edit out the parts where Mr. Zimmerman lacked personal knowledge, including the footage of the shooting
Mooney_v_State_2024-08-13.txt
348d1a5c-c822-40ab-bf3b-6f4add1de9cd
. Those critical few seconds were not authenticated by the pictorial testimony method, the silent witness method, or with circumstantial evidence. I write separately to explain my reasoning
Mooney_v_State_2024-08-13.txt
fa7681aa-73d4-4a4d-9ff5-4e5928537b6b
. Before delving into my analysis, I must emphasize that this dissent does not and should not be interpreted as calling into question the integrity of the officers, detectives, attorneys, or anyone else who may have touched the video exhibit at issue here. I have no reason to believe—and thus I do not believe—that the video was altered in any respect
Mooney_v_State_2024-08-13.txt
dbf0d512-fe18-4543-a8fc-bc7b3241f2c8
. But that is irrelevant to the legal issue before us. The relevant issue is whether the State satisfied its burden in establishing the authenticity of the video, based on the record evidence
Mooney_v_State_2024-08-13.txt
ff3e7e94-fc90-4593-b4ab-b60e0fe0468d
. Thus, any hypothetical speculation that the video has been fabricated or altered is solely to demonstrate what I believe are the weaknesses in the Majority’s reasoning, not to suggest that there is any reason to believe such foul play occurred here. 2 The Pictorial Testimony Method At trial, the State relied solely on the “pictorial testimony” method of authentication. See Mooney v. State, No
Mooney_v_State_2024-08-13.txt
3fedd293-0b60-4e65-8c8c-04f482e19529
. 1561, Sept. Term, 2022, 2023 WL 6783388, at *9 n.3 (Md. App. Ct. Oct. 13, 2023). Under that method, a video may be authenticated if a witness with firsthand knowledge of events testifies that the video fairly and accurately depicts those events. See Dep’t of Pub. Safety and Corr. Servs. v. Cole, 342 Md. 12, 20-21 (1996); see also Maj. Op. at 2
Mooney_v_State_2024-08-13.txt
6da5f3f1-f3c1-46b3-9d73-dfe97a347d1c
. That the pictorial testimony method was used is evident in the bench conference following the defense’s objection to the video’s admission, during which the court and the State discussed how to lay a proper foundation for authenticating the video: [MR. MOONEY’S COUNSEL]: I mean, there’s no way to know if that video’s been altered. It’s somebody else’s Ring camera
Mooney_v_State_2024-08-13.txt
f65341d7-1478-4019-8e96-3ac47fb6fe85
. These aren’t still photographs of what happened. THE COURT: Has he watched it? [MR. MOONEY’S COUNSEL]: I mean -- THE COURT: I don’t think that’s necessarily -- [MR. MOONEY’S COUNSEL]: And that was other -- THE COURT: -- a difference between still photographs and, um, video. If he’s able to authenticate it, he’s able to authenticate it, but I don’t. [MR. MOONEY’S COUNSEL]: Right
Mooney_v_State_2024-08-13.txt
998090ef-5d11-4962-a935-712e4eb8e565
. But I don’t know that he watched the whole thing either -- THE COURT: I don’t know either. [MR. MOONEY’S COUNSEL]: -- which is what I wanted to voir dire him on. THE COURT: Yeah. 3 [PROSECUTOR]: He has watched it in view, in preparation of this trial, he has -- THE COURT: Well, you -- you can ask him all that before, you haven’t laid the appropriate foundation for it yet
Mooney_v_State_2024-08-13.txt
a3a91f7c-75d3-45b2-9dcc-edad416a42ac
. I don’t know if that video -- [PROSECUTOR]: He’s authenticated it as to be the date and the time of the incident, it was a true and accurate reflection of that date and time. THE COURT: There are other questions you need to ask him, like, has he watched it. [PROSECUTOR]: Okay. THE COURT: And is it a fair and accurate representation of what happened. I mean, I’m not trying -- [PROSECUTOR]: Okay
Mooney_v_State_2024-08-13.txt
a06b986d-00a2-469e-9b7e-3985e57b3ef5
. THE COURT: Ask some more foundational questions. [PROSECUTOR]: Sure. After the bench conference, the State questioned Mr. Zimmerman in the manner suggested by the court and the court admitted the video: [PROSECUTOR]: Did you watch this video in preparation? [MR. ZIMMERMAN]: Yes, I did. [PROSECUTOR]: Okay
Mooney_v_State_2024-08-13.txt
d4fa8895-0b8c-45c7-8bad-2ae879b6fae4
. And after seeing that video[,] was that a true and accurate depiction of the events that occurred that day? [MR. ZIMMERMAN]: Yes. [PROSECUTOR]: And there was nothing that was changed or altered? [MR. ZIMMERMAN]: No. [PROSECUTOR]: From your recollection thereof? [MR. ZIMMERMAN]: No. 4 [PROSECUTOR]: Your Honor, the State at this time would move into evidence State’s Exhibit 1A
Mooney_v_State_2024-08-13.txt
793fc296-7f5b-4d68-be6f-b4768758dbda
. THE COURT: Over objection, State’s 1A is admitted. The problem here is that Mr. Zimmerman did not see Mr. Mooney after he walked past Mr. Zimmerman’s car. Mr. Zimmerman testified that as Mr. Mooney was walking past his car, he thought Mr. Mooney was about to say something because “it looked like he slowed down, like he was about to say something.” Mr. Zimmerman explained that: . .
