State of Tennessee v. Vermaine M. Burns ( 2015 )


Menu:
  •            IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE
    AT NASHVILLE
    February 10, 2015 Session
    STATE OF TENNESSEE v. VERMAINE M. BURNS
    Appeal from the Circuit Court for Williamson County
    No. II-CR0026236      James G. Martin, III, Judge
    No. M2014-00357-CCA-R3-CD                - Filed May 5, 2015
    Vermaine M. Burns (“the Defendant”) was convicted of several sexual offenses, all
    stemming from illicit Facebook chats (“chats”) and emails between himself and the victim,
    K.P.1 On appeal, the Defendant raises three issues: (1) whether the trial court abused its
    discretion by admitting into evidence the Defendant’s chats with the victim and an emailed
    photo of a penis; (2) whether the evidence was sufficient to support the jury’s finding that
    the Defendant was the author of the communications; and (3) whether the trial court erred
    by prohibiting the Defendant from referring to a fake Facebook profile created by the
    Defendant’s stepdaughter. After a review of the record and applicable law, we affirm the
    judgments of the trial court.
    Tenn. R. App. P. 3 Appeal as of Right; Judgments of the Circuit Court Affirmed
    R OBERT L. H OLLOWAY, J R., J., delivered the opinion of the Court, in which T HOMAS T.
    W OODALL, P.J., and T IMOTHY L. E ASTER, J., joined.
    Carrie Searcy (at trial and on appeal) and Carla Arevalo (at trial), Nashville, Tennessee, for
    the appellant, Vermaine M. Burns.
    Herbert H. Slatery III, Attorney General and Reporter; Andrew C. Coulam, Assistant
    Attorney General; Kim R. Helper, District Attorney General; and Mary Catherine White,
    Assistant District Attorney General, for the appellee, State of Tennessee.
    1
    It is the policy of the Court not to identify a minor victim of a sex crime by name.
    OPINION
    I. Factual and Procedural Background
    The Williamson County Grand Jury indicted the Defendant for four counts of
    solicitation to commit aggravated statutory rape, two counts of attempted solicitation of
    sexual exploitation of a minor, one count of solicitation to commit especially aggravated
    sexual exploitation of a minor, and one count of exploitation of a minor by electronic means.2
    At trial, the victim’s mother, Melanie Conley, testified that the Defendant was her
    cousin. At the time the offenses occurred, both the Defendant and K.P. had Facebook
    accounts, and Ms. Conley was a “Facebook friend[]” with the Defendant.
    In June 2010, Ms. Conley received an email from Facebook3 containing a message
    that had been sent to K.P.’s Facebook account from the Defendant’s Facebook account,
    asking K.P. to take pictures of her body and to send them to the author of the message.
    Upset, Ms. Conley looked at K.P.’s computer where K.P.’s Facebook account was still open.
    There, Ms. Conley found more messages of a similar nature and replies from K.P. indicating
    that “she was uncomfortable” doing the things she had been asked to do.
    Ms. Conley took a screen shot4 of the messages on K.P.’s Facebook account. Each
    message bore the name and photo of the Defendant. The last conversation was time-
    stamped 12:25 a.m. Ms. Conley understood the messages captured in the screen shot to
    indicate that K.P. had sent the photos of herself and the author was asking if K.P. wanted a
    photo of himself. In this conversation, K.P. gave her Yahoo email address (the “Yahoo email
    address” or “Yahoo account”), and Ms. Conley confirmed that the given email address was
    consistent with Ms. Conley’s memory of what K.P.’s email address was at the time. Ms.
    Conley confronted K.P. about the messages. She also confronted the Defendant, and “things
    got heated.” Later that same day, Ms. Conley contacted the Spring Hill Police Department,
    who took possession of K.P.’s computer.
    On cross-examination, Ms. Conley stated that the Defendant became aggressive when
    2
    K.P. was 14 years old when the offenses occurred, and the Defendant was more than 10 years older
    than the victim.
    3
    Ms. Conley explained that K.P.’s Facebook account was set up so that an email was sent to Ms.
    Conley’s email address every time K.P. received information over Facebook.
    4
    A “screen shot” is an image of a computer screen as it appeared at the time the screen shot was
    taken.
    -2-
    she confronted him about the messages. Ms. Conley stated that she knew K.P. and the
    Defendant were “Facebook friends” at the time of the offense. She also knew the Facebook
    account sending the messages belonged to the Defendant. When asked if she had told
    anyone that she believed that someone other than the Defendant could have sent the
    messages, Ms. Conley responded, “I did say that I wasn’t sitting there beside the person who
    sent it, so, I mean, it’s a possibility.” Apart from the messages found on K.P.’s Facebook
    account, Ms. Conley had never seen the Defendant make any inappropriate comments or
    behave inappropriately toward K.P.
    Detective Michael Foster of the Spring Hill Police Department testified that K.P.’s
    mother gave him the screen shot of the chat between K.P. and the Defendant. He also took
    possession of the victim’s laptop computer and brought it to the Franklin Police Department
    Internet Crimes Against Children task force (“ICAC”)5 in order for ICAC to “perform an
    image” of the hard drive on K.P.’s computer.
    Detective Foster, along with other ICAC officers, executed a search warrant at the
    Defendant’s home. Detective Foster participated in an interview of the Defendant during the
    execution of the search warrant. During that interview, the Defendant told officers that he
    did not have his own internet connection and instead used an unsecured network in the
    neighborhood. He also admitted to having a Facebook account as well as a Hotmail email
    address (the “Hotmail account” or “Hotmail email address”). He informed the detectives that
    he used his Facebook account to play a game called Mafia Wars.
    To assist ICAC, Detective Foster subpoenaed records for both the victim’s Yahoo
    account and the Defendant’s Hotmail account. The records for both accounts showed who
    created the account and included a “log in history” for June 2010, which detailed the dates
    and times that the account was accessed along with the internet protocol (“IP”) addresses
    used to access the account. Detective Foster explained that, whenever a computer accesses
    the internet, it has a signature IP address, which is attached to an internet service provider.
    That IP address can then be used to determine the exact location of the computer at the time
    it accessed the internet (e.g., a person’s home or a Starbucks).
    On cross-examination, Detective Foster admitted that he could not determine from
    looking at the screen shot of the chats who had accessed either of the two accounts when the
    chats were sent. Detective Foster also confirmed that the Defendant was “very cooperative”
    when they executed the search warrant, and the Defendant denied ever sending photos or
    “chatting” with K.P.
    5
    Detective Foster explained that ICAC had more experience investigating these types of cases and
    the Spring Hill Police Department did not have the necessary resources to retrieve evidence from the laptop.
    -3-
    ICAC Detective Stephanie Cisco participated in the execution of the search warrant
    on the Defendant’s home and was tasked with photographing the rooms of the home and
    collecting evidence. At the time the search warrant was executed, the Defendant was the
    only person in the home. In the master bedroom, Detective Cisco found a computer that was
    turned on with the Defendant’s Hotmail open on the screen, several cell phones, and a T-
    Mobile cell phone bill. Additionally, a résumé found on the computer listed the Defendant’s
    name, the Hotmail email address, and the Defendant’s cell phone number.
