State of Tennessee v. Vermaine M. Burns

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE February 10, 2015 Session STATE OF TENNESSEE v. VERMAINE M. BURNS Appeal from the Circuit Court for Williamson County No. II-CR0026236 James G. Martin, III, Judge No. M2014-00357-CCA-R3-CD - Filed May 5, 2015 Vermaine M. Burns (“the Defendant”) was convicted of several sexual offenses, all stemming from illicit Facebook chats (“chats”) and emails between himself and the victim, K.P.1 On appeal, the Defendant raises three issues: (1) whether the trial court abused its discretion by admitting into evidence the Defendant’s chats with the victim and an emailed photo of a penis; (2) whether the evidence was sufficient to support the jury’s finding that the Defendant was the author of the communications; and (3) whether the trial court erred by prohibiting the Defendant from referring to a fake Facebook profile created by the Defendant’s stepdaughter. After a review of the record and applicable law, we affirm the judgments of the trial court. Tenn. R. App. P. 3 Appeal as of Right; Judgments of the Circuit Court Affirmed R OBERT L. H OLLOWAY, J R., J., delivered the opinion of the Court, in which T HOMAS T. W OODALL, P.J., and T IMOTHY L. E ASTER, J., joined. Carrie Searcy (at trial and on appeal) and Carla Arevalo (at trial), Nashville, Tennessee, for the appellant, Vermaine M. Burns. Herbert H. Slatery III, Attorney General and Reporter; Andrew C. Coulam, Assistant Attorney General; Kim R. Helper, District Attorney General; and Mary Catherine White, Assistant District Attorney General, for the appellee, State of Tennessee. 1 It is the policy of the Court not to identify a minor victim of a sex crime by name. OPINION I. Factual and Procedural Background The Williamson County Grand Jury indicted the Defendant for four counts of solicitation to commit aggravated statutory rape, two counts of attempted solicitation of sexual exploitation of a minor, one count of solicitation to commit especially aggravated sexual exploitation of a minor, and one count of exploitation of a minor by electronic means.2 At trial, the victim’s mother, Melanie Conley, testified that the Defendant was her cousin. At the time the offenses occurred, both the Defendant and K.P. had Facebook accounts, and Ms. Conley was a “Facebook friend[]” with the Defendant. In June 2010, Ms. Conley received an email from Facebook3 containing a message that had been sent to K.P.’s Facebook account from the Defendant’s Facebook account, asking K.P. to take pictures of her body and to send them to the author of the message. Upset, Ms. Conley looked at K.P.’s computer where K.P.’s Facebook account was still open. There, Ms. Conley found more messages of a similar nature and replies from K.P. indicating that “she was uncomfortable” doing the things she had been asked to do. Ms. Conley took a screen shot4 of the messages on K.P.’s Facebook account. Each message bore the name and photo of the Defendant. The last conversation was time- stamped 12:25 a.m. Ms. Conley understood the messages captured in the screen shot to indicate that K.P. had sent the photos of herself and the author was asking if K.P. wanted a photo of himself. In this conversation, K.P. gave her Yahoo email address (the “Yahoo email address” or “Yahoo account”), and Ms. Conley confirmed that the given email address was consistent with Ms. Conley’s memory of what K.P.’s email address was at the time. Ms. Conley confronted K.P. about the messages. She also confronted the Defendant, and “things got heated.” Later that same day, Ms. Conley contacted the Spring Hill Police Department, who took possession of K.P.’s computer. On cross-examination, Ms. Conley stated that the Defendant became aggressive when 2 K.P. was 14 years old when the offenses occurred, and the Defendant was more than 10 years older than the victim. 3 Ms. Conley explained that K.P.’s Facebook account was set up so that an email was sent to Ms. Conley’s email address every time K.P. received information over Facebook. 4 A “screen shot” is an image of a computer screen as it appeared at the time the screen shot was taken. -2- she confronted him about the messages. Ms. Conley stated that she knew K.P. and the Defendant were “Facebook friends” at the time of the offense. She also knew the Facebook account sending the messages belonged to the Defendant. When asked if she had told anyone that she believed that someone other than the Defendant could have sent the messages, Ms. Conley responded, “I did say that I wasn’t sitting there beside the person who sent it, so, I mean, it’s a possibility.” Apart from the messages found on K.P.’s Facebook account, Ms. Conley had never seen the Defendant make any inappropriate comments or behave inappropriately toward K.P. Detective Michael Foster of the Spring Hill Police Department testified that K.P.’s mother gave him the screen shot of the chat between K.P. and the Defendant. He also took possession of the victim’s laptop computer and brought it to the Franklin Police Department Internet Crimes Against Children task force (“ICAC”)5 in order for ICAC to “perform an image” of the hard drive on K.P.’s computer. Detective Foster, along with other ICAC officers, executed a search warrant at the Defendant’s home. Detective Foster participated in an interview of the Defendant during the execution of the search warrant. During that interview, the Defendant told officers that he did not have his own internet connection and instead used an unsecured network in the neighborhood. He also admitted to having a Facebook account as well as a Hotmail email address (the “Hotmail account” or “Hotmail email address”). He informed the detectives that he used his Facebook account to play a game called Mafia Wars. To assist ICAC, Detective Foster subpoenaed records for both the victim’s Yahoo account and the Defendant’s Hotmail account. The records for both accounts showed who created the account and included a “log in history” for June 2010, which detailed the dates and times that the account was accessed along with the internet protocol (“IP”) addresses used to access the account. Detective Foster explained that, whenever a computer accesses the internet, it has a signature IP address, which is attached to an internet service provider. That IP address can then be used to determine the exact location of the computer at the time it accessed the internet (e.g., a person’s home or a Starbucks). On cross-examination, Detective Foster admitted that he could not determine from looking at the screen shot of the chats who had accessed either of the two accounts when the chats were sent. Detective Foster also confirmed that the Defendant was “very cooperative” when they executed the search warrant, and the Defendant denied ever sending photos or “chatting” with K.P. 5 Detective Foster explained that ICAC had more experience investigating these types of cases and the Spring Hill Police Department did not have the necessary resources to retrieve evidence from the laptop. -3- ICAC Detective Stephanie Cisco participated in the execution of the search warrant on the Defendant’s home and was tasked with photographing the rooms of the home and collecting evidence. At the time the search warrant was executed, the Defendant was the only person in the home. In the master bedroom, Detective Cisco found a computer that was turned on with the Defendant’s Hotmail open on the screen, several cell phones, and a T- Mobile cell phone bill. Additionally, a résumé found on the computer listed the Defendant’s name, the Hotmail email address, and the Defendant’s cell phone number. One of the cell phones recovered was a T-Mobile Blackberry. When