Mooney_v_State_2024-08-13.txt
7db3204d-3d2d-4b76-a7dd-f8823cbc8006
. I seen him walk, and I didn’t know which way he went and so I’m looking. And then, I’m thinking he’s going to come run up to my front side of my -- my passen -- or the drive’s seat. . . . And, um, I look out my, I cracked my door and I’m looking out and I didn’t see him. As soon as I sat back that’s when the gunshots happened. Mr
Mooney_v_State_2024-08-13.txt
a235fc48-ba16-4891-8438-b4a2dddf61ef
. Zimmerman gave his account of the incident before the State sought to authenticate the video—that is before Mr. Zimmerman answered “yes” when the State asked him if the video was “a true and accurate depiction of the events that occurred that day.” By his admission, therefore, Mr. Zimmerman’s first-hand knowledge of the events did not include the shooting
Mooney_v_State_2024-08-13.txt
768f4254-88fa-4d65-b490-0f528925a469
. A reasonable juror would have had no basis to conclude from Mr. Zimmerman’s testimony that the depiction of the shooting was true, accurate, and unaltered. Thus, that part of the video should have been edited out of the version presented to the jury. 5 Circumstantial Evidence The Majority concludes that the footage depicting the shooting was authenticated by circumstantial evidence
Mooney_v_State_2024-08-13.txt
a727fad1-c1b5-4e2d-bd73-1d1434fb45b3
. One such piece of circumstantial evidence, according to the Majority, is the “close temporal proximity” of the relevant events. Maj. Op. at 31-33. “Temporal proximity” refers to the amount of time between two or more events
Mooney_v_State_2024-08-13.txt
8e23c84b-52fe-42f0-993e-7935644536cb
. Under the Majority’s use of “temporal proximity,” the relevant events are (1) the moments depicted in the video leading up to the shooting, (2) the shooting, and (3) the moments after the shooting. Mr. Zimmerman had personal knowledge of the first and third events, but not the second
Mooney_v_State_2024-08-13.txt
ee3aa8a8-ecc9-48db-ad48-90b9658cfd79
.1 The Majority reasons that because the video is short and because the second event, which lasted just a few seconds, was sandwiched between the first and third events, a reasonable juror could infer that the “video fairly and accurately showed” the second event, even though Mr. Zimmerman did not see it. Maj. Op. at 32-33. Put another way: According to the Majority, Mr
Mooney_v_State_2024-08-13.txt
0d9bbd26-40ba-42e8-97c0-65d14d2bc210
. Zimmerman’s ability to authenticate some of the video provides a basis on which a reasonable juror could conclude that another part of the video was neither fabricated nor altered. I disagree with the Majority’s reasoning. The authentication requirement exists to prevent the admission of tampered evidence. If someone wanted to frame Mr
Mooney_v_State_2024-08-13.txt
0e3f9100-d11a-4ce9-ab6a-b3f7bff709e1
. Mooney by tampering with the video, we would expect that person to alter the minimum amount necessary to achieve that purpose. Here, that could be altering only the appearance of the shooter. So, the fact that Mr. Zimmerman can authenticate the parts he did see does not mean the parts he could not see were 1 As to the third event, Mr
Mooney_v_State_2024-08-13.txt
5c3ca46b-0fc5-438c-b659-5335b90e087b
. Zimmerman’s personal knowledge was limited as well, as he did not testify that he saw the shooter leave the scene. 6 untampered with. The Majority relies on two cases for its temporal proximity analysis: Sublet v. State, 442 Md. 632 (2015) and State v. Sample, 468 Md. 560 (2020)
Mooney_v_State_2024-08-13.txt
f8004365-e1f3-4336-b72c-5bb0304ec200
. If the Majority’s reliance on these cases is limited to the proposition that temporal proximity can theoretically provide circumstantial evidence of authenticity in certain contexts—that is, to establish that the concept of temporal proximity is potentially relevant in an authentication analysis—I do not disagree
Mooney_v_State_2024-08-13.txt
5e157bc9-105b-4a49-be12-9344ab8f5492