    One of the cell phones recovered was a T-Mobile Blackberry. When Detective Cisco
    found the phone, it was turned on, and if one of the buttons on the phone was pressed, a
    photo of the Defendant’s face appeared as the background for the phone’s screen. A T-
    Mobile cell phone bill found at the scene indicated that it was a statement for a Blackberry
    owned by the Defendant and contained the Defendant’s telephone number.
    Detective Cisco examined the Blackberry at the ICAC lab and found a subscriber
    identity module (“sim”) card6 and a micro SD card7 inside the phone. The micro SD card
    contained pictures of the Defendant. Additionally, the Hotmail email address appeared at the
    bottom of the Blackberry’s screen. Detective Cisco explained that the presence of that email
    address on the screen meant that the Hotmail account was registered to that Blackberry and
    any email sent to the Hotmail account would automatically appear on his phone. Detective
    Cisco confirmed that the Hotmail account registered to the phone was the same account that
    was open on the computer found in the master bedroom of the Defendant’s home. Detective
    Cisco then turned the phone over to another detective in order to retrieve information that
    had been deleted from the phone’s memory prior to its examination.
    On cross-examination, Detective Cisco stated she found the Blackberry next to the
    computer on the desk. She confirmed that the Blackberry was not password protected.
    When the Blackberry was found, icons on the screen indicated that it had a signal, and the
    phone bill found at the scene indicated that it was active and could be used. However,
    Detective Cisco explained that she turned the signal off when she began examining the phone
    in the lab to prevent anyone from remotely wiping the data stored on the phone. Detective
    6
    A sim card is a microchip issued by the phone company that is inserted into the phone and provides
    the subscriber’s information. Detective Cisco explained that not every phone company issues sim cards for
    modern phones.
    7
    A micro SD card is a “small portable storage device” that is inserted into a phone and can also be
    inserted into a digital camera or computer. It stores data such as applications for the phone, text messages,
    videos, papers, emails, et cetera. Detective Cisco explained that the SD card would store “anything that you
    wanted to save.” Each phone is different, and what data is stored on the SD card simply depends on how the
    phone is set up.
    -4-
    Cisco explained that she came to the conclusion that the Blackberry had cellular service when
    she found it because of a symbol that appeared on the phone’s screen that she understood to
    mean the phone had cellular service. When she turned the signal off in the lab, that symbol
    no longer appeared on the phone’s screen. But, in order to determine if the phone had
    cellular service on one day but not another, Detective Cisco said she would have to examine
    the phone bill.
    ICAC Detective Brett Kniss testified that he was trained to conduct computerized
    forensic examinations and had completed “undercover chat training,” during which he
    learned how to create fictitious Facebook accounts and pose as a minor to entice suspects.
    Through that process, he learned how Facebook operates. Additionally, Detective Kniss had
    reviewed the law enforcement manual published by Facebook.
    When Detective Kniss received the victim’s laptop from Detective Foster, he
    examined the hard drive for evidence of chats and photos that were allegedly sent by the
    Defendant. Detective Kniss explained that a Facebook chat can be sent between users who
    are already “Facebook friends” and operates like an instant message, allowing users to
    communicate in real time via the Facebook server. Chats can be “cleared” by the user and
    deleted off their Facebook page. Once the chats are deleted, the user cannot access the chats
    via their Facebook account. However, Detective Kniss was able to retrieve evidence of the
    chats from the hard drive of K.P.’s computer. Along with the content of the chat, Detective
    Kniss recovered the user ID numbers for the Facebook accounts, the sender and receiver of
    each chat message, and the date and time each chat message was sent. Detective Kniss
    copied all of the chats between K.P. and a Facebook account bearing the Defendant’s name
    into an Excel spreadsheet so they could be organized chronologically.
    K.P.’s and the Defendant’s names were listed as the user names associated with the
    Facebook accounts in the chats found on K.P’s hard drive. Detective Kniss verified the
    Defendant’s user name and user ID number through records from Facebook. Detective Kniss
    also used an undercover Facebook account to find the Defendant’s Facebook account and
    verified that the profile picture and the user ID associated with that account matched the
    picture and user ID recovered from the chats on K.P.’s laptop. Additionally, the Hotmail
    email address was displayed on the Defendant’s Facebook account.
    During her interview with Detective Kniss, K.P. had described a photo of a black
    man’s penis that the Defendant allegedly sent to her. Detective Kniss found a photo
    consistent with K.P.’s description during a search of the hard drive of K.P.’s laptop. The
    -5-
    time-date stamp8 on the image also matched the date and time of the chats found on K.P.’s
    computer. Similarly, the log in records for K.P.’s email account corresponded with the time-
    date stamp on the image.
    K.P. also told Detective Kniss about photos she had sent to the Defendant’s Hotmail
    email address provided to K.P. in the Facebook chat. Detective Kniss found photos matching
    the description given by K.P. during his search of the hard drive of K.P.’s laptop. Detective
    Kniss discovered that the email address on the Defendant’s résumé found during the
    execution of the search warrant was the same email address to which K.P. had been directed
    to send photos.
    Detective Kniss testified that the desktop computer found at the Defendant’s home
    accessed the internet, email, and Facebook through an unsecured internet signal9 in the
    neighborhood.
    Detective Kniss also searched the Defendant’s computer hard drive for Facebook
    chats between the Defendant and K.P., and he found the “exact” chats that he had previously
    found on K.P.’s computer—the user IDs, names, dates, and times all matched the chats found
    on K.P’s computer. All the chats bore the names of the Defendant and K.P.
    In a chat starting at 11:10 p.m. on June 11, 2010, and continuing into the early hours
    of June 12, 2010, the sender opened the conversation by referring to K.P. by a nickname and
    asking about several members of her family. The sender also asked, “What time are y’all
    leaving in the morning? Ain’t the trip tomorrow?” K.P. responded by saying, “The trip ain’t
    tomorrow.” The sender also asked K.P. whether she played Mafia Wars. Several times in
    the chat, the sender referenced that he or she was aware of K.P.’s age and that he or she was
    worried about getting into trouble for his conversations with her. Throughout their
    conversation, the sender repeatedly asked to K.P. to delete their chat and expressed
    apprehension about the consequences that could come from conversations with K.P.
    Eventually, their conversation turned to sexual topics. The sender asked K.P to
    describe her pubic hair; whether she was aroused; and whether she would perform oral and
    vaginal sex. In the midst of this conversation, the sender also wrote, “You young and you
    8
    Every time a computer receives an image, either from the internet or sent directly from another
    person, the computer automatically creates a time-date stamp for the image file, noting when the computer
    received it.
    9
    An unsecured internet signal means that the signal is not password protected and anyone within the
    range of the signal can use it to access the internet.
