J-A21027-19
2020 PA Super 171
COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF
: PENNSYLVANIA
:
v. :
:
:
DANIEL TALLEY :
:
Appellant : No. 2627 EDA 2018
Appeal from the Judgment of Sentence Entered August 24, 2018
In the Court of Common Pleas of Montgomery County Criminal Division
at No(s): CP-46-CR-0005241-2017
BEFORE: BOWES, J., OLSON, J., and FORD ELLIOTT, P.J.E.
OPINION BY OLSON, J.: FILED JULY 17, 2020
Appellant, Daniel Talley, appeals from the judgment of sentence entered
on August 24, 2018 in the Criminal Division of the Court of Common Pleas of
Montgomery County. We affirm.
The trial court summarized the factual and procedural history of this
case as follows.
In March 2016, Christa Nesbitt met [Appellant] while working as
a waitress at the Whistle Stop diner in Oreland, Pennsylvania.
[Appellant] regularly frequented the diner and began a romantic
relationship with Ms. Nesbitt in the spring of 2016. In September
2016, Ms. Nesbitt and her daughter, [R.N.], moved into
[Appellant’s] house. Ms. Nesbitt eventually broke up with
[Appellant] and moved out of [Appellant’s] home on May 27,
2017. The following day[,] Ms. Nesbitt began to receive
threatening and harassing text messages and [electronic-mails
(“e-mails”)] from unfamiliar addresses. The messages came from
e-mail addresses including, inter alia, “maxkillin@gmx.com” and
“nastybtch@cumof... .” Ms. Nesbitt stated that she had never
received such messages prior to leaving [Appellant] and did not
know of any grudges that anyone else might hold toward her at
that time.
J-A21027-19
The subject messages repeatedly referred to Ms. Nesbitt in a
vulgar and derogatory manner and included threats such as “I was
up da stret from ur hous my gun was loaded nd I was going to
end everythin we cld die 2getter,” “ur time is runin out slut u stole
dat kid from me u never be safe u slut.” The sender of these
messages ostensibly intended for Ms. Nesbitt to believe the
messages were being sent from [R.N.’s] biological father, [Korey
McClellan].[] Ms. Nesbitt testified there was no animosity between
her and Mr. McClellan at the time these messages were sent.
Some of the messages were received while Mr. McClellan was in
her presence and she did not observe him sending any messages
at those times. Mr. McClellan also denied sending any such
messages. Mr. McClellan stated that he harbored no ill will or
animosity toward Ms. Nesbitt after their relationship ended.
On June 2, 2017, Ms. Nesbitt received a text message saying that
the sender was observing her at a Friendly’s restaurant. Ms.
Nesbitt was, in fact, at a Friendly’s restaurant with her daughter
and a friend when she received this text message. Ms. Nesbitt
went to the Springfield Police Department to report this incident.
An investigation of her [telephone] by Detective Robert Chiarlanza
revealed that an application on her [telephone], unbeknownst to
her, was sharing her location with “Daniel Talley.”
Ms. Nesbitt continued to receive vulgar, harassing and, at times,
threatening text messages every day, multiple times a day until
approximately mid-July 2017. She estimated that she received
hundreds of messages of this nature during that time. The
messages referenced elements of [Appellant’s] and Ms. Nesbitt’s
prior sexual relationship that only [Appellant] knew about, such
as when [Appellant] would pressure Ms. Nesbitt to have anal sex
with him. The messages also used expressions that were specific
to [Appellant], such as “fake love,” an expression [Appellant]
would often use when accusing Ms. Nesbitt of cheating on him.
Ms. Nesbitt repeatedly asked the sender of the messages to stop
sending her messages. On June 14, 2017, Detective Chiarlanza
confronted [Appellant] at his home and warned him to stop
sending Ms. Nesbitt threatening and harassing text messages.
On June 19, 2017, Ms. Nesbitt received a message with the
subject “Tick tock” which read, in part, “It gonna happen, slut.
You gonna pay. Comin’ soon mybe on Fox stet. You seem to like
it der.” Ashley-Lynn Donnelly, a friend and neighbor of Ms.
Nesbitt, testified that on the night of June 19, 2017, between
-2-
J-A21027-19
11:30 p.m. and midnight, she was sitting on a neighbor’s porch
on Plymouth Avenue when she saw [Appellant’s] truck idling
[without its headlights]. It began driving up and down Plymouth
Avenue. After passing her a third time, she heard two loud bangs
and she then went inside. She suspected these bangs may have
been gunshots. Ms. Donnelly sent Ms. Nesbitt a text that night
[saying] that [Appellant’s] truck was near Ms. Nesbitt’s parent’s
house where Ms. Nesbitt was staying. The following day, June 20,
2017, Ms. Nesbitt noticed a bullet hole in her vehicle.
On June 20, 2017, Detective Chiarlanza went to investigate a
report that a car was shot on Plymouth Avenue. His investigation
revealed that “there was a bullet hole on the driver’s side that
entered into the passenger compartment behind the rear door.”
A small bullet fragment was recovered from the rear passenger
compartment of the vehicle. That same day the police obtained
and executed two search warrants for [Appellant’s] home and an
arrest warrant for [Appellant]. [Appellant] was in the driveway of
his residence next to his truck armed with a loaded Kel-Tec .380
semiautomatic pistol when the police arrived. Detective
Chiarlanza testified the gun in [Appellant’s] possession was
capable of producing a bullet hole similar to the one found in Ms.
Nesbitt’s vehicle.
Investigation of [Appellant’s] home revealed a security camera.
The video from the night of June 19, 2017 showed [Appellant]
entering his home at 11:56 p.m., shortly after the time Ms.
Donnelly testified [Appellant] was driving his truck on Plymouth
Avenue when she heard two loud bangs. [Appellant] lived only a
few blocks from where the shooting occurred and had time to
return home within a few minutes of the shooting.
A search of [Appellant’s] computer revealed that he had searched
the internet for terms including, inter alia, “VPN [Virtual Private
Network],” “Torproject.org” and “Private Internet access.”
[Appellant] had searched for these terms on June 16, 2017, two
days after Detective Chiarlanza first visited [Appellant’s] house.
Using a VPN and Tor, a web browser, allows a person to [conduct
anonymous searches] or hide their online presence and activity.
[Appellant] also had a virtual machine installed on his computer
allowing him to conceal any activity conducted on that computer
by completely compartmentalizing that activity within the virtual
machine so that it could later be deleted without a trace. Analysis
of [Appellant’s] computer further revealed that he had been
-3-
J-A21027-19
learning how to send e-mails from fictionalized e-mail addresses
to cellular telephone numbers using a website. There was also
evidence that on June 20, 2017, [Appellant] accessed the online
schedule that Ms. Nesbitt used for her job.
An extraction of [Appellant’s cellular telephone] data revealed
deleted text messages to a David Wolf which included, inter alia,
a message asking “Is there a way to spam a [cellular telephone]
with so many texts and call[s] it just totally fucks it up?” When
Mr. Wolf responded that this would likely be illegal and could easily
be traced, [Appellant] stated “That’s what TOR is for.” Mr. Wolf
then responded, “I guess. Then you’d have to find an online script
that sends SMS [short message service] anonymously, and will
accept input from an anonymized browser.”