Detective Cisco found the phone, it was turned on, and if one of the buttons on the phone was pressed, a photo of the Defendant’s face appeared as the background for the phone’s screen. A T- Mobile cell phone bill found at the scene indicated that it was a statement for a Blackberry owned by the Defendant and contained the Defendant’s telephone number. Detective Cisco examined the Blackberry at the ICAC lab and found a subscriber identity module (“sim”) card6 and a micro SD card7 inside the phone. The micro SD card contained pictures of the Defendant. Additionally, the Hotmail email address appeared at the bottom of the Blackberry’s screen. Detective Cisco explained that the presence of that email address on the screen meant that the Hotmail account was registered to that Blackberry and any email sent to the Hotmail account would automatically appear on his phone. Detective Cisco confirmed that the Hotmail account registered to the phone was the same account that was open on the computer found in the master bedroom of the Defendant’s home. Detective Cisco then turned the phone over to another detective in order to retrieve information that had been deleted from the phone’s memory prior to its examination. On cross-examination, Detective Cisco stated she found the Blackberry next to the computer on the desk. She confirmed that the Blackberry was not password protected. When the Blackberry was found, icons on the screen indicated that it had a signal, and the phone bill found at the scene indicated that it was active and could be used. However, Detective Cisco explained that she turned the signal off when she began examining the phone in the lab to prevent anyone from remotely wiping the data stored on the phone. Detective 6 A sim card is a microchip issued by the phone company that is inserted into the phone and provides the subscriber’s information. Detective Cisco explained that not every phone company issues sim cards for modern phones. 7 A micro SD card is a “small portable storage device” that is inserted into a phone and can also be inserted into a digital camera or computer. It stores data such as applications for the phone, text messages, videos, papers, emails, et cetera. Detective Cisco explained that the SD card would store “anything that you wanted to save.” Each phone is different, and what data is stored on the SD card simply depends on how the phone is set up. -4- Cisco explained that she came to the conclusion that the Blackberry had cellular service when she found it because of a symbol that appeared on the phone’s screen that she understood to mean the phone had cellular service. When she turned the signal off in the lab, that symbol no longer appeared on the phone’s screen. But, in order to determine if the phone had cellular service on one day but not another, Detective Cisco said she would have to examine the phone bill. ICAC Detective Brett Kniss testified that he was trained to conduct computerized forensic examinations and had completed “undercover chat training,” during which he learned how to create fictitious Facebook accounts and pose as a minor to entice suspects. Through that process, he learned how Facebook operates. Additionally, Detective Kniss had reviewed the law enforcement manual published by Facebook. When Detective Kniss received the victim’s laptop from Detective Foster, he examined the hard drive for evidence of chats and photos that were allegedly sent by the Defendant. Detective Kniss explained that a Facebook chat can be sent between users who are already “Facebook friends” and operates like an instant message, allowing users to communicate in real time via the Facebook server. Chats can be “cleared” by the user and deleted off their Facebook page. Once the chats are deleted, the user cannot access the chats via their Facebook account. However, Detective Kniss was able to retrieve evidence of the chats from the hard drive of K.P.’s computer. Along with the content of the chat, Detective Kniss recovered the user ID numbers for the Facebook accounts, the sender and receiver of each chat message, and the date and time each chat message was sent. Detective Kniss copied all of the chats between K.P. and a Facebook account bearing the Defendant’s name into an Excel spreadsheet so they could be organized chronologically. K.P.’s and the Defendant’s names were listed as the user names associated with the Facebook accounts in the chats found on K.P’s hard drive. Detective Kniss verified the Defendant’s user name and user ID number through records from Facebook. Detective Kniss also used an undercover Facebook account to find the Defendant’s Facebook account and verified that the profile picture and the user ID associated with that account matched the picture and user ID recovered from the chats on K.P.’s laptop. Additionally, the Hotmail email address was displayed on the Defendant’s Facebook account. During her interview with Detective Kniss, K.P. had described a photo of a black man’s penis that the Defendant allegedly sent to her. Detective Kniss found a photo consistent with K.P.’s description during a search of the hard drive of K.P.’s laptop. The -5- time-date stamp8 on the image also matched the date and time of the chats found on K.P.’s computer. Similarly, the log in records for K.P.’s email account corresponded with the time- date stamp on the image. K.P. also told Detective Kniss about photos she had sent to the Defendant’s Hotmail email address provided to K.P. in the Facebook chat. Detective Kniss found photos matching the description given by K.P. during his search of the hard drive of K.P.’s laptop. Detective Kniss discovered that the email address on the Defendant’s résumé found during the execution of the search warrant was the same email address to which K.P. had been directed to send photos. Detective Kniss testified that the desktop computer found at the Defendant’s home accessed the internet, email, and Facebook through an unsecured internet signal9 in the neighborhood. Detective Kniss also searched the Defendant’s computer hard drive for Facebook chats between the Defendant and K.P., and he found the “exact” chats that he had previously found on K.P.’s computer—the user IDs, names, dates, and times all matched the chats found on K.P’s computer. All the chats bore the names of the Defendant and K.P. In a chat starting at 11:10 p.m. on June 11, 2010, and continuing into the early hours of June 12, 2010, the sender opened the conversation by referring to K.P. by a nickname and asking about several members of her family. The sender also asked, “What time are y’all leaving in the morning? Ain’t the trip tomorrow?” K.P. responded by saying, “The trip ain’t tomorrow.” The sender also asked K.P. whether she played Mafia Wars. Several times in the chat, the sender referenced that he or she was aware of K.P.’s age and that he or she was worried about getting into trouble for his conversations with her. Throughout their conversation, the sender repeatedly asked to K.P. to delete their chat and expressed apprehension about the consequences that could come from conversations with K.P. Eventually, their conversation turned to sexual topics. The sender asked K.P to describe her pubic hair; whether she was aroused; and whether she would perform oral and vaginal sex. In the midst of this conversation, the sender also wrote, “You young and you 8 Every time a computer receives an image, either from the internet or sent directly from another person, the computer automatically creates a time-date stamp for the image file, noting when the computer received it. 9 An unsecured internet signal means that the signal is not password protected and anyone