Com. v. Talley, D.

J-A21027-19 2020 PA Super 171 COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF : PENNSYLVANIA : v. : : : DANIEL TALLEY : : Appellant : No. 2627 EDA 2018 Appeal from the Judgment of Sentence Entered August 24, 2018 In the Court of Common Pleas of Montgomery County Criminal Division at No(s): CP-46-CR-0005241-2017 BEFORE: BOWES, J., OLSON, J., and FORD ELLIOTT, P.J.E. OPINION BY OLSON, J.: FILED JULY 17, 2020 Appellant, Daniel Talley, appeals from the judgment of sentence entered on August 24, 2018 in the Criminal Division of the Court of Common Pleas of Montgomery County. We affirm. The trial court summarized the factual and procedural history of this case as follows. In March 2016, Christa Nesbitt met [Appellant] while working as a waitress at the Whistle Stop diner in Oreland, Pennsylvania. [Appellant] regularly frequented the diner and began a romantic relationship with Ms. Nesbitt in the spring of 2016. In September 2016, Ms. Nesbitt and her daughter, [R.N.], moved into [Appellant’s] house. Ms. Nesbitt eventually broke up with [Appellant] and moved out of [Appellant’s] home on May 27, 2017. The following day[,] Ms. Nesbitt began to receive threatening and harassing text messages and [electronic-mails (“e-mails”)] from unfamiliar addresses. The messages came from e-mail addresses including, inter alia, “maxkillin@gmx.com” and “nastybtch@cumof... .” Ms. Nesbitt stated that she had never received such messages prior to leaving [Appellant] and did not know of any grudges that anyone else might hold toward her at that time. J-A21027-19 The subject messages repeatedly referred to Ms. Nesbitt in a vulgar and derogatory manner and included threats such as “I was up da stret from ur hous my gun was loaded nd I was going to end everythin we cld die 2getter,” “ur time is runin out slut u stole dat kid from me u never be safe u slut.” The sender of these messages ostensibly intended for Ms. Nesbitt to believe the messages were being sent from [R.N.’s] biological father, [Korey McClellan].[] Ms. Nesbitt testified there was no animosity between her and Mr. McClellan at the time these messages were sent. Some of the messages were received while Mr. McClellan was in her presence and she did not observe him sending any messages at those times. Mr. McClellan also denied sending any such messages. Mr. McClellan stated that he harbored no ill will or animosity toward Ms. Nesbitt after their relationship ended. On June 2, 2017, Ms. Nesbitt received a text message saying that the sender was observing her at a Friendly’s restaurant. Ms. Nesbitt was, in fact, at a Friendly’s restaurant with her daughter and a friend when she received this text message. Ms. Nesbitt went to the Springfield Police Department to report this incident. An investigation of her [telephone] by Detective Robert Chiarlanza revealed that an application on her [telephone], unbeknownst to her, was sharing her location with “Daniel Talley.” Ms. Nesbitt continued to receive vulgar, harassing and, at times, threatening text messages every day, multiple times a day until approximately mid-July 2017. She estimated that she received hundreds of messages of this nature during that time. The messages referenced elements of [Appellant’s] and Ms. Nesbitt’s prior sexual relationship that only [Appellant] knew about, such as when [Appellant] would pressure Ms. Nesbitt to have anal sex with him. The messages also used expressions that were specific to [Appellant], such as “fake love,” an expression [Appellant] would often use when accusing Ms. Nesbitt of cheating on him. Ms. Nesbitt repeatedly asked the sender of the messages to stop sending her messages. On June 14, 2017, Detective Chiarlanza confronted [Appellant] at his home and warned him to stop sending Ms. Nesbitt threatening and harassing text messages. On June 19, 2017, Ms. Nesbitt received a message with the subject “Tick tock” which read, in part, “It gonna happen, slut. You gonna pay. Comin’ soon mybe on Fox stet. You seem to like it der.” Ashley-Lynn Donnelly, a friend and neighbor of Ms. Nesbitt, testified that on the night of June 19, 2017, between -2- J-A21027-19 11:30 p.m. and midnight, she was sitting on a neighbor’s porch on Plymouth Avenue when she saw [Appellant’s] truck idling [without its headlights]. It began driving up and down Plymouth Avenue. After passing her a third time, she heard two loud bangs and she then went inside. She suspected these bangs may have been gunshots. Ms. Donnelly sent Ms. Nesbitt a text that night [saying] that [Appellant’s] truck was near Ms. Nesbitt’s parent’s house where Ms. Nesbitt was staying. The following day, June 20, 2017, Ms. Nesbitt noticed a bullet hole in her vehicle. On June 20, 2017, Detective Chiarlanza went to investigate a report that a car was shot on Plymouth Avenue. His investigation revealed that “there was a bullet hole on the driver’s side that entered into the passenger compartment behind the rear door.” A small bullet fragment was recovered from the rear passenger compartment of the vehicle. That same day the police obtained and executed two search warrants for [Appellant’s] home and an arrest warrant for [Appellant]. [Appellant] was in the driveway of his residence next to his truck armed with a loaded Kel-Tec .380 semiautomatic pistol when the police arrived. Detective Chiarlanza testified the gun in [Appellant’s] possession was capable of producing a bullet hole similar to the one found in Ms. Nesbitt’s vehicle. Investigation of [Appellant’s] home revealed a security camera. The video from the night of June 19, 2017 showed [Appellant] entering his home at 11:56 p.m., shortly after the time Ms. Donnelly testified [Appellant] was driving his truck on Plymouth Avenue when she heard two loud bangs. [Appellant] lived only a few blocks from where the shooting occurred and had time to return home within a few minutes of the shooting. A search of [Appellant’s] computer revealed that he had searched the internet for terms including, inter alia, “VPN [Virtual Private Network],” “Torproject.org” and “Private Internet access.” [Appellant] had searched for these terms on June 16, 2017, two days after Detective Chiarlanza first visited [Appellant’s] house. Using a VPN and Tor, a web browser, allows a person to [conduct anonymous searches] or hide their online presence and activity. [Appellant] also had a virtual machine installed on his computer allowing him to conceal any activity conducted on that computer by completely compartmentalizing that activity within the virtual machine so that it could later be deleted without a trace. Analysis of [Appellant’s] computer further revealed that he had been -3- J-A21027-19 learning how to send e-mails from fictionalized e-mail addresses to cellular telephone numbers using a website. There was also evidence that on June 20, 2017, [Appellant] accessed the online schedule that Ms. Nesbitt used for her job. An extraction of [Appellant’s cellular telephone] data revealed deleted text messages to a David Wolf which included, inter alia, a message asking “Is there a way to spam a [cellular telephone] with so many texts and call[s] it just totally fucks it up?” When Mr. Wolf responded that this would likely be illegal and could easily be traced, [Appellant] stated “That’s what TOR is for.” Mr. Wolf then responded, “I guess. Then you’d have to find an online script that sends SMS [short message service] anonymously, and will accept input from an anonymized browser.” Ms. Nesbitt did not receive any more threatening or harassing messages after [Appellant’s] arrest on July 18, 2017 when he no longer had access to [cellular telephones] or computers. [Appellant testified in his own defense and] denied sending any of the subject messages[. He also] testified that such messages had been coming from Mr. McClellan