. But if the Majority relies on Sublet and Sample as precedents to justify how it uses temporal proximity here, I disagree. The nature of and relevance of the evidence at issue in both cases were different than that of the video at issue here. So too are the authentication challenges raised in the respective cases. In Sublet, this Court decided three cases consolidated for appeal. 442 Md
Mooney_v_State_2024-08-13.txt
8c43dea2-0082-41c2-9c80-4909c960221b
. at 636-37. The second case, Harris v. State, involved private messages and public tweets on X (formerly Twitter). Id. at 645-52. The State apparently believed that the content of those communications was evidence of the defendant’s guilt; that is, what the defendant said in those communications was inculpatory. See id. at 645-52, 674-76
Mooney_v_State_2024-08-13.txt
f8028b67-4eee-4a11-9dea-f45652a74774
. But the State had to establish that the communications were the handiwork of the defendant. It was in that context that temporal proximity came into play: The timing of the communications relative to other events connecting the defendant to the alleged crime was circumstantial evidence of the defendant’s authorship. Id. at 674-76
Mooney_v_State_2024-08-13.txt
41722dd3-ad46-4b07-a74f-cedf54b2f417
. In Sample, the social media action was the unfriending on Facebook by one person—the defendant—of the defendant’s alleged accomplice. 468 Md. at 565-68. The State asserted that this act of unfriending was evidence of the defendant’s guilt in that it 7 showed the defendant was trying to distance himself from his alleged accomplice. See id. at 567
Mooney_v_State_2024-08-13.txt
984e77b0-ba9d-4919-a6d0-f1ab2b1da157
. The names on the accounts of both the person who did the unfriending and the person who was unfriended did not identify the real names of the account holder
Mooney_v_State_2024-08-13.txt
02ebbd6a-7ed7-4c8e-9af9-13ad5746f329
. Thus, the authenticity challenge was twofold: (1) to show that the accounts were held by the defendant and the accomplice, respectively; and (2) to show that the defendant, and not someone else who might have gained access to the account, committed the act of unfriending. Id
Mooney_v_State_2024-08-13.txt
33f1e073-a685-478b-b4c3-105f3241689b
. In that context, the temporal proximity of the alleged crime to the act of unfriending was among the circumstantial evidence from which, we held, a reasonable juror could conclude that the unfriending was done by the defendant. Id. at 568, 602-05
Mooney_v_State_2024-08-13.txt
6ad95b20-4f66-43da-9534-39a0f9bf6f9e
. In both Sublet and Sample, the relevance of the evidence hinged on whether the defendant was the person who generated the evidence at issue—in Sublet, the social media communications and in Sample, the unfriending. In other words, the authentication issue was not so much whether the evidence was real or fake; the issue was whether the defendant was the actor who created the evidence
Mooney_v_State_2024-08-13.txt
1d30fda9-a4ab-439e-a61e-5d753506eb3f
. So, the act of generating that evidence was a critical piece of the temporal proximity analysis. In contrast, here, the relevance of the piece of evidence—the video—does not hinge on who created it, but instead on whether it was real or fake
Mooney_v_State_2024-08-13.txt
c26f83f4-24e2-474d-8740-278e9b5bee04
. Here, the authentication issue was not to show that a particular person created the video; it was whether the State demonstrated that the video was neither fabricated nor altered. And the creation of the video was not a relevant event in the Majority’s temporal proximity analysis. Accordingly, in my view, Sublet and Sample do not support how the Majority uses temporal proximity here
Mooney_v_State_2024-08-13.txt
95c24d63-cee9-44b8-b82b-123528a1e546
. 8 Silent Witness Testimony The Majority tries to fill the gap left by the pictorial method by using the “silent witness” approach to authenticating the video, pointing to “the nature and origin of the video.” Maj. Op. at 34. Recall that the State introduced and entered the video into evidence through the testimony of Mr. Zimmerman. Detective Liu, who received the video, testified after Mr
Mooney_v_State_2024-08-13.txt
ba8e6aa5-f17f-4c86-9a5d-d80381b1181c