within the range of the signal can use it to access the internet. -6- my cuz [sic]. Yeah, for you I could get locked up.” Detective Kniss understood this communication to mean that the sender knew K.P. was underage and also that the sender was related to K.P. The sender and K.P. also discussed how they might meet in person. The sender suggested that K.P. tell her mother that she wanted to “go hang with [K.W.]” 10 At the time, the Defendant had a stepdaughter named K.W. who lived in his home. The sender asked K.P. to send photos of her vaginal area to the Defendant’s Hotmail email address. K.P. refused and told the sender she was not comfortable sending such photos. Even though K.P. refused to send the photos of her vaginal area as the sender requested, the chats indicated that she did send some photographs to the Hotmail email address. When the sender received one of the photos, he or she responded, “Come on. What’s that? Do better . . . Take the same pic, but take your clothes off.” The sender also instructed K.P., “You need to finger f*** yourself right now and tell me when you [sic] coming [sic] . . . When you come [sic] on your fingers, take a [p]ic of your fingers so I know you did it.” The sender asked K.P. to send that photo to the Hotmail email address. The chat ended at 3:04 a.m. on June 12, 2010. Detective Kniss recovered two photos from the Defendant’s computer hard drive that were consistent with the photos K.P. sent to the person in the chat. The first photo showed K.P. looking into a mirror wearing an undershirt. The second image depicted K.P.’s fingers held up for the camera.11 Both photos were placed on the Defendant’s computer on June 12, 2010, and according to the time-date stamp, they were last accessed on that computer around 2:30 a.m on June 12, 2010. The same photos were recovered from K.P.’s hard drive. The time-date stamps on the photos found on K.P.’s hard drive correspond with the time she was chatting with the sender on June 12, 2010. At 1:06 a.m. on June 13, 2010, the sender initiated another Facebook chat and told K.P. to “call [K.W.] tomorrow night.” Again, the sender indicated that he or she knew K.P. was 14 years old and expressed concern that their conversations would be discovered. The sender also repeatedly tried to get K.P. to send him or her a photo of her vaginal area, but K.P. refused and expressed discomfort with sending such photos. In this conversation, the sender offered to send K.P. a photo of his or her genitalia and described sex acts he or she would like to perform with K.P. The sender also said: 10 In the interest of protecting the privacy of a minor, we elect to refer to K.W. and her brother, D.W., by their initials. 11 K.P. told Detective Kniss during her interview that she had put lotion on her fingers to “simulate the wetness,” held up her fingers to take the photo, and sent that photo to the Hotmail email address. -7- Sees [sic], what you don’t realize is that because we’re fam you can always come over always and it couldn’t never end, just f*** and f*** and f***. You can’t do that with no other guy and get away with it, but with me. Feel me? See, she trust [sic] you over here, and so what better place to be and get what you want when you want it and we got all summer to f*** as many times as possible. According to the time-stamps, that chat ended at 2:09 a.m. on June 13, 2010. At 12:07 a.m. on June 14, 2010, the sender initiated yet another Facebook chat with K.P. The sender asked K.P. to meet in person, and K.P. suggested that she tell her mother that she was visiting the Defendant’s home. Detective Kniss explained that this conversation indicated that K.P. knew the sender; was familiar with the location of the sender’s home; and that her mother would be comfortable letting her visit the sender’s home. The sender replied, “Yeah, that’s cool. Tell her you coming to hang out with [K.W.] and friends.” Again, the sender asked K.P. to send a photo, to which she replied, “I ain’t sending another one. You already got three[,]” and “My bad for getting tired of sending you pics.” The sender asked K.P. if she wanted a “pic of this” and asked K.P. for her email address. K.P. responded by giving the sender her email address.12 The sender then indicated that a photo of a flaccid penis was sent to K.P. The last chat message Detective Kniss was able to recover was sent at 12:54 a.m. on June 14, 2010. Detective Kniss recovered a photo of a man’s penis from K.P.’s computer hard drive. That photo was placed on K.P.’s computer at 12:41 a.m. on June 14, 2010. Detective Kniss explained that the time-date stamp on the photo correlated with the date and time of the chat during which the sender asked if K.P. wanted a “pic of this” and asked for her email address. Additionally, the same photo was recovered from the micro SD card in the Blackberry seized during the search of the Defendant’s home. The photo had been deleted from the Blackberry, but Detective Kniss was able to retrieve it in the ICAC lab. On cross-examination, Detective Kniss admitted that, even though he could identify which account the chats were sent from, he had no way of determining who actually sent the messages. Additionally, Detective Kniss confirmed that the data on the micro SD card indicated that the micro SD card has been transferred from another device into the Blackberry. Therefore, photos found on the card could have been taken on another device before the micro SD card was placed into the Blackberry. Detective Kniss explained that he did not dust the micro SD card for fingerprints because the dust could have damaged the data 12 Detective Kniss noted that this portion of the chat was the same as the screen shot taken by Ms. Conley and given to the Spring Hill Police Department. -8- stored on the card. The micro SD card was not tested for fingerprints after the data from it was recovered. Detective Kniss admitted that it would not be unusual for a person trying to “groom” 13 a child to set up a fake Facebook account. However, Detective Kniss stated that he did not see any indications of a fake account on the Defendant’s computer. Detective Kniss was not able to determine if multiple people used the computer. Based on the language and references to “cousins” and “family” in the chats, Detective Kniss concluded that K.P. and the sender were familiar with each other. However, he said other people would also know about the familial relationship between K.P. and the Defendant. With regard to the photo of the penis found on K.P.’s computer and the Defendant’s Blackberry, Detective Kniss noted that there were no identifying features in the photo other than the red shorts pulled down around the subject’s legs. Detective Kniss admitted that he did not search the Defendant’s home for shorts matching those seen in the picture. Likewise, he did not visually examine the Defendant’s penis to see if it was consistent with the penis depicted in the photo. He also did not conduct an internet search to determine whether the photo was a “stock” photo. However, Detective Kniss stated that he believed the email with the photo was sent from the Blackberry because he did not find any evidence on the Defendant’s computer indicating that the email was sent from the computer. Detective Kniss also confirmed that, because the Defendant was using an unsecured internet connection in his home, someone with sufficient technological expertise could intercept all the data sent and received on that network. If information about the Defendant’s passwords or account information had been intercepted, another person could access the Defendant’s email and Facebook from another computer. In short, Detective Kniss explained that he could verify that the Defendant had access to the computer and Blackberry that were used to send Facebook chats and email the photo of the penis, however, he did not know who was “sitting behind the computer or utilizing [the Blackberry] to send these messages.” At most, the chats indicated “that the person utilizing the computer, sending the chat message, had an intimate knowledge about [the Defendant], being his account, his email, knowledge of [K.P.’s] family.” Detective Kniss admitted that, if someone had been monitoring the Defendant long enough, they could have received the information discussed in the chats. 