Ms. Nesbitt did not receive any more threatening or harassing
messages after [Appellant’s] arrest on July 18, 2017 when he no
longer had access to [cellular telephones] or computers.
[Appellant testified in his own defense and] denied sending any of
the subject messages[. He also] testified that such messages had
been coming from Mr. McClellan for months before [Appellant’s]
breakup with Ms. Nesbitt. He testified that there was animosity
between Ms. Nesbitt and Mr. McClellan and that Ms. Nesbitt was
afraid of Mr. McClellan. [Appellant] also testified that the virtual
machine installed on his computer was to avoid viruses when his
daughter used the computer to play games. The VPN, he
explained, was required for work. Detective Chiarlanza testified
in rebuttal that based on his experience and similar investigations
it was not feasible the VPN software [Appellant] installed on his
computer was being used for [Appellant’s] employment.
On July 26, 2018, the jury found [Appellant] guilty of [two counts
of] stalking[, pursuant to 18 Pa.C.S.A. § 2709.1(a)(1) and
§ 2709.1(a)(2),] and [one count each of] terroristic threats [(18
Pa.C.S.A. § 2706(a)(1))] and harassment [(18 Pa.C.S.A.
§ 2709(a)(2)),] but deadlocked on the charges of recklessly
endangering another person and simple assault. [Appellant] was
sentenced on August 24, 2018. On August 30, 2018, [Appellant]
filed a notice of appeal to [this Court]. On September 5, 2018,
the [trial] court ordered [Appellant] to file a concise statement of
[errors] complained of on appeal in accordance with Pa.R.A.P.
1925(b). On October 1, 2018, the [trial] court granted [Appellant]
an extension of time to file his [Rule 1925(b)] concise statement.
-4-
J-A21027-19
On October 23, 2018, [Appellant] filed a concise statement of
[errors] complained of on appeal. On October 25, 2018,
[Appellant] filed an amended concise statement. [The trial court
issued its opinion on December 14, 2018.]
Trial Court Opinion, 12/14/18, at 1-6.
Appellant’s brief identifies three issues for our review:
Does Article 1, § 14 of the Pennsylvania Constitution violate the
Due Process Clauses of the United States Constitution both facially
and as applied against [Appellant]?
[Do] concurrent sentences based upon [convictions under] the
two subsections of 18 Pa.C.S.A. [§] 2709.1(a) [(proscribing
differing forms of stalking)] constitute double punishment [for]
the same statutorily proscribed conduct and thus an illegal
sentence?
Was the admission of screenshots of text messages and emails an
abuse of discretion and a misapplication of the Best Evidence Rule
as codified by the Pennsylvania Rules of Evidence 1001-1004?
Appellant’s Brief at 2-3.1
Appellant’s first issue alleges that he was wrongfully detained prior to
trial pursuant to Article 1, § 14 of the Pennsylvania Constitution.2 Specifically,
____________________________________________
1 We have re-ordered Appellant’s issues to facilitate our discussion.
2 An order pertaining to bail is ordinarily subject to immediate review pursuant
to Pa.R.A.P. 1762(b)(2). See Commonwealth v. Parsons, 166 A.3d 1242,
1245 (Pa. Super. 2017). Appellant, however, did not pursue this course of
action but instead challenged the denial of nominal bail in the context of his
direct appeal from a judgment of sentence. We have not deemed this issue
to be moot since Appellant claims, in part, that the wrongful denial of nominal
bail deprived him of a meaningful opportunity to assist in his own defense and,
as such, contributed to his conviction.
-5-
J-A21027-19
Appellant asserts that Article 1, § 14 of the Pennsylvania Constitution3
violates, both facially and as applied, the procedural and substantive
components of the due process clauses of the Fifth and Fourteenth
Amendments of the United States Constitution. Appellant maintains that
Article 1, § 14 affords insufficient procedures to enable a judicial officer to
evaluate the likelihood of potential danger posed by a detainee. See
Appellant’s Brief at 32-44 and 45-47. Because of these procedural
deficiencies, Appellant further contends that Article 1, § 14 is excessive in
relation to the regulatory goal of pre-trial detention predicated upon an
identified threat an arrestee poses toward an individual or the community.
See id. at 47-54. The Commonwealth asserts that Appellant waived his
federal due process claims. See Commonwealth Brief at 8-9 and 20-24. After
careful consideration, we agree with the Commonwealth that Appellant failed
to preserve his federal due process challenges for appellate review.
A brief review of the relevant factual history is essential to our resolution
of this claim. Police officials arrested Appellant on July 18, 2017 and a criminal
____________________________________________
3 In relevant part, Article 1, § 14 of the Pennsylvania Constitution states:
All prisoners shall be bailable by sufficient sureties . . . unless no
condition or combination of conditions other than imprisonment
will reasonably assure the safety of any person and the community
when the proof is evident or presumption great.
Pennsylvania Constitution Article 1, § 14.
-6-
J-A21027-19
complaint was filed on August 7, 2017. Appellant’s bail was set at
$250,000.00. On January 8, 2018, Appellant moved for release on nominal
bail. The motion alleged that Appellant was entitled to relief pursuant to
Pa.R.Crim.P. 600(B) and (D)(2), which permit an individual who has been
incarcerated in excess of 180 days from the filing of a criminal complaint to
file a written motion seeking release on nominal bail, subject to any
nonmonetary condition imposed by the court and permitted by law. See
Pa.R.Crim.P. 600(B) and (D)(2); Motion for Release on Nominal Bail, 1/8/18.
The trial court heard oral argument on Appellant’s nominal bail motion
on May 1, 2018. At oral argument, the Commonwealth conceded that
Appellant had been incarcerated for more than 180 days since the filing of the
criminal complaint. In addition, defense counsel conceded that the court, in
deciding the motion, could consider the affidavit of probable cause filed in
support of the charges against Appellant. On May 9, 2018, the trial court
denied Appellant’s motion for release on nominal bail, concluding that no
condition, or combination of conditions, could ensure the safety of the
community or Ms. Nesbitt. See Trial Court Opinion, 12/14/18, at 7.
Appellant, on May 11, 2018, moved for reconsideration of the trial court’s
denial of his nominal bail motion. Among other contentions, Appellant’s
motion for reconsideration raised constitutional challenges based upon Article
1, § 13 of the Pennsylvania Constitution (prohibiting excessive bail and fines
and infliction of cruel punishments) and the Eighth Amendment to the United
-7-
J-A21027-19
States Constitution (prohibiting cruel and unusual punishments). The trial
court entertained argument on Appellant’s reconsidered motion on June 28,
2018 and denied the motion on July 11, 2018.