. Zimmerman. So, to begin with, the trial court did not admit the video based on the silent witness approach based on Detective Liu’s testimony. In any event, Detective Liu’s testimony was insufficient under the silent witness approach
Mooney_v_State_2024-08-13.txt
b642e71d-224e-4ec4-9bc9-73907ddf3b11
. Here’s what we know from Detective Liu’s testimony: (1) When officers arrive at the scene of the crime, the first thing they do is look for witnesses and cameras; and (2) he obtained the video from someone with a camera mounted on the exterior wall of his residence
Mooney_v_State_2024-08-13.txt
9716d494-9237-48ab-b763-67e680dd8305
. From these two facts, the Majority holds that a reasonable juror could conclude that the “video was recorded by a camera belonging to a local resident and that it was obtained the same night of the shooting.” Maj. Op. at 34. I have no problem with the first inference—that the video was recorded by a local resident’s camera. But the second inference is a bridge too far
Mooney_v_State_2024-08-13.txt
1e05f5d2-33b4-4ea5-8d55-be31a33fdeec
. There is no basis to draw any conclusion as to when Detective Liu received the video. Maybe the resident was home when Detective Liu canvassed the area; maybe not. Maybe Detective Liu left a card at the residence’s front door on the day of the shooting and received a call back the next day, or maybe he received a return call in the following weeks or months
Mooney_v_State_2024-08-13.txt
411155d1-57b5-49ee-bf13-fb15e2f76477
. The record reveals nothing about when Detective Liu received the video. There is much we do not know, but should know, to be consistent with the standard 9 this Court has set for the “silent witness” approach to authenticating photos or videos
Mooney_v_State_2024-08-13.txt
b46cc7a3-0e06-43e2-a076-cebbc8a911ff
. Which type of camera was used? What media was used to record the images? Where were the images from the camera stored? Did Detective Liu receive a copy of the video or the original? If it was a copy, who made the copy, and when and how was it made? Was the video emailed to Detective Liu? Did he receive a thumb drive? Was Detective Liu given access to a cloud account where the video was stored
Mooney_v_State_2024-08-13.txt
6db91ec0-6040-475d-a152-de53ef8f034f
? Was the video recorded in a format that made it easy to alter? Who had access to the video before it was provided to Detective Liu? Who had access to the video after Detective Liu received it? The inability to answer these questions on this record is troubling, in my view, particularly when compared to other cases in which video evidence was admitted or excluded
Mooney_v_State_2024-08-13.txt
0aed2d7f-ab6b-46ab-86e0-c843d049cbc7
. In Cole, for instance, this Court held that a videotape of a prisoner’s extraction from his cell was properly authenticated. 342 Md. at 27
Mooney_v_State_2024-08-13.txt
299aaa73-08c4-4270-959b-39a32aeca65a
. There, the prison warden testified that videotaping cell extractions was a routine practice at the prison, that each videotape was routinely labeled with the date and time of the extraction, that each videotape was routinely labeled with the names of the prison officers and inmates involved, that each videotape was maintained in a security vault, and that each videotape could only be viewed by
Mooney_v_State_2024-08-13.txt
fa5a0e1b-484b-4d10-ad98-a69dcf7c12ad
signing it out on a custody form
Mooney_v_State_2024-08-13.txt
492756e3-2a99-40e4-ac1b-850fe1f5e696
. Id. In Jackson v. State, 460 Md. 107 (2018), we held that video footage of an ATM was properly authenticated when a bank employee described in detail the process for obtaining that footage and providing it to police
Mooney_v_State_2024-08-13.txt
6b91d1b2-e478-44c9-bab4-2cd9432ada8b
. The employee testified that the process involved accessing a digital video recorder program that prevented him from modifying the video or even copying it to an external storage device. Id. at 117. To send the video to the police, 10 the employee was required to submit a request to bank employees outside of Maryland, who would then mail the video directly to the police. Id. Finally, in Reyes v