for months before [Appellant’s] breakup with Ms. Nesbitt. He testified that there was animosity between Ms. Nesbitt and Mr. McClellan and that Ms. Nesbitt was afraid of Mr. McClellan. [Appellant] also testified that the virtual machine installed on his computer was to avoid viruses when his daughter used the computer to play games. The VPN, he explained, was required for work. Detective Chiarlanza testified in rebuttal that based on his experience and similar investigations it was not feasible the VPN software [Appellant] installed on his computer was being used for [Appellant’s] employment. On July 26, 2018, the jury found [Appellant] guilty of [two counts of] stalking[, pursuant to 18 Pa.C.S.A. § 2709.1(a)(1) and § 2709.1(a)(2),] and [one count each of] terroristic threats [(18 Pa.C.S.A. § 2706(a)(1))] and harassment [(18 Pa.C.S.A. § 2709(a)(2)),] but deadlocked on the charges of recklessly endangering another person and simple assault. [Appellant] was sentenced on August 24, 2018. On August 30, 2018, [Appellant] filed a notice of appeal to [this Court]. On September 5, 2018, the [trial] court ordered [Appellant] to file a concise statement of [errors] complained of on appeal in accordance with Pa.R.A.P. 1925(b). On October 1, 2018, the [trial] court granted [Appellant] an extension of time to file his [Rule 1925(b)] concise statement. -4- J-A21027-19 On October 23, 2018, [Appellant] filed a concise statement of [errors] complained of on appeal. On October 25, 2018, [Appellant] filed an amended concise statement. [The trial court issued its opinion on December 14, 2018.] Trial Court Opinion, 12/14/18, at 1-6. Appellant’s brief identifies three issues for our review: Does Article 1, § 14 of the Pennsylvania Constitution violate the Due Process Clauses of the United States Constitution both facially and as applied against [Appellant]? [Do] concurrent sentences based upon [convictions under] the two subsections of 18 Pa.C.S.A. [§] 2709.1(a) [(proscribing differing forms of stalking)] constitute double punishment [for] the same statutorily proscribed conduct and thus an illegal sentence? Was the admission of screenshots of text messages and emails an abuse of discretion and a misapplication of the Best Evidence Rule as codified by the Pennsylvania Rules of Evidence 1001-1004? Appellant’s Brief at 2-3.1 Appellant’s first issue alleges that he was wrongfully detained prior to trial pursuant to Article 1, § 14 of the Pennsylvania Constitution.2 Specifically, ____________________________________________ 1 We have re-ordered Appellant’s issues to facilitate our discussion. 2 An order pertaining to bail is ordinarily subject to immediate review pursuant to Pa.R.A.P. 1762(b)(2). See Commonwealth v. Parsons, 166 A.3d 1242, 1245 (Pa. Super. 2017). Appellant, however, did not pursue this course of action but instead challenged the denial of nominal bail in the context of his direct appeal from a judgment of sentence. We have not deemed this issue to be moot since Appellant claims, in part, that the wrongful denial of nominal bail deprived him of a meaningful opportunity to assist in his own defense and, as such, contributed to his conviction. -5- J-A21027-19 Appellant asserts that Article 1, § 14 of the Pennsylvania Constitution3 violates, both facially and as applied, the procedural and substantive components of the due process clauses of the Fifth and Fourteenth Amendments of the United States Constitution. Appellant maintains that Article 1, § 14 affords insufficient procedures to enable a judicial officer to evaluate the likelihood of potential danger posed by a detainee. See Appellant’s Brief at 32-44 and 45-47. Because of these procedural deficiencies, Appellant further contends that Article 1, § 14 is excessive in relation to the regulatory goal of pre-trial detention predicated upon an identified threat an arrestee poses toward an individual or the community. See id. at 47-54. The Commonwealth asserts that Appellant waived his federal due process claims. See Commonwealth Brief at 8-9 and 20-24. After careful consideration, we agree with the Commonwealth that Appellant failed to preserve his federal due process challenges for appellate review. A brief review of the relevant factual history is essential to our resolution of this claim. Police officials arrested Appellant on July 18, 2017 and a criminal ____________________________________________ 3 In relevant part, Article 1, § 14 of the Pennsylvania Constitution states: All prisoners shall be bailable by sufficient sureties . . . unless no condition or combination of conditions other than imprisonment will reasonably assure the safety of any person and the community when the proof is evident or presumption great. Pennsylvania Constitution Article 1, § 14. -6- J-A21027-19 complaint was filed on August 7, 2017. Appellant’s bail was set at $250,000.00. On January 8, 2018, Appellant moved for release on nominal bail. The motion alleged that Appellant was entitled to relief pursuant to Pa.R.Crim.P. 600(B) and (D)(2), which permit an individual who has been incarcerated in excess of 180 days from the filing of a criminal complaint to file a written motion seeking release on nominal bail, subject to any nonmonetary condition imposed by the court and permitted by law. See Pa.R.Crim.P. 600(B) and (D)(2); Motion for Release on Nominal Bail, 1/8/18. The trial court heard oral argument on Appellant’s nominal bail motion on May 1, 2018. At oral argument, the Commonwealth conceded that Appellant had been incarcerated for more than 180 days since the filing of the criminal complaint. In addition, defense counsel conceded that the court, in deciding the motion, could consider the affidavit of probable cause filed in support of the charges against Appellant. On May 9, 2018, the trial court denied Appellant’s motion for release on nominal bail, concluding that no condition, or combination of conditions, could ensure the safety of the community or Ms. Nesbitt. See Trial Court Opinion, 12/14/18, at 7. Appellant, on May 11, 2018, moved for reconsideration of the trial court’s denial of his nominal bail motion. Among other contentions, Appellant’s motion for reconsideration raised constitutional challenges based upon Article 1, § 13 of the Pennsylvania Constitution (prohibiting excessive bail and fines and infliction of cruel punishments) and the Eighth Amendment to the United -7- J-A21027-19 States Constitution (prohibiting cruel and unusual punishments). The trial court entertained argument on Appellant’s reconsidered motion on June 28, 2018 and denied the motion on July 11, 2018. The certified record confirms that Appellant waived appellate review of his federal due process claims challenging the validity of Article 1, § 14 of the Pennsylvania Constitution. Critically, the record reflects that Appellant never raised these federal constitutional challenges in his original motion for nominal bail, the hearing on that motion, his motion for reconsideration, or at argument on the reconsidered motion. In fact, Appellant first raised his procedural and substantive due process claims in his October 23, 2018 concise statement, which he filed after his notice of appeal. Because Appellant did not properly preserve his federal due process challenges before the trial court, he cannot litigate them for the first time on appeal. See Pa.R.A.P. 302(a) (“Issues not raised in the lower court are waived and cannot be raised for the first time on appeal.”); Beemac Trucking, LLC v. CNG Concepts, LLC, 134 A.3d 1055, 1058 (Pa. Super. 2016) (“An issue raised for the first time in a concise statement is waived [because an issue raised for the first time after the filing of a notice of appeal deprives the trial court of the opportunity to consider the claim].”); Commonwealth v. Lawrence, 99 A.3d 116, 122 (Pa. Super. 