13 Detective Kniss explained that, in his experience investigating these types of crimes, he would expect to see the suspect “grooming” the victim. Grooming could include giving gifts to the victim, befriending the victim, acting in a semi-parental role or as someone to look up to, and trying to gain the victim’s trust. -9- On redirect-examination, Detective Kniss confirmed that identifying the person who actually authored messages sent to minor victims was “the nature of the beast” in cases involving electronic means. In this case, Detective Kniss did not find any indication that someone had intercepted the Defendant’s computer activity. Had he found any such evidence, Detective Kniss would have investigated further. Detective Kniss explained that he believed the Defendant was the author of the chats because: (1) the time-date stamps on the photos correspond with the times the chats occurred; (2) the chats and photos were found on devices to which the Defendant had access, namely the computer found in the master bedroom and the Blackberry, and those devices were found in close proximity to each other; (3) the photo of the penis was consistent with the Defendant because it was a photo of a black male; (4) the Hotmail account referenced in the chats was also found on the Blackberry and the Defendant’s computer; and (5) that Hotmail account was open on the computer when the search warrant was executed. Sergeant Eric Anderson testified that he worked with ICAC in 2010. He interviewed the Defendant when officers executed the search warrant on the Defendant’s home. During that interview, the Defendant told Sergeant Anderson that there was only one working computer in the home and it was located in the master bedroom. He also confirmed that he had a T-Mobile cell phone but claimed that it had been inactive for about three months due to nonpayment. Sergeant Anderson stated that he did not recall asking the Defendant about the T-Mobile bill found in the master bedroom. During his interview, the Defendant admitted to having a Facebook account as well as Yahoo, Gmail, and Hotmail email accounts. He claimed that he “was hardly on [Facebook]” and mentioned that he used it to play a game called Mafia Wars. He also used Facebook to chat with friends and had uploaded a few photos to his profile. On the Monday evening prior to the execution of the search warrant, June 14, 2010, the Defendant claimed that he and his wife were in bed by 10:00 p.m. No one else used the computer in the master bedroom after that time. The Defendant stated that the computer was password protected. On cross-examination, Sergeant Anderson confirmed that the Defendant was cooperative during the execution of the search warrant and that the Defendant denied participating in the Facebook conversations with K.P. K.P. testified that she was 14 years old at the time of the offenses and that the Defendant was her second cousin. She had a Facebook account set up under her name and a Yahoo email address. She recalled chatting with the Defendant on Facebook on “two or three nights” in June 2010. K.P. stated that she was uncomfortable with the sexual nature of the chats and was “confused for the most part.” K.P. affirmed that she was “just going along with it.” -10- In those chats, K.P. was asked to send naked photos of herself, but she refused. However, she admitted that she sent three photos of herself to the Hotmail account—two photos of herself clothed and one photo of her fingers after she had been instructed to masturbate. In return, K.P. received a photo of a penis, which she deleted. K.P. identified copies of the chats previously admitted into evidence as the chats that she had participated in with the Defendant and confirmed that they accurately reflected her conversations with the Defendant. On cross-examination, K.P. affirmed that the Defendant had never made sexual comments toward her before the Facebook chats. Additionally, at the time the chats took place, K.P. recalled that the Defendant lived with his former wife and her two children. On redirect-examination, K.P. explained that, in June of 2010, her family was scheduled to take a trip to Holiday World. This trip had become an annual family event, and other members of her family would have been aware of it. K.P. confirmed that the trip was referenced in the chats. On recross-examination, K.P. confirmed that she had also told other kids at her school about the trip. Nekia Wilson testified that she was married to the Defendant, but they had been separated for almost three years. At the time of the offenses, Ms. Wilson lived in a home with the Defendant and her two children. There were two computers in the house—a desktop computer and a non-functioning laptop. The desktop computer was located in the master bedroom and was primarily used by the Defendant. The Defendant used the computer to access Facebook and play games, including a game called Mafia Wars. The Defendant had a Facebook account under his own name. Ms. Wilson stated that she had her own Facebook account as well. However, she did not use the desktop computer to access her account because she “could never remember the password.” Ms. Wilson explained that she had known the password to the desktop computer at one time, but after new software was installed on the computer, the password was changed and she was not able to access the computer with the old password. Ms. Wilson confirmed that the new software had been installed before the police executed the search warrant. Often, Ms. Wilson would wake up late at night, and the Defendant would be using the desktop computer. The Defendant had multiple email accounts, but Ms. Wilson said that she did not have access to those accounts because she did not know the passwords. Ms. Wilson did not recall her children using the desktop computer. Instead, they used the computer at their grandmother’s house because it was faster than the desktop. Additionally, the children had a “netbook” that they would take back and forth between Ms. Wilson’s home and their grandmother’s home. Ms. Wilson accessed the internet using her Blackberry. She explained that both she and the Defendant owned Blackberries, but her -11- Blackberry had service through Sprint. The Defendant’s Blackberry had service through T- Mobile. Ms. Wilson also described the Defendant’s penis to the jury and identified the photo sent to K.P. as a photo of the Defendant’s penis. She explained that she could identify it as such based on the way the pubic hair was groomed and the discoloration of the skin. She was also able to identify red fabric in the photo as being either the blanket on her bed or red shorts she had purchased for the Defendant. Moreover, Ms. Wilson stated that she believed the Defendant had previously sent her the same photo. Raymond Gordon, the Defendant’s stepfather, testified that he knew the Defendant to be an honest person. He noted that the Defendant had separated from Ms. Wilson, and their relationship was “not friendly.” He further stated that he had seen K.P. at the Defendant’s home