The certified record confirms that Appellant waived appellate review of
his federal due process claims challenging the validity of Article 1, § 14 of the
Pennsylvania Constitution. Critically, the record reflects that Appellant never
raised these federal constitutional challenges in his original motion for nominal
bail, the hearing on that motion, his motion for reconsideration, or at
argument on the reconsidered motion. In fact, Appellant first raised his
procedural and substantive due process claims in his October 23, 2018 concise
statement, which he filed after his notice of appeal. Because Appellant did
not properly preserve his federal due process challenges before the trial court,
he cannot litigate them for the first time on appeal. See Pa.R.A.P. 302(a)
(“Issues not raised in the lower court are waived and cannot be raised for the
first time on appeal.”); Beemac Trucking, LLC v. CNG Concepts, LLC, 134
A.3d 1055, 1058 (Pa. Super. 2016) (“An issue raised for the first time in a
concise statement is waived [because an issue raised for the first time after
the filing of a notice of appeal deprives the trial court of the opportunity to
consider the claim].”); Commonwealth v. Lawrence, 99 A.3d 116, 122 (Pa.
Super. 2014) (claims challenging constitutionality of statutory provisions are
generally subject to waiver), appeal denied, 114 A.3d 416 (Pa. 2015).
-8-
J-A21027-19
To the extent Appellant’s brief develops a claim alleging that the trial
court improperly denied nominal bail pursuant to Pa.R.Crim.P. 600(D)(2), we
conclude that Appellant is not entitled to relief.4 Appellant’s claim here is that
the Commonwealth failed to present witnesses or offer other proof that no
condition or combination of conditions could reasonably assure the safety of
the victim or the community. See Appellant’s Brief at 33. As such, Appellant
maintains that the Commonwealth failed to meet its burden of proof at the
bail hearing. Id. We conclude that the record contained sufficient evidence
to show that no condition or combination of conditions could reasonably assure
the safety of the victim or the community. Hence, the trial court did not abuse
its discretion in refusing Appellant’s request for nominal bail.
“In evaluating Rule 600 issues, our standard of review of a trial court's
decision is whether the trial court abused its discretion.” Commonwealth v.
Hunt, 858 A.2d 1234, 1238 (Pa. Super. 2004) (en banc). Our scope of review
____________________________________________
4 Although the focus of Appellant’s nominal bail claim centers upon the alleged
deprivation of Appellant’s substantive and procedural due process rights under
the United States Constitution, his brief forwards a claim that the
Commonwealth failed to meet its burden of proof in demonstrating that bail
would be inappropriate under Pa.R.Crim.P. 600(D)(2) and Article 1, § 14 of
the Pennsylvania Constitution. Appellant preserved this claim by litigating a
motion for release on nominal bond and by including the claim in his Rule
1925 concise statement. Although Appellant did not expressly include a
challenge to the trial court’s denial of nominal bail in his statement of
questions involved as required by Pa.R.A.P. 2116(a) (precluding appellate
review unless issue is stated in statement of questions involved or is fairly
suggested thereby), we shall overlook this omission as it has not hampered
our review.
-9-
J-A21027-19
is limited to the findings of the trial court and the evidence of record generated
at the Rule 600 evidentiary hearing, which we view in the light most favorable
to the prevailing party. Id. at 1238-1239.
Rule 600(D)(2) of the Pennsylvania Rules of Criminal Procedure
provides, in relevant part:
[W]hen a defendant is held in pretrial incarceration beyond the
time set forth in paragraph (B), at any time before trial, the
defendant's attorney, or the defendant if unrepresented, may file
a written motion requesting that the defendant be released
immediately on nominal bail subject to any nonmonetary
conditions of bail imposed by the court as permitted by law. A
copy of the motion shall be served on the attorney for the
Commonwealth concurrently with filing. The judge shall conduct
a hearing on the motion.
Pa.R.Crim.P. 600(D)(2). Rule 600(B)(1) states: “[N]o defendant shall be held
in pretrial incarceration in excess of . . . 180 days from the date on which the
criminal complaint is filed.” Pa.R.Crim.P. 600(B)(1). Even if a defendant has
been incarcerated for at least 180 days from the date on which the complaint
was filed, a trial court retains discretion to deny release on nominal bail if “no
condition or combination of conditions other than imprisonment will
reasonably assure the safety of any person and the community.”
Commonwealth v. Jones, 899 A.2d 353, 355 (Pa. Super. 2006), quoting PA.
CONST., art. I, § 14.
In its Rule 1925(a) opinion, the trial court set forth its reasons for
denying Appellant’s nominal bail motion pursuant to Rule 600(D)(2). It
stated:
- 10 -
J-A21027-19
Given the nature of the allegations in this case and the substantial
evidence that appeared in the affidavit of probable cause
supporting the complaint, the court determined that no
combination of conditions could ensure the safety of the
community and in particular the victim, Christa Nesbitt. This was
based on the escalating pattern of threatening and harassing
messages received by Ms. Nesbitt, including mention of firearms
and death threats against Ms. Nesbitt. There was substantial
circumstantial evidence in the affidavit of probable cause linking
[Appellant] to these messages, including forensic analysis of his
computer and [cellular telephones] that revealed research into
“spamming” a [telephone] with text messages, researching online
when text messages become criminal harassment, and concerted
efforts to anonymize his online activity. More significantly, Ms.
Nesbitt’s vehicle was shot on the night of June 19, 2017 and a
witness placed [Appellant’s] vehicle at the scene immediately
before a loud bang was heard. [Appellant] was arrested on June
20, 2017 and released on bail on June 22, 2017. The harassing
and threatening messages stopped while [Appellant] was in jail
but resumed within an hour of [Appellant’s] release on bail. The
vulgar and threatening messages continued until July 12, 2017,
just days before [Appellant] was again arrested on July 18, 2017.
The court concluded the totality of circumstances indicated that
[Appellant] likely was the author of these threatening messages,
was physically stalking [Ms. Nesbitt,] and fired a bullet into her
car. There was no combination of conditions within the court’s
power that could ensure the safety of Ms. Nesbitt and the
community.[FN A] Accordingly, the court properly denied
[Appellant’s] motion for release on nominal bail.
The court suggested that [Appellant] be released on house
[FN A]
arrest with electronic monitoring but was advised this option is not
available in Montgomery County prior to sentencing.
Trial Court Opinion, 12/14/18, at 7-8.
We cannot agree with Appellant that the Commonwealth failed to
demonstrate that no condition or combination of conditions could ensure the
safety of the community or Ms. Nesbitt. Appellant’s claim that the
- 11 -
J-A21027-19
Commonwealth failed to meet its burden rests on his contention that the
prosecution produced no witnesses or other evidence at the Rule 600(D)(2)
hearing. Defense counsel, however, conceded that the Commonwealth could
rely on the factual averments in the affidavit of probable cause to oppose
Appellant’s motion. As the trial court observed, the affidavit of probable cause
linked Appellant to numerous harassing text messages and violent threats
issued to Ms. Nesbitt and set forth compelling proof that Appellant used a
firearm to damage Ms. Nesbitt’s vehicle. In addition, the trial court learned
that house arrest with electronic monitoring was not available prior to
sentencing. Under these circumstances, the trial court did not abuse its
discretion in denying nominal bail to Appellant.