2014) (claims challenging constitutionality of statutory provisions are generally subject to waiver), appeal denied, 114 A.3d 416 (Pa. 2015). -8- J-A21027-19 To the extent Appellant’s brief develops a claim alleging that the trial court improperly denied nominal bail pursuant to Pa.R.Crim.P. 600(D)(2), we conclude that Appellant is not entitled to relief.4 Appellant’s claim here is that the Commonwealth failed to present witnesses or offer other proof that no condition or combination of conditions could reasonably assure the safety of the victim or the community. See Appellant’s Brief at 33. As such, Appellant maintains that the Commonwealth failed to meet its burden of proof at the bail hearing. Id. We conclude that the record contained sufficient evidence to show that no condition or combination of conditions could reasonably assure the safety of the victim or the community. Hence, the trial court did not abuse its discretion in refusing Appellant’s request for nominal bail. “In evaluating Rule 600 issues, our standard of review of a trial court's decision is whether the trial court abused its discretion.” Commonwealth v. Hunt, 858 A.2d 1234, 1238 (Pa. Super. 2004) (en banc). Our scope of review ____________________________________________ 4 Although the focus of Appellant’s nominal bail claim centers upon the alleged deprivation of Appellant’s substantive and procedural due process rights under the United States Constitution, his brief forwards a claim that the Commonwealth failed to meet its burden of proof in demonstrating that bail would be inappropriate under Pa.R.Crim.P. 600(D)(2) and Article 1, § 14 of the Pennsylvania Constitution. Appellant preserved this claim by litigating a motion for release on nominal bond and by including the claim in his Rule 1925 concise statement. Although Appellant did not expressly include a challenge to the trial court’s denial of nominal bail in his statement of questions involved as required by Pa.R.A.P. 2116(a) (precluding appellate review unless issue is stated in statement of questions involved or is fairly suggested thereby), we shall overlook this omission as it has not hampered our review. -9- J-A21027-19 is limited to the findings of the trial court and the evidence of record generated at the Rule 600 evidentiary hearing, which we view in the light most favorable to the prevailing party. Id. at 1238-1239. Rule 600(D)(2) of the Pennsylvania Rules of Criminal Procedure provides, in relevant part: [W]hen a defendant is held in pretrial incarceration beyond the time set forth in paragraph (B), at any time before trial, the defendant's attorney, or the defendant if unrepresented, may file a written motion requesting that the defendant be released immediately on nominal bail subject to any nonmonetary conditions of bail imposed by the court as permitted by law. A copy of the motion shall be served on the attorney for the Commonwealth concurrently with filing. The judge shall conduct a hearing on the motion. Pa.R.Crim.P. 600(D)(2). Rule 600(B)(1) states: “[N]o defendant shall be held in pretrial incarceration in excess of . . . 180 days from the date on which the criminal complaint is filed.” Pa.R.Crim.P. 600(B)(1). Even if a defendant has been incarcerated for at least 180 days from the date on which the complaint was filed, a trial court retains discretion to deny release on nominal bail if “no condition or combination of conditions other than imprisonment will reasonably assure the safety of any person and the community.” Commonwealth v. Jones, 899 A.2d 353, 355 (Pa. Super. 2006), quoting PA. CONST., art. I, § 14. In its Rule 1925(a) opinion, the trial court set forth its reasons for denying Appellant’s nominal bail motion pursuant to Rule 600(D)(2). It stated: - 10 - J-A21027-19 Given the nature of the allegations in this case and the substantial evidence that appeared in the affidavit of probable cause supporting the complaint, the court determined that no combination of conditions could ensure the safety of the community and in particular the victim, Christa Nesbitt. This was based on the escalating pattern of threatening and harassing messages received by Ms. Nesbitt, including mention of firearms and death threats against Ms. Nesbitt. There was substantial circumstantial evidence in the affidavit of probable cause linking [Appellant] to these messages, including forensic analysis of his computer and [cellular telephones] that revealed research into “spamming” a [telephone] with text messages, researching online when text messages become criminal harassment, and concerted efforts to anonymize his online activity. More significantly, Ms. Nesbitt’s vehicle was shot on the night of June 19, 2017 and a witness placed [Appellant’s] vehicle at the scene immediately before a loud bang was heard. [Appellant] was arrested on June 20, 2017 and released on bail on June 22, 2017. The harassing and threatening messages stopped while [Appellant] was in jail but resumed within an hour of [Appellant’s] release on bail. The vulgar and threatening messages continued until July 12, 2017, just days before [Appellant] was again arrested on July 18, 2017. The court concluded the totality of circumstances indicated that [Appellant] likely was the author of these threatening messages, was physically stalking [Ms. Nesbitt,] and fired a bullet into her car. There was no combination of conditions within the court’s power that could ensure the safety of Ms. Nesbitt and the community.[FN A] Accordingly, the court properly denied [Appellant’s] motion for release on nominal bail. The court suggested that [Appellant] be released on house [FN A] arrest with electronic monitoring but was advised this option is not available in Montgomery County prior to sentencing. Trial Court Opinion, 12/14/18, at 7-8. We cannot agree with Appellant that the Commonwealth failed to demonstrate that no condition or combination of conditions could ensure the safety of the community or Ms. Nesbitt. Appellant’s claim that the - 11 - J-A21027-19 Commonwealth failed to meet its burden rests on his contention that the prosecution produced no witnesses or other evidence at the Rule 600(D)(2) hearing. Defense counsel, however, conceded that the Commonwealth could rely on the factual averments in the affidavit of probable cause to oppose Appellant’s motion. As the trial court observed, the affidavit of probable cause linked Appellant to numerous harassing text messages and violent threats issued to Ms. Nesbitt and set forth compelling proof that Appellant used a firearm to damage Ms. Nesbitt’s vehicle. In addition, the trial court learned that house arrest with electronic monitoring was not available prior to sentencing. Under these circumstances, the trial court did not abuse its discretion in denying nominal bail to Appellant. In his second claim, Appellant asserts that he received an illegal sentence when the trial court imposed separate punishments for each of his two stalking convictions. Following trial, the jury found Appellant guilty of one count of stalking pursuant to 18 Pa.C.S.A. § 2709.1(a)(1) and a second count of stalking pursuant to 18 Pa.C.S.A. § 2709.1(a)(2). Appellant maintains that the two subsections of the stalking statute do not constitute separate crimes, but merely serve as two alternate means of proving the same offense. See Appellant’s Brief at 19. Hence, Appellant asserts that the trial court imposed an illegal sentence when it ordered distinct, consecutive punishments for his stalking convictions. - 12 - J-A21027-19 The merger of crimes for sentencing purposes is governed by the following principles and standard of review. Whether [a]ppellant's convictions merge for sentencing is a question implicating the legality of [a]ppellant's sentence. Consequently, our standard of review is de novo and the scope of our review is plenary. See Commonwealth v. Collins, 764 A.2d 1056, 1057, n.1 (Pa. 2001)[.] [42 Pa.C.S.A. § 9765] provides: § 9765. Merger of sentences No crimes shall merge for sentencing purposes unless the crimes arise from a single criminal act and all of the statutory elements of one offense are included in the statutory elements of the other offense. Where crimes merge for sentencing purposes, the court may sentence the defendant only on the higher graded offense. 