People v. Brand

2021 IL 125945 IN THE SUPREME COURT OF THE STATE OF ILLINOIS (Docket No. 125945) THE PEOPLE OF THE STATE OF ILLINOIS, Appellee, v. CROSETTI BRAND, Appellant. Opinion filed November 18, 2021. JUSTICE CARTER delivered the judgment of the court, with opinion. Chief Justice Anne M. Burke and Justices Garman, Theis, Neville, Michael J. Burke, and Overstreet concurred in the judgment and opinion. OPINION ¶1 Following a Cook County bench trial, defendant was found guilty of aggravated domestic battery, home invasion, and possession of a stolen or converted motor vehicle. Defendant was sentenced to concurrent prison terms of 16 years for home invasion and 3 years for possession of a stolen or converted motor vehicle. The appellate court affirmed defendant’s conviction and remanded the cause for a preliminary hearing under People v. Krankel, 102 Ill. 2d 181 (1984). 2020 IL App (1st) 171728. ¶2 On appeal before this court, defendant raises two issues: (1) whether the trial court erred by admitting evidence regarding the contents of messages allegedly sent by defendant to the victim via Facebook Messenger and (2) whether the State failed to prove him guilty beyond a reasonable doubt of possession of a stolen or converted motor vehicle. ¶3 We affirm the appellate court’s judgment. ¶4 I. BACKGROUND ¶5 Defendant, Crosetti Brand, was charged with two counts of home invasion (720 ILCS 5/19-6(a)(3) (West 2014)), one count of aggravated domestic battery (id. § 12-3.3(a-5)), and one count of possession of a stolen or converted motor vehicle (625 ILCS 5/4-103(a)(1) (West 2014)). The charges stemmed from an incident that occurred on November 3, 2015, when defendant allegedly forced his way into the apartment of his former girlfriend, Anita Shannon, attacked Shannon and threatened her 15-year-old son, M.B., and fled in Shannon’s Kia Sedona. ¶6 The case proceeded to a bench trial on January 31, 2017. At trial, Shannon testified that defendant was her ex-boyfriend and that they dated for about two years, until she ended the relationship on October 30, 2015. On November 3, 2015, four days after she ended the relationship, defendant went to her place of employment to speak with her. Shannon told defendant that she did not want to talk to him anymore. ¶7 Later that evening, at about 7:15 p.m., Shannon was in her apartment preparing dinner for her four children when defendant knocked on the door. She opened the door about six inches and told defendant that she no longer wanted to be with him. Defendant told her that she needed “to come [sic] with a better answer than that.” Shannon closed the door. ¶8 Defendant knocked on the door again. Shannon reopened the door just enough to “peek out” and told defendant that, if he did not leave her alone, she would call the police. Defendant then pushed the door open, entered the apartment, locked the -2- door behind him, and put a gun to Shannon’s chin. Defendant grabbed Shannon by the shirt collar, pushed her up against the wall next to the bathroom door, and began choking her. ¶9 Shannon’s 15-year-old son, M.B., stepped forward and asked defendant what he was doing. Defendant told M.B. to “get back” and pointed the gun at him. Defendant eventually dragged Shannon into M.B.’s room, banged her head against a dresser, threw her to the ground, and then ran into Shannon’s bedroom. After defendant ran into Shannon’s bedroom, she heard keys jiggling. Defendant exited the bedroom and fled the apartment. Shannon got up and locked the door behind him. She looked out the window and saw that her car, a 2014 Kia Sedona, was gone. She then called 911. ¶ 10 On November 8, 2015, Shannon received a message from a person named “Masetti Meech” on Facebook Messenger. Shannon explained that “Masetti Meech” was a name that defendant used when he communicated with her on Facebook Messenger while they were dating. Accordingly, Shannon believed that when communicating via Facebook Messenger with Masetti Meech on November 8, 2015, she was actually communicating with defendant. ¶ 11 In the November 8 message, Masetti Meech told Shannon the location on 64th Street where she could recover her 2014 Kia Sedona. Shannon subsequently went to that location and retrieved her vehicle using a spare key. The State did not introduce a copy of the November 8 Facebook Messenger message into evidence because Shannon had deleted it once her “mailbox [got] full.” ¶ 12 On November 21, 2015, Shannon received another message from Masetti Meech via Facebook Messenger, a photograph of which was admitted into evidence. Shannon read the contents of the message into evidence: “This is just the beginning. Only if you know what’s lined up for your people as well. 79, 37, 71st, 39, 42, workplace, 79 is today. I’m coming in from back way. See your brother and OG. Bullets don’t have name on them. I will see you soon. I love the waiting game. I parked up