Tyrone Boyd v. State of Mississippi , 2015 Miss. LEXIS 204 ( 2015 )


Menu:
  •                     IN THE SUPREME COURT OF MISSISSIPPI
    NO. 2014-KA-00404-SCT
    TYRONE BOYD
    v.
    STATE OF MISSISSIPPI
    DATE OF JUDGMENT:                          03/28/2014
    TRIAL JUDGE:                               HON. LESTER F. WILLIAMSON, JR.
    TRIAL COURT ATTORNEYS:                     PHILLIP S. “FLIP” WEINBERG
    KATHRYN R. McNAIR
    COURT FROM WHICH APPEALED:                 LAUDERDALE COUNTY CIRCUIT COURT
    ATTORNEYS FOR APPELLANT:                   OFFICE OF STATE PUBLIC DEFENDER
    BY: ERIN ELIZABETH PRIDGEN
    GEORGE T. HOLMES
    ATTORNEY FOR APPELLEE:                     OFFICE OF THE ATTORNEY GENERAL
    BY: SCOTT STUART
    DISTRICT ATTORNEY:                         BILBO MITCHELL
    NATURE OF THE CASE:                        CRIMINAL - FELONY
    DISPOSITION:                               AFFIRMED - 04/30/2015
    MOTION FOR REHEARING FILED:
    MANDATE ISSUED:
    BEFORE DICKINSON, P.J., PIERCE AND COLEMAN, JJ.
    PIERCE, JUSTICE, FOR THE COURT:
    ¶1.    This appeal arises from the conviction of Tyrone Boyd under Mississippi Code
    Section 97-5-33(6) for the exploitation of a child. Following conviction, the Circuit Court
    of Lauderdale County sentenced Boyd to a term of twelve years imprisonment with seven
    years to serve, and five years to be suspended and on reporting probation. Boyd appeals to
    this Court, claiming the trial court abused its discretion by admitting Facebook and text
    messages into evidence and that the State failed to properly authenticate them. Specifically,
    Boyd argues the evidence purporting to link him to the messages in question was not
    sufficient to prove that he, in fact, authored the messages. Boyd’s contention is meritless,
    but more importantly, Boyd is barred from appealing on such grounds, as he failed to object
    to the items’ admission at trial. We affirm Boyd’s conviction and sentence.
    STATEMENT OF THE FACTS
    ¶2.    On June 13, 2012, RDS1 was living in Meehan, in Lauderdale County, Mississippi.
    At that time, RDS was twelve years old. Through Facebook, RDS received a friend request
    from someone named “Tyrone Boyd.”2 RDS did not yet know Boyd, a thirty-two-year-old
    man, but the two shared a mutual friend, so she accepted his friend request. Boyd began
    sending Facebook messages to RDS, and RDS sent messages back to Boyd. The messages
    began innocuously. Boyd asked general questions of RDS, such as where she lived, who her
    siblings were and how old her siblings were. RDS asked Boyd his age. Boyd said that he was
    seventeen. RDS told Boyd that he was too old for her. At that point, RDS informed her
    stepfather about her conversations with Boyd. The stepfather said that the name “Tyrone
    Boyd” sounded familiar and he told RDS that he may have attended high school with Boyd.
    RDS subsequently gave her cell phone to her stepfather, and he began to send text messages
    to Boyd on RDS’s cell phone, posing as RDS.