42 Pa.C.S.[A.] § 9765. The statute's mandate is clear. It prohibits merger unless two distinct facts are present: 1) the crimes arise from a single criminal act; and 2) all of the statutory elements of one of the offenses are included in the statutory elements of the other. Commonwealth v. Baldwin, 985 A.2d 830, 833 (Pa. 2009).5 ____________________________________________ 5 Appellant maintains that his contentions on appeal do not implicate the doctrine of merger. See Appellant’s Reply Brief at 22-23. Instead, Appellant asserts that “the two stalking subsections [under which he was convicted are alternate] ways to prove the single crime of stalking rather than two distinct crimes.” Id. at 22. In Baldwin, however, the Supreme Court anticipated the situation in which courts confront the issue of merging offenses defined under separate subsections of the same criminal statute. In Baldwin, the Court noted: [W]hile Section 9765 indeed focuses on an examination of “statutory elements,” [the Court cautioned against ignoring] the - 13 - J-A21027-19 In relevant part, the Crimes Code defines the offense of stalking as follows: § 2709.1. Stalking (a) Offense defined.--A person commits the crime of stalking when the person either: (1) engages in a course of conduct or repeatedly commits acts toward another person, including following the person without proper authority, under circumstances which demonstrate either an intent to place such other person in reasonable fear of bodily injury or to cause substantial emotional distress to such other person; or (2) engages in a course of conduct or repeatedly communicates to another person under circumstances which demonstrate or communicate either an intent to place such other person in ____________________________________________ simple legislative reality that individual criminal statutes often overlap, and proscribe in the alternative several different categories of conduct under a single banner. See, e.g., Aggravated Assault, 18 Pa.C.S.[A.] § 2702 (defining seven distinct violations of law); Involuntary Deviate Sexual Intercourse, 18 Pa.C.S.[A.] § 3123 (setting forth eight separate violations). Consequently, in such cases, [the Supreme Court admonished] that [] courts must take care to determine which particular “offenses,” i.e. violations of law, are at issue in a particular case. See, e.g., Commonwealth v. Johnson, 874 A.2d 66, 71 n.2 (Pa. Super. 2005) (recognizing that a particular subsection of a criminal statute may merge with another crime as a lesser-included offense even though a different subsection of that same statute may not). Baldwin, 985 A.2d at 837 n.6. Here, the two variants of stalking defined at 18 Pa.C.S.A. §§ 2709.1(a)(1) and 2709.1(a)(2) proscribe distinct categories of conduct under a single statutory heading. As such, they are subject to merger analysis under 42 Pa.C.S.A. § 9765. Thus, insofar as Appellant’s argument relies on cases that predate the adoption of the merger statute, see Appellant’s Brief at 62-65, his argument against application of § 9765 is unavailing. - 14 - J-A21027-19 reasonable fear of bodily injury or to cause substantial emotional distress to such other person. 18 Pa.C.S.A. §§ 2709.1(a)(1) and (a)(2) (emphasis added). As the plain language of 18 Pa.C.S.A. § 2709.1(a)(1) makes clear, an individual may be found guilty of stalking under § 2709.1(a)(1) where he or she “engages in a course of conduct or repeatedly commits acts toward another person, including following the person without proper authority, under circumstances which demonstrate either an intent to place such other person in reasonable fear of bodily injury or to cause substantial emotional distress.” 18 Pa.C.S.A. § 2709.1(a)(1) (emphasis added). The Commonwealth asserts that the following conduct on the part of Appellant met the criteria set forth in § 2709.1(a)(1): (1) Appellant observed Ms. Nesbitt at a Friendly’s restaurant without her consent on June 2, 2017, as evidenced by his text message to that effect, Ms. Nesbitt’s testimony confirming her presence at the restaurant on that date, and forensic evidence showing that Appellant installed an application on Ms. Nesbitt’s cellular telephone which shared, without her consent, the location of her mobile telephone with Appellant; (2) observations made by Ms. Nesbitt’s neighbor of Appellant in his truck in the vicinity of Ms. Nesbitt’s parent’s home between 11:30 p.m. and midnight on the evening of June 19, 2017 when a bullet was fired into Ms. Nesbitt’s vehicle; and, (3) forensic evidence which showed that Appellant accessed, without Ms. Nesbitt’s consent, an online schedule used by Ms. Nesbitt in her employment. See - 15 - J-A21027-19 Commonwealth’s Brief at 27, citing N.T. Trial, 7/23/18, at 88-89, 141-142 and N.T. Trial, 7/24/18, at 334. In addition, the plain text of 18 Pa.C.S.A. § 2709.1(a)(2) states that an individual may be held criminally liable for stalking under § 2709.1(a)(2) if he or she “engages in a course of conduct or repeatedly communicates to another person under circumstances which demonstrate or communicate either an intent to place such other person in reasonable fear of bodily injury or to cause substantial emotional distress.” 18 Pa.C.S.A. § 2709.1(a)(2) (emphasis added). The Commonwealth argues that repeated instances in which Appellant sent harassing text messages to Ms. Nesbitt satisfied this subsection. See Commonwealth Brief at 26. We have carefully reviewed the notes of testimony from Appellant’s trial, together with the statutory language defining the offense of stalking at 18 Pa.C.S.A. §§ 2709.1(a)(1) and (a)(2). Based upon our review, we are satisfied that Appellant’s convictions for stalking under § 2709.1(a)(1) and § 2709.1(a)(2) did not arise from a single criminal act. Moreover, since § 2709.1(a)(1) proscribes “courses of conduct or the repeated commission of acts” and § 2709.1(a)(2) prohibits “courses of conduct or repeated communications,” we are convinced that not all of the elements of one subsection of § 2709.1 are included in the other, or vice versa. As such, Appellant’s stalking convictions under § 2709.1(a)(1) and § 2709.1(a)(2) do - 16 - J-A21027-19 not merge under 42 Pa.C.S.A. § 9765 and the trial court did not err in imposing separate punishments for those convictions. Appellant’s final claim asserts that the trial court erred and/or abused its discretion in admitting “screenshots,” or photographs of the text messages depicted on Ms. Nesbitt’s cellular telephone, in contravention of the best evidence rule as adopted in Pa.R.E. 1001, 1002, 1003, and 1004. According to Appellant, neither the screenshots, nor any testimony relating to their content, were admissible since the screenshots did not meet the criteria of “original” writings or “duplicates” under the evidentiary rules. Furthermore, per Appellant, the screenshots needed to qualify either as originals or duplicates since the Commonwealth’s “entire case against [Appellant] hinged on whether he was the sender of a slew of vulgar and anonymous text messages” and Appellant’s defense centered on his claim that “he was not the sender, but that, in fact, his [former]-girlfriend Ms. Nesbitt had been receiving similar messages even before [their relationship ended].” Appellant’s Brief at 19. In challenging the admission of the screenshots, as opposed