In his second claim, Appellant asserts that he received an illegal
sentence when the trial court imposed separate punishments for each of his
two stalking convictions. Following trial, the jury found Appellant guilty of one
count of stalking pursuant to 18 Pa.C.S.A. § 2709.1(a)(1) and a second count
of stalking pursuant to 18 Pa.C.S.A. § 2709.1(a)(2). Appellant maintains that
the two subsections of the stalking statute do not constitute separate crimes,
but merely serve as two alternate means of proving the same offense. See
Appellant’s Brief at 19. Hence, Appellant asserts that the trial court imposed
an illegal sentence when it ordered distinct, consecutive punishments for his
stalking convictions.
- 12 -
J-A21027-19
The merger of crimes for sentencing purposes is governed by the
following principles and standard of review.
Whether [a]ppellant's convictions merge for sentencing is a
question implicating the legality of [a]ppellant's sentence.
Consequently, our standard of review is de novo and the scope of
our review is plenary. See Commonwealth v. Collins, 764 A.2d
1056, 1057, n.1 (Pa. 2001)[.]
[42 Pa.C.S.A. § 9765] provides:
§ 9765. Merger of sentences
No crimes shall merge for sentencing purposes unless the
crimes arise from a single criminal act and all of the statutory
elements of one offense are included in the statutory
elements of the other offense. Where crimes merge for
sentencing purposes, the court may sentence the defendant
only on the higher graded offense.
42 Pa.C.S.[A.] § 9765.
The statute's mandate is clear. It prohibits merger unless two
distinct facts are present: 1) the crimes arise from a single
criminal act; and 2) all of the statutory elements of one of the
offenses are included in the statutory elements of the other.
Commonwealth v. Baldwin, 985 A.2d 830, 833 (Pa. 2009).5
____________________________________________
5 Appellant maintains that his contentions on appeal do not implicate the
doctrine of merger. See Appellant’s Reply Brief at 22-23. Instead, Appellant
asserts that “the two stalking subsections [under which he was convicted are
alternate] ways to prove the single crime of stalking rather than two distinct
crimes.” Id. at 22. In Baldwin, however, the Supreme Court anticipated the
situation in which courts confront the issue of merging offenses defined under
separate subsections of the same criminal statute. In Baldwin, the Court
noted:
[W]hile Section 9765 indeed focuses on an examination of
“statutory elements,” [the Court cautioned against ignoring] the
- 13 -
J-A21027-19
In relevant part, the Crimes Code defines the offense of stalking as
follows:
§ 2709.1. Stalking
(a) Offense defined.--A person commits the crime of stalking
when the person either:
(1) engages in a course of conduct or repeatedly commits acts
toward another person, including following the person without
proper authority, under circumstances which demonstrate either
an intent to place such other person in reasonable fear of bodily
injury or to cause substantial emotional distress to such other
person; or
(2) engages in a course of conduct or repeatedly communicates
to another person under circumstances which demonstrate or
communicate either an intent to place such other person in
____________________________________________
simple legislative reality that individual criminal statutes often
overlap, and proscribe in the alternative several different
categories of conduct under a single banner. See, e.g.,
Aggravated Assault, 18 Pa.C.S.[A.] § 2702 (defining seven distinct
violations of law); Involuntary Deviate Sexual Intercourse, 18
Pa.C.S.[A.] § 3123 (setting forth eight separate violations).
Consequently, in such cases, [the Supreme Court admonished]
that [] courts must take care to determine which particular
“offenses,” i.e. violations of law, are at issue in a particular case.
See, e.g., Commonwealth v. Johnson, 874 A.2d 66, 71 n.2
(Pa. Super. 2005) (recognizing that a particular subsection of a
criminal statute may merge with another crime as a
lesser-included offense even though a different subsection of that
same statute may not).
Baldwin, 985 A.2d at 837 n.6.
Here, the two variants of stalking defined at 18 Pa.C.S.A. §§ 2709.1(a)(1) and
2709.1(a)(2) proscribe distinct categories of conduct under a single statutory
heading. As such, they are subject to merger analysis under 42 Pa.C.S.A.
§ 9765. Thus, insofar as Appellant’s argument relies on cases that predate
the adoption of the merger statute, see Appellant’s Brief at 62-65, his
argument against application of § 9765 is unavailing.
- 14 -
J-A21027-19
reasonable fear of bodily injury or to cause substantial emotional
distress to such other person.
18 Pa.C.S.A. §§ 2709.1(a)(1) and (a)(2) (emphasis added).
As the plain language of 18 Pa.C.S.A. § 2709.1(a)(1) makes clear, an
individual may be found guilty of stalking under § 2709.1(a)(1) where he or
she “engages in a course of conduct or repeatedly commits acts toward
another person, including following the person without proper authority, under
circumstances which demonstrate either an intent to place such other person
in reasonable fear of bodily injury or to cause substantial emotional distress.”
18 Pa.C.S.A. § 2709.1(a)(1) (emphasis added). The Commonwealth asserts
that the following conduct on the part of Appellant met the criteria set forth
in § 2709.1(a)(1): (1) Appellant observed Ms. Nesbitt at a Friendly’s
restaurant without her consent on June 2, 2017, as evidenced by his text
message to that effect, Ms. Nesbitt’s testimony confirming her presence at the
restaurant on that date, and forensic evidence showing that Appellant installed
an application on Ms. Nesbitt’s cellular telephone which shared, without her
consent, the location of her mobile telephone with Appellant; (2) observations
made by Ms. Nesbitt’s neighbor of Appellant in his truck in the vicinity of Ms.
Nesbitt’s parent’s home between 11:30 p.m. and midnight on the evening of
June 19, 2017 when a bullet was fired into Ms. Nesbitt’s vehicle; and, (3)
forensic evidence which showed that Appellant accessed, without Ms. Nesbitt’s
consent, an online schedule used by Ms. Nesbitt in her employment. See
- 15 -
J-A21027-19
Commonwealth’s Brief at 27, citing N.T. Trial, 7/23/18, at 88-89, 141-142 and
N.T. Trial, 7/24/18, at 334.
In addition, the plain text of 18 Pa.C.S.A. § 2709.1(a)(2) states that an
individual may be held criminally liable for stalking under § 2709.1(a)(2) if he
or she “engages in a course of conduct or repeatedly communicates to
another person under circumstances which demonstrate or communicate
either an intent to place such other person in reasonable fear of bodily injury
or to cause substantial emotional distress.” 18 Pa.C.S.A. § 2709.1(a)(2)
(emphasis added). The Commonwealth argues that repeated instances in
which Appellant sent harassing text messages to Ms. Nesbitt satisfied this
subsection. See Commonwealth Brief at 26.
We have carefully reviewed the notes of testimony from Appellant’s trial,
together with the statutory language defining the offense of stalking at 18
Pa.C.S.A. §§ 2709.1(a)(1) and (a)(2). Based upon our review, we are
satisfied that Appellant’s convictions for stalking under § 2709.1(a)(1) and
§ 2709.1(a)(2) did not arise from a single criminal act. Moreover, since
§ 2709.1(a)(1) proscribes “courses of conduct or the repeated commission of
acts” and § 2709.1(a)(2) prohibits “courses of conduct or repeated
communications,” we are convinced that not all of the elements of one
subsection of § 2709.1 are included in the other, or vice versa. As such,
Appellant’s stalking convictions under § 2709.1(a)(1) and § 2709.1(a)(2) do
- 16 -
J-A21027-19
not merge under 42 Pa.C.S.A. § 9765 and the trial court did not err in
imposing separate punishments for those convictions.