and watch and wait. Your son not going to see 16. I see him at school.” -3- Shannon testified that the numbers listed in the November 21 message referred to addresses where she and her relatives either lived or worked. ¶ 13 Defense counsel objected to Shannon’s testimony about both Facebook Messenger messages, arguing that they were irrelevant and lacked foundation. The court overruled the objections, stating that “[Shannon] knows the defendant by the nickname of Masetti Meech, whatever it is, a nickname or otherwise. She got a text from him on that day on Facebook or whatever, and that’s what he supposedly sent her.” A photograph of the November 21 message was admitted into evidence, again over the objection of defense counsel. ¶ 14 Shannon further testified that, on November 24, 2015, she and her brother saw defendant walking on 39th Street near her brother’s building. Shannon called 911, and her brother flagged down a police officer. ¶ 15 Later, on November 24, 2015, Shannon went to the police station and spoke with a detective, who showed her a bag containing the car keys that defendant took from her bedroom. The keys were found when the police searched defendant while taking him into custody. A photograph of the bag’s contents was admitted into evidence over defense counsel’s objection. ¶ 16 M.B. testified that he lives with his mother, Shannon, and his three brothers and sisters. At about 7:15 p.m. on November 3, 2015, M.B. was in his bedroom when he heard a door slam and then saw defendant choking his mother in the hallway outside of his room. M.B. walked toward defendant, who then pointed a gun at M.B. and said, “Is this what you want?” ¶ 17 According to M.B., defendant put the gun underneath his mother’s chin and dragged her into M.B.’s bedroom. Defendant shoved his mother to the floor and went into her bedroom and retrieved her car keys. Defendant then left the apartment. M.B. called 911 and handed the phone to his mother to speak to the operator. M.B. looked out the window and saw that his mother’s car was gone. ¶ 18 On cross-examination, M.B. testified that he was at home when the police arrived in response to the 911 call but that he did not speak with the officers that evening. M.B. spoke with the officers a week later, on November 10, and told them what he saw. -4- ¶ 19 Officer Steve Austin testified that he arrested defendant at about 3:30 p.m. on November 24, 2015. A custodial search was performed on defendant, and personal property was taken from him and placed in a personal property bag. Officer Austin identified three photographs of a personal property bag as depicting the bag that contained the items recovered from defendant during his custodial search. Officer Austin did not state what the items were. ¶ 20 On cross-examination, Officer Austin admitted that he did not perform the custodial search of defendant and he did not remember whether he was present during the search. On redirect examination, Officer Austin stated that a custodial search is performed during “all arrests.” On recross-examination, Officer Austin stated that he did not know who performed the custodial search. ¶ 21 Defendant did not call any witnesses. The parties stipulated that Officer Donald Smith, who responded to the 911 call on November 3, 2015, would have testified that he created a case incident report based on what Shannon told him that night. Shannon told him that, when defendant entered her apartment, he pulled out a silver object that she believed to be a gun and hit her in the head with it. She witnessed defendant subsequently get into her car and drive away. The report does not mention any statement by Shannon that defendant pushed her head into a drawer or pointed his gun at her son, M.B. ¶ 22 The trial court convicted defendant on all counts. In finding defendant guilty of home invasion, the court ruled that the State did not prove beyond a reasonable doubt that defendant was armed at the time, as required for a conviction under section 19-6(a)(3) of the home invasion statute (720 ILCS 5/19-6(a)(3) (West 2014)). Instead, the court found that the State proved defendant’s guilt under section 19-6(a)(2), which only required that defendant intentionally injured the victim within the apartment, regardless of whether a firearm was involved. See id. § 19-6(a)(2). ¶ 23 Defendant filed a posttrial motion for a new trial. Prior to the hearing on his motion for a new trial, defendant informed the court that he wanted to file a pro se motion alleging that his counsel was ineffective. The court informed defendant that “you can file whatever you’d like to file and I will set it for a Krankel [(102 Ill. 2d 181)] hearing,” but no Krankel hearing was ever held. -5- ¶ 24 The trial court denied defendant’s motion for a new trial and sentenced him to 16 years of imprisonment for home invasion (merged with aggravated domestic battery) to be served