to complete transcriptions of the downloaded contents of Ms. Nesbitt’s cellular telephone, Appellant emphasizes that the screenshots omitted certain content found within the messages, including “hyperlinks[6] to a website that could have shed ____________________________________________ 6A hyperlink is an “element on a webpage – usu. a word, phrase, or graphic, but sometimes a single pixel – that when clicked on, takes the user to another - 17 - J-A21027-19 light on who sent the messages” and “important metadata[7] such as a full list of the participants [in] the messages, the source [of the message], the number of attachments, and the start time and time of last activity.” Id. at 20. Not only did the screenshots omit features that could have identified the sender of the messages, the failure to secure the original text messages was inexcusable since police authorities had both the capability and opportunity to fully download Ms. Nesbitt’s cellular telephone. See id. We apply the following standard and scope of review when reviewing a challenge to a trial court’s evidentiary rulings. When we review a trial court ruling on admission of evidence, we must acknowledge that decisions on admissibility are within the sound discretion of the trial court and will not be overturned absent an abuse of discretion or misapplication of law. In addition, for a ruling on evidence to constitute reversible error, it must have been harmful or prejudicial to the complaining party. An abuse of discretion is not merely an error of judgment, but if in reaching a conclusion the law is overridden or misapplied, or the judgment exercised is manifestly unreasonable, or the result of partiality, prejudice, bias or ill-will, as shown by the evidence or the record, discretion is abused. ____________________________________________ part of the same website or to a different website.” Black’s Law Dictionary at 759 (8th Ed. 2004). 7 Metadata is data that describes and gives information about other data. Merriam-Webster’s Collegiate Dictionary at 779 (11th Ed. 2003). Metadata may be used to summarize basic information about data to facilitate the tracking and manipulation of specific information. Some examples of metadata include information about the location on a computer network where certain data has been created, as well as information about the size of a digital file or the standards used in the creation, storage, or transmission of the file. - 18 - J-A21027-19 Geise v. Nationwide Life and Annuity Co. of America, 939 A.2d 409, 417 (Pa. Super. 2007) (internal citations and quotations omitted). We begin with an overview of the relevant principles that govern Appellant’s challenge. The common law best evidence rule is presently codified at Pa.R.E. 1001-1004. Pursuant to Rule 1002, “[a]n original writing,[8] recording, or photograph is required in order to prove its content unless these rules, other rules prescribed by the Supreme Court, or a statute provides otherwise.”9 Pa.R.E. 1002. If neither an original nor a duplicate writing is ____________________________________________ 8 For purposes of the best evidence rule, “[a] writing consists of letters, words, numbers, or their equivalent set down in any form.” Pa.R.E. 1001(a). Moreover, the original of a writing refers to “the writing … itself or any counterpart intended to have the same effect by the person who executed or issued it. For electronically stored information, ‘original’ means any printout – or other output readable by sight – if it accurately reflects the information.” Pa.R.E. 1001(d). Duplicates are defined as “cop[ies] produced by mechanical, photographic, chemical, electronic, or other equivalent process or technique that accurately reproduces [an] original.” Pa.R.E. 1001(e). Rule 1003 states: “A duplicate is admissible to the same extent as the original unless a genuine question is raised about the original’s authenticity or the circumstances make it unfair to admit the duplicate.” Pa.R.E. 1003. 9 The commentary appended to Rule 1002 explains that the common law formulation of the best evidence rule applied whenever the terms of a writing were “material,” a requirement that is now dealt with in Pa.R.E. 1004(d). See Pa.R.E. 1002, cmt.; see also Commonwealth v. Green, 162 A.3d 509, 518 (Pa. Super. 2017) (en banc). Pa.R.E. 1004(d) provides that an original is not required when a writing, recording or photograph is unrelated to a controlling issue. See Pa.R.E. 1004(d). Pa.R.E. 1004 also identifies additional circumstances in which the requirement of an original may be excused and other evidence of content permitted, but these circumstances are not present in this appeal. See Pa.R.E. 1004(a) (excusing requirement of original when all originals are lost or destroyed by any action other than the proponent acting in bad faith), 1004(b) (excusing requirement of original where original - 19 - J-A21027-19 introduced, testimony is inadmissible to prove content. Commonwealth v. Lewis, 623 A.2d 355, 358 (Pa. Super. 1993). The comment to Rule 1002 sets forth several underlying policy considerations for the requirement of an original writing. In relevant part, it states: This rule corresponds to the common law “best evidence rule.” See Hera v. McCormick, 625 A.2d 682 (Pa. Super. 1993). [C]ommentators have [identified] four reasons justifying the rule. (1) The exact words of many documents, especially operative or dispositive documents, such as deeds, wills or contracts, are so important in determining a party's rights accruing under those documents. (2) Secondary evidence of the contents of documents, whether copies or testimony, is susceptible to inaccuracy. (3) The rule inhibits fraud because it allows the parties to examine the original documents to detect alterations and erroneous testimony about the contents of the document. ____________________________________________ cannot be obtained by any available judicial process), and 1004(c) (excusing the requirement of an original where the party against whom the original would be offered had control of the original, was on notice that the original would be a subject of proof at a trial or hearing, and failed to produce the original at the trial or hearing). Although no definitive test determines when a writing is related to a controlling issue because a party must prove its contents, writings that are viewed as “operative or dispositive” have usually been considered subject to the rule. See Pa.R.E. 1002, cmt. Writings that merely evidence a transaction, thing, or event are generally not subject to the rule. See id.; see also Hamill-Quinlan, Inc. v. Fisher, 591 A.2d 309, 313 (Pa. Super. 