Appellant’s final claim asserts that the trial court erred and/or abused
its discretion in admitting “screenshots,” or photographs of the text messages
depicted on Ms. Nesbitt’s cellular telephone, in contravention of the best
evidence rule as adopted in Pa.R.E. 1001, 1002, 1003, and 1004. According
to Appellant, neither the screenshots, nor any testimony relating to their
content, were admissible since the screenshots did not meet the criteria of
“original” writings or “duplicates” under the evidentiary rules. Furthermore,
per Appellant, the screenshots needed to qualify either as originals or
duplicates since the Commonwealth’s “entire case against [Appellant] hinged
on whether he was the sender of a slew of vulgar and anonymous text
messages” and Appellant’s defense centered on his claim that “he was not the
sender, but that, in fact, his [former]-girlfriend Ms. Nesbitt had been receiving
similar messages even before [their relationship ended].” Appellant’s Brief at
19. In challenging the admission of the screenshots, as opposed to complete
transcriptions of the downloaded contents of Ms. Nesbitt’s cellular telephone,
Appellant emphasizes that the screenshots omitted certain content found
within the messages, including “hyperlinks[6] to a website that could have shed
____________________________________________
6A hyperlink is an “element on a webpage – usu. a word, phrase, or graphic,
but sometimes a single pixel – that when clicked on, takes the user to another
- 17 -
J-A21027-19
light on who sent the messages” and “important metadata[7] such as a full list
of the participants [in] the messages, the source [of the message], the
number of attachments, and the start time and time of last activity.” Id. at
20. Not only did the screenshots omit features that could have identified the
sender of the messages, the failure to secure the original text messages was
inexcusable since police authorities had both the capability and opportunity to
fully download Ms. Nesbitt’s cellular telephone. See id.
We apply the following standard and scope of review when reviewing a
challenge to a trial court’s evidentiary rulings.
When we review a trial court ruling on admission of evidence, we
must acknowledge that decisions on admissibility are within the
sound discretion of the trial court and will not be overturned
absent an abuse of discretion or misapplication of law. In addition,
for a ruling on evidence to constitute reversible error, it must have
been harmful or prejudicial to the complaining party.
An abuse of discretion is not merely an error of judgment, but if
in reaching a conclusion the law is overridden or misapplied, or
the judgment exercised is manifestly unreasonable, or the result
of partiality, prejudice, bias or ill-will, as shown by the evidence
or the record, discretion is abused.
____________________________________________
part of the same website or to a different website.” Black’s Law Dictionary at
759 (8th Ed. 2004).
7 Metadata is data that describes and gives information about other data.
Merriam-Webster’s Collegiate Dictionary at 779 (11th Ed. 2003). Metadata
may be used to summarize basic information about data to facilitate the
tracking and manipulation of specific information. Some examples of
metadata include information about the location on a computer network where
certain data has been created, as well as information about the size of a digital
file or the standards used in the creation, storage, or transmission of the file.
- 18 -
J-A21027-19
Geise v. Nationwide Life and Annuity Co. of America, 939 A.2d 409, 417
(Pa. Super. 2007) (internal citations and quotations omitted).
We begin with an overview of the relevant principles that govern
Appellant’s challenge. The common law best evidence rule is presently
codified at Pa.R.E. 1001-1004. Pursuant to Rule 1002, “[a]n original writing,[8]
recording, or photograph is required in order to prove its content unless these
rules, other rules prescribed by the Supreme Court, or a statute provides
otherwise.”9 Pa.R.E. 1002. If neither an original nor a duplicate writing is
____________________________________________
8 For purposes of the best evidence rule, “[a] writing consists of letters, words,
numbers, or their equivalent set down in any form.” Pa.R.E. 1001(a).
Moreover, the original of a writing refers to “the writing … itself or any
counterpart intended to have the same effect by the person who executed or
issued it. For electronically stored information, ‘original’ means any printout
– or other output readable by sight – if it accurately reflects the information.”
Pa.R.E. 1001(d). Duplicates are defined as “cop[ies] produced by mechanical,
photographic, chemical, electronic, or other equivalent process or technique
that accurately reproduces [an] original.” Pa.R.E. 1001(e). Rule 1003 states:
“A duplicate is admissible to the same extent as the original unless a genuine
question is raised about the original’s authenticity or the circumstances make
it unfair to admit the duplicate.” Pa.R.E. 1003.
9 The commentary appended to Rule 1002 explains that the common law
formulation of the best evidence rule applied whenever the terms of a writing
were “material,” a requirement that is now dealt with in Pa.R.E. 1004(d). See
Pa.R.E. 1002, cmt.; see also Commonwealth v. Green, 162 A.3d 509, 518
(Pa. Super. 2017) (en banc). Pa.R.E. 1004(d) provides that an original is not
required when a writing, recording or photograph is unrelated to a controlling
issue. See Pa.R.E. 1004(d). Pa.R.E. 1004 also identifies additional
circumstances in which the requirement of an original may be excused and
other evidence of content permitted, but these circumstances are not present
in this appeal. See Pa.R.E. 1004(a) (excusing requirement of original when
all originals are lost or destroyed by any action other than the proponent
acting in bad faith), 1004(b) (excusing requirement of original where original
- 19 -
J-A21027-19
introduced, testimony is inadmissible to prove content. Commonwealth v.
Lewis, 623 A.2d 355, 358 (Pa. Super. 1993). The comment to Rule 1002
sets forth several underlying policy considerations for the requirement of an
original writing. In relevant part, it states:
This rule corresponds to the common law “best evidence rule.”
See Hera v. McCormick, 625 A.2d 682 (Pa. Super. 1993).
[C]ommentators have [identified] four reasons justifying the rule.
(1) The exact words of many documents, especially operative or
dispositive documents, such as deeds, wills or contracts, are so
important in determining a party's rights accruing under those
documents.
(2) Secondary evidence of the contents of documents, whether
copies or testimony, is susceptible to inaccuracy.
(3) The rule inhibits fraud because it allows the parties to examine
the original documents to detect alterations and erroneous
testimony about the contents of the document.
____________________________________________
cannot be obtained by any available judicial process), and 1004(c) (excusing
the requirement of an original where the party against whom the original
would be offered had control of the original, was on notice that the original
would be a subject of proof at a trial or hearing, and failed to produce the
original at the trial or hearing).
Although no definitive test determines when a writing is related to a controlling
issue because a party must prove its contents, writings that are viewed as
“operative or dispositive” have usually been considered subject to the rule.
See Pa.R.E. 1002, cmt. Writings that merely evidence a transaction, thing,
or event are generally not subject to the rule. See id.; see also
Hamill-Quinlan, Inc. v. Fisher, 591 A.2d 309, 313 (Pa. Super. 1991).