    -6-
    my cuz [sic]. Yeah, for you I could get locked up.” Detective Kniss understood this
    communication to mean that the sender knew K.P. was underage and also that the sender was
    related to K.P. The sender and K.P. also discussed how they might meet in person. The
    sender suggested that K.P. tell her mother that she wanted to “go hang with [K.W.]” 10 At the
    time, the Defendant had a stepdaughter named K.W. who lived in his home.
    The sender asked K.P. to send photos of her vaginal area to the Defendant’s Hotmail
    email address. K.P. refused and told the sender she was not comfortable sending such
    photos. Even though K.P. refused to send the photos of her vaginal area as the sender
    requested, the chats indicated that she did send some photographs to the Hotmail email
    address. When the sender received one of the photos, he or she responded, “Come on.
    What’s that? Do better . . . Take the same pic, but take your clothes off.” The sender also
    instructed K.P., “You need to finger f*** yourself right now and tell me when you [sic]
    coming [sic] . . . When you come [sic] on your fingers, take a [p]ic of your fingers so I
    know you did it.” The sender asked K.P. to send that photo to the Hotmail email address.
    The chat ended at 3:04 a.m. on June 12, 2010.
    Detective Kniss recovered two photos from the Defendant’s computer hard drive that
    were consistent with the photos K.P. sent to the person in the chat. The first photo showed
    K.P. looking into a mirror wearing an undershirt. The second image depicted K.P.’s fingers
    held up for the camera.11 Both photos were placed on the Defendant’s computer on June 12,
    2010, and according to the time-date stamp, they were last accessed on that computer around
    2:30 a.m on June 12, 2010. The same photos were recovered from K.P.’s hard drive. The
    time-date stamps on the photos found on K.P.’s hard drive correspond with the time she was
    chatting with the sender on June 12, 2010.
    At 1:06 a.m. on June 13, 2010, the sender initiated another Facebook chat and told
    K.P. to “call [K.W.] tomorrow night.” Again, the sender indicated that he or she knew K.P.
    was 14 years old and expressed concern that their conversations would be discovered. The
    sender also repeatedly tried to get K.P. to send him or her a photo of her vaginal area, but
    K.P. refused and expressed discomfort with sending such photos. In this conversation, the
    sender offered to send K.P. a photo of his or her genitalia and described sex acts he or she
    would like to perform with K.P. The sender also said:
    10
    In the interest of protecting the privacy of a minor, we elect to refer to K.W. and her brother, D.W.,
    by their initials.
    11
    K.P. told Detective Kniss during her interview that she had put lotion on her fingers to “simulate
    the wetness,” held up her fingers to take the photo, and sent that photo to the Hotmail email address.
    -7-
    Sees [sic], what you don’t realize is that because we’re fam you can always
    come over always and it couldn’t never end, just f*** and f*** and f***. You
    can’t do that with no other guy and get away with it, but with me. Feel me?
    See, she trust [sic] you over here, and so what better place to be and get what
    you want when you want it and we got all summer to f*** as many times as
    possible.
    According to the time-stamps, that chat ended at 2:09 a.m. on June 13, 2010.
    At 12:07 a.m. on June 14, 2010, the sender initiated yet another Facebook chat with
    K.P. The sender asked K.P. to meet in person, and K.P. suggested that she tell her mother
    that she was visiting the Defendant’s home. Detective Kniss explained that this conversation
    indicated that K.P. knew the sender; was familiar with the location of the sender’s home; and
    that her mother would be comfortable letting her visit the sender’s home. The sender replied,
    “Yeah, that’s cool. Tell her you coming to hang out with [K.W.] and friends.” Again, the
    sender asked K.P. to send a photo, to which she replied, “I ain’t sending another one. You
    already got three[,]” and “My bad for getting tired of sending you pics.” The sender asked
    K.P. if she wanted a “pic of this” and asked K.P. for her email address. K.P. responded by
    giving the sender her email address.12 The sender then indicated that a photo of a flaccid
    penis was sent to K.P. The last chat message Detective Kniss was able to recover was sent
    at 12:54 a.m. on June 14, 2010.
    Detective Kniss recovered a photo of a man’s penis from K.P.’s computer hard drive.
    That photo was placed on K.P.’s computer at 12:41 a.m. on June 14, 2010. Detective Kniss
    explained that the time-date stamp on the photo correlated with the date and time of the chat
    during which the sender asked if K.P. wanted a “pic of this” and asked for her email address.
    Additionally, the same photo was recovered from the micro SD card in the Blackberry seized
    during the search of the Defendant’s home. The photo had been deleted from the Blackberry,
    but Detective Kniss was able to retrieve it in the ICAC lab.
    On cross-examination, Detective Kniss admitted that, even though he could identify
    which account the chats were sent from, he had no way of determining who actually sent the
    messages. Additionally, Detective Kniss confirmed that the data on the micro SD card
    indicated that the micro SD card has been transferred from another device into the
    Blackberry. Therefore, photos found on the card could have been taken on another device
    before the micro SD card was placed into the Blackberry. Detective Kniss explained that he
    did not dust the micro SD card for fingerprints because the dust could have damaged the data
    12
    Detective Kniss noted that this portion of the chat was the same as the screen shot taken by Ms.
    Conley and given to the Spring Hill Police Department.
    -8-
    stored on the card. The micro SD card was not tested for fingerprints after the data from it
    was recovered.
    Detective Kniss admitted that it would not be unusual for a person trying to “groom” 13
    a child to set up a fake Facebook account. However, Detective Kniss stated that he did not
    see any indications of a fake account on the Defendant’s computer. Detective Kniss was not
    able to determine if multiple people used the computer. Based on the language and
    references to “cousins” and “family” in the chats, Detective Kniss concluded that K.P. and
    the sender were familiar with each other. However, he said other people would also know
    about the familial relationship between K.P. and the Defendant.
    With regard to the photo of the penis found on K.P.’s computer and the Defendant’s
    Blackberry, Detective Kniss noted that there were no identifying features in the photo other
    than the red shorts pulled down around the subject’s legs. Detective Kniss admitted that he
    did not search the Defendant’s home for shorts matching those seen in the picture. Likewise,
    he did not visually examine the Defendant’s penis to see if it was consistent with the penis
    depicted in the photo. He also did not conduct an internet search to determine whether the
    photo was a “stock” photo. However, Detective Kniss stated that he believed the email with
    the photo was sent from the Blackberry because he did not find any evidence on the
    Defendant’s computer indicating that the email was sent from the computer.
    Detective Kniss also confirmed that, because the Defendant was using an unsecured
    internet connection in his home, someone with sufficient technological expertise could
    intercept all the data sent and received on that network. If information about the Defendant’s
    passwords or account information had been intercepted, another person could access the
    Defendant’s email and Facebook from another computer. In short, Detective Kniss explained
    that he could verify that the Defendant had access to the computer and Blackberry that were
    used to send Facebook chats and email the photo of the penis, however, he did not know who
    was “sitting behind the computer or utilizing [the Blackberry] to send these messages.” At
    most, the chats indicated “that the person utilizing the computer, sending the chat message,
    had an intimate knowledge about [the Defendant], being his account, his email, knowledge
    of [K.P.’s] family.” Detective Kniss admitted that, if someone had been monitoring the
    Defendant long enough, they could have received the information discussed in the chats.