1991). Here, the Commonwealth offered the screenshots to prove Appellant’s culpability in harassing and stalking Ms. Nesbitt. For this reason, as discussed more fully below, we conclude that the screenshots were central to certain controlling issues in the case and that the best evidence rule governed their admission relevant to those issues at trial. - 20 - J-A21027-19 (4) The appearance of the original may furnish information as to its authenticity. Pa.R.E. 1002, cmt., quoting 5 Weinstein & Berger, Weinstein's Evidence § 1002(2) (Sandra D. Katz rev. 1994). This Court has also observed that, “in light of the added importance that the fact-finder may attach to the written word, it is better to have available the exact words of a writing, to prevent the [erroneous transmission of] critical facts which accompanies the use of written copies or recollection, and to prevent fraud.” Lewis, 623 A.2d at 358. To recount, Appellant’s claim is that the best evidence rule required the Commonwealth to produce original versions of the text messages or, failing that, duplicate copies that accurately reproduced the originals. Appellant contrasts the screenshots of Ms. Nesbitt’s telephone against full forensic downloads such as those performed on Appellant’s cellular telephone.10 Appellant points out that while the forensic downloads showed the status of a message (e.g. read or not read), the date and time the messages was read, from whom and to whom the messages was sent (including the name and telephone number), the source (e.g. iMessage), the name of the body file, and the content of the message, screenshots of the text messages sent to Ms. Nesbitt’s telephone omitted hyperlinks, metadata, and the content of certain messages. See Appellant’s Brief at 23. Appellant’s position is that because ____________________________________________ 10 Forensic downloads on Appellant’s cellular telephone failed to produce evidence of text messages sent to Ms. Nesbitt or evidence showing that Appellant was the sender of such text messages. - 21 - J-A21027-19 the screenshots omitted hyperlinks, metadata, and certain content found in the original text messages, the screenshots do not fall within the definition of an “original electronic document” since they cannot constitute a printout, or other sight-readable output, that accurately reflected information found in the source writing. See Appellant’s Brief at 23-24, citing Pa.R.E. 1001(d) (definition of original writing). Appellant also argues that the same omissions exclude the screenshots from the definition of “duplicates” since they did not accurately reproduce the original text messages. See Appellant’s Brief at 24. Because the screenshots did not qualify as either originals or duplicates of the text messages, the trial court erred in admitting the screenshots, as well as any content-related testimony. In the alternative, Appellant argues that even if the challenged screenshots qualified as duplicates, they nevertheless should not have been admitted. Citing Pa.R.E. 1003 and the commentary to Rule 1002, Appellant argues that genuine issues surrounding the authenticity of the original text messages compel the conclusion that the screenshots were not admissible duplicates. In questioning the authenticity of the original communications, Appellant accuses Ms. Nesbitt of manipulating her pretrial statements to the police to make her story more consistent with the idea that Appellant sent the offending text messages. See Appellant’s Brief at 27, citing N.T. Trial, 7/23/18, at 185-186. Appellant also cites his own testimony as undermining the Commonwealth’s theory that he began sending the messages only after - 22 - J-A21027-19 his relationship with Ms. Nesbitt ended. See Appellant’s Brief at 27. In view of these genuine issues surrounding the source and authenticity of the original messages, Appellant claims that information contained in the original texts (such as hyperlinks, metadata, and certain content), but omitted from the screenshots, could have proven that Appellant was not the sender. Under these circumstances, Appellant concludes “it was fundamentally unfair for the trial court to admit the screenshots in place of the original messages.” Appellant’s Brief at 28. The trial court held that the screenshots constituted “original writings” within the definition of Rule 1001(d), which provides that originals of electronically stored information include “any printout – or other output readable by sight – [that] accurately reflects the information.” Trial Court Opinion, 12/14/18, at 22, quoting Pa.R.E. 1001(d). The court considered the original text messages to be electronically stored information which represented data stored on the devices of both the sender and recipient, as well as on the servers of the service providers. See Trial Court Opinion, 12/14/18, at 22. As such, the court determined that the screenshots of the text messages received by Ms. Nesbitt were printouts of the electronic communications she received, which fell within the definition of an original writing under Rule 1001(d). See id. The trial court also rejected Appellant’s claim that only access to full downloads of the text messages received by Ms. Nesbitt, with accompanying - 23 - J-A21027-19 access to related metadata, would facilitate authentication of the screenshots as accurate reproductions of original material. While the court acknowledged that metadata might aid in verifying the source or sender of the messages, the court expressed skepticism as to how the metadata could verify the accuracy of the screenshots in depicting the content of the challenged communications. See id. Here, the court noted Ms. Nesbitt’s testimony in which she confirmed that the screenshots accurately reflected the messages she received. This was in line with the trial court’s prior ruling on Appellant’s motion in limine, in which the court said it would allow Ms. Nesbitt to authenticate the messages she received but consider, on a message-by-message basis, the factual basis for any opinion she rendered about the identity of the sender of each message. See N.T., 7/20/18, at 10 (“generally, [the court believes] it is appropriate that the victim is permitted to testify that she received these messages on her phone and she took a photograph of them. [The court believes] that’s direct knowledge . . . if she begins to offer opinions as to who the sender is, then we will deal with what is the factual foundation that gives rise to that opinion . . . if there is a timely objection to that.”). For these reasons, the court determined that the omission of metadata from the printed screenshots did not preclude their admission into evidence as originals pursuant to Pa.R.E. 1001(d) and 1002. Finally, the trial court tacitly approved admission of the screenshots as duplicates under Pa.R.E. 1003. The court acknowledged the diminishing role - 24 - J-A21027-19 of the best evidence rule as it applied to copies generated through advanced technologies and improved methods of document reproduction. See Trial Court Opinion, 12/14/18, at 22, quoting Pa.R.E. 1003, cmt. (“[Under the traditional best evidence rule, copies of documents were not routinely admissible.] This view dated back to the time when copies were made by hand copying and were therefore subject to inaccuracy. On the other hand, Pennsylvania courts have admitted copies made by techniques that are more likely to produce accurate copies.”). Since the screenshots were generated as digital photographs of the original text messages, a reliable form of reproduction recognized in Rule 1001(e), the court suggested in the alternative that the screenshots were properly admitted as duplicates under Rule 1003.11 See Trial Court Opinion, 12/14/18, at 23. ____________________________________________ 11 For its part, the Commonwealth disputes Appellant’s contention that the screenshots did not accurately reproduce the original text messages because of omitted hyperlinks, metadata, and content found in certain communications. Instead, the Commonwealth concurs in the trial court’s conclusions that the screenshots were admissible either as originals under Rule 1002 or, alternatively, as duplicates under Rule 1003. See Commonwealth’s Brief at 12-13. To support its position, the Commonwealth cites the definition of “metadata” found in Blacks Law Dictionary, which states: “[metadata includes] secondary data that organize[s], manage[s,] and facilitate[s] the use of primary data.” Id. at 13, quoting Blacks Law Dictionary (10th ed. 2014). The Commonwealth then classifies the text in a text message as primary data (i.e. the writing) and the metadata as secondary data, which it deems as “extrinsic information” related to the writing. See Commonwealth’s Brief at 13. According to the Commonwealth, a screenshot accurately represents the primary data (or original text message) even if it does not capture extrinsic secondary information. Id. at 13-14. As such, a screenshot is admissible as an original, since it constitutes a printout that - 25 - J-A21027-19 We conclude that the trial court neither erred nor abused its discretion in admitting the screenshots. As a preliminary matter, the record confirms that the Commonwealth properly authenticated the screenshots prior to admission.12 Pennsylvania law holds that authentication is a threshold inquiry ____________________________________________ accurately reflects information, or as a duplicate, since it represents an accurate copy produced by photographic means. Id. The Commonwealth also argues that the screenshots were properly authenticated under Pennsylvania law, which permits authentication of electronic messages through circumstantial evidence, including testimony from a sender or recipient and contextual clues in the communication tending to reveal the identity of the sender. Id. at 15, citing Commonwealth v. Mangel, 181 A.3d 1154, 1160 (Pa. Super. 