concurrently with 3 years of imprisonment for possession of a stolen or converted motor vehicle. However, the sentencing order incorrectly stated that defendant was convicted of home invasion under section 19-6(a)(3). ¶ 25 The court also entered an order of protection on behalf of the victim against defendant, set to expire two years after defendant’s release from prison. Defendant appealed. ¶ 26 On appeal, defendant contended that (1) the trial court erred by admitting evidence regarding the contents of two messages that he allegedly sent to the victim via Facebook Messenger, (2) the State failed to prove him guilty beyond a reasonable doubt of possession of a stolen or converted motor vehicle, (3) the trial court erred by admitting photographs of the victim’s car keys allegedly recovered from defendant and inventoried by the police, when the State failed to present a sufficient chain of custody, (4) the court erred by failing to conduct an inquiry under Krankel, 102 Ill. 2d 181, regarding his posttrial allegations of ineffective assistance of counsel, (5) the court erroneously considered improper factors during sentencing, (6) the order of protection should be vacated because it was entered in contravention of the statutory requirements, and (7) the mittimus should be corrected to accurately reflect that he was convicted of home invasion under section 19-6(a)(2) of the Criminal Code of 2012 (Criminal Code) (720 ILCS 5/19-6(a)(2) (West 2014)) instead of under section 19-6(a)(3) (id. § 19-6(a)(3)). ¶ 27 The appellate court affirmed defendant’s convictions and sentence. 2020 IL App (1st) 171728. The appellate court found sufficient foundation for admitting the messages the victim testified to receiving from “Masetti Meech” via Facebook Messenger. The appellate court also found that proof of intent to permanently deprive the victim of her car was not required because defendant was charged with conversion or theft. It was sufficient that the victim testified that defendant broke into her residence, committed assault, stole her car keys, and took her car. She found the car five days later based on a message she received via Facebook Messenger from an account previously used by defendant. A little more than two weeks later, a message from the same account threatened her family members, using address information only defendant would have known. Police also found -6- defendant in possession of the victim’s car keys when he was arrested near her brother’s workplace. Because the trial court failed to hold a Krankel hearing on defendant’s ineffective assistance of trial counsel claim, the State agreed a hearing was necessary, and the appellate court remanded the cause for a preliminary Krankel hearing. The appellate court also corrected the mittimus on agreement of the parties. 2020 IL App (1st) 171728. This court allowed defendant’s petition for leave to appeal. Ill. S. Ct. R. 315 (eff. Oct. 1, 2019). ¶ 28 II. ANALYSIS ¶ 29 Defendant raises two issues on appeal before this court: (1) whether the trial court erred by admitting evidence regarding the contents of two messages that he allegedly sent to the victim via Facebook Messenger and (2) whether the State failed to prove him guilty beyond a reasonable doubt of possession of a stolen or converted motor vehicle. We examine each issue in turn. ¶ 30 A. Admissibility of Facebook Messages ¶ 31 Initially, the State argues that defendant forfeited any authentication argument concerning the Facebook Messenger messages by not objecting at trial or including the argument in a posttrial motion. Defendant contends that his general objection to the admission of the messages was sufficient to avoid forfeiture. We begin by addressing the State’s argument that defendant forfeited any argument concerning the State’s authentication of the messages. ¶ 32 A “defendant must both specifically object at trial and raise the specific issue again in a posttrial motion to preserve any alleged error for review.” People v. Woods, 214 Ill. 2d 455, 470 (2005); see also Ill. R. Evid. 103(a)(1) (eff. Oct. 15, 2015) (an objection must “stat[e] the specific ground of the objection”). When a defendant fails to satisfy either requirement, he forfeits his challenge on appeal. Woods, 214 Ill. 2d at 470. “This rule is particularly appropriate when a defendant argues that the State failed to lay the proper technical foundation for the admission of evidence, and a defendant’s lack of a timely and specific objection deprives the State of the -7- opportunity to correct any deficiency in the foundational proof at the trial level.” Id. ¶ 33 The appellate court reviewed the State’s forfeiture argument, finding as follows: “Review of the record indicates that there was no forfeiture here. When the State began questioning Ms. Shannon about the November 8 Facebook Message from Masetti Meech, defendant immediately voiced a general objection, which the trial court overruled. When the State subsequently began questioning Ms. Shannon about the November 21 Facebook message from Masetti Meech, defendant immediately stated that he was ‘going to object to relevance’ and ‘foundation as well.’ The trial court overruled the objection, stating, ‘She got a message from Masetti Meech. She knows him by the name on her Facebook account.’ Defendant subsequently argued in his posttrial motion that the court erred in admitting evidence of the November 8 and November 21 Facebook messages over his objections. The trial court denied the posttrial motion.” 2020 IL App (1st) 171728, ¶ 26. ¶ 34 After reviewing the record, the appellate court concluded that the trial court was made aware of defendant’s claim that the Facebook messages were not properly authenticated because there was insufficient evidence that they actually came from him but that the trial court rejected that claim on the basis of Shannon’s testimony that defendant previously used the name “Masetti Meech” when messaging her on Facebook Messenger. Accordingly, the appellate court held that “[w]here, as here, the trial court clearly had the opportunity to review the same essential claim that is later raised on appeal, there is no forfeiture. People v. Heider, 231 Ill. 2d 1, 18 (2008).” Id. ¶ 27. We agree with the appellate court that defendant did not forfeit his argument concerning the State’s authentication of the messages. ¶ 35 We now address defendant’s argument that the November 8 and November 21 messages were not properly authenticated. Defendant argues that the lower courts ignored the unique authentication problems social media posts present due to the potential for hacking an account, gaining unauthorized access in other ways, or creating new fraudulent accounts. Defendant suggests these issues demand a higher standard for laying a foundation for digital messages requiring proof that defendant (1) actually controlled the account used and (2) actually sent the message. The State -8- counters that messages sent via Facebook Messenger are subject to the same authentication requirements as any other documentary evidence. ¶ 36 The admissibility of evidence is within the sound discretion of the trial court and will not be disturbed absent an abuse of discretion. People v. Taylor, 2011 IL 110067, ¶ 27. An abuse of discretion occurs when the trial court’s decision is arbitrary, fanciful, or unreasonable or when no reasonable person would agree with the trial court’s position. People v. Becker, 239 Ill. 2d 215, 234 (2010). The Illinois Rules of Evidence govern the admissibility of evidence in proceedings in the courts of Illinois, with limited exceptions not applicable here. See Ill. R. Evid. 101 (eff. Jan. 6, 2015); see also Ill. R. Evid. 402 (eff. Jan. 1, 2011) (relevant evidence is generally admissible). The Illinois Rules of Evidence provide that authentication as a “condition precedent” to the admissibility of evidence is satisfied “by evidence sufficient to support a finding that the matter in question is what its proponent claims.” Ill. R. Evid. 901(a) (eff. Jan. 1, 2011). ¶ 37 Illinois Rule of Evidence 901(b) provides “examples of authentication or identification conforming with the requirements of [Rule 901].” Ill. R. Evid. 901(b) (eff. Jan. 1, 2011). At the time of defendant’s bench trial in January 2017, example (4) of Rule 901(b) stated: “Distinctive Characteristics and the Like. Appearance, contents, substance, internal patterns, or other distinctive characteristics taken in conjunction with circumstances.” Ill. R. Evid. 901(b)(4) (eff. Jan. 1, 2011). ¶ 38 This court amended example (4) of Rule 904(b), effective September 17, 2019, adding “including those that apply to the source of an electronic communication” after the phrase “or other distinctive characteristics.” Gino L. DiVito opined in his author’s commentary on the 2019 amendment to Rule 901(b) and its subdivisions: “Until that revision, no evidence rule had specifically addressed authentication of electronic communications such as text messages, emails, and social media sites. Before the amendment, Rule 901(b)(4), which provides circumstantial evidence of authenticity based on ‘distinctive characteristics,’ was nevertheless the go-to rule for a trial court’s determination of an electronic communication’s authenticity. But the supreme court’s amendment now makes it clear that such communications are subject to the rule. The court recognizes the impact of -9- rapidly evolving technology on the admissibility of evidence and the need for the rules to keep pace. The amendment makes explicit what previously was implicit.” Gino L. DiVito, The Illinois Rules of Evidence: A Color-Coded Guide 292 (2021), https://www.tdrlawfirm.com/assets/downloads/Illinois_Rules_of_ Evidence_Color-Coded_Guide.pdf [https://perma.cc/QLS3-XEX8]. ¶ 39 Other evidentiary treatises