    1
    Because this case involves the sexual exploitation of a minor, we refer to the victim
    by initials only.
    2
    The Facebook profile that initiated the cyber-friendship with RDS listed only the
    name “Tyrone Boyd” and did not supply an accompanying picture.
    2
    ¶3.    RDS testified that her stepfather and Boyd communicated using the Facebook phone
    application to send messages to one another. At one point in their conversations, Boyd asked
    if RDS was a virgin. At that time, Boyd was talking to the stepfather posing as RDS. When
    Boyd asked RDS her age, the stepfather replied that she was fourteen.3 Afterward, the
    stepfather, still posing as RDS, gave her phone number to Boyd, as the two wanted to
    communicate by text message, as well as through the Facebook application.
    ¶4.    On June 26, 2012, Boyd text-messaged RDS’s phone to say that he wanted to pick up
    RDS at her house. RDS said that she would rather walk down the street than have Boyd
    come to her house. The stepfather, posing as RDS said, “You know I’m a virgin.” Boyd
    responded, “What that mean.” Boyd then continued, “So, I’m – I’m going to be the first?”
    Boyd then wrote “You ready to lose – you ready to lose it?” Then he, as RDS, answered
    “Yeah.” He next messaged Boyd that he wanted to meet him at the Spaceway store. The
    stepfather and his wife, RDS’s mother, then drove to Spaceway. They testified Boyd drove
    into the Spaceway parking area, and the stepfather recognized his former high school
    classmate, Tyrone Boyd.
    ¶5.    The stepfather and his wife went to the sheriff’s department the next day. They spoke
    with police investigator Gypsi Ward. The stepfather gave Ward RDS’s cell phone. Ward
    continued communicating with Boyd, pretending to be RDS. The second meeting was
    effectuated by text messages sent by Ward, now posing as RDS, to Boyd, in addition to
    3
    The stepfather testified that, while posing as RDS, he mistakenly said she was
    fourteen, even though she was twelve. The stepfather attributed his mistake to the fact that
    he has seven children, one of whom was fourteen at the time the conversation took place.
    3
    telephone conversations between Boyd and one of RDS’s older sisters, who also posed as
    RDS. Boyd appeared the second night, and deputies arrested him near the highway behind
    Spaceway. The deputies seized a cell phone when they arrested Boyd. After arresting Boyd,
    Ward confiscated his phone and obtained a search warrant to discover its contents. The
    phone had no contents whatsoever, other than a contact list of various phone numbers,
    including RDS’s.4
    ¶6.    Boyd was charged with exploitation of a child under Mississippi Code Section 97-5-
    33(6), which provides: “No person shall, by any means including computer, knowingly
    entice, induce, persuade, seduce, solicit, advise, coerce, or order a child to meet with the
    defendant or any other person for the purpose of engaging in sexually explicit conduct.”
    