    13
    Detective Kniss explained that, in his experience investigating these types of crimes, he would
    expect to see the suspect “grooming” the victim. Grooming could include giving gifts to the victim,
    befriending the victim, acting in a semi-parental role or as someone to look up to, and trying to gain the
    victim’s trust.
    -9-
    On redirect-examination, Detective Kniss confirmed that identifying the person who
    actually authored messages sent to minor victims was “the nature of the beast” in cases
    involving electronic means. In this case, Detective Kniss did not find any indication that
    someone had intercepted the Defendant’s computer activity. Had he found any such
    evidence, Detective Kniss would have investigated further. Detective Kniss explained that
    he believed the Defendant was the author of the chats because: (1) the time-date stamps on
    the photos correspond with the times the chats occurred; (2) the chats and photos were found
    on devices to which the Defendant had access, namely the computer found in the master
    bedroom and the Blackberry, and those devices were found in close proximity to each other;
    (3) the photo of the penis was consistent with the Defendant because it was a photo of a
    black male; (4) the Hotmail account referenced in the chats was also found on the Blackberry
    and the Defendant’s computer; and (5) that Hotmail account was open on the computer when
    the search warrant was executed.
    Sergeant Eric Anderson testified that he worked with ICAC in 2010. He interviewed
    the Defendant when officers executed the search warrant on the Defendant’s home. During
    that interview, the Defendant told Sergeant Anderson that there was only one working
    computer in the home and it was located in the master bedroom. He also confirmed that he
    had a T-Mobile cell phone but claimed that it had been inactive for about three months due
    to nonpayment. Sergeant Anderson stated that he did not recall asking the Defendant about
    the T-Mobile bill found in the master bedroom.
    During his interview, the Defendant admitted to having a Facebook account as well
    as Yahoo, Gmail, and Hotmail email accounts. He claimed that he “was hardly on
    [Facebook]” and mentioned that he used it to play a game called Mafia Wars. He also used
    Facebook to chat with friends and had uploaded a few photos to his profile. On the Monday
    evening prior to the execution of the search warrant, June 14, 2010, the Defendant claimed
    that he and his wife were in bed by 10:00 p.m. No one else used the computer in the master
    bedroom after that time. The Defendant stated that the computer was password protected.
    On cross-examination, Sergeant Anderson confirmed that the Defendant was cooperative
    during the execution of the search warrant and that the Defendant denied participating in the
    Facebook conversations with K.P.
    K.P. testified that she was 14 years old at the time of the offenses and that the
    Defendant was her second cousin. She had a Facebook account set up under her name and
    a Yahoo email address. She recalled chatting with the Defendant on Facebook on “two or
    three nights” in June 2010. K.P. stated that she was uncomfortable with the sexual nature
    of the chats and was “confused for the most part.” K.P. affirmed that she was “just going
    along with it.”
    -10-
    In those chats, K.P. was asked to send naked photos of herself, but she refused.
    However, she admitted that she sent three photos of herself to the Hotmail account—two
    photos of herself clothed and one photo of her fingers after she had been instructed to
    masturbate. In return, K.P. received a photo of a penis, which she deleted. K.P. identified
    copies of the chats previously admitted into evidence as the chats that she had participated
    in with the Defendant and confirmed that they accurately reflected her conversations with the
    Defendant.
    On cross-examination, K.P. affirmed that the Defendant had never made sexual
    comments toward her before the Facebook chats. Additionally, at the time the chats took
    place, K.P. recalled that the Defendant lived with his former wife and her two children. On
    redirect-examination, K.P. explained that, in June of 2010, her family was scheduled to take
    a trip to Holiday World. This trip had become an annual family event, and other members
    of her family would have been aware of it. K.P. confirmed that the trip was referenced in the
    chats. On recross-examination, K.P. confirmed that she had also told other kids at her school
    about the trip.
    Nekia Wilson testified that she was married to the Defendant, but they had been
    separated for almost three years. At the time of the offenses, Ms. Wilson lived in a home
    with the Defendant and her two children. There were two computers in the house—a desktop
    computer and a non-functioning laptop. The desktop computer was located in the master
    bedroom and was primarily used by the Defendant. The Defendant used the computer to
    access Facebook and play games, including a game called Mafia Wars. The Defendant had
    a Facebook account under his own name.
    Ms. Wilson stated that she had her own Facebook account as well. However, she did
    not use the desktop computer to access her account because she “could never remember the
    password.” Ms. Wilson explained that she had known the password to the desktop computer
    at one time, but after new software was installed on the computer, the password was changed
    and she was not able to access the computer with the old password. Ms. Wilson confirmed
    that the new software had been installed before the police executed the search warrant.
    Often, Ms. Wilson would wake up late at night, and the Defendant would be using the
    desktop computer. The Defendant had multiple email accounts, but Ms. Wilson said that she
    did not have access to those accounts because she did not know the passwords.
    Ms. Wilson did not recall her children using the desktop computer. Instead, they used
    the computer at their grandmother’s house because it was faster than the desktop.
    Additionally, the children had a “netbook” that they would take back and forth between Ms.
    Wilson’s home and their grandmother’s home. Ms. Wilson accessed the internet using her
    Blackberry. She explained that both she and the Defendant owned Blackberries, but her
    -11-
    Blackberry had service through Sprint. The Defendant’s Blackberry had service through T-
    Mobile.
    Ms. Wilson also described the Defendant’s penis to the jury and identified the photo
    sent to K.P. as a photo of the Defendant’s penis. She explained that she could identify it as
    such based on the way the pubic hair was groomed and the discoloration of the skin. She was
    also able to identify red fabric in the photo as being either the blanket on her bed or red shorts
    she had purchased for the Defendant. Moreover, Ms. Wilson stated that she believed the
    Defendant had previously sent her the same photo.
    Raymond Gordon, the Defendant’s stepfather, testified that he knew the Defendant
    to be an honest person. He noted that the Defendant had separated from Ms. Wilson, and
    their relationship was “not friendly.” He further stated that he had seen K.P. at the
    Defendant’s home on several occasions and he had never seen the Defendant behave
    inappropriately toward her.
    Betty Gordon, the Defendant’s mother, testified that the Defendant was currently
    living with her and her husband. The Defendant moved in when he and his wife separated,
    and she noted that their separation was “not friendly.” Ms. Gordon had observed the
    Defendant on the computer looking for jobs and buying car parts. She admitted that the
    Defendant had a Facebook account and that she was his “Facebook friend.” Ms. Gordon
    stated that she felt that the Defendant had been honest with her. She also stated that she had
    never seen the Defendant engage in conduct that would cause her concern.