on several occasions and he had never seen the Defendant behave inappropriately toward her. Betty Gordon, the Defendant’s mother, testified that the Defendant was currently living with her and her husband. The Defendant moved in when he and his wife separated, and she noted that their separation was “not friendly.” Ms. Gordon had observed the Defendant on the computer looking for jobs and buying car parts. She admitted that the Defendant had a Facebook account and that she was his “Facebook friend.” Ms. Gordon stated that she felt that the Defendant had been honest with her. She also stated that she had never seen the Defendant engage in conduct that would cause her concern. On cross-examination, Ms. Gordon confirmed that there was a laptop computer in the Defendant’s home when he lived with his wife. However, Ms. Gordon claimed that she did not see a computer in the master bedroom of the home. Finally, she confirmed that the Defendant had a Blackberry, but she claimed that “[i]t was off more than it was on.” Lonnita Anderson, the Defendant’s current girlfriend, testified that she had a daughter who was seven years old. The Defendant had never engaged in conduct that caused Ms. Anderson to feel concerned for her daughter. She stated that the Defendant had always been honest with her. On cross-examination, Ms. Anderson admitted that she had only known the Defendant for a short period of time and that they did not live together. She stated that the Defendant had a Facebook account but claimed he was “never on Facebook.” The Defendant testified that, at the time of the charged offenses, he lived in a home with Ms. Wilson and her two children, K.W. and D.W. At the time, the Defendant had been laid off from his job, and over the course of a typical day, he would be on the computer, searching Career Builders, “filling out” résumés, and emailing people trying to find a job. -12- Prior to being laid off, the Defendant traveled frequently for work, and he and Ms. Wilson would send nude photos of themselves to each other while he was away. The Defendant admitted that he had a Facebook account in June 2010. He also stated that other people in the house had their own Facebook accounts. The Defendant primarily used his Facebook account to communicate with his brother in Baton Rouge and to play a game called Mafia Wars. The Defendant admitted that he would sometimes chat with friends. However, he denied ever chatting with or sending photos to K.P. He claimed the photo sent to K.P. was not a photo of his penis. Additionally, he claimed that he had never received any emails from K.P. The Defendant accessed the internet through an unsecured network. Additionally, he stated that all of his passwords were “remembered” so that he did not need to type in his password when he logged into an account and that “anybody else that got on that computer didn’t have to sign in to get into [his] Facebook.” The Defendant claimed that everyone in the home had access to and used the computer in the master bedroom; the password to log into the computer was posted on a Post-It note on top of the computer. The Defendant asserted that he had no cell phone service during the time someone was sending chats to K.P. because he had not paid his cell phone bill. The Defendant noted that his Blackberry had a micro SD card, but he claimed that the card came with the phone and had never been removed from the phone. However, he noted that anyone who lived in the house had access to the phone. On cross-examination, the Defendant explained that the icons on his Blackberry screen would show that he had strong tower signal even when the phone service was cut off. He admitted that there was a T-Mobile bill sitting on his computer stand when police executed the search warrant and that he received a text message from T-Mobile on June 12, 2010, which read, “To continue your monthly service as of 07/27/2010, you must pay $159.76 before 06/26/2010. If not paid, all minutes will be debited from your FlexAccount.” However, later in his testimony, the Defendant said he did not think he had cell phone service at the time of the offenses, but he was not sure. He also admitted that he made an outgoing call to a friend on June 26, 2010, and that such a call may have meant that he had phone service at the time of the offenses. The Defendant admitted that the Hotmail account belonged to him. The Hotmail account was also set up to send emails to his Blackberry, and it was the email address associated with his Facebook account. The Defendant noted that Facebook would send an email to his Hotmail account any time he got a “friend request” and he could accept the request without having to go to his Facebook page. Further, the Defendant admitted that -13- “nine out of ten times,” if someone were to send an email to the Hotmail account, he would have seen it. He also clarified that the only password “remembered” on the computer was the password to his Facebook account. His email passwords were not “remembered.” The Defendant admitted that he knew K.P.’s family had scheduled a trip to Holiday World. He further admitted that he had been online the day the search warrant was executed. At the time, he was checking his email and searching for a job. On redirect-examination, the Defendant said that 20 to 30 people would have known about the family’s upcoming trip to Holiday World. He also explained that T-Mobile would send him the text message regarding payment every month regardless of whether he had active service at the time the text message was sent. Based upon the evidence presented, the jury convicted the Defendant as charged. This timely appeal followed. II. Analysis Authentication On appeal, the Defendant first argues that the chats and email containing a photo of a penis that were sent to K.P. were not properly authenticated because the State failed to exclude the possibility that someone else authored the messages. The State argues that it need not exclude the possibility that someone else wrote the messages sent to K.P. in order to authenticate the messages. In light of the circumstantial evidence surrounding the Facebook chats and emails, the State avers that the trial court did not abuse its discretion by admitting the evidence. We agree with the State. “Decisions regarding the admissibility or exclusion of evidence are entrusted to the trial court’s discretion.” State v. Banks, 271 S.W.3d 90, 116 (Tenn. 2008) (citing State v. Robinson, 146 S.W.3d 469, 490 (Tenn. 2004)). As such, we review the trial court’s decision under an abuse of discretion standard. Id. This Court will find an abuse of discretion when the trial court “applied incorrect legal standards, reached an illogical conclusion, based its decision on a clearly erroneous assessment of the evidence, or employed reasoning that causes an injustice to the complaining party.” Id. (citing Konvalinka v. Chattanooga- Hamilton Cnty. Hosp. Auth., 249 S.W.3d 346, 358 (Tenn. 2008)). Tennessee Rule of Evidence 901 provides, “[t]he requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to the court to support a finding by the trier that the matter in question is what its proponent -14- claims.” Tenn. R. Evid. 901(a). Evidence may be authenticated through, “[t]estimony that a matter is what it is claimed to be” or “[a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.” Tenn. R. Evid. 901(b)(1), (4). A Tennessee appellate court has reviewed authentication of evidence found on social media websites on one other occasion. In Melissa L. Bright Dockery v. Kevin Carl Dockery, Sr., No. E2009-01059-COA-R3-CV, 2009 WL 3486662 (Tenn. Ct. App. Oct. 29, 2009), the Court of Appeals held that MySpace messages were