2018). 12 Effective October 1, 2020, a new provision of the Pennsylvania Rules of Evidence, Pa.R.E. 901(b)(11) (governing authentication or identification of digital evidence), will provide in relevant part: Rule 901. Authenticating or identifying evidence (a) In General. Unless stipulated, to satisfy the requirement of authenticating or identifying an item of evidence, the proponent must produce evidence sufficient to support a finding that the item is what the proponent claims it is. (b) Examples. The following are examples only—not a complete list—of evidence that satisfies the requirement: *** (11) Digital Evidence. To connect digital evidence with a person or entity: (A) direct evidence such as testimony of a person with personal knowledge; or (B) circumstantial evidence such as: - 26 - J-A21027-19 ____________________________________________ (i) identifying content; or (ii) proof of ownership, possession, control, or access to a device or account at the relevant time when corroborated by circumstances indicating authorship. Pa.R.E. 901(b)(11) has no counterpart in the Federal Rules of Evidence. “Digital evidence,” as used in this rule, is intended to include a communication, statement, or image existing in an electronic medium. This includes emails, text messages, social media postings, and images. The rule illustrates the manner in which digital evidence may be attributed to the author. The proponent of digital evidence is not required to prove that no one else could be the author. Rather, the proponent must produce sufficient evidence to support a finding that a particular person or entity was the author. See Pa.R.E. 901(a). Direct evidence under Pa.R.E. 901(b)(11)(A) may also include an admission by a party-opponent. Circumstantial evidence of identifying content under Pa.R.E. 901(b)(11)(B)(i) may include self-identification or other distinctive characteristics, including a display of knowledge only possessed by the author. Circumstantial evidence of content may be sufficient to connect the digital evidence to its author. Circumstantial evidence of ownership, possession, control, or access to a device or account alone is insufficient for authentication of authorship of digital evidence under Pa.R.E. 901(b)(11)(B)(ii). See, e.g., Commonwealth v. Mangel, 181 A.3d 1154, 1163 (Pa. Super. 2018) (social media account bearing defendant's name, hometown, and high school was insufficient to authenticate the online and mobile device chat messages as having been authored by defendant). However, this evidence is probative in combination with other evidence of the author's identity. Expert testimony may also be used for authentication purposes. See, e.g., Commonwealth v. Manivannan, 186 A.3d 472 (Pa. Super. 2018). - 27 - J-A21027-19 for all evidence and provides that the following principles govern authentication of digital communications such as text messages. Pursuant to Pennsylvania Rule of Evidence 901, authentication is required prior to admission of evidence. The proponent of the evidence must introduce sufficient evidence that the matter is what it purports to be. See Pa.R.E. 901(a). Testimony of a witness with personal knowledge that a matter is what it is claimed to be can be sufficient. See Pa.R.E. 901(b)(1). Evidence that cannot be authenticated by a knowledgeable person, pursuant to subsection (b)(1), may be authenticated by other parts of subsection (b), including circumstantial evidence pursuant to subsection (b)(4). See Pa.R.E. 901(b)(4). Pennsylvania appellate courts have considered the authentication of computerized instant messages and cell[ular tele]phone text messages. See In the Interest of F.P., a Minor, 878 A.2d 91, 96 (Pa. Super. 2005) (computerized instant messages); Commonwealth v. Koch, 39 A.3d 996, 1005 (Pa. Super. 2011), affirmed by an equally divided court, 106 A.3d 705 (Pa. 2014) (cell phone text messages)[.] [In Koch, this Court held that text messages are documents and subject to the same requirements for authenticity as non-electronic documents generally. Koch, 39 A.3d at 1004 (citations omitted). The Koch Court additionally observed that “electronic writings typically show their source, so they can be authenticated by contents in the same way that a communication by postal mail can be authenticated.” Id. at 1003. The panel in Koch was mindful, however, of the difficulty with establishing authorship of text message in certain cases. Because more than one individual can access an electronic device without permission, the Koch Court ruled, “authentication of electronic communications, like documents, requires more than mere confirmation that the number or address belonged to a particular person. Circumstantial evidence, which tends to corroborate the identity of the sender, is required.” Id. at 1005.] ____________________________________________ Pa.R.E. 901(b)(11) and cmt. (effective October 1, 2020). - 28 - J-A21027-19 Commonwealth v. Mangel, 181 A.3d 1154, 1160 (Pa. Super. 2018). The Commonwealth must provide sufficient evidence from which a factfinder could reasonably ascertain the authenticity of the records (i.e. identity of the sender and confirmation that the document is what it purports to be) by a preponderance of the evidence. See id. at 1161. The Commonwealth offered sufficient direct and circumstantial evidence to establish the authenticity of the screenshots. Ms. Nesbitt, as the recipient of the text messages depicted in the screenshots, offered direct authenticating testimony in which she confirmed that the screenshots accurately reflected the messages she received. See Mangel, 181 A.3d at 1162 (recognizing recipient or sender testimony as direct evidence of authenticity). In addition, the Commonwealth proffered circumstantial evidence that identified Appellant as the sender of the messages. Ms. Nesbitt testified that she never received harassing test messages before terminating her relationship with Appellant. N.T. Trial, 7/23/18, at 82. Ms. Nesbitt also testified that she received a harassing text message stating that the sender was observing her in a restaurant and police officials were later able to determine that an application installed on her cellular telephone was sharing her location with an individual named “Daniel Talley.” Id. at 86-89. In addition, the text messages received by Ms. Nesbitt referred to specific sexual acts that occurred during intimate moments in the relationship between Appellant and Ms. Nesbitt. Id. at 123-124. Apart from Ms. Nesbitt, only Appellant possessed knowledge of - 29 - J-A21027-19 those acts. Id. The text messages received by Ms. Nesbitt also included phrases such as “fake love,” an idiom commonly used by Appellant. Id. at 133-134. Lastly, police officials uncovered software on Appellant’s computer that enabled him to send anonymous text messages. N.T. Trial, 7/24/18, at 306-309. In sum, the Commonwealth introduced