    On cross-examination, Ms. Gordon confirmed that there was a laptop computer in the
    Defendant’s home when he lived with his wife. However, Ms. Gordon claimed that she did
    not see a computer in the master bedroom of the home. Finally, she confirmed that the
    Defendant had a Blackberry, but she claimed that “[i]t was off more than it was on.”
    Lonnita Anderson, the Defendant’s current girlfriend, testified that she had a daughter
    who was seven years old. The Defendant had never engaged in conduct that caused Ms.
    Anderson to feel concerned for her daughter. She stated that the Defendant had always been
    honest with her. On cross-examination, Ms. Anderson admitted that she had only known the
    Defendant for a short period of time and that they did not live together. She stated that the
    Defendant had a Facebook account but claimed he was “never on Facebook.”
    The Defendant testified that, at the time of the charged offenses, he lived in a home
    with Ms. Wilson and her two children, K.W. and D.W. At the time, the Defendant had been
    laid off from his job, and over the course of a typical day, he would be on the computer,
    searching Career Builders, “filling out” résumés, and emailing people trying to find a job.
    -12-
    Prior to being laid off, the Defendant traveled frequently for work, and he and Ms. Wilson
    would send nude photos of themselves to each other while he was away.
    The Defendant admitted that he had a Facebook account in June 2010. He also stated
    that other people in the house had their own Facebook accounts. The Defendant primarily
    used his Facebook account to communicate with his brother in Baton Rouge and to play a
    game called Mafia Wars. The Defendant admitted that he would sometimes chat with
    friends. However, he denied ever chatting with or sending photos to K.P. He claimed the
    photo sent to K.P. was not a photo of his penis. Additionally, he claimed that he had never
    received any emails from K.P.
    The Defendant accessed the internet through an unsecured network. Additionally, he
    stated that all of his passwords were “remembered” so that he did not need to type in his
    password when he logged into an account and that “anybody else that got on that computer
    didn’t have to sign in to get into [his] Facebook.” The Defendant claimed that everyone in
    the home had access to and used the computer in the master bedroom; the password to log
    into the computer was posted on a Post-It note on top of the computer.
    The Defendant asserted that he had no cell phone service during the time someone
    was sending chats to K.P. because he had not paid his cell phone bill. The Defendant noted
    that his Blackberry had a micro SD card, but he claimed that the card came with the phone
    and had never been removed from the phone. However, he noted that anyone who lived in
    the house had access to the phone.
    On cross-examination, the Defendant explained that the icons on his Blackberry
    screen would show that he had strong tower signal even when the phone service was cut off.
    He admitted that there was a T-Mobile bill sitting on his computer stand when police
    executed the search warrant and that he received a text message from T-Mobile on June 12,
    2010, which read, “To continue your monthly service as of 07/27/2010, you must pay
    $159.76 before 06/26/2010. If not paid, all minutes will be debited from your FlexAccount.”
    However, later in his testimony, the Defendant said he did not think he had cell phone service
    at the time of the offenses, but he was not sure. He also admitted that he made an outgoing
    call to a friend on June 26, 2010, and that such a call may have meant that he had phone
    service at the time of the offenses.
    The Defendant admitted that the Hotmail account belonged to him. The Hotmail
    account was also set up to send emails to his Blackberry, and it was the email address
    associated with his Facebook account. The Defendant noted that Facebook would send an
    email to his Hotmail account any time he got a “friend request” and he could accept the
    request without having to go to his Facebook page. Further, the Defendant admitted that
    -13-
    “nine out of ten times,” if someone were to send an email to the Hotmail account, he would
    have seen it. He also clarified that the only password “remembered” on the computer was
    the password to his Facebook account. His email passwords were not “remembered.”
    The Defendant admitted that he knew K.P.’s family had scheduled a trip to Holiday
    World. He further admitted that he had been online the day the search warrant was executed.
    At the time, he was checking his email and searching for a job.
    On redirect-examination, the Defendant said that 20 to 30 people would have known
    about the family’s upcoming trip to Holiday World. He also explained that T-Mobile would
    send him the text message regarding payment every month regardless of whether he had
    active service at the time the text message was sent.
    Based upon the evidence presented, the jury convicted the Defendant as charged. This
    timely appeal followed.
    II. Analysis
    Authentication
    On appeal, the Defendant first argues that the chats and email containing a photo of
    a penis that were sent to K.P. were not properly authenticated because the State failed to
    exclude the possibility that someone else authored the messages. The State argues that it
    need not exclude the possibility that someone else wrote the messages sent to K.P. in order
    to authenticate the messages. In light of the circumstantial evidence surrounding the
    Facebook chats and emails, the State avers that the trial court did not abuse its discretion by
    admitting the evidence. We agree with the State.
    “Decisions regarding the admissibility or exclusion of evidence are entrusted to the
    trial court’s discretion.” State v. Banks, 
    271 S.W.3d 90
    , 116 (Tenn. 2008) (citing State v.
    Robinson, 
    146 S.W.3d 469
    , 490 (Tenn. 2004)). As such, we review the trial court’s decision
    under an abuse of discretion standard. 
    Id. This Court
    will find an abuse of discretion when
    the trial court “applied incorrect legal standards, reached an illogical conclusion, based its
    decision on a clearly erroneous assessment of the evidence, or employed reasoning that
    causes an injustice to the complaining party.” 
    Id. (citing Konvalinka
    v. Chattanooga-
    Hamilton Cnty. Hosp. Auth., 
    249 S.W.3d 346
    , 358 (Tenn. 2008)).
    Tennessee Rule of Evidence 901 provides, “[t]he requirement of authentication or
    identification as a condition precedent to admissibility is satisfied by evidence sufficient to
    the court to support a finding by the trier that the matter in question is what its proponent
    -14-
    claims.” Tenn. R. Evid. 901(a). Evidence may be authenticated through, “[t]estimony that
    a matter is what it is claimed to be” or “[a]ppearance, contents, substance, internal patterns,
    or other distinctive characteristics, taken in conjunction with circumstances.” Tenn. R. Evid.
    901(b)(1), (4).
    A Tennessee appellate court has reviewed authentication of evidence found on social
    media websites on one other occasion. In Melissa L. Bright Dockery v. Kevin Carl Dockery,
    Sr., No. E2009-01059-COA-R3-CV, 
    2009 WL 3486662
    (Tenn. Ct. App. Oct. 29, 2009), the
    Court of Appeals held that MySpace messages were properly admitted at trial when the
    messages were sent from the defendant to his friend, Ms. Lowe, and she had subsequently
    printed out their conversation. The trial court admitted the messages based on Ms. Lowe’s
    testimony that she had printed the messages directly from her computer; they showed exactly
    what she and the defendant said to each other; and each message identified which party to
    the conversation was making a particular statement. 
    Id. at *6.