properly admitted at trial when the messages were sent from the defendant to his friend, Ms. Lowe, and she had subsequently printed out their conversation. The trial court admitted the messages based on Ms. Lowe’s testimony that she had printed the messages directly from her computer; they showed exactly what she and the defendant said to each other; and each message identified which party to the conversation was making a particular statement. Id. at *6. Several other jurisdictions have addressed the issue of authenticating electronic and social media communications in more depth. For example, in Griffin v. State, 19 A.3d 415 (Md. 2011), the Court of Appeals of Maryland detailed the concerns surrounding evidence found on social media websites. In that case, the State sought to introduce printouts from the defendant’s girlfriend’s MySpace profile, which allegedly contained a threat to one of the State’s witnesses. Id. at 418. The State tried to authenticate the printouts through an officer’s stipulation that he recognized a photo on the page as that of the defendant’s girlfriend and the date of birth displayed on the profile was the same date that the defendant’s girlfriend gave as her date of birth. Id. at 419. The Court of Appeals of Maryland noted the challenges that arise when trying to authenticate evidence from social media, stating, “The concern arises because anyone can create a fictitious account and masquerade under another person’s name or can gain access to another’s account by obtaining the username and password.” Id. at 421. Therefore, it held that “the picture of [the defendant’s girlfriend], coupled with her birth date and location, were not sufficient ‘distinctive characteristics’ on a MySpace profile to authenticate its printout, given the prospect that someone other than [the defendant’s girlfriend] could have not only created the site, but also posted the [purported threat].” Id. at 424. However, the Court of Appeals of Maryland also outlined a number of possible avenues by which such evidence could be authenticated. Id. at 427. One such option was to “search the computer of the person who allegedly created the profile and posting and examine the computer’s internet history and hard drive to determine whether that computer was used to originate the social network profile and posting in question.” Id. -15- Other courts have held that evidence derived from social media and emails was sufficiently authenticated when the prosecution offered circumstantial evidence corroborating that the evidence was what its proponent claimed. For example, in In re F.P., 878 A.2d 91 (Pa. 2005), the Supreme Court of Pennsylvania held that transcripts of instant messages between the defendant and the victim were properly authenticated and admitted at trial. Id. at 93. In that case, the defendant assaulted the victim because he believed that the victim had stolen a DVD from him. Id. In the instant message conversations, the defendant identified himself by his first name and threatened physical violence against the victim for stealing from the defendant. Id. at 94. Additionally, after the victim notified school authorities about the threats, staff at the school met with the defendant and the victim regarding the messages and the alleged theft. Id. Approximately the same time as these school meetings, the defendant sent the victim another instant message stating, “u gotta tell tha school shit and stuff like a lil bitch.”14 Id. at 95. In the same conversation, the defendant also threatened, “want my brother to beat ur ass on tha steel center bus” and “want [sic] till I see u outta school ima beat ur aSS.” Id. At the adjudication hearing, the defendant’s brother testified that he witnessed the defendant beating up the victim after disembarking a school bus that the defendant did not normally ride. Id. The Pennsylvania Supreme Court held that “[a]ll of this evidence, taken together, was clearly sufficient to authenticate the instant message transcripts as having originated from [the defendant].” Id. Further, the court declined to adopt an authentication standard that would require more direct proof of authorship for electronic communications. Id. The court noted that the same uncertainties regarding authorship exist with traditional written documents and held, “We believe that e-mail messages and similar forms of electronic communication can be properly authenticated within the existing framework of Pa. R. Ev. 901 and Pennsylvania case law.” Id. Additionally, in Commonwealth v. Purdy, 945 N.E.2d 372 (Mass. 2011), the Supreme Judicial Court of Massachusetts held that email exchanges were properly authenticated. Id. at 376. In that case, the defendant was accused of running a house of prostitution out of his combination “hair salon, antique store, art studio, and massage parlor.” Id. at 372, 377. The email exchanges admitted into evidence were found on the hard drive of a computer that admittedly belonged to the defendant. Id. at 378. One email exchange was initiated from the defendant’s email account; was signed with the defendant’s name and the address of his business; and described the author of the email as a “working artist, as well [as an] entrepreneur, small business guy, hairstylist, art and antiques dealer, [and] massage therapist,” and added, “and I operate a service.” Id. Other email messages were initiated from the defendant’s account and bore the defendant’s name as the signature. The defendant argued that the computer was located in an area where his employees could access it, and the 14 In the interest of accuracy, the Pennsylvania Supreme Court left excerpts from the instant messages unaltered and uncorrected for grammatical errors. In re F.P., 878 A.2d at 94 n.5. -16- defendant claimed his employees frequently used the computer and “used his e-mail account to play pranks on him, and that they answered e-mails in his name.” Id. at 378. The court held that, even though the prosecution had not provided direct evidence that the defendant authored the emails in question, the circumstantial evidence regarding the defendant’s knowledge of passwords for the computer, his admitted ownership of the email account, and the fact that the emails originated from the defendant’s email address and bore his name was sufficient to authenticate the emails. Id. at 379-80. Further, the court held, “The defendant’s uncorroborated testimony that others used his computer regularly and that he did not author the emails was relevant to the weight, not the admissibility, of the messages.” Id. at 381-82. Similarly, in a case analogous to the one before us today, People v. Clevenstine, 891 N.Y.S.2d 511 (N.Y. App. Div. 2009), the New York Supreme Court, Appellate Division, held that sexually explicit MySpace instant message communications between the defendant and the victims were properly authenticated at trial. Id. at 514. In that case, both victims testified that they had discussed sexually explicit topics via the MySpace instant messaging service; state police had recovered copies of those instant messages from the hard drives of the victims’ computers; the defendant’s wife recalled finding sexually explicit conversations on the defendant’s MySpace account; and a representative from MySpace testified that the accounts participating in the instant messages had been created by the victims and the defendant. Id. At trial, the defendant suggested that someone else had accessed his account and sent the message, but the court stated that “the likelihood of such a scenario presented a factual issue for the jury.” Id. Finally, in Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. 