direct testimony showing that the screenshots accurately reflected the text messages Ms. Nesbitt received. In addition, the Commonwealth produced circumstantial evidence linking Appellant to the messages received by Ms. Nesbitt, including Appellant’s access to a device capable of sending anonymous text messages, displays of knowledge known only to Appellant and Ms. Nesbitt, and the use of distinct linguistic phrases commonly used by Appellant. The Commonwealth therefore met its burden of authenticating the screenshots. Having concluded that the Commonwealth properly authenticated the screenshots, we turn now to Appellant’s claim that the best evidence rule nevertheless barred their use at trial because they omitted certain features contained in the original text messages. Pertinent to this question, this Court has previously observed that: “Nevertheless[, the best evidence rule embodied at Pa.R.E. 1002] is applicable only in circumstances where the contents of the writing, recording or photograph are integral to proving the central issue in a trial[.] Consequently, if the Commonwealth is introducing a writing, recording, or photograph at trial, Rule 1002 requires that the original be introduced only if the Commonwealth must prove the contents of the writing, recording or photograph to establish the elements of its case.” [Commonwealth v. Fisher, 764 A.2d 82, 88 (Pa. Super. 2000) (“The best evidence rule is controlling only if the terms of [the proposed evidence] - 30 - J-A21027-19 must be proved to make a case or provide a defense[.]”) (citation omitted), appeal denied, 759 A.2d 385 (Pa. 2000)]. “The rule is not implicated just because evidence is relevant;” the rule applies if the writing, recording, or photograph is necessary to prove the elements of a case. [Commonwealth v. Townsend, 747 A.2d 376, 380-381 (Pa. Super. 2000)]. In other words, the content of the video must be material to, and not just mere evidence of, the issues at bar for the best evidence rule to apply. [Lewis, 623 A.2d at 358.] “If the Commonwealth does not need to prove the content of the writing or recording to prove the elements of the offense charged, then the Commonwealth is not required to introduce the original writing or recording.” Commonwealth v. Dent, 837 A.2d 571, 590 (Pa. Super. 2003)[;] see also Fisher, supra ([no] violation of best evidence rule occurs with admission of duplicate tape recordings of defendant's taunting voice mail messages, where tapes did not establish fundamental components of any offenses charged); Townsend, supra ([no] violation of best evidence rule occurred where trial court allowed detective to testify regarding content of defendant's written confession, even though written confession was not admitted into evidence; content of confession made persuasive evidence for Commonwealth's case but was not necessary to establish elements of crimes of burglary and assault, which had no elements requiring proof of content of confession or any other writing). The Comment to Rule 1002 suggests “recordings and photographs are usually only evidence of the transaction, thing or event. It is rare that a recording or photograph would be operative or dispositive[.]” Pa.R.E. 1002, [cmt]. Commonwealth v. Green, 162 A.3d 509, 518-519 (Pa. Super. 2017) (en banc). Because Appellant’s claims surrounding the features omitted from the screenshots implicate only the identity of the individual who sent the messages, and not the accuracy with which the screenshots depicted the contents of the original communications, we conclude that Appellant’s claims fall outside the scope of the best evidence rule. We explain. - 31 - J-A21027-19 The gravamen of the Commonwealth’s case against Appellant alleged that he harassed and stalked Ms. Nesbitt by sending her volumes of threatening text messages. Because those messages were the basis of the charges leveled by the Commonwealth against Appellant, the Commonwealth needed to prove that the “substantive content”13 of the messages established the elements of the charged offenses. To prove the substantive content of the messages, the Commonwealth introduced the screenshots at trial. Moreover, because the content of the original messages was an essential component in a successful prosecution of Appellant, the Commonwealth, as the proponent of the screenshots, needed to demonstrate the admissibility of the screenshots under the best evidence rule. Insofar as the screenshots were introduced to establish the substantive content of the original text messages, we agree with the trial court that the screenshots were admissible, either as authenticated printouts of the original electronic text messages under Pa.R.E. 1001(d), or as authenticated duplicates generated through a photographic process that accurately reproduced the original messages within the contemplation of Pa.R.E. 1001(e). Although Appellant repeatedly takes aim at “genuine issues of authenticity” involving the original text messages and the resultant unfairness ____________________________________________ 13 We employ the term “substantive content” to refer to the content of the original text messages received by Ms. Nesbitt separate and apart from the hyperlinks, metadata, and limited portions of text that were omitted from the screenshots. - 32 - J-A21027-19 of admitting the screenshots as originals or as duplicates in their place, in point of fact Appellant’s challenge is wholly focused on the potential probative value of the omitted features in showing the source of the offending communications.14 Appellant does not claim that omissions in the screenshots lead to inaccuracies in their depiction of the substantive content of the original text messages. In addition, Appellant does not allege that the omitted features rendered the screenshots incapable of showing that the original communications established the elements of the charged offenses. Most importantly, Appellant does not claim that the hyperlinks, metadata, and other content found in the original text messages, but omitted from the screenshots, were material or essential in proving the identity of the individual who authored or sent the text messages. Put differently, Appellant does not allege that either he or the Commonwealth needed to prove the content of the original text messages in order to show who sent the original communications. Instead, Appellant’s claim is only that the omitted features may have facilitated an assessment of the authorship of the messages and, therefore, may have some relevance in determining the identity of the sender. While Appellant may be correct that the omitted features possessed some probative value in identifying the author of the original communications, he has not ____________________________________________ 14 As we stated above, the Commonwealth properly authenticated the screenshots by introducing direct and circumstantial evidence to show that they were what they purported to be and that they could be linked to Appellant as the author and sender of the communications. - 33 - J-A21027-19 alleged, much less shown, that the content of those communications was essential in proving who sent the messages. In the absence of such a showing, the original messages, along with the hyperlinks, metadata, and other content omitted from the screenshots, possessed only potential relevance concerning the messages sent to Ms. Nesbitt. The best evidence rule is triggered, however, only when the contents of a writing are essential, not merely relevant, in proving a claim or defense. See Townsend, 747 A.2d at 380-381. As such, the trial court did not violate the best evidence rule in admitting the screenshots. Accordingly, Appellant is not entitled to relief. Judgment of sentence affirmed. Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 7/17/20 - 34 -