    Several other jurisdictions have addressed the issue of authenticating electronic and
    social media communications in more depth. For example, in Griffin v. State, 
    19 A.3d 415
    (Md. 2011), the Court of Appeals of Maryland detailed the concerns surrounding evidence
    found on social media websites. In that case, the State sought to introduce printouts from the
    defendant’s girlfriend’s MySpace profile, which allegedly contained a threat to one of the
    State’s witnesses. 
    Id. at 418.
    The State tried to authenticate the printouts through an
    officer’s stipulation that he recognized a photo on the page as that of the defendant’s
    girlfriend and the date of birth displayed on the profile was the same date that the defendant’s
    girlfriend gave as her date of birth. 
    Id. at 419.
    The Court of Appeals of Maryland noted the
    challenges that arise when trying to authenticate evidence from social media, stating, “The
    concern arises because anyone can create a fictitious account and masquerade under another
    person’s name or can gain access to another’s account by obtaining the username and
    password.” 
    Id. at 421.
    Therefore, it held that “the picture of [the defendant’s girlfriend],
    coupled with her birth date and location, were not sufficient ‘distinctive characteristics’ on
    a MySpace profile to authenticate its printout, given the prospect that someone other than
    [the defendant’s girlfriend] could have not only created the site, but also posted the
    [purported threat].” 
    Id. at 424.
    However, the Court of Appeals of Maryland also outlined a number of possible
    avenues by which such evidence could be authenticated. 
    Id. at 427.
    One such option was
    to “search the computer of the person who allegedly created the profile and posting and
    examine the computer’s internet history and hard drive to determine whether that computer
    was used to originate the social network profile and posting in question.” 
    Id. -15- Other
    courts have held that evidence derived from social media and emails was
    sufficiently authenticated when the prosecution offered circumstantial evidence corroborating
    that the evidence was what its proponent claimed. For example, in In re F.P., 
    878 A.2d 91
    (Pa. 2005), the Supreme Court of Pennsylvania held that transcripts of instant messages
    between the defendant and the victim were properly authenticated and admitted at trial. 
    Id. at 93.
    In that case, the defendant assaulted the victim because he believed that the victim had
    stolen a DVD from him. 
    Id. In the
    instant message conversations, the defendant identified
    himself by his first name and threatened physical violence against the victim for stealing
    from the defendant. 
    Id. at 94.
    Additionally, after the victim notified school authorities about
    the threats, staff at the school met with the defendant and the victim regarding the messages
    and the alleged theft. 
    Id. Approximately the
    same time as these school meetings, the
    defendant sent the victim another instant message stating, “u gotta tell tha school shit and
    stuff like a lil bitch.”14 
    Id. at 95.
    In the same conversation, the defendant also threatened,
    “want my brother to beat ur ass on tha steel center bus” and “want [sic] till I see u outta
    school ima beat ur aSS.” 
    Id. At the
    adjudication hearing, the defendant’s brother testified
    that he witnessed the defendant beating up the victim after disembarking a school bus that
    the defendant did not normally ride. 
    Id. The Pennsylvania
    Supreme Court held that “[a]ll
    of this evidence, taken together, was clearly sufficient to authenticate the instant message
    transcripts as having originated from [the defendant].” 
    Id. Further, the
    court declined to
    adopt an authentication standard that would require more direct proof of authorship for
    electronic communications. 
    Id. The court
    noted that the same uncertainties regarding
    authorship exist with traditional written documents and held, “We believe that e-mail
    messages and similar forms of electronic communication can be properly authenticated
    within the existing framework of Pa. R. Ev. 901 and Pennsylvania case law.” 
    Id. Additionally, in
    Commonwealth v. Purdy, 
    945 N.E.2d 372
    (Mass. 2011), the Supreme
    Judicial Court of Massachusetts held that email exchanges were properly authenticated. 
    Id. at 376.
    In that case, the defendant was accused of running a house of prostitution out of his
    combination “hair salon, antique store, art studio, and massage parlor.” 
    Id. at 372,
    377. The
    email exchanges admitted into evidence were found on the hard drive of a computer that
    admittedly belonged to the defendant. 
    Id. at 378.
    One email exchange was initiated from the
    defendant’s email account; was signed with the defendant’s name and the address of his
    business; and described the author of the email as a “working artist, as well [as an]
    entrepreneur, small business guy, hairstylist, art and antiques dealer, [and] massage
    therapist,” and added, “and I operate a service.” 
    Id. Other email
    messages were initiated
    from the defendant’s account and bore the defendant’s name as the signature. The defendant
    argued that the computer was located in an area where his employees could access it, and the
    14
    In the interest of accuracy, the Pennsylvania Supreme Court left excerpts from the instant messages
    unaltered and uncorrected for grammatical errors. In re 
    F.P., 878 A.2d at 94
    n.5.
    -16-
    defendant claimed his employees frequently used the computer and “used his e-mail account
    to play pranks on him, and that they answered e-mails in his name.” 
    Id. at 378.
    The court
    held that, even though the prosecution had not provided direct evidence that the defendant
    authored the emails in question, the circumstantial evidence regarding the defendant’s
    knowledge of passwords for the computer, his admitted ownership of the email account, and
    the fact that the emails originated from the defendant’s email address and bore his name was
    sufficient to authenticate the emails. 
    Id. at 379-80.
    Further, the court held, “The defendant’s
    uncorroborated testimony that others used his computer regularly and that he did not author
    the emails was relevant to the weight, not the admissibility, of the messages.” 
    Id. at 381-82.
    Similarly, in a case analogous to the one before us today, People v. Clevenstine, 
    891 N.Y.S.2d 511
    (N.Y. App. Div. 2009), the New York Supreme Court, Appellate Division,
    held that sexually explicit MySpace instant message communications between the defendant
    and the victims were properly authenticated at trial. 
    Id. at 514.
    In that case, both victims
    testified that they had discussed sexually explicit topics via the MySpace instant messaging
    service; state police had recovered copies of those instant messages from the hard drives of
    the victims’ computers; the defendant’s wife recalled finding sexually explicit conversations
    on the defendant’s MySpace account; and a representative from MySpace testified that the
    accounts participating in the instant messages had been created by the victims and the
    defendant. 
    Id. At trial,
    the defendant suggested that someone else had accessed his account
    and sent the message, but the court stated that “the likelihood of such a scenario presented
    a factual issue for the jury.” 
    Id. Finally, in
    Tienda v. State, 
    358 S.W.3d 633
    (Tex. Crim. App. 2012), the Texas Court
    of Criminal Appeals likewise affirmed the introduction of MySpace postings based on
    circumstantial evidence used to authenticate the postings. 
    Id. at 642-45.
    In that case, the
    defendant also suggested that someone else had created or accessed the MySpace account
    and argued that the State had failed to authenticate the messages as coming from the
    defendant. 
    Id. at 636.