2012), the Texas Court of Criminal Appeals likewise affirmed the introduction of MySpace postings based on circumstantial evidence used to authenticate the postings. Id. at 642-45. In that case, the defendant also suggested that someone else had created or accessed the MySpace account and argued that the State had failed to authenticate the messages as coming from the defendant. Id. at 636. In response, the court held: Conceivably some unknown malefactors somehow stole the appellant’s numerous self-portrait photographs, concocted boastful messages about David Valadez’s murder and the circumstances of that shooting, was aware of the music played at Valadez’s funeral, knew when the appellant was released on pretrial bond with electronic monitoring and referenced to that year-long event along with stealing the photograph of the grinning appellant lounging in his chair while wearing his ankle monitor. But that is an alternate scenario whose likelihood and weight the jury was entitled to assess once the State had produced a prima facie showing that it was the appellant, not some unidentified conspirators or fraud artists, who created and maintained these MySpace pages. Id. at 646. -17- Comparing the facts of this case to cases from other jurisdictions, we conclude that there was more than sufficient circumstantial evidence to authenticate the Facebook chats and emails in question. The Defendant admitted that the Facebook account used to send the chats belonged to him. Additionally, Detective Kniss independently verified that the Facebook account belonged to the Defendant by comparing the Facebook profile picture, user ID number, and associated email address with those of the Facebook account that sent chats to K.P. Transcripts of the “exact” same chats were found on both the Defendant and K.P.’s computer hard drives. With regard to the emailed photographs, the Defendant admitted that the Hotmail account belonged to him and that the password to the account was not “remembered,” requiring someone to enter a password each time they logged into the account. Further, it was the same email address to which the sender instructed K.P. to send photos. The Hotmail email address was also associated with the Defendant’s Facebook account and tied to the T- Mobile Blackberry. Additionally, the same Hotmail account was open when police executed the search warrant, and the Hotmail email address was listed on the Defendant’s résumé. Photos sent via email by K.P. were found on the Defendant’s computer, and the photo of a black man’s penis was found on the Defendant’s Blackberry, as well as K.P.’s computer hard drive. The time-date stamps of the photos matched the times the chats were sent to their respective recipients. In light of all this evidence, we hold that the trial court did not abuse its discretion when it admitted the chats and the emailed photograph of a penis. To the extent that the Defendant argues that the State was required to affirmatively prove that the Defendant was the author of the message, we agree with reasoning from other jurisdictions that such challenge goes to the weight of the evidence, not its admissibility. See Tienda, 358 S.W.3d at 646; Purdy, 945 N.E.2d at 381-82; Clevenstine, 891 N.Y.S.2d at 514. Within the Defendant’s challenge to the authentication of the Facebook chats and emails, he argues that the communications were inadmissable hearsay because the State failed to prove the Defendant was the author of the messages. However, his argument is waived because he made no hearsay objection to their introduction at trial. See Tenn. R. App. P. 36(a) (“Nothing in this rule shall be construed as requiring relief be granted to a party responsible for an error or who failed to take whatever action was reasonably available to prevent or nullify the harmful effect of an error.”). Sufficiency of the Evidence The Defendant challenges the sufficiency of the evidence solely as to the issue of whether he was the actual author of the chats and email containing the photo of a penis. The -18- Defendant argues that evidence was not sufficient to prove he was the author because the devices used to send the messages were not exclusively under his control and other individuals could have accessed his account. The State argues that direct evidence of authorship was not required and that the circumstantial evidence presented at trial was sufficient to support the jury’s verdict. We agree with the State. Our standard of review for a sufficiency of the evidence challenge is “whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.” Jackson v. Virginia, 443 U.S. 307, 319 (1979) (emphasis in original); see also Tenn. R. App. P. 13(e). Questions of fact, the credibility of witnesses, and weight and value to be given the evidence are resolved by the fact finder. State v. Cabbage, 571 S.W.2d 832, 835 (Tenn. 1978), superseded on other grounds by Tenn. R. Crim. P. 33 as stated in State v. Moats, 906 S.W.2d 431, 434 n.1 (Tenn. 1995). This Court will not reweigh the evidence. Id. Our standard of review “is the same whether the conviction is based upon direct or circumstantial evidence.” State v. Dorantes, 331 S.W.3d 370, 379 (Tenn. 2011) (quoting State v. Hanson, 279 S.W.3d 265, 275 (Tenn. 2009)) (internal quotation marks omitted). A guilty verdict removes the presumption of innocence, replacing it with a presumption of guilt. State v. Bland, 958 S.W.2d 651, 659 (Tenn. 1997); State v. Tuggle, 639 S.W.2d 913, 914 (Tenn. 1982). The defendant bears the burden of proving why the evidence was insufficient to support the conviction. Bland, 958 S.W.2d at 659; Tuggle, 639 S.W.2d at 914. On appeal, the “State must be afforded the strongest legitimate view of the evidence and all reasonable inferences that may be drawn therefrom.” State v. Vasques, 221 S.W.3d 514, 521 (Tenn. 2007). The identity of the accused as the person who committed the offense for which he is on trial is a question of fact for the jury. State v. Williams, 623 S.W.2d 118, 120 (Tenn. Crim. App. 1981). The identity of an accused may be established either by direct evidence, circumstantial evidence, or a combination of the two. State v. Thompson, 519 S.W.2d 789, 793 (Tenn. 1975). To borrow a phrase from the trial court, this case contains a “plethora of circumstantial evidence” showing that the Defendant was the author of the communications with K.P. The chats were sent to K.P. late at night from a computer located in the Defendant’s bedroom. The email containing the photo of a penis was also sent late at night from a separate device, and the photo was found on the Defendant’s T-Mobile Blackberry. The Defendant’s wife testified that the computer’s password had been changed and she could no longer access the computer and that her children generally did not use the computer. While the computer was connected to the internet through an unsecured network, there was -19- no indication that someone had hacked into the Defendant’s accounts in order to communicate with K.P. Finally, in the chats themselves, the sender notes a familial relationship between the sender and K.P.; references K.P.’s upcoming family trip to Holiday World of which the Defendant was aware; and asked K.P. whether she played Mafia Wars, a game the Defendant often played. At trial the Defendant vigorously argued that someone else had gained access to his Facebook and Hotmail accounts and sent the messages and photos to K.P., but the jury clearly discredited his account of the events by returning a guilty verdict. Based on the evidence presented, we conclude that there was sufficient evidence for the jury to conclude that the Defendant was the author of the chats and email containing the photo of a penis and that his identity as the