Here, the Commonwealth offered the screenshots to prove Appellant’s
culpability in harassing and stalking Ms. Nesbitt. For this reason, as discussed
more fully below, we conclude that the screenshots were central to certain
controlling issues in the case and that the best evidence rule governed their
admission relevant to those issues at trial.
- 20 -
J-A21027-19
(4) The appearance of the original may furnish information as to
its authenticity.
Pa.R.E. 1002, cmt., quoting 5 Weinstein & Berger, Weinstein's Evidence
§ 1002(2) (Sandra D. Katz rev. 1994). This Court has also observed that, “in
light of the added importance that the fact-finder may attach to the written
word, it is better to have available the exact words of a writing, to prevent the
[erroneous transmission of] critical facts which accompanies the use of written
copies or recollection, and to prevent fraud.” Lewis, 623 A.2d at 358.
To recount, Appellant’s claim is that the best evidence rule required the
Commonwealth to produce original versions of the text messages or, failing
that, duplicate copies that accurately reproduced the originals. Appellant
contrasts the screenshots of Ms. Nesbitt’s telephone against full forensic
downloads such as those performed on Appellant’s cellular telephone.10
Appellant points out that while the forensic downloads showed the status of a
message (e.g. read or not read), the date and time the messages was read,
from whom and to whom the messages was sent (including the name and
telephone number), the source (e.g. iMessage), the name of the body file,
and the content of the message, screenshots of the text messages sent to Ms.
Nesbitt’s telephone omitted hyperlinks, metadata, and the content of certain
messages. See Appellant’s Brief at 23. Appellant’s position is that because
____________________________________________
10 Forensic downloads on Appellant’s cellular telephone failed to produce
evidence of text messages sent to Ms. Nesbitt or evidence showing that
Appellant was the sender of such text messages.
- 21 -
J-A21027-19
the screenshots omitted hyperlinks, metadata, and certain content found in
the original text messages, the screenshots do not fall within the definition of
an “original electronic document” since they cannot constitute a printout, or
other sight-readable output, that accurately reflected information found in
the source writing. See Appellant’s Brief at 23-24, citing Pa.R.E. 1001(d)
(definition of original writing). Appellant also argues that the same omissions
exclude the screenshots from the definition of “duplicates” since they did not
accurately reproduce the original text messages. See Appellant’s Brief at 24.
Because the screenshots did not qualify as either originals or duplicates of the
text messages, the trial court erred in admitting the screenshots, as well as
any content-related testimony.
In the alternative, Appellant argues that even if the challenged
screenshots qualified as duplicates, they nevertheless should not have been
admitted. Citing Pa.R.E. 1003 and the commentary to Rule 1002, Appellant
argues that genuine issues surrounding the authenticity of the original text
messages compel the conclusion that the screenshots were not admissible
duplicates. In questioning the authenticity of the original communications,
Appellant accuses Ms. Nesbitt of manipulating her pretrial statements to the
police to make her story more consistent with the idea that Appellant sent the
offending text messages. See Appellant’s Brief at 27, citing N.T. Trial,
7/23/18, at 185-186. Appellant also cites his own testimony as undermining
the Commonwealth’s theory that he began sending the messages only after
- 22 -
J-A21027-19
his relationship with Ms. Nesbitt ended. See Appellant’s Brief at 27. In view
of these genuine issues surrounding the source and authenticity of the original
messages, Appellant claims that information contained in the original texts
(such as hyperlinks, metadata, and certain content), but omitted from the
screenshots, could have proven that Appellant was not the sender. Under
these circumstances, Appellant concludes “it was fundamentally unfair for the
trial court to admit the screenshots in place of the original messages.”
Appellant’s Brief at 28.
The trial court held that the screenshots constituted “original writings”
within the definition of Rule 1001(d), which provides that originals of
electronically stored information include “any printout – or other output
readable by sight – [that] accurately reflects the information.” Trial Court
Opinion, 12/14/18, at 22, quoting Pa.R.E. 1001(d). The court considered the
original text messages to be electronically stored information which
represented data stored on the devices of both the sender and recipient, as
well as on the servers of the service providers. See Trial Court Opinion,
12/14/18, at 22. As such, the court determined that the screenshots of the
text messages received by Ms. Nesbitt were printouts of the electronic
communications she received, which fell within the definition of an original
writing under Rule 1001(d). See id.
The trial court also rejected Appellant’s claim that only access to full
downloads of the text messages received by Ms. Nesbitt, with accompanying
- 23 -
J-A21027-19
access to related metadata, would facilitate authentication of the screenshots
as accurate reproductions of original material. While the court acknowledged
that metadata might aid in verifying the source or sender of the messages,
the court expressed skepticism as to how the metadata could verify the
accuracy of the screenshots in depicting the content of the challenged
communications. See id. Here, the court noted Ms. Nesbitt’s testimony in
which she confirmed that the screenshots accurately reflected the messages
she received. This was in line with the trial court’s prior ruling on Appellant’s
motion in limine, in which the court said it would allow Ms. Nesbitt to
authenticate the messages she received but consider, on a
message-by-message basis, the factual basis for any opinion she rendered
about the identity of the sender of each message. See N.T., 7/20/18, at 10
(“generally, [the court believes] it is appropriate that the victim is permitted
to testify that she received these messages on her phone and she took a
photograph of them. [The court believes] that’s direct knowledge . . . if she
begins to offer opinions as to who the sender is, then we will deal with what
is the factual foundation that gives rise to that opinion . . . if there is a timely
objection to that.”). For these reasons, the court determined that the
omission of metadata from the printed screenshots did not preclude their
admission into evidence as originals pursuant to Pa.R.E. 1001(d) and 1002.
Finally, the trial court tacitly approved admission of the screenshots as
duplicates under Pa.R.E. 1003. The court acknowledged the diminishing role
- 24 -
J-A21027-19
of the best evidence rule as it applied to copies generated through advanced
technologies and improved methods of document reproduction. See Trial
Court Opinion, 12/14/18, at 22, quoting Pa.R.E. 1003, cmt. (“[Under the
traditional best evidence rule, copies of documents were not routinely
admissible.] This view dated back to the time when copies were made by
hand copying and were therefore subject to inaccuracy. On the other hand,
Pennsylvania courts have admitted copies made by techniques that are more
likely to produce accurate copies.”). Since the screenshots were generated as
digital photographs of the original text messages, a reliable form of
reproduction recognized in Rule 1001(e), the court suggested in the
alternative that the screenshots were properly admitted as duplicates under
Rule 1003.11 See Trial Court Opinion, 12/14/18, at 23.