    Miss. Code Ann. § 97-5-36
     (6) (Rev. 2014). On February 11, 2013, the Grand Jury of
    Lauderdale County indicted Boyd with exploitation of a child “. . . by means of a computer
    and/or cell phone, [to] knowingly entice induce, persuade, seduce, solicit, advise, coerce and
    /or order a child, to-wit: [RDS], to meet with him for the purpose of engaging in sexually
    explicit conduct.”
    ¶7.    On January 27, 2014, the matter went to trial. The State presented a case that RDS
    had identified herself as a minor, but that Boyd still had attempted to meet with her alone and
    had expressed interest in having sex with her. The stepfather testified that he, along with his
    wife, saw Boyd at the place and time at which Boyd and RDS had decided to meet.
    4
    RDS’s Facebook profile did not list her full name. Rather, her profile name was her
    first and middle name. The contact name in the phone’s contact list appeared to refer to
    RDS’s first and middle names.
    4
    Investigator Ward identified Boyd the second time before arresting him with her partner at
    the agreed-upon meeting spot. Ward testified that Boyd was driving alone and no other
    people were present. Boyd denied ownership of the phone and the Facebook account.
    ¶8.    At trial, the state submitted printouts of the Facebook messages between the Tyrone
    Boyd account and RDS’s account. The State also admitted text-message printouts, taken
    from RDS’s phone, of messages sent between RDS’s number and Boyd’s number. The State
    further submitted a printout of Boyd’s phone’s contact list. Counsel for Boyd did not object
    to any of these evidentiary admissions. At trial, a data-extraction technician explained how
    he processed Boyd’s phone through a data extractor and identified a printout of Boyd’s stored
    numbers in the contacts list in the phone. One of the contacts contained RDS’s phone
    number. The phone contained no text messages, and the technician suggested that this lack
    of data was consistent with purposeful deletion of the phone’s contents.
    ¶9.    On January 31, 2014, the jury returned a guilty verdict. The Circuit Court of
    Lauderdale County, Mississippi, Honorable Lester Williamson presiding, sentenced Boyd
    to a term of twelve years with seven years to serve and five years to be suspended and on
    reporting probation. Boyd also was fined $6,930.50. On March 28, 2014, Boyd moved for
    a new trial. The trial court entered an order denying Boyd’s motion. Boyd then filed a timely
    notice of appeal with this Court.
    ¶10.   On appeal, Boyd argues the court erred when it admitted the printouts containing the
    Facebook and text messages. Boyd claims that the evidence of the Facebook messages and
    text messages received by RDS was not sufficiently authenticated by the State. Specifically,
    5
    Boyd contends the State should have attempted to “identify if Boyd was the actual owner of
    the Facebook account that corresponded with [RDS’s] account,” or “subpoena Boyd’s cell
    phone company records to show who owned his phone, what numbers the phone dialed and
    the location of the person using the phone.”
    ¶11.   Boyd appeals, seeking reversal of his conviction and a new trial. The single issue
    raised by Boyd on appeal is:
    Whether the trial court abused its discretion by admitting Facebook and
    text messages into evidence that the State failed to properly authenticate.
    ¶12.   This Court reviews the admission of evidence under an abuse-of-discretion standard.
    Young v. Guild, 
    7 So. 3d 251
    , 262 (Miss. 2009). This Court will not reverse a conviction
    unless the trial court abused its discretion in a manner that was prejudicial to the accused or
    adversely affected a substantial right of the accused. Sewell v. State, 
    721 So. 2d 129
    , 138
    (Miss. 1999).
    ANALYSIS
    ¶13.   This Court repeatedly has held that failure to make a contemporaneous objection
    waives an issue for purposes of appeal. Williams v. State, 
    684 So. 2d 1179
    , 1203 (Miss.
    1996). Because Boyd did not object to the admission into evidence of the Facebook
    messages, the text messages, and the cell-phone printouts, Boyd is procedurally barred from
    raising the items’ admission as an issue on appeal. Notwithstanding the procedural bar, we
    find Boyd’s assignments of error meritless.
    ¶14.   Mississippi Rule of Evidence Rule 901(a) provides for the authentication of evidence
    as a condition precedent to admission. Authentication simply establishes that “a matter is
    6
    what its proponent claims it to be.” M.R.E. 901. Authentication and identification of
    evidence are central to the concept of relevance; unless an item of evidence is shown to be
    “genuine,” the item is irrelevant and should be excluded. See M.R.E. 901(a) cmt.
    ¶15.   In a case of first impression, this Court recently examined the unique issues presented
    in attempting to authenticate messages sent via social media. Smith v. State, 
    136 So. 3d 424
    (Miss. 2014). In Smith, this Court noted that “concerns over authentication arise ‘because
    anyone can create a fictitious account and masquerade under another person’s name or can
    gain access to another’s account by obtaining the user’s username and password,” and
    consequently, “the potential for fabricating or tampering with electronically stored
    information on a social networking site is high, and poses challenges to authenticating
    printouts from the website.” 
    Id. at 432
     (internal citations omitted). Further, this Court held
    “[b]ecause of the special concerns regarding fabrication, ‘the fact that an electronic
    communication on its face purports to originate from a certain person’s social networking
    account is generally insufficient standing alone to authenticate that person as the author of
    the communication.’” 
    Id. at 433
     (internal citations omitted).
    ¶16.   Smith then outlines situations where this type of evidence is sufficiently authenticated:
    . . . the sender admits authorship, the purported sender is seen composing the
    communication, business records of an internet service provider or cell phone
    company show that the communication originated from the purported sender’s
    personal computer or cell phone under circumstances in which it is reasonable
    to believe that only the purported sender would have access to the computer
    or cell phone, the communication contains information that only the purported
    sender could be expected to know, the purported sender responds to an
    exchange in such a way as to indicate circumstantially that he was in fact the
    author of the communication, or other circumstances peculiar to the particular
    case may suffice to establish a prima facie showing of authenticity.
    