Mooney_v_State_2024-08-13.txt
0750d1cf-4b11-44ce-8717-6e24bb637667
. State, 257 Md. App
Mooney_v_State_2024-08-13.txt
c089f8a6-a994-4cb3-afc3-f46673bf9582
. 596 (2023), the Appellate Court of Maryland held that a video taken by a man’s residential security camera was properly authenticated when he testified to the camera’s “general reliability” and other pertinent facts, including that he had installed the camera in the front window of the residence, that the camera was motion-activated and would send an alert to his phone when it began recording,
Mooney_v_State_2024-08-13.txt
754e4ef3-65fb-4280-8878-723482be7738
and that he received such an alert on the night the video in issue was taken
Mooney_v_State_2024-08-13.txt
59f46800-1a38-498b-9fb1-4d765aecd828
. Id. at 612, 631. In contrast, in Washington v. State, 406 Md. 642 (2008), we held that a video was not properly authenticated because an unknown person created the video “through some unknown process” by compiling footage from eight surveillance cameras onto a CD and then copying that footage to a videotape. Id. at 655
Mooney_v_State_2024-08-13.txt
3f29b47a-6946-4992-a078-eb51b09fe67d
. As we noted, “[t]here was no testimony as to the process used, the manner of operation of the cameras, the reliability or authenticity of the images, or the chain of custody of the pictures.” Id. So too here. On this record, there was insufficient evidence to authenticate the video using the silent witness method
Mooney_v_State_2024-08-13.txt
b70f9b28-9ae0-4691-a487-3c607eb75094
. * * * In sum, the most critical part of the video—the shooting—was not properly authenticated using the pictorial testimony method, the silent witness method, or with other circumstantial evidence. In my view, that part of the video should not have been admitted. I would therefore reverse and remand the case for a new trial. Accordingly, I respectfully dissent.
Mooney_v_State_2024-08-13.txt
6363aade-d8ea-4bee-8158-27dcc26b1882
1 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA NATIONAL SECURITY COUNSELORS, Plaintiff, v. CENTRAL INTELLIGENCE AGENCY, et al., Defendants. Civil Action Nos. 11-443, 11-444, 11-445 (BAH) Judge Beryl A
National_Security_Counselors_2013-08-15.txt
376cc02c-ca80-4657-8310-1c6542416e0a
. Howell MEMORANDUM OPINION The plaintiff National Security Counselors (“NSC”) brought these three related actions against six federal agencies pursuant to the Freedom of Information Act (“FOIA”), 5 U.S.C. § 552, claiming that the defendant agencies have violated the FOIA in numerous ways
National_Security_Counselors_2013-08-15.txt
488b30ce-65d8-4d9e-a850-3c43a532ba11
.1 NSC’s claims run the gamut, including challenges to: the withholding of specific information; the adequacy of the agencies’ search efforts; the refusal to process FOIA requests; the refusal to produce responsive records in an electronic format; and certain policies or practices which the plaintiff claims are ongoing and systematic FOIA violations
National_Security_Counselors_2013-08-15.txt
bd6d8a31-835c-482b-9b5d-e12237875c67
. Although six agencies are named as defendants,2 the vast majority of the plaintiff’s claims relate to the actions of the Central Intelligence Agency (“CIA”) in processing and responding to FOIA requests. The defendants previously moved to dismiss many of the plaintiff’s claims, which this Court previously granted in part and denied in part. See Nat’l Sec. Counselors v. CIA (“NSC I”), 898 F. Supp
National_Security_Counselors_2013-08-15.txt
2fc41340-8be1-4b1e-a542-700254bc9857
. 2d 233 1 The plaintiff filed each of these actions on the same day and notified the Court that all three cases are related to one another because they involve common factual and legal issues. See Notice of Related Case, No. 11-444, ECF No. 2; Notice of Related Case, No. 11-445, ECF No. 2
National_Security_Counselors_2013-08-15.txt
62a8b637-a95f-4506-80a6-960b54805a1c
. Although the Court has not formally consolidated these actions, due to their interrelated nature and in the interests of judicial economy the Court has adjudicated dispositive motions in the three cases in consolidated opinions