____________________________________________
11 For its part, the Commonwealth disputes Appellant’s contention that the
screenshots did not accurately reproduce the original text messages because
of omitted hyperlinks, metadata, and content found in certain
communications. Instead, the Commonwealth concurs in the trial court’s
conclusions that the screenshots were admissible either as originals under
Rule 1002 or, alternatively, as duplicates under Rule 1003. See
Commonwealth’s Brief at 12-13. To support its position, the Commonwealth
cites the definition of “metadata” found in Blacks Law Dictionary, which states:
“[metadata includes] secondary data that organize[s], manage[s,] and
facilitate[s] the use of primary data.” Id. at 13, quoting Blacks Law Dictionary
(10th ed. 2014). The Commonwealth then classifies the text in a text message
as primary data (i.e. the writing) and the metadata as secondary data, which
it deems as “extrinsic information” related to the writing. See
Commonwealth’s Brief at 13. According to the Commonwealth, a screenshot
accurately represents the primary data (or original text message) even if it
does not capture extrinsic secondary information. Id. at 13-14. As such, a
screenshot is admissible as an original, since it constitutes a printout that
- 25 -
J-A21027-19
We conclude that the trial court neither erred nor abused its discretion
in admitting the screenshots. As a preliminary matter, the record confirms
that the Commonwealth properly authenticated the screenshots prior to
admission.12 Pennsylvania law holds that authentication is a threshold inquiry
____________________________________________
accurately reflects information, or as a duplicate, since it represents an
accurate copy produced by photographic means. Id. The Commonwealth
also argues that the screenshots were properly authenticated under
Pennsylvania law, which permits authentication of electronic messages
through circumstantial evidence, including testimony from a sender or
recipient and contextual clues in the communication tending to reveal the
identity of the sender. Id. at 15, citing Commonwealth v. Mangel, 181
A.3d 1154, 1160 (Pa. Super. 2018).
12 Effective October 1, 2020, a new provision of the Pennsylvania Rules of
Evidence, Pa.R.E. 901(b)(11) (governing authentication or identification of
digital evidence), will provide in relevant part:
Rule 901. Authenticating or identifying evidence
(a) In General. Unless stipulated, to satisfy the requirement of
authenticating or identifying an item of evidence, the proponent
must produce evidence sufficient to support a finding that the item
is what the proponent claims it is.
(b) Examples. The following are examples only—not a complete
list—of evidence that satisfies the requirement:
***
(11) Digital Evidence. To connect digital evidence with a
person or entity:
(A) direct evidence such as testimony of a person with
personal knowledge; or
(B) circumstantial evidence such as:
- 26 -
J-A21027-19
____________________________________________
(i) identifying content; or
(ii) proof of ownership, possession, control, or access to a
device or account at the relevant time when corroborated by
circumstances indicating authorship.
Pa.R.E. 901(b)(11) has no counterpart in the Federal Rules of
Evidence. “Digital evidence,” as used in this rule, is intended to
include a communication, statement, or image existing in an
electronic medium. This includes emails, text messages, social
media postings, and images. The rule illustrates the manner in
which digital evidence may be attributed to the author.
The proponent of digital evidence is not required to prove that no
one else could be the author. Rather, the proponent must produce
sufficient evidence to support a finding that a particular person or
entity was the author. See Pa.R.E. 901(a).
Direct evidence under Pa.R.E. 901(b)(11)(A) may also include an
admission by a party-opponent.
Circumstantial evidence of identifying content under Pa.R.E.
901(b)(11)(B)(i) may include self-identification or other
distinctive characteristics, including a display of knowledge only
possessed by the author. Circumstantial evidence of content may
be sufficient to connect the digital evidence to its author.
Circumstantial evidence of ownership, possession, control, or
access to a device or account alone is insufficient for
authentication of authorship of digital evidence under Pa.R.E.
901(b)(11)(B)(ii). See, e.g., Commonwealth v. Mangel, 181
A.3d 1154, 1163 (Pa. Super. 2018) (social media account bearing
defendant's name, hometown, and high school was insufficient to
authenticate the online and mobile device chat messages as
having been authored by defendant). However, this evidence is
probative in combination with other evidence of the author's
identity.
Expert testimony may also be used for authentication purposes.
See, e.g., Commonwealth v. Manivannan, 186 A.3d 472 (Pa.
Super. 2018).
- 27 -
J-A21027-19
for all evidence and provides that the following principles govern
authentication of digital communications such as text messages.
Pursuant to Pennsylvania Rule of Evidence 901, authentication is
required prior to admission of evidence. The proponent of the
evidence must introduce sufficient evidence that the matter is
what it purports to be. See Pa.R.E. 901(a). Testimony of a
witness with personal knowledge that a matter is what it is claimed
to be can be sufficient. See Pa.R.E. 901(b)(1). Evidence that
cannot be authenticated by a knowledgeable person, pursuant to
subsection (b)(1), may be authenticated by other parts of
subsection (b), including circumstantial evidence pursuant to
subsection (b)(4). See Pa.R.E. 901(b)(4).
Pennsylvania appellate courts have considered the authentication
of computerized instant messages and cell[ular tele]phone text
messages. See In the Interest of F.P., a Minor, 878 A.2d 91,
96 (Pa. Super. 2005) (computerized instant messages);
Commonwealth v. Koch, 39 A.3d 996, 1005 (Pa. Super. 2011),
affirmed by an equally divided court, 106 A.3d 705 (Pa. 2014)
(cell phone text messages)[.]
[In Koch, this Court held that text messages are documents and
subject to the same requirements for authenticity as
non-electronic documents generally. Koch, 39 A.3d at 1004
(citations omitted). The Koch Court additionally observed that
“electronic writings typically show their source, so they can be
authenticated by contents in the same way that a communication
by postal mail can be authenticated.” Id. at 1003. The panel in
Koch was mindful, however, of the difficulty with establishing
authorship of text message in certain cases. Because more than
one individual can access an electronic device without permission,
the Koch Court ruled, “authentication of electronic
communications, like documents, requires more than mere
confirmation that the number or address belonged to a particular
person. Circumstantial evidence, which tends to corroborate the
identity of the sender, is required.” Id. at 1005.]
____________________________________________
Pa.R.E. 901(b)(11) and cmt. (effective October 1, 2020).
- 28 -
J-A21027-19
Commonwealth v. Mangel, 181 A.3d 1154, 1160 (Pa. Super. 2018). The
Commonwealth must provide sufficient evidence from which a factfinder could
reasonably ascertain the authenticity of the records (i.e. identity of the sender
and confirmation that the document is what it purports to be) by a
preponderance of the evidence. See id. at 1161.
The Commonwealth offered sufficient direct and circumstantial evidence
to establish the authenticity of the screenshots. Ms. Nesbitt, as the recipient
of the text messages depicted in the screenshots, offered direct authenticating
testimony in which she confirmed that the screenshots accurately reflected
the messages she received. See Mangel, 181 A.3d at 1162 (recognizing
recipient or sender testimony as direct evidence of authenticity). In addition,
the Commonwealth proffered circumstantial evidence that identified Appellant
as the sender of the messages. Ms. Nesbitt testified that she never received
harassing test messages before terminating her relationship with Appellant.