have also acknowledged that e-mail messages, text messages, information from social media, and websites “may be authenticated through various traditional common law methods such as the reply doctrine, distinctive characteristics, chain of custody,” or another process or system that ensures “the accuracy of the message and the identity of the sender.” Michael H. Graham, Handbook of Illinois Evidence § 901.9, Commentary, at 1220 (2021 ed.); see also, Graham, supra, § 901.4, Commentary (collecting cases); John H. Wigmore, Evidence § 2130, at 1338 (Supp. IV 2021) (“[A]uthentication of electronic communications such as emails, text messages, and social media posts and messages. For each of these categories, courts have required some evidence of genuineness to provide a foundation for authentication, emphasizing that electronic communications are no more self-authenticating than other comparable documents.”). ¶ 40 Although the 2019 amendment to example (4) of Rule 901(b) was not available at the time of defendant’s 2017 bench trial, the amendment merely clarified what was already implicit—that electronic communications are subject to the rule. Before the adoption of Rule 901 in 2011, Illinois case law had long recognized these same principles of authentication by use of circumstantial evidence, including factors such as appearance, contents, and substance. See People v. Towns, 157 Ill. 2d 90, 104 (1993). As we have explained, reliability may be established when a witness testifies as to the distinctive characteristics of the electronic communication as a foundational basis for proving the source of the electronic communication. See, e.g., People v. Caffey, 205 Ill. 2d 52, 95 (2001) (“Reliability may be established when the witness testifies that when he or she received telephone calls, the witness checked the caller ID and that the same number always appeared for the same caller.”). Subsequent to the adoption of Rule 901, our appellate court has recognized authentication factors that support the admissibility of electronic and social media communications. See, e.g., People v. Diomedes, 2014 IL App (2d) 121080, ¶¶ 17-19 (citing Rule 901(b)(4) in holding that authentication requirements - 10 - for the admissibility of an e-mail message may be satisfied when the contents of the document, in conjunction with other circumstances, reflect distinctive characteristics and that there is no obligation to prove that the IP address from which the e-mail was sent was connected to the defendant); and People v. Walker, 2016 IL App (2d) 140566 (applying Rule 901(b)(4) to establish circumstantial evidence that the defendant arranged or was accountable for a fourth drug sale where text messages involving a phone number used by an undercover officer to receive and make calls to the defendant and buy drugs from him on three prior occasions before using only text messages for the fourth drug purchase). ¶ 41 Here, the parties agree that evidence of a message sent via Facebook Messenger is admissible as documentary evidence. Indeed, they acknowledge that our appellate court has treated social media messages as documentary evidence for admissibility purposes, despite the digital nature. See, e.g., People v. Curry, 2020 IL App (2d) 180148, ¶¶ 55-56; People v. Kent, 2017 IL App (2d) 140917, ¶ 86. The parties simply disagree whether, under the facts of this case, the trial court abused its discretion in admitting the evidence. ¶ 42 Here, the appellate court found Kent informative. In Kent, the defendant was charged with first degree murder of the victim, who was shot in the driveway of his residence. Kent, 2017 IL App (2d) 140917, ¶¶ 3-4. At trial, a detective testified that, the day after the murder, he searched Facebook and found a profile under the name “ ‘Lorenzo Luckii Santos’ ” that contained a photograph of a person resembling the defendant. Id. ¶ 57. The Santos Facebook profile contained a post reading “ ‘its my way or the highway.....leave em dead n his driveway.’ ” Id. The detective testified that the profile name “ ‘Lorenzo Luckii Santos’ ” was “ ‘associated’ ” with this post, and he printed a screenshot of it. Id. The detective provided no testimony concerning when the post was created, but he testified that the post was deleted later that same day. Id. ¶ 43 The defendant in Kent objected to the Facebook evidence, arguing that the State failed to provide sufficient authentication. Id. ¶ 58. The trial court overruled the objection, finding that the Facebook post was sufficiently authenticated with the profile name, the photograph of the person resembling defendant, and the statement about leaving someone “ ‘dead n his driveway.’ ” Id. ¶¶ 57-58. - 11 - ¶ 44 The defendant appealed, arguing that the trial court abused its discretion in admitting the Facebook post, as it was not properly authenticated. Id. ¶ 66. The appellate court in Kent noted that “ ‘ “[t]he authentication of social media poses unique issues regarding what is required to make a prima facie showing that the matter is what the proponent claims.” ’ ” Id. ¶ 105 (quoting Smith v. State, 2012- CT-00218-SCT (¶ 19) (Miss. 2014), quoting Nathan Petrashek, The Fourth Amendment and the Brave New World of Online Social Networking, 93 Marq. L. Rev. 1495, 1506 (2010)). The appellate court in Kent reasoned that “concern over authentication arises because anyone can create a fictitious account and masquerade under another person’s name or can gain access to another’s account by obtaining the user’s username and password, and consequently, the potential for fabricating or tampering with electronically stored information on a social networking website is high and poses challenges to authenticating printouts from the website.” Id. ¶ 106. Citing Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. 2012)), a Texas case that surveyed cases addressing the authentication of various forms of electronically stored information, the appellate court in Kent held that the following factors were relevant for determining whether a social media post was properly authenticated: “(1) the purported sender admits authorship, (2) the purported sender is seen composing the communication, (3) business records of an Internet service provider or cell phone company show that the communication originated from the purported sender’s personal computer or cell phone under circumstances in which it is reasonable to believe that only the purported sender would have had access to the computer or cell phone, (4) the communication contains information that only the purported sender could be expected to know, (5) the purported sender responds to an exchange in such a way as to indicate circumstantially that he was in fact the author of the communication, or (6) other circumstances peculiar to the particular case may suffice to establish a prima facie showing of authenticity.” Kent, 2017 IL App (2d) 140917, ¶ 118. ¶ 45 The appellate court in Kent noted that these examples “are intended only as a guide” and that “ ‘[e]vidence may be authenticated in many ways, and as with any piece of evidence whose authenticity is in question, the “type and quantum” of - 12 - evidence necessary to authenticate a web page will always depend on context.’ ” Id. ¶ 119 (quoting United States v. Vayner, 769 F.3d 125, 133 (2d Cir. 2014)). ¶ 46 In Kent, the appellate court noted that the State offered neither direct nor circumstantial proof of authentication. Id. ¶ 103. The defendant did not admit making the post or creating the Facebook profile, and nobody saw him composing the post. Id. At the pretrial hearing, the State represented that the computer from which the Facebook post originated would have an Internet protocol (IP) address belonging to defendant’s girlfriend, but no such evidence was presented at trial. Id. The State offered no evidence that any of the information in the Facebook post “was known or available only to defendant or, at the very least, to a small group of people including defendant.” Id. ¶ 116. Also, “the State offered no evidence that defendant ever accessed Facebook or even used the Internet. At best, the photograph and the name on the Facebook profile are about defendant and not evidence that defendant himself had created the post or was responsible for its contents.” (Emphasis in original.) Id. ¶ 111. Accordingly, the appellate court in Kent held that, without some basis from which a reasonable juror could conclude that the Facebook post was “not just any Internet post but was, in fact, created by defendant or at his direction,” the trial court abused its discretion by admitting the Facebook post and the detective’s testimony. Id. ¶ 119. ¶ 47 More recently, in Curry, 2020 IL App (2d) 180148, the appellate court considered whether the trial court abused its discretion in admitting Facebook records as self-authenticating business records. The defendant in Curry was charged with criminal sexual assault. Id. ¶ 1. Before trial, the State moved in limine to admit, as self-authenticating business records, messages sent through Facebook from defendant to the victim. Id. ¶ 7. The trial court found that the Facebook messages were admissible to show only “ ‘where [the messages] came from and where they went to.’ ” Id. The message content would require victim authentication “ ‘pertaining to [the conversations].’ ” Id. ¶ 48 At trial, the victim in Curry testified that the defendant was a friend of her mother and cousin and that she awoke with defendant on top of her and his penis was inside her vagina. She got up and ran to the bathroom and told defendant he was not supposed to be in her bedroom. Id. ¶ 8. The victim ran to her mother’s - 13 - room, woke her up, and told her about the incident, and the police were called. Id. ¶ 9. ¶ 49 The victim in Curry further testified that she had a Facebook account for about four years and was a “ ‘Facebook friend’ ” with defendant for about two years. Id. ¶ 10. Before the sexual assault, the victim and the defendant had used their phone Facebook Messenger application to communicate. She was familiar with defendant’s Facebook messages because they included his name and his photo. Defendant also called the victim by her nickname, and they discussed mutually familiar topics. Id. According to the victim, she received several Facebook messages from the defendant before the incident, and she did not respond because she was asleep. After the incident, while police were transporting the victim for a sexual-assault examination, defendant sent another message telling her not to sign a complaint, adding that she would never see him again and that he would never bother her again if she would say that her report was false. The victim sent the defendant several messages asking why he was in her bed and had pulled down her pants. Id. ¶ 11. ¶ 50 At the hospital, the victim told a police officer that defendant was sending her messages. The officer said he would call another officer and have him take defendant’s phone. After that, the victim did not receive any messages from defendant. Id. ¶ 12. ¶ 51 The trial court in Curry admitted the Facebook documents obtained by police, including the messages between the defendant and the victim, finding that the victim’s testimony provided the additional foundation for admission of their content. Id. ¶ 23. Defendant was found guilty and appealed, arguing, inter alia, that the trial court abused its discretion in admitting the content of the Facebook messages because there was insufficient authentication. Id. ¶ 33. ¶ 52 The appellate court in Curry affirmed defendant’s conviction. Id. ¶ 61. The appellate court examined Kent, 2017 IL App (2d) 140917, and rejected the defendant’s reliance on Kent, finding it factually distinguishable “given the substantial and circumstantial evidence connecting the instant messages to defendant.” Curry, 2020 IL App (2d) 180148, ¶ 55. Specifically, the appellate court recognized: “Facebook messages are akin to e-mails or text messages. An e-mail may be authenticated through circumstantial evidence. [Citation.] A text message - 14 - similarly may be authenticated through circumstantial evidence. [Citations.]” Id. The appellate court determined that, based on the circumstantial evidence suggesting that defendant authored the Facebook messages, they were properly authenticated and that the trial court did not abuse its discretion in admitting the content of the messages. Id. ¶¶ 57-59 ¶ 53 We determine that the present case is more akin to Curry. Here, the State presented sufficient circumstantial evidence properly authenticating the November 8 and November 21 Facebook Messenger messages from “Masetti Meech.” The victim, Ms. Shannon, testified that while they were dating, defendant messaged her via Facebook messenger multiple times under the username “Masetti Meech.” Based on defendant’s repeated use of the username “Masetti Meech” when messaging her, Shannon believed that the November 8 and November 21 messages from “Masetti Meech” actually came from defendant. The State here also provided evidence that the November 8 Facebook message contained unique information that was not widely known to persons other than defendant and the victim. Specifically, the November 8 Facebook message from “Masetti Meech” informed Shannon about the location of her car, which she subsequently retrieved from the location identified in the message. Shannon testified that defendant was the person who had taken her car five days earlier. Thus, defendant was in the unique position of knowing where he had disposed of the vehicle. We find that the trial court could reasonably conclude that defendant was the author of the November 8 Facebook Messenger message from “Masetti Meech” to Ms. Shannon, which accurately informed her of the location of her vehicle. ¶ 54 The State also provided evidence that the November 21 Facebook Messenger message contained unique information known to a small group of people, including defendant. Specifically, the November 21 message from “Masetti Meech” to Ms. Shannon contained threats to shoot “your people,” including her son, who was “not going to see 16,” and stated “79, 37, 71st, 39, 42, workplace, 79 is today.” Shannon testified that “79” represented 79th Street where her mother lives, “37” represents 37th Street where her sister lives, “71” represents 71st Street where her other sister lives, “39” represents 39th Street where her brother lives, and “42” represents “the main office to the workplace where [she] used to work.” The author of the November 21 message knew the age of Ms. Shannon’s son, as well as the address of her place of work, and the residential addresses of her mother, brother, and two - 15 - sisters. The totality of this information would have been known only to people close to Ms. Shannon, including defendant, who was her ex-boyfriend of two years. We find that the trial court could reasonably conclude that defendant authored the November 21 Facebook Messenger message from “Masetti Meech.” ¶ 55 Under these circumstances, we cannot say that the trial court abused its discretion in finding that the November 8 and November 21 Facebook Messenger messages from “Masetti Meech” to Ms. Shannon were authenticated as coming from defendant. ¶ 56 B. Possession of a Stolen or Converted Motor Vehicle ¶ 57 Defendant next contends that the State failed to prove him guilty beyond a reasonable doubt of possession of a stolen or converted motor vehicle in connection with his alleged unlawful possession of Ms. Shannon’s 2014 Kia Sedona. According to defendant, the State failed to prove that he took the car with the intent to permanently deprive Ms. Shannon of its use. The State asserts that defendant’s arguments ignore that the State was only required to prove that defendant knew that Shannon’s car was converted when it was in his possession. ¶ 58 When reviewing the sufficiency of the evidence, the relevant question is whether, after viewing all the evidence in the light most favorable to the State, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt. People v. Davison, 233 Ill. 2d 30, 43 (2009). Section 4-103(a)(1) of the Illinois Vehicle Code states that it is a felony for a person not entitled to the possession of a vehicle to possess it, knowing it to have been “stolen or converted.” 625 ILCS 5/4-103(a)(1) (West 2014). ¶ 59 Here, defendant’s indictment alleged that “he, not being entitled to the possession of a motor vehicle, to wit: a 2014 Kia Sedona, property of Anita Shannon, possessed said vehicle knowing it to have been stolen or converted.” Therefore, to sustain a conviction for the offense as charged, the State was required to prove beyond a reasonable doubt that defendant (1) possessed Ms. Shannon’s 2014 Kia Sedona, (2) was not entitled to possess the vehicle, and (3) knew that the vehicle was either stolen or that it was converted. - 16 - ¶ 60 Defendant tries to refocus the analysis to look at the difference between stealing a motor vehicle and converting a motor vehicle. In support, defendant places significant reliance on People v. Cramer, 85 Ill. 2d 92 (1981). Yet, Cramer is distinguishable and does not govern resolution of this case. At issue in Cramer was whether the defendant, who was charged with theft, was entitled to an included- offense jury instruction based upon section 4-103(a). Id. at 94-95, 100. That issue is not presented here. Also, to the extent that Cramer has been interpreted as indicating that the State’s burden of proof under section 4-103(a) is higher if the defendant participated in the actual taking of the vehicle, we disagree. Nothing in the plain language of section 4-103(a) suggests that the State bears a heightened burden of proof where, as here, the evidence shows that the defendant was responsible for the initial taking of the vehicle. ¶ 61 Here, defendant was charged only with possession of a stolen or converted motor vehicle. Thus, the State was only required to prove that defendant knew the car was either stolen or converted. See In re Karavidas, 2013 IL 115767; People v. Gengler, 251 Ill. App. 3d 213 (1993). ¶ 62 The evidence here proved that defendant knew he either stole the vehicle (took with the intent to permanently deprive the owner) or converted it (took control of temporarily). Ms. Shannon and her son heard defendant going through her purse in Shannon’s room before he left the apartment. When they looked outside, Shannon’s Kia Sedona was gone, as were the car keys from her purse. Since the defendant and Shannon dated for about two years, he undoubtedly knew her car and where to find her car keys. Several days later, Ms. Shannon received a Facebook message from “Masetti Meech,” an account defendant used to message Shannon in the past, telling her where to find her car. Shannon found her car where the message told her it would be located. When defendant was arrested, he had the victim’s car keys in his possession. This evidence was sufficient for a reasonable fact finder to conclude that defendant took Ms. Shannon’s car without her permission, either with the intent to take it permanently or temporarily from her control. ¶ 63 Thus, the State proved defendant knowingly and wrongfully deprived the victim of her vehicle for several days. This was sufficient to sustain his conviction as charged under section 4-103(a)(1). We therefore affirm defendant’s conviction. - 17 - ¶ 64 III. CONCLUSION ¶ 65 For the foregoing reasons, we affirm the judgment of the appellate court, which affirmed defendant’s conviction and remanded for a Krankel hearing. ¶ 66 Affirmed and remanded. - 18 -