    In response, the court held:
    Conceivably some unknown malefactors somehow stole the appellant’s
    numerous self-portrait photographs, concocted boastful messages about David
    Valadez’s murder and the circumstances of that shooting, was aware of the
    music played at Valadez’s funeral, knew when the appellant was released on
    pretrial bond with electronic monitoring and referenced to that year-long event
    along with stealing the photograph of the grinning appellant lounging in his
    chair while wearing his ankle monitor. But that is an alternate scenario whose
    likelihood and weight the jury was entitled to assess once the State had
    produced a prima facie showing that it was the appellant, not some
    unidentified conspirators or fraud artists, who created and maintained these
    MySpace pages.
    
    Id. at 646.
    -17-
    Comparing the facts of this case to cases from other jurisdictions, we conclude that
    there was more than sufficient circumstantial evidence to authenticate the Facebook chats
    and emails in question. The Defendant admitted that the Facebook account used to send the
    chats belonged to him. Additionally, Detective Kniss independently verified that the
    Facebook account belonged to the Defendant by comparing the Facebook profile picture,
    user ID number, and associated email address with those of the Facebook account that sent
    chats to K.P. Transcripts of the “exact” same chats were found on both the Defendant and
    K.P.’s computer hard drives.
    With regard to the emailed photographs, the Defendant admitted that the Hotmail
    account belonged to him and that the password to the account was not “remembered,”
    requiring someone to enter a password each time they logged into the account. Further, it
    was the same email address to which the sender instructed K.P. to send photos. The Hotmail
    email address was also associated with the Defendant’s Facebook account and tied to the T-
    Mobile Blackberry. Additionally, the same Hotmail account was open when police executed
    the search warrant, and the Hotmail email address was listed on the Defendant’s résumé.
    Photos sent via email by K.P. were found on the Defendant’s computer, and the photo of a
    black man’s penis was found on the Defendant’s Blackberry, as well as K.P.’s computer hard
    drive. The time-date stamps of the photos matched the times the chats were sent to their
    respective recipients.
    In light of all this evidence, we hold that the trial court did not abuse its discretion
    when it admitted the chats and the emailed photograph of a penis. To the extent that the
    Defendant argues that the State was required to affirmatively prove that the Defendant was
    the author of the message, we agree with reasoning from other jurisdictions that such
    challenge goes to the weight of the evidence, not its admissibility. See 
    Tienda, 358 S.W.3d at 646
    ; 
    Purdy, 945 N.E.2d at 381-82
    ; 
    Clevenstine, 891 N.Y.S.2d at 514
    .
    Within the Defendant’s challenge to the authentication of the Facebook chats and
    emails, he argues that the communications were inadmissable hearsay because the State
    failed to prove the Defendant was the author of the messages. However, his argument is
    waived because he made no hearsay objection to their introduction at trial. See Tenn. R.
    App. P. 36(a) (“Nothing in this rule shall be construed as requiring relief be granted to a party
    responsible for an error or who failed to take whatever action was reasonably available to
    prevent or nullify the harmful effect of an error.”).
    Sufficiency of the Evidence
    The Defendant challenges the sufficiency of the evidence solely as to the issue of
    whether he was the actual author of the chats and email containing the photo of a penis. The
    -18-
    Defendant argues that evidence was not sufficient to prove he was the author because the
    devices used to send the messages were not exclusively under his control and other
    individuals could have accessed his account. The State argues that direct evidence of
    authorship was not required and that the circumstantial evidence presented at trial was
    sufficient to support the jury’s verdict. We agree with the State.
    Our standard of review for a sufficiency of the evidence challenge is “whether, after
    viewing the evidence in the light most favorable to the prosecution, any rational trier of fact
    could have found the essential elements of the crime beyond a reasonable doubt.” Jackson
    v. Virginia, 
    443 U.S. 307
    , 319 (1979) (emphasis in original); see also Tenn. R. App. P. 13(e).
    Questions of fact, the credibility of witnesses, and weight and value to be given the evidence
    are resolved by the fact finder. State v. Cabbage, 
    571 S.W.2d 832
    , 835 (Tenn. 1978),
    superseded on other grounds by Tenn. R. Crim. P. 33 as stated in State v. Moats, 
    906 S.W.2d 431
    , 434 n.1 (Tenn. 1995). This Court will not reweigh the evidence. 
    Id. Our standard
    of
    review “is the same whether the conviction is based upon direct or circumstantial evidence.”
    State v. Dorantes, 
    331 S.W.3d 370
    , 379 (Tenn. 2011) (quoting State v. Hanson, 
    279 S.W.3d 265
    , 275 (Tenn. 2009)) (internal quotation marks omitted).
    A guilty verdict removes the presumption of innocence, replacing it with a
    presumption of guilt. State v. Bland, 
    958 S.W.2d 651
    , 659 (Tenn. 1997); State v. Tuggle,
    
    639 S.W.2d 913
    , 914 (Tenn. 1982). The defendant bears the burden of proving why the
    evidence was insufficient to support the conviction. 
    Bland, 958 S.W.2d at 659
    ; 
    Tuggle, 639 S.W.2d at 914
    . On appeal, the “State must be afforded the strongest legitimate view of the
    evidence and all reasonable inferences that may be drawn therefrom.” State v. Vasques, 
    221 S.W.3d 514
    , 521 (Tenn. 2007).
    The identity of the accused as the person who committed the offense for which he is
    on trial is a question of fact for the jury. State v. Williams, 
    623 S.W.2d 118
    , 120 (Tenn.
    Crim. App. 1981). The identity of an accused may be established either by direct evidence,
    circumstantial evidence, or a combination of the two. State v. Thompson, 
    519 S.W.2d 789
    ,
    793 (Tenn. 1975).
    To borrow a phrase from the trial court, this case contains a “plethora of
    circumstantial evidence” showing that the Defendant was the author of the communications
    with K.P. The chats were sent to K.P. late at night from a computer located in the
    Defendant’s bedroom. The email containing the photo of a penis was also sent late at night
    from a separate device, and the photo was found on the Defendant’s T-Mobile Blackberry.
    The Defendant’s wife testified that the computer’s password had been changed and she could
    no longer access the computer and that her children generally did not use the computer.
    While the computer was connected to the internet through an unsecured network, there was
    -19-
    no indication that someone had hacked into the Defendant’s accounts in order to
    communicate with K.P. Finally, in the chats themselves, the sender notes a familial
    relationship between the sender and K.P.; references K.P.’s upcoming family trip to Holiday
    World of which the Defendant was aware; and asked K.P. whether she played Mafia Wars,
    a game the Defendant often played. At trial the Defendant vigorously argued that someone
    else had gained access to his Facebook and Hotmail accounts and sent the messages and
    photos to K.P., but the jury clearly discredited his account of the events by returning a guilty
    verdict. Based on the evidence presented, we conclude that there was sufficient evidence for
    the jury to conclude that the Defendant was the author of the chats and email containing the
    photo of a penis and that his identity as the perpetrator of the offenses was established.