    7 Smith, 136
     So. 3d at 433 (¶21). While not exhaustive, Smith provides examples of
    circumstances in which evidence could be deemed authentic in congruence with Mississippi
    Rule of Evidence 901.5 We find that, other than the first two situations outlined in Smith
    (where the sender admits authorship or a witness testifies to seeing the author compose and
    transmit the message), each of the other situations exemplified in Smith entail circumstantial,
    and not direct, evidence of authenticity.
    Facebook messages
    ¶17.   On appeal Boyd contends, “[t]he Facebook messages did not contain any personal
    identifying information” and that “[w]ith nothing more to properly authenticate” the trial
    5
    Mississippi Rule of Evidence 901, in pertinent part, provides:
    (a) General Provision. The requirement of authentication or identification as
    a condition precedent to admissibility is satisfied by evidence sufficient to
    support a finding that the matter in question is what its proponent claims.
    (b) Illustrations. By way of illustration only, and not by way of limitation, the
    following are examples of authentication or identification conforming with the
    requirements of this rule:
    (1) Testimony of Witness With Knowledge. Testimony that a
    matter is what it is claimed to be.
    (2) Non-expert Opinion on Handwriting. Non-expert opinion as
    to the genuineness of handwriting, based upon familiarity not
    acquired for purposes of the litigation.
    ...
    (10) Other Methods. Any method of authentication or
    identification provided by the Mississippi Supreme Court or by
    the Constitution of Mississippi.
    8
    court should have excluded the Facebook messages from evidence.6 At trial, the State
    introduced Facebook messages from RDS’s account by which she communicated with the
    Tyrone Boyd account. Over the course of the Facebook communications, the Boyd profile
    asked RDS for her number, which she gave him. In reference to his own number Boyd told
    RDS, “I just got dis new # so soon as it charge I will give it 2u all I no is 481 ma.” Not only
    was RDS’s number later recovered from the contacts list in the phone found on Boyd during
    his arrest, but the text messages the State attributed to Boyd came from a number beginning
    with the numerical sequence “601-481.”
    ¶18.   Presumably, thousands of cell-phone owners living near Meridian, Mississippi, have
    phone numbers beginning with the same six digits. However, Boyd was arrested at the time
    and meeting place arranged in text messages originating from a number containing these six
    digits, with a phone containing RDS’s phone number in his possession, and the messages
    also happened to be from Tyrone Boyd. Whether these peculiar circumstances are analogous
    to those contemplated in Smith is a question for this Court. We find the Facebook messages
    were properly admitted considering the circumstances laid out here.7
    6
    Note that Facebook accounts cannot be verified as can phone calls and text
    messages, as mentioned in Smith. See Smith, 136 So. 3d at 434-435.
    7
    Admittedly, this analysis involves a new application of the well-settled
    authentication process (in light of technological change). We find that, in Smith, the Court
    addressed two cases State v. Eleck, 
    23 A. 3d 818
    , 823 (Conn. App. 2011) and United States
    v. Jackson, 
    208 F. 3d 633
    , 636-37 (7th Cir. 2000)), and that those two cases stood for the
    principle that “Because of the special concerns regarding fabrication, ‘the fact that an
    electronic communication on its face purports to originate from a certain person’s social
    networking account is generally insufficient standing alone to authenticate that person as the
    author of the communications.’” Smith, 136 So. 3d at 433. In both Eleck and Jackson, the
    proponent attempted to authenticate Facebook messages using only photos, posts, and the
    9
    Text messages
    ¶19.   Boyd asserts, “the State simply relied on a UFED machine printout” that listed RDS’s
    phone number as one of the contacts” on the phone confiscated from Boyd. This assertion
    is incorrect. The State also submitted a printout made from RDS’s phone of text messages
    between RDS and the number attributed to Boyd. Second, the State pointed to the fact that
    Boyd arrived at or just behind the Spaceway store twice immediately after messages were
    sent between his phone and RDS’s phone agreeing to meet there, and Boyd’s presence was
    confirmed by three eyewitnesses who testified at trial. Third, the jury heard how police
    confiscated a phone when Boyd was arrested that had the same number with which RDS had