perpetrator of the offenses was established. Testimony Regarding Stepdaughter’s Fake Facebook Profile Finally, the Defendant argues that the trial court erred by prohibiting the Defendant from referring to a fake Facebook profile created by the Defendant’s stepdaughter. By prohibiting questions about said profile, the Defendant contends that the trial court denied him the right to “completely and effectively interrogate witnesses to elicit material evidence to support the Defense theory.” The State argues that the issue is waived because the Defendant failed to provide citations to the record or include portions of the transcripts in the record that may have contained substantive discussions of the issue. Alternatively, the State asserts that the trial court did not abuse its discretion in excluding such evidence because it was not relevant to the issues presented at trial and the Defendant was still able to argue that the State could not prove he was the author of the messages. Under the rules of this Court, “Issues which are not supported by argument, citation to authorities, or appropriate references to the record will be treated as waived in this court.” Tenn. Ct. Crim. App. R. 10(b). Additionally, the Defendant bears the burden of preparing a record which conveys “a fair, accurate, and complete account of what transpired with respect to those issues that are the bases of the appeal.” Tenn. R. App. P. 24(b); State v. Taylor, 669 S.W.2d 694, 699 (Tenn. Crim. App. 1983). When there was an evidentiary hearing regarding the issue presented for review, a transcript of the hearing must be included in the record. State v. Bennett, 798 S.W.2d 783, 789 (Tenn. Crim. App. 1990). Allegations contained in pleadings, counsel’s arguments and statements of facts contained in a brief or similar pleading, and counsel’s statements made in open court are not evidence. Id.; State v. Roberts, 755 S.W.2d 833, 836 (Tenn. Crim. App. 1988). When the record does not contain a transcript of the proceedings relevant to the issue presented for review, this Court is precluded from considering the issue. State v. Groseclose, 615 S.W.2d 142, 147 (Tenn. 1981); Roberts, 755 S.W.2d at 836; State v. Jones, 623 S.W.2d 129, 131 (Tenn. Crim. App. 1981). In such cases, this Court conclusively presumes that the -20- evidence supports the trial court’s ruling. In re M.L.D., 182 S.W.3d 890, 894 (Tenn. Ct. App. 2005); Roberts, 755 S.W.2d at 836; State v. Baron, 659 S.W.2d 811, 815 (Tenn. Crim. App. 1983); Taylor, 669 S.W.2d at 699. In this case, the Defendant has failed to provide any citations to the record to support his argument on this issue. Additionally, the trial court’s ruling on the issue is not clear from the record. The State filed a pretrial motion in limine regarding the stepdaughter’s fake Facebook profile, but the record on appeal does not contain an order on the motion. Before trial, the trial court commented on the evidence: My only thought on [the stepdaughter’s fake Facebook account] is simply that I wouldn’t make reference to it in the opening statement or in voir dire. If you want to bring it up on cross-examination or during your case in chief make sure you lay the proper foundation. So I’ll just reserve that motion until we get to trial and I can hear the evidentiary basis for whatever the question is being asked about that. Further, it appears that the jury-out hearings were not requested to be included in the transcripts of the trial, and we have no means to determining whether the issue was discussed at that time. The issue did arise during the Defendant’s testimony when the Defendant stated that his stepdaughter had a Facebook profile in which she posed as a man. The State objected and in a bench conference said, “This went specifically to the State’s motion in limine and it is a blatant, blatant violation of the Court’s previous order that it was not to be referenced without asking for prior Court permission” (emphasis added). It is unclear from the record whether the trial court made a final ruling on the admissibility of the Defendant’s stepdaughter’s fake Facebook profile—the trial court’s pretrial comment simply instructed the parties to lay a proper foundation for the testimony before it could be heard. However, the State’s objection during the Defendant’s testimony suggests that the trial court had made a ruling on the matter. There’s no indication in the record that the trial court made any further ruling on the issue, and we have no way of determining whether such a ruling was made during the jury-out hearings that were not included in the transcript. Therefore, because the Defendant bears the burden of preparing a record which conveys “a fair, accurate, and complete account of what transpired with respect to those issues that are the bases of the appeal” and failed to provide citations to the record to support his argument, we conclude that the Defendant waived the issue. See Tenn. R. App. P. 24(b); Tenn. Ct. Crim. App. R. 10(b). -21- Waiver notwithstanding, the Defendant’s argument is without merit because he fails to explain with specificity how testimony regarding his stepdaughter’s fake Facebook account was relevant to the issues presented at trial. The Defendant claims that testimony about the fake profile should have been admitted “to support the Defense theory.” We gather from his brief that, at trial, the Defendant wanted to assert either that someone created a fake Facebook profile under his name and communicated with K.P. or someone accessed his Facebook account and posed as him while chatting with K.P. The Defendant correctly states that individuals accused of a crime are entitled to present evidence that someone else committed the crime. Sawyers v. State, 83 Tenn. 694, 695 (1885). However, such evidence must be presented in accordance with the Tennessee Rules of Evidence. State v. Powers, 101 S.W.3d 383, 395 (Tenn. 2003). Under Tennessee Rule of Evidence 401, evidence must “tend to make the existence of any fact that is of consequence to the determination of the action more probable or less probable than it would be without the evidence.” Generally, irrelevant evidence is not admissible at trial. Tenn. R. Evid. 402. In this case, there was no dispute at trial that the Facebook chats were sent from the Defendant’s own Facebook profile; he admitted as much during his testimony. The Defendant did not argue that his stepdaughter authored the messages sent to K.P. or sent K.P. the photo of the penis. Therefore, we cannot determine how testimony regarding the stepdaughter’s fake Facebook profile would have been relevant to his defense that he was not the author of the chats with K.P. Further, the Defendant clearly asserted at trial that someone had gained access to his Facebook account and impersonated him in the chats with K.P. Throughout the investigation and trial, the Defendant categorically denied chatting with K.P. or sending her emails. Moreover, he elicited testimony from multiple witnesses that the chats were inconsistent with his previously observed behavior toward the victim. Additionally, multiple witnesses admitted that they could not confirm that the Defendant was the individual who had authored the communications sent to K.P. Even without testimony about the stepdaughter’s fake Facebook profile, the Defendant clearly was able to defend himself against the charges on the ground that the State could not prove his identity as the author beyond a reasonable doubt. Therefore, we conclude that this issue is without merit. III. Conclusion For the aforementioned reasons, we affirm the judgments of the trial court. _________________________________ ROBERT L. HOLLOWAY, JR., JUDGE -22-