National_Security_Counselors_2013-08-15.txt
3b2c9e9b-7a62-4028-8c0b-c59f87bafe22
. For these same reasons, the Court administratively stayed all three actions for approximately four months while the parties completed the briefing of summary judgment motions and cross-motions in each case. See Minute Order dated Mar. 21, 2013
National_Security_Counselors_2013-08-15.txt
cd5fa2c0-5a8a-46ee-b9b6-0f537d7bdcc9
. 2 The six defendants are: the Central Intelligence Agency (“CIA”), the Department of Justice (“DOJ”), the Defense Intelligence Agency (“DIA”), the Department of State (“State Department”), the National Security Agency (“NSA”), and the Office of the Director of National Intelligence (“ODNI”). 2 (D.D.C. 2012)
National_Security_Counselors_2013-08-15.txt
25e1c13f-420e-4880-82e8-face0b4c17f6
. The defendants now move for summary judgment on all of the plaintiff’s remaining claims, and the plaintiff has also cross-moved for summary judgment on a portion of those claims. Additionally, the plaintiff has filed a motion for sanctions in one of the related cases and a motion for leave to file an amended complaint in another
National_Security_Counselors_2013-08-15.txt
758df363-0a4c-499b-88c7-3cb807c0675d
. For the reasons discussed below, the Court grants in part and denies in part the defendants’ motions for summary judgment, grants in part and denies in part the plaintiff’s cross-motions for summary judgment, denies the plaintiff’s motion for sanctions, and denies the plaintiff’s motion for leave to file an amended complaint. Table of Contents I. Background ......................................
National_Security_Counselors_2013-08-15.txt
57c504ef-7531-458b-b094-3141ab9ff7ed
........................................................................................ 5 A. 2009 FOIA Requests ............................................................................................................ 6 1. Count Twenty in No. 11-444: September 25, 2009 FOIA Request to the CIA ............... 6 2. Count Eight in No. 11-445: October 22, 2009 FOIA Request to the DOJ .............
National_Security_Counselors_2013-08-15.txt
f11fae0e-0748-46d0-a8ab-8b1a132e75dc
......... 7 3. Counts One, Five and Six in No. 11-445: December 1, 2009 FOIA Requests to the CIA, DIA, and ODNI ....................................................................................................................... 8 B. 2010 FOIA Requests .......................................................................................................... 10 1
National_Security_Counselors_2013-08-15.txt
4e804204-56e7-4a21-9cfd-f55aad9a9c67
. Counts Seven, Nine and Ten in No. 11-445: February 6, 2010 FOIA Requests to the CIA, State Department, and NSA ......................................................................................... 10 2. Counts Two and Three in No. 11-445: February 9, 2010 FOIA Requests to the CIA... 12 3. Count Seventeen in No. 11-444: May 4, 2010 FOIA Requests to the CIA ................... 14 4
National_Security_Counselors_2013-08-15.txt
88652b15-1791-46cf-b3a1-c2c9707ab346
. Count Three in No. 11-443: May 12, 2010 FOIA Request to the CIA .......................... 15 3 5. Count Nine in No. 11-444: May 13, 2010 FOIA Request to the CIA .......................... 16 6. Count Eight in No. 11-444: July 5, 2010 FOIA Request to the CIA ............................. 18 7. Count One in No. 11-444: August 8, 2010 FOIA Requests to the CIA ......................... 19 C
National_Security_Counselors_2013-08-15.txt
4ab77a98-5dca-496d-a796-6b3157d2d959
. 2011 FOIA Requests .......................................................................................................... 20 1. Count Eighteen in No. 11-444: January 26, 2011 FOIA Request to the CIA ................ 20 2. Count Thirteen in No. 11-445: February 11, 2011 FOIA Request to the CIA............... 21 3. Count Ten in No. 11-444: February 16, 2011 FOIA Request to the CIA ............
National_Security_Counselors_2013-08-15.txt