    Testimony Regarding Stepdaughter’s Fake Facebook Profile
    Finally, the Defendant argues that the trial court erred by prohibiting the Defendant
    from referring to a fake Facebook profile created by the Defendant’s stepdaughter. By
    prohibiting questions about said profile, the Defendant contends that the trial court denied
    him the right to “completely and effectively interrogate witnesses to elicit material evidence
    to support the Defense theory.” The State argues that the issue is waived because the
    Defendant failed to provide citations to the record or include portions of the transcripts in the
    record that may have contained substantive discussions of the issue. Alternatively, the State
    asserts that the trial court did not abuse its discretion in excluding such evidence because it
    was not relevant to the issues presented at trial and the Defendant was still able to argue that
    the State could not prove he was the author of the messages.
    Under the rules of this Court, “Issues which are not supported by argument, citation
    to authorities, or appropriate references to the record will be treated as waived in this court.”
    Tenn. Ct. Crim. App. R. 10(b). Additionally, the Defendant bears the burden of preparing
    a record which conveys “a fair, accurate, and complete account of what transpired with
    respect to those issues that are the bases of the appeal.” Tenn. R. App. P. 24(b); State v.
    Taylor, 
    669 S.W.2d 694
    , 699 (Tenn. Crim. App. 1983). When there was an evidentiary
    hearing regarding the issue presented for review, a transcript of the hearing must be included
    in the record. State v. Bennett, 
    798 S.W.2d 783
    , 789 (Tenn. Crim. App. 1990). Allegations
    contained in pleadings, counsel’s arguments and statements of facts contained in a brief or
    similar pleading, and counsel’s statements made in open court are not evidence. Id.; State
    v. Roberts, 
    755 S.W.2d 833
    , 836 (Tenn. Crim. App. 1988).
    When the record does not contain a transcript of the proceedings relevant to the issue
    presented for review, this Court is precluded from considering the issue. State v. Groseclose,
    
    615 S.W.2d 142
    , 147 (Tenn. 1981); 
    Roberts, 755 S.W.2d at 836
    ; State v. Jones, 
    623 S.W.2d 129
    , 131 (Tenn. Crim. App. 1981). In such cases, this Court conclusively presumes that the
    -20-
    evidence supports the trial court’s ruling. In re M.L.D., 
    182 S.W.3d 890
    , 894 (Tenn. Ct.
    App. 2005); 
    Roberts, 755 S.W.2d at 836
    ; State v. Baron, 
    659 S.W.2d 811
    , 815 (Tenn. Crim.
    App. 1983); 
    Taylor, 669 S.W.2d at 699
    .
    In this case, the Defendant has failed to provide any citations to the record to support
    his argument on this issue. Additionally, the trial court’s ruling on the issue is not clear from
    the record. The State filed a pretrial motion in limine regarding the stepdaughter’s fake
    Facebook profile, but the record on appeal does not contain an order on the motion. Before
    trial, the trial court commented on the evidence:
    My only thought on [the stepdaughter’s fake Facebook account] is simply that
    I wouldn’t make reference to it in the opening statement or in voir dire. If you
    want to bring it up on cross-examination or during your case in chief make
    sure you lay the proper foundation.
    So I’ll just reserve that motion until we get to trial and I can hear the
    evidentiary basis for whatever the question is being asked about that.
    Further, it appears that the jury-out hearings were not requested to be included in the
    transcripts of the trial, and we have no means to determining whether the issue was discussed
    at that time. The issue did arise during the Defendant’s testimony when the Defendant stated
    that his stepdaughter had a Facebook profile in which she posed as a man. The State
    objected and in a bench conference said, “This went specifically to the State’s motion in
    limine and it is a blatant, blatant violation of the Court’s previous order that it was not to be
    referenced without asking for prior Court permission” (emphasis added).
    It is unclear from the record whether the trial court made a final ruling on the
    admissibility of the Defendant’s stepdaughter’s fake Facebook profile—the trial court’s
    pretrial comment simply instructed the parties to lay a proper foundation for the testimony
    before it could be heard. However, the State’s objection during the Defendant’s testimony
    suggests that the trial court had made a ruling on the matter. There’s no indication in the
    record that the trial court made any further ruling on the issue, and we have no way of
    determining whether such a ruling was made during the jury-out hearings that were not
    included in the transcript. Therefore, because the Defendant bears the burden of preparing
    a record which conveys “a fair, accurate, and complete account of what transpired with
    respect to those issues that are the bases of the appeal” and failed to provide citations to the
    record to support his argument, we conclude that the Defendant waived the issue. See Tenn.
    R. App. P. 24(b); Tenn. Ct. Crim. App. R. 10(b).
    -21-
    Waiver notwithstanding, the Defendant’s argument is without merit because he fails
    to explain with specificity how testimony regarding his stepdaughter’s fake Facebook
    account was relevant to the issues presented at trial. The Defendant claims that testimony
    about the fake profile should have been admitted “to support the Defense theory.” We gather
    from his brief that, at trial, the Defendant wanted to assert either that someone created a fake
    Facebook profile under his name and communicated with K.P. or someone accessed his
    Facebook account and posed as him while chatting with K.P.
    The Defendant correctly states that individuals accused of a crime are entitled to
    present evidence that someone else committed the crime. Sawyers v. State, 
    83 Tenn. 694
    ,
    695 (1885). However, such evidence must be presented in accordance with the Tennessee
    Rules of Evidence. State v. Powers, 
    101 S.W.3d 383
    , 395 (Tenn. 2003). Under Tennessee
    Rule of Evidence 401, evidence must “tend to make the existence of any fact that is of
    consequence to the determination of the action more probable or less probable than it would
    be without the evidence.” Generally, irrelevant evidence is not admissible at trial. Tenn. R.
    Evid. 402.
    In this case, there was no dispute at trial that the Facebook chats were sent from the
    Defendant’s own Facebook profile; he admitted as much during his testimony. The
    Defendant did not argue that his stepdaughter authored the messages sent to K.P. or sent K.P.
    the photo of the penis. Therefore, we cannot determine how testimony regarding the
    stepdaughter’s fake Facebook profile would have been relevant to his defense that he was
    not the author of the chats with K.P.
    Further, the Defendant clearly asserted at trial that someone had gained access to his
    Facebook account and impersonated him in the chats with K.P. Throughout the investigation
    and trial, the Defendant categorically denied chatting with K.P. or sending her emails.
    Moreover, he elicited testimony from multiple witnesses that the chats were inconsistent with
    his previously observed behavior toward the victim. Additionally, multiple witnesses
    admitted that they could not confirm that the Defendant was the individual who had authored
    the communications sent to K.P. Even without testimony about the stepdaughter’s fake
    Facebook profile, the Defendant clearly was able to defend himself against the charges on
    the ground that the State could not prove his identity as the author beyond a reasonable
    doubt. Therefore, we conclude that this issue is without merit.
    III. Conclusion
    For the aforementioned reasons, we affirm the judgments of the trial court.
    _________________________________
    ROBERT L. HOLLOWAY, JR., JUDGE
    -22-