N.T. Trial, 7/23/18, at 82. Ms. Nesbitt also testified that she received a
harassing text message stating that the sender was observing her in a
restaurant and police officials were later able to determine that an application
installed on her cellular telephone was sharing her location with an individual
named “Daniel Talley.” Id. at 86-89. In addition, the text messages received
by Ms. Nesbitt referred to specific sexual acts that occurred during intimate
moments in the relationship between Appellant and Ms. Nesbitt. Id. at
123-124. Apart from Ms. Nesbitt, only Appellant possessed knowledge of
- 29 -
J-A21027-19
those acts. Id. The text messages received by Ms. Nesbitt also included
phrases such as “fake love,” an idiom commonly used by Appellant. Id. at
133-134. Lastly, police officials uncovered software on Appellant’s computer
that enabled him to send anonymous text messages. N.T. Trial, 7/24/18, at
306-309. In sum, the Commonwealth introduced direct testimony showing
that the screenshots accurately reflected the text messages Ms. Nesbitt
received. In addition, the Commonwealth produced circumstantial evidence
linking Appellant to the messages received by Ms. Nesbitt, including
Appellant’s access to a device capable of sending anonymous text messages,
displays of knowledge known only to Appellant and Ms. Nesbitt, and the use
of distinct linguistic phrases commonly used by Appellant. The
Commonwealth therefore met its burden of authenticating the screenshots.
Having concluded that the Commonwealth properly authenticated the
screenshots, we turn now to Appellant’s claim that the best evidence rule
nevertheless barred their use at trial because they omitted certain features
contained in the original text messages. Pertinent to this question, this Court
has previously observed that:
“Nevertheless[, the best evidence rule embodied at Pa.R.E. 1002]
is applicable only in circumstances where the contents of the
writing, recording or photograph are integral to proving the
central issue in a trial[.] Consequently, if the Commonwealth is
introducing a writing, recording, or photograph at trial, Rule 1002
requires that the original be introduced only if the Commonwealth
must prove the contents of the writing, recording or photograph
to establish the elements of its case.” [Commonwealth v.
Fisher, 764 A.2d 82, 88 (Pa. Super. 2000) (“The best evidence
rule is controlling only if the terms of [the proposed evidence]
- 30 -
J-A21027-19
must be proved to make a case or provide a defense[.]”) (citation
omitted), appeal denied, 759 A.2d 385 (Pa. 2000)]. “The rule is
not implicated just because evidence is relevant;” the rule applies
if the writing, recording, or photograph is necessary to prove the
elements of a case. [Commonwealth v. Townsend, 747 A.2d
376, 380-381 (Pa. Super. 2000)]. In other words, the content of
the video must be material to, and not just mere evidence of, the
issues at bar for the best evidence rule to apply. [Lewis, 623
A.2d at 358.] “If the Commonwealth does not need to prove the
content of the writing or recording to prove the elements of the
offense charged, then the Commonwealth is not required to
introduce the original writing or recording.” Commonwealth v.
Dent, 837 A.2d 571, 590 (Pa. Super. 2003)[;] see also Fisher,
supra ([no] violation of best evidence rule occurs with admission
of duplicate tape recordings of defendant's taunting voice mail
messages, where tapes did not establish fundamental components
of any offenses charged); Townsend, supra ([no] violation of
best evidence rule occurred where trial court allowed detective to
testify regarding content of defendant's written confession, even
though written confession was not admitted into evidence;
content of confession made persuasive evidence for
Commonwealth's case but was not necessary to establish
elements of crimes of burglary and assault, which had no elements
requiring proof of content of confession or any other writing). The
Comment to Rule 1002 suggests “recordings and photographs are
usually only evidence of the transaction, thing or event. It is rare
that a recording or photograph would be operative or
dispositive[.]” Pa.R.E. 1002, [cmt].
Commonwealth v. Green, 162 A.3d 509, 518-519 (Pa. Super. 2017) (en
banc).
Because Appellant’s claims surrounding the features omitted from the
screenshots implicate only the identity of the individual who sent the
messages, and not the accuracy with which the screenshots depicted the
contents of the original communications, we conclude that Appellant’s claims
fall outside the scope of the best evidence rule. We explain.
- 31 -
J-A21027-19
The gravamen of the Commonwealth’s case against Appellant alleged
that he harassed and stalked Ms. Nesbitt by sending her volumes of
threatening text messages. Because those messages were the basis of the
charges leveled by the Commonwealth against Appellant, the Commonwealth
needed to prove that the “substantive content”13 of the messages established
the elements of the charged offenses. To prove the substantive content of
the messages, the Commonwealth introduced the screenshots at trial.
Moreover, because the content of the original messages was an essential
component in a successful prosecution of Appellant, the Commonwealth, as
the proponent of the screenshots, needed to demonstrate the admissibility of
the screenshots under the best evidence rule. Insofar as the screenshots were
introduced to establish the substantive content of the original text messages,
we agree with the trial court that the screenshots were admissible, either as
authenticated printouts of the original electronic text messages under Pa.R.E.
1001(d), or as authenticated duplicates generated through a photographic
process that accurately reproduced the original messages within the
contemplation of Pa.R.E. 1001(e).
Although Appellant repeatedly takes aim at “genuine issues of
authenticity” involving the original text messages and the resultant unfairness
____________________________________________
13 We employ the term “substantive content” to refer to the content of the
original text messages received by Ms. Nesbitt separate and apart from the
hyperlinks, metadata, and limited portions of text that were omitted from the
screenshots.
- 32 -
J-A21027-19
of admitting the screenshots as originals or as duplicates in their place, in
point of fact Appellant’s challenge is wholly focused on the potential probative
value of the omitted features in showing the source of the offending
communications.14 Appellant does not claim that omissions in the screenshots
lead to inaccuracies in their depiction of the substantive content of the original
text messages. In addition, Appellant does not allege that the omitted
features rendered the screenshots incapable of showing that the original
communications established the elements of the charged offenses. Most
importantly, Appellant does not claim that the hyperlinks, metadata, and other
content found in the original text messages, but omitted from the screenshots,
were material or essential in proving the identity of the individual who
authored or sent the text messages. Put differently, Appellant does not allege
that either he or the Commonwealth needed to prove the content of the
original text messages in order to show who sent the original communications.
Instead, Appellant’s claim is only that the omitted features may have
facilitated an assessment of the authorship of the messages and, therefore,
may have some relevance in determining the identity of the sender. While
Appellant may be correct that the omitted features possessed some probative
value in identifying the author of the original communications, he has not
____________________________________________
14 As we stated above, the Commonwealth properly authenticated the
screenshots by introducing direct and circumstantial evidence to show that
they were what they purported to be and that they could be linked to Appellant
as the author and sender of the communications.
- 33 -
J-A21027-19
alleged, much less shown, that the content of those communications was
essential in proving who sent the messages. In the absence of such a
showing, the original messages, along with the hyperlinks, metadata, and
other content omitted from the screenshots, possessed only potential
relevance concerning the messages sent to Ms. Nesbitt. The best evidence
rule is triggered, however, only when the contents of a writing are essential,
not merely relevant, in proving a claim or defense. See Townsend, 747 A.2d
at 380-381. As such, the trial court did not violate the best evidence rule in
admitting the screenshots. Accordingly, Appellant is not entitled to relief.
Judgment of sentence affirmed.
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 7/17/20
- 34 -