    communicated. Lastly, the confiscated phone’s contacts list contained RDS’s phone number,
    despite the fact that Boyd claimed not to know her.
    ¶20.   Contrary to Boyd’s assertion on appeal, Smith does not stand for the proposition that
    the State must authenticate electronic communications by subpoenaing the telephone
    company and obtaining global positioning information for each message sent to prove that
    a person authored the messages in question. In relevant part from the above-cited excerpt,
    Smith held that messages also may be authenticated by evidence that “ . . . the purported
    sender respond[ed] to an exchange in such a way as to indicate circumstantially that he was
    in fact the author of the communication,” or that “other circumstances peculiar to the
    particular case may suffice to establish a prima facie showing of authenticity.” Smith, 136
    account names from the profiles. In this case, it is clear that the name “Tyrone Boyd” on the
    Facebook profile does not suffice to show that Tyrone Boyd authored the messages; what
    does authenticate them are the “peculiar circumstances” of the instant case.
    10
    So. 3d at 433. Here, Boyd appeared at the Spaceway store after the person using the number
    attributed to him agreed to do so. This fact would stand as a “circumstantial indication” that
    the purported sender, Boyd, authored the messages because he went to the agreed location
    twice immediately after messages agreeing to meet at that location were sent.
    ¶21.   Next, Smith provides that other “peculiar circumstances” may establish authenticity.
    Id. While this Court has not defined these circumstances in great depth, we find the State’s
    evidence was sufficiently authenticated under Smith. The fact that police arrested Boyd with
    a phone that had the exact same number as the one with which RDS corresponded, and that
    Boyd was alone at the time of seizure, certainly seems to be a peculiar coincidence indicating
    that this was Boyd’s phone. Moreover, the fact that the phone contained RDS’s number is
    even more circumstantially suggestive. Boyd’s only explanation for any of the above was
    his testimony that the police both conspired to frame him with a cell phone that was not his
    and that Investigator Ward perjured herself at trial in furtherance of the conspiracy. The jury,
    it seems, did not subscribe to Boyd’s version of events.
    ¶22.   As Boyd would have it, the State could only admit evidence of his Facebook phone-
    application communications and his text-message communications, for that matter, by
    obtaining records, including locational GPS information on each message, to the exclusion
    of all other people who may have accessed his phone or phone applications, in order to prove
    each message independently authentic. Such a standard seems impracticable and goes much
    further than this Court provided for in Smith. Boyd would make the authentication of
    electronic communication appear to be sui generis in relation to more familiar media. But,
    11
    where authorship is not admitted or witnessed, authentication always has depended on
    circumstantial evidence, whether the subject medium was electronic or not. Here, we find
    the instant facts provide sufficient authentication, particularly in light of the “peculiar
    circumstances” of this case.     Thus, we find Boyd’s claims regarding each contested
    admission are without merit.
    CONCLUSION
    ¶23.   Boyd’s issue raised on appeal is procedurally barred, and this Court cannot review it.
    Notwithstanding the bar, Boyd’s contentions are meritless. Accordingly, we affirm Boyd’s
    conviction and sentence.
    ¶24. CONVICTION OF EXPLOITATION OF A CHILD AND SENTENCE OF
    TWELVE (12) YEARS IN THE CUSTODY OF THE MISSISSIPPI DEPARTMENT
    OF CORRECTIONS, WITH FIVE (5) YEARS SUSPENDED, AND SEVEN (7)
    YEARS TO SERVE, AND FIVE (5) YEARS PROBATION, WITH CONDITIONS,
    AFFIRMED. APPELLANT SHALL PAY PROBATION SUPERVISION FEE IN THE
    AMOUNT OF $55 PER MONTH. WITHIN THIRTY (30) DAYS OF RELEASE, THE
    APPELLANT SHALL PAY A FINE OF $50,000 WITH $45,000 SUSPENDED, A
    $1,000 FINE TO THE CHILDREN’S TRUST FUND, COURT COSTS OF $420.50, $10
    TO THE VBF, AND AN APPEARANCE BOND OF $500. APPELLANT SHALL
    RECEIVE SIXTY-FOUR (64) DAYS JAIL CREDIT.
    WALLER, C.J., RANDOLPH, P.J., LAMAR, KITCHENS, CHANDLER, KING
    AND COLEMAN, JJ., CONCUR. DICKINSON, P.J., CONCURS IN RESULT ONLY
    WITHOUT SEPARATE WRITTEN OPINION.
    12
    

Document Info

Docket Number: 2014-KA-00404-SCT

Citation Numbers: 175 So. 3d 1, 2015 Miss. LEXIS 204

Judges: Dickinson, Pierce, Coleman, Waller, Randolph, Lamar, Kitchens, Chandler, King

Filed Date: 4/30/2015

Precedential Status: Precedential

Modified Date: 10/19/2024