Authentication Flashcards

1
Q

What is authentication?

A

It is a process used to establish that a piece of evidence is what the proponent claims it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can authentication be done?

A

1) Testimony of a witness with knowledge of an item;
2) Comparison with an authenticated specimen by an expert or juror;
3) Testimony of a witness as to distinctive characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is required to prove chain of custody?

A

In play with generic or common items, frequently drugs. The witness must testify that the item is the “same item” and in “substantially the same condition.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a break in the chain of custody go towards proving?

A

Any defect in the chain of custody goes to the weight of the evidence, not the admissibility of the evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Does an examination of handwriting violate the 5th amendments right against self incrimination?

A

No. A handwriting exemplar is identifying a physical characteristic which falls outside the protection of the 5th amendment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FRE 901(b)(2): Handwriting Opinions

A

A non-expert may testify that the handwriting is genuine as long as the familiarity with the handwriting was not acquired for the current litigation. A sufficient familiarity with the handwriting of another person may be acquired by seeing him write, exchanging correspondence, or by other means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FRE 901(b)(5): Identifying voices

A

Lay Witnesses opinion as to familiarity with a voice based on hearing that voice at anytime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is required to authenticate photos?

A

The photographer is not needed to authenticate the photograph. Any witness familiar with what it portrays may authenticate it.
Counsel may then challenge the authentication on cross-examination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What must be considered when attempting to authenticate emails?

A

1) It bears the purported author’s email address;
2) Content reflects knowledge of the purported conduct;
3) Author identifies himself via his purported nickname or provides other identifying information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly