Skip to main content

Electronic Evidence and Electronic Signatures: Chapter 3

Electronic Evidence and Electronic Signatures
Chapter 3
    • Notifications
    • Privacy
  • Project HomeElectronic Evidence and Electronic Signatures
  • Projects
  • Learn more about Manifold

Notes

Show the following:

  • Annotations
  • Resources
Search within:

Adjust appearance:

  • font
    Font style
  • color scheme
  • Margins
table of contents
  1. Cover
  2. Title Page
  3. Copyright Page
  4. List of Contributors
  5. A note on our Creative Commons licence
  6. Dedication
  7. Contents
  8. Software is reliable and robust
  9. Preface
  10. Acknowledgments
  11. Table of statutes
  12. Table of cases
  13. 1. The sources and characteristics of electronic evidence and artificial intelligence
    1. Digital devices
      1. Processors
      2. Mobile devices
      3. Embedded devices
      4. Software
      5. Data storage facilities
      6. Data formats
      7. Starting a computer
    2. Networks
      1. Types of network
      2. Cloud computing
      3. The Internet of Things
      4. The deep web and the dark web
      5. Common network applications
    3. Types of evidence available on a digital device
      1. Files
      2. Metadata
      3. Imaging
      4. System and program logs
      5. Temporary files and cache files
      6. Deleted or ‘lost’ files
      7. Simulations, data visualizations, augmented and virtual reality
      8. Encryption and obfuscated data
    4. Artificial intelligence and machine learning
      1. Simulations, data visualizations, augmented and virtual reality
      2. Transparency and explainability
      3. AI adversarial attacks
    5. Defining electronic evidence
      1. The dependency on machinery and software
      2. The mediation of technology
      3. Speed of change
      4. Volume and replication
      5. Storage and disclosure
    6. Concluding remarks
  14. 2. The foundations of evidence in electronic form
    1. Direct and indirect evidence
    2. Evidence in both digital and analogue form
    3. Metadata and electronic evidence
    4. Means of proof
      1. Testimony and hearsay
      2. Real evidence
    5. Documents and disclosure or discovery
    6. Visual reading of a document
    7. Authentication
    8. Best evidence
    9. Analogue evidence
    10. Digital evidence
    11. Civil proceedings
    12. Criminal proceedings
    13. Admissibility
    14. Weight
    15. Video and audio evidence
      1. Testimonial use in legal proceedings
      2. Identification and recognition evidence
    16. Computer-generated animations and simulations
      1. Computer-generated evidence in England and Wales: civil proceedings
      2. Computer-generated evidence in England and Wales: criminal proceedings
  15. 3. Hearsay
    1. The rule of hearsay exclusion and its rationale
    2. The right of confrontation
    3. Hearsay and electronic evidence
    4. Electronic evidence and real evidence
    5. Testimonial and non-testimonial use of information
    6. Implied assertions
    7. Civil proceedings and the requirement to give notice
    8. Criminal proceedings
      1. Telephone calls and messages
      2. Representations other than by a person
      3. Body-worn camera footage
      4. Business and other documents
      5. Judicial discretion to include hearsay
      6. Judicial discretion to exclude hearsay
    9. Concluding observations
  16. 4. Software code as the witness
    1. The classification of digital data
      1. Category 1: Content written by one or more people
      2. Category 2: Records generated by the software that have not had any input from a human
      3. Category 3: Records comprising a mix of human input and calculations generated by software
    2. Challenging the code to test the truth of the statement
  17. 5. The presumption that computers are ‘reliable’
    1. The purpose of a presumption
    2. Presumptions and mechanical instruments
    3. Judicial formulations of the presumption that mechanical instruments are in order when used
      1. Judicial notice
      2. A ‘notorious’ class
      3. Common knowledge
    4. Evidential foundations of the presumption
    5. How judges assess the evidence of devices controlled by software
    6. Mechanical instruments and computer-like devices
    7. The nature of software errors
      1. Why software appears to fail
      2. Classification of software errors
    8. The development, maintenance and operation of software
      1. Developmental issues and software errors
      2. Increasing the risk of errors through modification of software
      3. Security vulnerabilities
      4. Software testing
      5. Writing software that is free of faults
      6. Software standards
      7. Summary
    9. Challenging ‘reliability’
      1. Aviation
      2. Financial products
      3. Motor vehicles
      4. Emergency services
      5. Medical
      6. The Post Office Horizon scandal
      7. Banking
      8. Interception of communications
    10. Most computer errors are either immediately detectable or result from input errors
    11. Challenging the authenticity of digital data – trial within a trial
      1. A protocol for challenging software in devices and systems
    12. Reintroduction of the common law presumption
    13. The statutory presumption
    14. Challenging the presumption
      1. ‘Working properly’
    15. Concluding remarks
  18. 6. Authenticating electronic evidence
    1. Authenticity and authentication
      1. An example: email
      2. Digital evidence compared to past paradigms
      3. Admissibility and authentication
      4. The best evidence rule
      5. Identity and integrity
      6. Reliability
    2. Methods of authentication
      1. Self-authentication
      2. System authentication
      3. Digital certification
      4. Digital forensics
      5. Extrinsic and circumstantial evidence
      6. Judicial notice
      7. Digital evidence in archival systems
    3. Technological authentication
      1. Digital signatures
      2. Blockchain
    4. Challenges to the authenticity of evidence in digital form
      1. The cloud
      2. The Internet of Things
      3. Digital preservation
      4. Migration and format changes
    5. The business records exception to the rule against hearsay
      1. The business records exception
      2. Authentication of digital business records
    6. Conclusion
  19. 7. Electronic signatures
    1. The purpose of a signature
    2. Dictionary definitions
    3. The manuscript signature
    4. Statutory definition of signature
    5. The functions of a signature
      1. The primary evidential function
      2. Secondary evidential functions
      3. Cautionary function
      4. Protective function
      5. Channelling function
      6. Record-keeping function
    6. Disputing a manuscript signature
      1. Defences
      2. Evidence of the manuscript signature
      3. Intention to authenticate and adopt the document
    7. The electronic signature
    8. Forms of electronic signature
      1. Authority, delegation and ratification
      2. Forged signatures
    9. Evidence of intent to sign
      1. The automatic inclusion of the signature
      2. Partial document with separate signature page
    10. The Electronic Communications Act 2000
      1. The definition of an electronic signature
      2. The elements of an electronic signature
      3. Liability of a certification service provider
      4. The power to modify legislation
      5. Regulation of Investigatory Powers Act 2000
    11. Electronic sound
    12. The ‘I accept’ and ‘wrap’ methods of indicating intent
      1. Click wrap
      2. Browse wrap
      3. ‘I accept’
    13. Personal Identification Number (PIN) and password
    14. Typing a name into an electronic document
      1. Acts by a lawyer as agent
      2. Interest in real property
      3. Loan of money
      4. Employment
      5. Contract
      6. Guarantees and debt
      7. Public administration, the judiciary and the police
      8. Statute of Frauds
      9. Wills
      10. Constitution of a legal entity
      11. Amending boilerplate contractual terms
    15. The name in an email address
      1. Limitation Act 1969 (NSW)
      2. Statute of Frauds
      3. Legal fees arrangement
      4. Civil Law Act
    16. A manuscript signature that has been scanned
      1. Mortgage redemption
      2. Writing
      3. Employment
    17. Biodynamic version of a manuscript signature
      1. Electoral register
      2. Contract formation
    18. Digital signatures
      1. Technical overview of digital signatures
      2. Algorithms and keys
      3. Control of the key
      4. Disguising the message
      5. Public key infrastructure
      6. Difficulties with public key infrastructure
      7. Authenticating the sender
      8. The ideal attributes of a signature in electronic form
      9. Methods of authentication
      10. Types of infrastructure for asymmetric cryptographic systems
      11. Management of the key and certificate
      12. The duties of a user
      13. Internal management of a certification authority
      14. Barriers to the use of the public key infrastructure
      15. Risks associated with the use of digital signatures
      16. What a digital signature is capable of doing
      17. What no form of electronic signature is capable of doing
      18. The weakest link
      19. The burden of managing the private key
      20. Evidence and digital signatures
      21. ‘Non-repudiation’
      22. Certifying certificates
      23. The burden of proof
      24. The recipient’s procedural and due diligence burden
      25. The sending party: the burden of proof of security and integrity
      26. Burden of proof – the jitsuin
      27. Burden of proof – summary
  20. 8. Encrypted data
    1. Encryption
    2. Methods to obtain encrypted data
      1. Breaking the encryption without obtaining the key
      2. Obtaining the key
    3. Compelling disclosure in England and Wales
      1. Protected information
      2. Notice requiring disclosure
      3. Obligations of secrecy and tipping off
      4. Circumventing the procedure
    4. The privilege against self-incrimination
      1. England and Wales
      2. The USA
      3. Canada
      4. Belgium
    5. Concluding observations
  21. 9. Proof: the technical collection and examination of electronic evidence
    1. Accreditation of the digital forensics discipline
    2. Guidelines for handling digital evidence
    3. Handling electronic evidence
      1. Identifying electronic evidence
      2. Gathering electronic evidence
      3. Gathering of data following legal retention or reporting obligations
      4. Copying electronic evidence
    4. Forensic triage
      1. Preserving electronic evidence
    5. Analysis of electronic evidence
      1. Tools
      2. Traces of evidence
    6. Reporting
    7. Analysis of a failure
    8. Anti-forensics and interpretation of evidence
      1. Data destruction
      2. Falsifying data
      3. Hiding data
      4. Attacks against computer forensics
      5. Trail obfuscation
    9. An intellectual framework for analysing electronic evidence
    10. Conclusions and future considerations
  22. 10. Competence of witnesses
    1. The need for witnesses
    2. Separating data reliability from computer reliability
    3. Lay experts as witnesses
    4. Qualification of witnesses
  23. Appendix 1: Draft Convention on Electronic Evidence
  24. Appendix 2: Cumulative vignettes
  25. Index

3

Hearsay

Daniel Seng and Stephen Mason

3.1 The much-maligned evidential rule of hearsay exclusion has been subject to some interesting challenges in many common law jurisdictions since 2005. An anathema to lawyers of the civil or administrative law system and seemingly largely misunderstood in its complexity by many common law lawyers, the hearsay rule has been supplemented in some respects and undermined in others by various legislative reforms in both civil and criminal proceedings. This chapter does not seek to provide a comprehensive exposé of the hearsay rule. However, in drawing the rule back to its historical foundation we will, in part, consider its relevance in the context of electronic evidence and attempt to demonstrate the application of hearsay to evidence in electronic form.

The rule of hearsay exclusion and its rationale

3.2 We begin with a traditional definition of the hearsay rule. Sir Rupert Cross defined the hearsay rule of evidence in these terms: ‘[A]‌ statement other than one made by a person while giving oral evidence in the proceedings is inadmissible as evidence of any fact stated’.1 In offering this definition, Sir Rupert Cross intentionally conflates in one definition the rule against self-corroboration with the rule against hearsay in the narrow sense,2 to both encompass and contrast the situations where the witness who made the statement is either available to testify (the rule against self-corroboration) or unable to testify (the rule against hearsay in the narrow sense). If a witness’s earlier statement is sought to be admitted of the facts therein, it is at common law inadmissible except as an informal admission provided against that witness or as part of the res gestae rule.3 And where it is so admitted, it is not as evidence of the truth of the assertions contained in them.4 If the witness’s earlier statement is in the form of electronic evidence, this does not change the application of this rule, and does not engage the rule against hearsay.

Daniel Seng and Stephen Mason, ‘Hearsay’, in Stephen Mason and Daniel Seng (eds.), Electronic Evidence and Electronic Signatures (5th edn, University of London 2021) 85–111.

1Sir Rupert Cross, Evidence (5th edn, Butterworths 1979) 6, emphasis added. In his first edition, Phipson stated his definition of hearsay as ‘Oral or written statements made by persons not called as witnesses are not receivable to prove the truth of the matters stated’: Sidney L. Phipson, The Law of Evidence (Stevens and Hayes 1892) 117. See also the definition suggested by Charles Cato, who preferred to see hearsay limited to ‘unsworn utterances containing narrative assertion, where it is a suggestion for reform’; ‘Verbal acts, res gestae and hearsay: a suggestion for reform’ (1993) 5(1) Bond LR 72, 73.

2Roderick Munday, Cross & Tapper on Evidence (13th edn, Oxford University Press 2018) 563 (hereinafter Cross & Tapper).

3Cross & Tapper, 563.

4Cross & Tapper, 587.

3.3 Turning to the rule against hearsay, the most widely accepted judicial formulation of the rule is as follows:

Evidence of a statement made to a witness by a person who is not himself called as a witness may or may not be hearsay. It is hearsay and inadmissible when the object of the evidence is to establish the truth of what is contained in the statement. It is not hearsay and is admissible when it is proposed to establish by evidence, not the truth of the statement, but the fact that it was made.1

1Subramaniam v Public Prosecutor [1956] 1 WLR 965 at 969, [1956] 7 WLUK 26, (1956) 100 SJ 566, [1956] CLY 7051.

3.4 The hearsay rule is prompted when the testimony of a witness as to what a declarant said is admitted in evidence to establish its truth, but not otherwise. Hearsay evidence is thus subject to at least four clear vulnerabilities: belief by the declarant that X exists (the risk of impaired perception), justification for the declarant’s statement that ‘X exists’ (bad memory, ambiguity and insincerity), confirmation that the witness correctly heard the declarant as having said ‘X exists’ (impaired perception) and justification for the witness in repeating that statement (the duplicated risks of bad memory, ambiguity and insincerity).1 Hearsay therefore increases these risks because it has to contend not only with the testimony of the witness, but also with the testimony of the declarant. This is because the usual safeguards that apply in relation to ordinary testimony must also apply to second-hand evidence,2 since there is no link between the testimony of the witness and the declarant’s proposition that ‘X exists’ that is sought to be supported.

1Cross & Tapper, 564. See also John H. Wigmore, A Treatise on the Anglo-American System of Evidence in Trials at Common Law (3rd edn, Little Brown 1940) para 478; Edmund M. Morgan, ‘Hearsay dangers and the application of the hearsay concept’ (1948) 62(2) Harv L Rev 177; Laurence H. Tribe, ‘Triangulating hearsay’ (1974) 87(5) Harv L Rev 957; and Michael H. Graham, ‘Stickperson hearsay: a simplified approach to understanding the rule against hearsay’ (1982) 4 U Ill L Rev 887; Edward W. Cleary (ed), McCormick on Evidence (West Publishing Co 1984) para 245.

2That is, evidence that is more than one remove from the first statement, or ‘irrespective of the number of intermediate communications between the original source and the testifying witness’: Colin Tapper, Cross & Tapper on Evidence (12th edn, Oxford University Press 2010) 552 fn 9; the authors of Australian Law Reform Commission, Uniform Evidence Law (Report No 102, 2006) refer throughout to ‘second-hand’ hearsay evidence.

3.5 Thus, some academics have advanced the argument that ‘[t]‌he basic rationale of the hearsay rule rests on the right of cross-examination’.1 ‘The central reason for the presumptive exclusion of hearsay statements is the general inability to test their reliability. Without the declarant in court, it may be impossible to inquire into the declarant’s perception, memory, narration or sincerity.’2 However, it should also be noted that cross-examination is only one way to test evidence: if it is the rationale for hearsay, evidence which is inherently reliable or which can be evaluated for reliability without the need for cross-examination could be admitted.3

1Cross & Tapper, 565; James Allan, ‘The working rationale of the hearsay rule and the implications of modern psychological knowledge’ [1991] 44 CLP 217. On the dangers of hearsay evidence, see Morgan, ‘Hearsay dangers and the application of the hearsay concept’, 178–179. On the perceived virtues of cross-examination, see 2 Bl Comm 373, where Sir William Blackstone stated that examination through ‘viva voce, in the presence of all mankind, is much more conducive to the clearing up of truth’, and Matthew Hale, History and Analysis of the Common Law of England (J. Nutt 1713) 258, https://constitution.org/1-Constitution/cmt/hale/history_common_law.htm (cited in the US Supreme Court case of Crawford v Washington, 541 U.S. 36 (2004)), where it is said that cross-examination ‘beats and boults out the Truth much better than when the Witness only delivers a formal Series of his Knowledge without being interrogated’. The Supreme Court of Canada proclaimed cross-examination as ‘the optimal way of testing testimonial evidence’: R v Khelawon 2006 SCC 57 (CanLII), [2006] 2 SCR 787 at [35].

2R v Khelawon [2006] 2 SCR 787, para 2.

3Elisabeth McDonald, ‘Going “Straight to basics”: the role of Lord Cooke in reforming the rule against hearsay – from Baker to the Evidence Act 2006’, (2008) 39(1) VUWLR 143, 156. Focusing on the right of cross-examination would also mean that the rule against self-corroboration cannot be justified, and that out-of-court statements of witnesses are outside the hearsay rule. See e.g., New Zealand Evidence Act 2006, s 18(1)(b)(i) (defining admissible hearsay as including any reliable statement that is made by a person who is available as a witness).

The right of confrontation

3.6 A further, apparently important but ill-defined foundation of the hearsay rule that is related to the right of cross-examination is the right to confront an accuser as an essential element of the right to a fair trial. It was on this basis that the United States Supreme Court in Crawford v Washington held that where cross-examination is not possible for the testimonial statements of witnesses who have since become unavailable, the statements are inadmissible.1

1Crawford v Washington 124 S.Ct. 1354 (2004), 541 U.S. 36 (2004).

3.7 The right to confront draws on the notion that the right to humane treatment and procedural integrity both feel undermined by the admission of hearsay evidence.1 Although expressly established in the Constitution of the United States2 and in the European Convention of Human Rights,3 a review shows that in other common law jurisdictions there is no ‘right’ per se of confrontation for hearsay evidence.4 As the UK Supreme Court explained in Horncastle, under the common law system of trial by jury, the conditions relating to the admissibility of hearsay evidence (including exceptions to the hearsay rule), combined with the trial judge’s role as gatekeeper in applying them and her general residual discretion to exclude prejudicial or unfair evidence from going before the jury, provide the appropriate assurance in guaranteeing a fair trial.5 This greatly reduces the influence of this right as justification for the hearsay rule.

1For discussion of the foundation of this right and its modern legitimacy, see Mike Redmayne, ‘Confronting confrontation’ in Paul Roberts and Jill B. Hunter (eds) Criminal Evidence and Human Rights: Reimagining Common Law Procedural Traditions (Hart Publishing 2012), 283–308 (the text of this chapter is also an LSE Law, Society and Economy Working Paper, No 10/2010, http://eprints.lse.ac.uk/32897/1/WPS2010-10_Redmayne.pdf). See also Toni M. Massaro, ‘The dignity value of face-to-face confrontations’ (1998) 40(5) U Fla L Rev 863.

2US Const. amend. VI (‘In all criminal prosecutions, the accused shall enjoy the right … to be confronted with the witnesses against him’).

3European Convention on Human Rights, article 6(3)(d). In Al-Khawaja v United Kingdom (26766/05) Tahery v United Kingdom (22228/06) [2011] 12 WLUK 533, [2012] 2 Costs LO 139, (2012) 54 EHRR 23, 32 BHRC 1, [2012] Crim LR 375, Times, 22 December 2011, [2012] CLY 657, it was held that the defendant was entitled to examine the maker of a statement admitted in evidence who was not called as a witness, where the statement was the sole, or at least the decisive, basis for the defendant’s conviction.

4R. v Horncastle (Michael Christopher) [2009] UKSC 14, [2010] 2 AC 373, [2010] 2 WLR 47, [2010] 2 All ER 359, [2009] 12 WLUK 249, [2010] 1 Cr App R 17, [2010] HRLR 12, [2010] UKHRR 1, [2010] Crim LR 496, (2009) 153(48) SJLB 32, Times, 10 December 2009, [2010] CLY 658. The UK Supreme Court declined to follow Al-Khawaja and Tahery.

5R. v Horncastle (Michael Christopher) [2010] 2 AC 373 at [41].

3.8 United States jurisprudence also suggests waning support for this rationale as justification for the hearsay rule. Even though any ‘testimonial’ evidence in respect of which there has been or can be no cross-examination is excluded, it has also been held that hearsay exceptions including dying declarations and non-testimonial evidence such as business records and statements in furtherance of a conspiracy are not excluded by the Confrontation Clause.1 As the Supreme Court itself recognized, the right of confrontation was not absolute and exceptions to the hearsay rule are valid inroads on the right of confrontation.2

1Crawford v Washington 124 S.Ct. 1354 (2004) at 1367, 1376.

2Crawford v Washington 124 S.Ct. 1354 (2004) at 1377, citing U.S. v Burr, 25 F.Cas. 187 (1807) at 193.

Hearsay and electronic evidence

3.9 For these reasons, we adopt the broader view taken by Stein that the rule against hearsay exists as a rule of evidence that properly allocates the risk of error. Confirmed risks that can be eliminated or avoided1 are part of the fundamental ‘principle of maximal inferential individualization’, which Stein described as follows:

(1) No adverse inference should be drawn against the defendant, unless it has been exposed to and survived the maximal individualized testing;

(2) This includes every practical possibility of testing the applicability of the inference in question to the individual defendant’s case;

(3) The defendant should accordingly be provided with appropriate immunities from the risk of error.2

1Alex Stein, ‘The refoundation of evidence law’ (1996) 9(1) CJLJ 279, 326–328.

2Stein, ‘The refoundation of evidence law’, 326–327.

3.10 Admitting hearsay thus denies to the party adversely affected by the evidence the opportunity to test all of the inculpatory arguments that transform the evidence.1 Hearsay evidence is excluded, not because a court could not be assured of its reliability, but that its reliability was effectively unknowable due to, among other things, the absence of an ability to cross-examine. Furthermore, in the interest of fairness to the adversely affected party, as part of the exclusionary strategy of the principle of maximal inferential individualization, such a line of inquiry should not be allowed to begin.2 This is because admitting hearsay will expose the adversely affected party to the possibility of not being able to test every practical possibility of the hearsay inference to the proponent’s case, thereby introducing ‘value-preferences’ that threaten the overall coherence of the proceedings.3

1Stein, ‘The refoundation of evidence law’, 326–327.

2Stein, ‘The refoundation of evidence law’, 327.

3Stein, ‘The refoundation of evidence law’, 326 and following, would describe this as an avoidable risk of error in proceedings.

3.11 Based on the discussion thus far, it could be possible to conclude that electronic evidence will not initiate the hearsay rule because records in digital form are ‘non-testimonial’ and that the hearsay rule focuses only on the ‘human-centric’ nature of statements. This would be wrong. In fact, because of the third (and some would argue fourth) industrial revolution and the digital economy, ever-increasing amounts of information are now in digital form.1 The digital revolution has forced companies and individuals alike to record, use, transform and generate information in complex ways. ‘Our reality [is now defined] in written records, oral communications, and immersive experiences’ that are in electronic form.2 Global interconnectedness and reliance on electronic information, especially to cope with the speed of change, has led to the development of increasingly complex information systems that have outpaced much of existing jurisprudence. It follows that it is necessary to fundamentally reconsider their justification and underlying rationale. For the rules of evidence, the question should be the relevance, if any, of the rule against hearsay in relation to this shift in evidence from physical form to digital form. In reality, the difficult application of the hearsay rule of exclusion to electronic evidence has been considered to be complex and confusing.3

1For example, see Peter Lyman and Hal R. Varian, ‘How much information?’ (2003), https://www2.sims.berkeley.edu/research/projects/how-much-info-2003/printable_report.pdf.

2George L. Paul, ‘Systems of evidence in the age of complexity’ (2014) 12(2) Ave Maria L Rev 173.

3Colin Tapper, ‘Reform of the law of evidence in relation to the output from computers’ (1995) 3(1) IJLIT 79 for a critique and suggestion that the rule should be abolished.

3.12 In this regard, a useful tool for evaluating electronic evidence under the hearsay rule and for sharpening the evidential analysis is, first, to classify the type of device that is used to produce the evidence in question:

Data processing devices can be classified into the following categories [these are discussed in more detail in Chapter 4]:

[category 1] devices which accept human-supplied input and reproduce human-supplied output,

[category 2] self-contained data processing devices that obtain input or take recordings from the environment without human intervention, and

[category 3] devices which are a hybrid of the two. 1

1Daniel Seng, ‘Computer output as evidence’ (1997) 130 Sing JLS 173.

3.13 After identifying the device, the next step is to analyse the use that is made of the output of the device to determine if its use is testimonial: that is, if the output is tendered for the matter stated in the output as a fact, or otherwise.1

1Notwithstanding the statutory abrogation of the hearsay rule, the analysis of whether the use of the evidence is testimonial remains pertinent in relation to the conditions which have to be satisfied for the statement to be admissible. A further discussion follows.

3.14 Category 1 relates to the use of data processing devices primarily to store and record content that is written or spoken by one or more persons. Category 1 devices operate primarily to receive human input and store that same input for subsequent retrieval. When such information is retrieved, most of the time it is principally used for the testimonial content of the human input. As an antecedent to the storage and recording functions of these devices, this information may be recorded, digitized, compressed and processed in some way before being stored on the device or some other platform. There may be further processing or ingestion in the form of activation of the device for recording, transcribing or indexing the recording to facilitate its retrieval.

3.15 Evidence produced by Category 1 devices is therefore generally hearsay, even though it is the product of automation, because these devices are used primarily as recording devices for the evidential value of human input. Examples include lists of contacts and their information in mobile devices, text messages and email correspondence between parties – the only difference between paper-based documentation and such records is that their creation, capture and storage are done electronically. The Singapore case of Aw Kew Lim illustrates this point well.1 In this case, the accused were charged with the copyright offence of possession of illegally copied gramophone records for sale. To prove that the accused were owners of the shop that was searched and found to have the records in question, the prosecution tendered in evidence a computer printout from the official government Registry of Companies and Businesses that identified the name of the firm, other company registration information and the names and addresses of the accused as directors. The court ruled that the information about the names of the accused was inadmissible as hearsay. As the court explained, the printout contained information that was derived from some other source such as a database or an original document, which would be inadmissible hearsay, even if that printout had been correctly certified.2 To put it another way, the printout was admitted because it recorded the fact that ‘[the six accused] were directors of [company X]’. This is a hearsay use of the electronic evidence enabled by the recordation function of the device.

1Aw Kew Lim v PP [1987] SLR(R) 443, [1987] 2 MLJ 601.

2Aw Kew Lim v PP [1987] SLR(R) 443 at [9]‌.

Electronic evidence and real evidence

3.16 Category 2 devices (records generated by software that have not had any input from a human), simply put, generate evidence that is substantially the product of automation. Digital cameras and video recorders are the ubiquitous example of Category 2 devices. Fundamentally, after some form of manual setup, these devices work autonomously by collecting light information via digital sensors and converting that via digital processing into digital form. After some additional processing, depending on the specifications and features of these cameras and recorders, the digitized images or video streams are stored or recorded. When the images or videos are retrieved, they are used to replicate the input or environment within which these devices are situated.

3.17 English courts appear relatively sanguine in admitting ANPR (automatic number plate recognition) evidence, without raising any noted hearsay challenges.1 The primary reason for the absence of challenges is that, typically, photographs and video recordings, such as ANPR evidence made from Category 2 devices, are not used ‘testimonially’: they are considered real evidence. Real evidence is ‘an independent species of evidence as [its] production calls upon the court to reach conclusions on the basis of its own perception, and not on that of witnesses directly or indirectly reported to it’.2 The genesis for its modern application to electronic evidence may be found in Re The Statue of Liberty, where the issue was whether the cinematograph film recordings of a navigational traffic radar system were admissible to prove the movements of the vessels that had collided. Sir Jocelyn Simon P held that they were. His Lordship opined, at 195 (emphasis added):

In my view the evidence in question in the present case has nothing to do with the hearsay rule … It is in the nature of real evidence, which is conveniently defined in Cockle’s Cases and Statutes on Evidence (10th Edn. 1963) …:

‘Real evidence is evidence afforded by the production of physical objects for inspection or other examination by the court.’

… The law is bound these days to take cognisance of the fact that mechanical means replace human effort.3

1For example, see R. v Doyle (Hugh), R. v Wood (Carl), R. v Lincoln (William) [2017] EWCA Crim 340, [2017] 2 WLUK 194, where hearsay challenges were raised on appeal in relation to the covert listening devices placed on the defendants’ cars, but not in relation to the automatic number plate recognition evidence as part of the evidence of the movement of those cars. Likewise, hearsay challenges were raised, but not in relation to the automatic number plate recognition evidence, in R. v Brown (Nico) [2019] EWCA Crim 1143, [2019] 1 WLR 6721, [2019] 7 WLUK 41, [2019] 2 Cr App R 25, [2020] Crim LR 71, [2019] CLY 647.

2Cross & Tapper, 58.

3The Statue of Liberty Owners of Motorship Sapporo Maru v Owners of Steam Tanker Statue of Liberty [1968] 1 WLR 739, [1968] 2 All ER 195, [1968] 1 Lloyd’s Rep 429, [1968] 3 WLUK 65, (1968) 112 SJ 380, [1968] CLY 1546, admitting as real evidence radar set recordings of nautical traffic.

3.18 It is also for this reason that the digital audio recorder is an example of either a Category 1 or a Category 2 device, depending on its use. From a technical standpoint, the analogue sound waves produced by human speech or sounds are captured by the microphones on such recorders, converted into digital form by the use of digital signal processing techniques and then further processed (for instance, compressed, tagged or indexed), before the digitized representation of sound is stored or recorded. Whether the recording made by a digital audio recorder is hearsay will depend on whether it is used as evidence testimonially. For instance, if Amazon Echo recordings of conversations were used as evidence of the incidents that allegedly took place in households being investigated, the recording would be an experiential reproduction of the context of the offences allegedly being committed.1 In other words, it is used as a surveillance tool – a Category 2 device. On the other hand, if the Echo is used as a dictation tool to record the user as saying ‘X exists’, such a use as evidence that ‘X exists’ would be testimonial and would be excluded as hearsay. In those circumstances, it would be a Category 1 device.

1For example, see Michael Harrigan, ‘Privacy versus justice: Amazon’s First Amendment battle in the cloud’, (2017) 45 W St L Rev 91; Robert D. Lang and Lenore E. Benessere, ‘Alexa, Siri, Bixby, Google’s Assistant, and Cortana testifying in court’, (2018) 74 J Mo B 20; John G. Browninga and Lisa Angeloa, ‘Alexa, testify new sources of evidence from the Internet of Things’ (2019) 82 Tex BJ 506.

3.19 But while real evidence from Category 2 devices does not amount to ‘assertions’ that are caught by the hearsay rule, this does not mean that such evidence is automatically admissible. All relevant evidence is generally considered admissible only if a proper foundation has been laid for its admission: this will be by way of satisfying the authentication requirements of the laws of evidence. A more detailed discussion of the authentication evidence in general and specific challenges to the reliability and accuracy of electronic evidence can be found in Chapter 6.

3.20 In many circumstances, the proponent of the electronic evidence, usually the prosecutor, would, in the absence of foundation evidence, seek to circumvent the requirement for foundation evidence by relying on the doctrine of omnia praesumuntur rite esse acta or presumption of reliability. However, this presumption is not a suitable substitute for authentication, particularly in relation to complex and sui generis devices and systems. It is often ill-appreciated that foundation evidence must also be sought before there can be reliance on the presumption itself. And the scope and effect of the presumption has often been misunderstood. A more detailed discussion of the presumption of reliability as applied to devices that produce electronic evidence can be found in Chapter 5.

Testimonial and non-testimonial use of information

3.21 A large proportion of electronic evidence, however, will be evidence produced by Category 3 devices (records comprising a mix of human input and calculations generated by software). In this category, the device functions through a mix of human-supplied input and produces data output without further human intervention. The human input could be in the form of the initial calibration of such devices or their internal programming. These are ex facie testimonial input of some form in the absence of further elucidation. Even machine learning systems – the epitome of autonomous systems – have varying levels of reliance and dependence on human-labelled data, choices and configurations to enable their proper autonomous operations.

3.22 The line between Category 2 and Category 3 devices can be hard to draw: the difference is one of degree that represents the relative significance of the level of contribution of human-supplied input and pre-programmed autonomous processes to the eventual output, and the extent to which the testimonial input qualifies the (purportedly) non-testimonial use of the output. In Wood, for instance, the admissibility of chromatograph and spectrometer outputs as real evidence was supported by the oral testimony of the chemists who calibrated and operated the machines, as well as the programmers of the program who analysed the chromatograph and spectrometer outputs, leading the courts to characterize the processes of recording, processing and calculating the testing sample as operating without human intervention. The Court of Appeal in Wood, in characterizing the test results as real evidence, said:

This computer was rightly described as a tool. It did not contribute its own knowledge [but] merely did a sophisticated calculation which could have been done manually by the chemist and was in fact done by the chemists using the computer programmed by the [programmer] whom the Crown called as a witness. The fact that the efficiency of a device is dependent on more than one person does not make any difference in kind. Virtually every device will involve the persons who made it, the persons who calibrated, programmed or set it up … and the person who uses or observes the device. In each particular case how many of these people it is appropriate to call must depend on the facts of, and the issues raised and the concessions made in that case. 1

1R v Wood (Stanley William) [1982] 6 WLUK 191, (1983) 76 Cr App R 23, [1982] Crim LR 667, [1983] CLY 636 at 27 (emphasis added).

3.23 It could be argued that the phrase ‘it did not contribute to its own knowledge’ (as noted above) is a misleading representation of the testimonial input of the chemists and programmers. When programmers set up instructions (or code) in devices, it is these instructions which are followed by the devices to process the input received. These instructions amount to conditional statements embedded in such devices.1 But it is clear that the effect of the supporting testimonies of the chemists and programmers is that it is only the non-testimonial parts of the chromatograph and spectrometer outputs – the analysis results – that are being relied on by the courts. In contrast, in Mehesz v Redman2 the electronic evidence of blood alcohol concentration was produced by a chromatograph that had to be calibrated using a pre-prepared standard. The chromatograph was in turn coupled to a data analyser which had to be manually configured by following an instruction manual prior to its use to produce the concentration analysis. Only one of the two analysts who ran the tests testified. He also admitted to not following the instruction manual and making changes to the configuration of the analyser. Bereft of the testimony of the second analyst who ran the second test (two tests were run and the results averaged for the final concentration report), the testimony of the programmer of the data analyser, as well as the instruction manual, the court upheld the objection as to the admissibility of the final printout from the analyser. Zelling J of the South Australian Supreme Court pointed out that because the calibration depended on a standard prepared by somebody, the final result was the average of two analyses and the second person was not called, and because the instructions in the manual were not followed, ‘there was no overall evidence called from an expert as to the trustworthiness of the computer itself … under these circumstances the objection as to hearsay should have been sustained’.3 Likewise, in Holt v Auckland City Council,4 which concerned a similar setup of a chromatograph with a data analyser (and almost similar lack of evidence), the court held that the final output was ‘inadmissible as incorporating hearsay data outside the field of [the analyst’s] proven competence’.5

1Steve W. Tepper, ‘Testable reliability – a modernized approach to ESI admissibility’ (2014) 12(2) Ave Maria L Rev 213, 231–233. For this reason, Tepper argues that all output generated by programmed devices is hearsay, 238, 240.

2(1979) 21 SASR 569.

3(1979) 21 SASR 569 at 573.

4[1980] 2 NZLR 124.

5[1980] 2 NZLR 124 at 128–129.

3.24 There is much to commend in the detailed analyses undertaken in Mehesz and Holt. They attempt to resolve the different components of the electronic evidence into its testimonial and non-testimonial components, identify the programmers as declarants responsible for each of the components, require each declarant to explain how she was responsible for her respective testimonial component, and justify the results that arise from each non-testimonial component. This analysis approach more accurately reflects the reality that modern-day devices and computers are complex systems1 subject to inevitable faults and errors,2 clearly part of the ‘heightened reliability and testability’ regime proposed by Tepper,3 and consonant with the principle of maximal inferential individualization advanced by Stein.4 For instance, if the contents of text messages and email correspondence are to be used testimonially and constitute hearsay, some metadata associated with such messages and correspondence, such as the date and time of transmission and receipt and the routing paths, would be generated by Category 2 devices without human intervention. Such metadata is produced as a consequence of software code, and subject to the tests of authentication, reliability and testability, it could constitute real evidence and be independently admissible.

1Paul, ‘Systems of evidence in the age of complexity’.

2Peter Bernard Ladkin, ‘Robustness of software’ (2020) 17 Digital Evidence and Electronic Signature Law Review 15.

3Tepper, ‘Testable reliability’, 247–250 (citing in support the decision of State v Swinton, 847 A.2d 921 (Conn. 2004) at 924, in which the Supreme Court of Connecticut declared that reliability is an essential precondition of admissibility).

4‘Maximal inferential individualization is the Stein doctrine for describing maximum testing of all individual inferences possible from the evidence. It restates the importance of rules of evidence and seeks to avoid the use of discretion and ambiguous rules in place of rules of evidence. The point that Stein made is that the rules operate to avoid subjecting the opponent of the evidence to ‘the impermissible risk of error’, which he called ‘a special kind of moral injustice’ if it is not avoided (Stein, ‘The refoundation of evidence law’, 325–326).

3.25 But we caution against treating the test of reliability as the ultimate aim for this hybridized hearsay-authentication analysis of electronic evidence. The concept of ‘reliability’ is a value-loaded concept that varies depending on, among other things, the specifications of the device, the purposes to which the device has been put and the underlying social concepts that it seeks to protect.1 For instance, it is well known that devices that operate on neural networks have statistically modelled accuracy, precision and recall measurements of reliability. It is also well known that there are two estimates of such parameters: using the data on hand and using unavailable data. The latter obviously cannot be done (‘you do not know what you do not know’) and has to be an estimate. This explains why a problem or situation that occurs only outside normal operating parameters (called ‘corner cases’), or errors that occur in open environments which subject the device to situations or environments outside normal operating parameters, are so difficult to ascertain. That is not to say that it is impossible to ascertain the ‘reliability’ of devices and systems: we contend that unexplained and unjustified instances where the device or system is not operating as intended is certainly evidence of absence of reliability.

1For which see Ladkin, ‘Robustness of software’.

3.26 Therefore, there is much to be said for treating computing systems and devices as ‘the witness’1 in proceedings. Just as a human witness will be subject to an examination as to his or her experience and qualifications, subjecting the output of a device to the scrutiny of the hearsay rule helps to tease out the embedded human assertions from the results sought to be admitted in evidence – be it the code or its data.2 If there is no opportunity for the human assertions to be tested – for instance, if the automatically produced analysis is to be relied on but the programmer who wrote the software that generated the analysis is not called to testify – the analysis becomes hearsay.3 Given that the product of devices will inevitably be based on a multiplicity of, and interplay between, direct and indirect human assertions, not all of which have been validated, let alone completely assessed for their accuracy and correctness,4 it will be near impossible to call all contributors of these assertions to give evidence in legal proceedings. Therefore, considering that these models entrench various human assertions and even biases, it is more apt to proceed with caution and subject such electronic evidence to closer scrutiny for the ‘human input’ by placing it into the hybrid Category 3. Of course, this closer scrutiny can be further assisted with a robust approach to authentication of such evidence and to a more effective stance regarding disclosure.

1For which see, Chapter 4 ‘Software code as the witness’, although note the opinion of Judge Curtis E. A. Karnow in ‘The opinion of machines’ (2018) 19 Colum Sci & Tech L Rev 136.

2Arguments have been developed in the US that devices that generate reports as evidence of the accused’s commission of an offence, such as breath analysers, would entitle the accused to challenge them on the basis of the Confrontation Clause, as the devices serve as tools of human declarants. See Tepper, ‘Testable reliability’, citing Melendez–Diaz v Massachusetts, 557 U.S. 305, 310–11, 129 S.Ct. 2527, 174 L.Ed.2d 314, 321–22 (2009), at 242–244 in support.

3See Mehesz v Redman (1979) 21 SASR 569; Holt v Auckland City Council [1980] 2 NZLR 124.

4See Chapter 4 and Chapter 5.

Implied assertions

3.27 Since the decision of Wright v Doe d Tatham,1 the law in England and Wales has been that implied assertions from testimonial statements are inadmissible under the rule against hearsay. Although difficult issues may arise in relation to distinguishing implied assertions from the use of such statements as grounding a relevant inference (which falls outside the hearsay rule),2 this position at common law was later affirmed by a majority of the House of Lords in R v Kearley,3 who held inadmissible, as being irrelevant, calls made to the defendant’s number asking to be supplied with drugs as proof that the defendant had intent to supply drugs, or alternatively, inadmissible as hearsay.

1(1837) 7 A & E 313, 11 ER 1378.

2See, for instance, Ratten (Leith McDonald) v Queen, The [1972] AC 378, [1971] 3 WLR 930, [1971] 3 All ER 801, [1971] 10 WLUK 28, (1972) 56 Cr App R 18, (1971) 115 SJ 889, [1971] CLY 4587.

3R. v Blastland (Douglas) [1986] AC 41, [1985] 3 WLR 345, [1985] 2 All ER 1095, [1985] 7 WLUK 293, (1985) 81 Cr App R 266, [1985] Crim LR 727, [1985] CLY 578; R v Kearley [1992] 2 AC 228, [1992] 2 WLR 656, [1992] 2 All ER 345, [1992] 4 WLUK 107, (1992) 95 Cr App R 888, [1992] Crim LR 797, (1992) 89(21) LSG 28, (1992) 142 NLJ 599, Times, 10 April 1992, Independent, 9 April 1992, [1992] CLY 852; see also Diane Birch and Michael Hirst, ‘Interpreting the new concept of hearsay’ (2010) 69(1) CLJ 72; Greg Taylor, ‘Two English hearsay heresies’ (2005) 9(2) E & P 110. For the Australian context, see the comments of McHugh J in the Australian case of Pollitt v R [1992] HCA 35, (1992) 174 CLR 558 at [21]. Similarly in New Zealand, see R v Mokaraka [2002] 1 NZLR 793 (CA).

3.28 In the context of electronic evidence, the circumstances in which the strictness of the rule against implied assertions at common law could apply are legion. In the digital economy, electronic records proliferate with an abundance of unique identification numbers that identify records and documents (e.g. hash numbers, login IDs, registration numbers), labels that identify the nature, origin, provenance or ownership of goods, services or other records (e.g. barcodes and QR codes on product packaging), dates of records and documents and the relationships or identities of persons (e.g. organizational unit attributes and organizational codes used for grouping accounts and corporate entities). In the controversial case of Myers (James William) v DPP,1 the manufacturer’s records, made routinely in the course of production, that identified the cars in question as stolen cars because they recorded identification numbers indelibly stamped inside the cylinder blocks, which corresponded to the numbers found in the cylinder blocks of the cars sold by the defendant, were held to be implied assertions and inadmissible as hearsay. A majority of the House of Lords reasoned that the cogency of the records, maintained on microfilm, depended on hearsay, as each witness could not prove that the records were correct or that the numbers which the records contained were in fact the numbers on the car cylinder when it was made by the unknown workmen.2 While the records in question in Myers were microfilm records, even if they were substituted with electronic records, the analysis at common law would remain the same.

1[1965] AC 1001, [1964] 3 WLR 145, [1964] 2 All ER 881, [1964] 6 WLUK 79, (1964) 48 Cr App R 3488, (1964) 128 JP 481, (1964) 108 SJ 519, [1964] CLY 1461.

2[1965] AC 1001, see Lord Reid, at 1019; Lord Morris of Borth-y-Gest at 1027; Lord Godson, at 1030. Their Lordships also considered, but dismissed, the application of the business records exception and the public records exception to such records.

3.29 The House of Lords was not unaware of the controversial nature of their decision, but noted that, at common law, the reliability and trustworthiness of records is not an exception to the hearsay rule,1 and urged legislative reform.2 However, the statutory treatment of the rule against hearsay is different, depending on whether electronic evidence is adduced in civil proceedings or in criminal proceedings. It is to the statutory rules against hearsay in civil and criminal proceedings and the complex and unique issues that arise in the treatment of electronic evidence that we now turn.3

1For example, see Kearley, per Lord Oliver at 276; Myers, per Lord Reid at 1023–24.

2For the virtues or otherwise of this position, see Brenda Marshall, ‘Admissibility of implied assertions: towards a reliability-based exception to the hearsay rule’ (1997) 23(1) Mon LR 200; Peter Mirfield, ‘A final farewell to Kearley’, (2012) 128(Jul) LQR 331–337.

3We observe that the admissibility of the mobile telephone records and chat room records in the following cases does not appear to have been discussed: R v Davis [2006] EWCA Crim 1155, [2006] 1 WLR 31300, [2006] 4 All ER 648, [2006] 5 WLUK 528, [2006] 2 Cr App R 322, [2007] Crim LR 70, Times, 1 June 2006, [2006] CLY 989, use of a mobile telephone; R. v Bailey (Tyrone) [2008] EWCA Crim 817, [2008] 4 WLUK 498, evidence of a chat room.

Civil proceedings and the requirement to give notice

3.30 In England and Wales, the hearsay rule was abolished for civil proceedings by s 1(1) of the Civil Evidence Act 1995. The Act applies to all civil proceedings,1 including proceedings in the magistrates’ court.2 A party that intends to adduce hearsay evidence in civil proceedings is required to give the other party or parties notice of his intention and, should it be requested, particulars of the evidence.3 This requirement to give notice is not unique to England and Wales. A criticism of hearsay evidence said to justify the existence of a rule of exclusion is that admission of hearsay would amount to an unjustified element of surprise causing delay and unwarranted disruption in a proceeding.4 This criticism has largely been addressed through the power given to any other party to the proceedings, with leave of the court, to call as a witness the person whose hearsay evidence is relied on by the proponent but who is not called as a witness by the proponent, and cross-examine him on the statement.5 It is noteworthy that pursuant to the notice, hearsay of any degree may be admitted.6 This is especially relevant in relation to electronic records made in the course of manufacturing or production by various workers, who may or may not be identified, within the organizational hierarchy or chain of responsibility. However, the court may have regard to, among other things, whether the evidence involves multiple hearsay in estimating the weight to be given to such hearsay evidence.7

1Civil Evidence Act 1995, s 11.

2The Magistrates’ Courts (Hearsay Evidence in Civil Proceedings) Rules 1999, SI 1999/681.

3Civil Evidence Act 1995, s 2.

4See Chris Gallavin, Evidence (LexisNexis 2008) 127. The irony of this justification for the rule of exclusion is that argument over the application of the rule was likely to lead to more delay and greater expense than would otherwise have been the case.

5Civil Evidence Act 1995, s 3. See also Australia, Evidence Act 1995 (Cth), s 68.

6Civil Evidence Act 1995, s 1(2)(b).

7Civil Evidence Act 1995, s 4(2)(c).

3.31 The Act includes a number of exceptions to the hearsay rule that are particularly relevant to documents stored in digital form. Published works dealing with matters of a public nature, public documents and public records are all admissible under the provisions of s 7(2) of the Civil Evidence Act 1995. More distinctively, where a document can be shown to be part of the records of a business or public authority, the document can be received into evidence in civil proceedings without further proof in accordance with s 9, subject to certification procedures1 that may be dispensed by the court.2 Subject to the threshold requirement that these records must be part of a ‘business’, which includes any activity regularly carried on over a period of time,3 the wording of this and similar provisions in other jurisdictions4 means that the form a technology takes (‘records’ means ‘records in whatever form’)5 will not prevent the admission into evidence of data stored in digital form.

1Civil Evidence Act 1995, s 9(2).

2Civil Evidence Act 1995, s 9(5).

3Civil Evidence Act 1995, s 9(4) (defining ‘business’). In contrast in Australia, the business records exception does not apply to records prepared or obtained for the purposes of conducting proceedings, or were made in connection with an investigation leading to criminal proceedings. Australia, Evidence Act 1995 (Cth), s 69(3).

4See New Zealand Evidence Act 2006, s 20; Australia, Evidence Act 1995 (Cth), s 69.

5Civil Evidence Act 1995, s 9(4)(a).

3.32 Finally, it is noteworthy that s 9(3) of the Civil Evidence Act enables the absence of an entry in the records of a business or public authority to be proved by affidavit of the relevant officer of that business or authority. This addresses the problem of ‘negative hearsay’, in which evidential significance is attributed to the absence of the requisite records of a business or public authority. Of course, to enable the requisite conclusions to be drawn, especially in relation to electronic records or electronic databases, the necessary foundation evidence as to, among other things, good record-keeping practices must first be established.

Criminal proceedings

3.33 In England and Wales, the enactment of the Criminal Justice Act 2003 repealed the provisions relating to hearsay in the Criminal Justice Act 1988, and by doing so, abrogated most of the common law of hearsay,1 substituting in its place a statutory regime for admitting hearsay2 and multiple hearsay.3 The operative provision is s 114(1), which reads:

Admissibility of hearsay evidence

(1) In criminal proceedings a statement not made in oral evidence in the proceedings is admissible as evidence of any matter stated if, but only if—

(a) any provision of this Chapter or any other statutory provision makes it admissible,

(b) any rule of law preserved by section 118 makes it admissible,

(c) all parties to the proceedings agree to it being admissible, or

(d) the court is satisfied that it is in the interests of justice for it to be admissible.

1Previously, where a computer recorded the numbers of various components that were fitted to motor cars, the printout was a hearsay statement where it was offered in evidence to prove that a number of components were fitted to a specific motor car: Myers (James William) v DPP [1965] AC 1001, [1964] 3 WLR 145, [1964] 2 All ER 881, [1964] 6 WLUK 79, (1964) 48 Cr App R 3488, (1964) 128 JP 481, (1964) 108 SJ 519, [1964] CLY 1461; Michael Hirst, ‘Hearsay, confessions and mobile telephones’ (2011) 75(6) JCL 482, 483.

2Cross & Tapper, 611.

3Criminal Justice Act 2003, s 121. Evidence from a Police Incident Log was wrongly admitted under s 117 at trial, but on appeal the members of the court decided that the evidence was correctly admitted under s 121(c): Maher v DPP [2006] EWHC 1271 (Admin), [2006] 5 WLUK 333, (2006) 170 JP 441, (2006) 170 JPN 780, [2006] CLY 789.

3.34 The provisions of s 114 serve as an introductory provision to the other provisions in that chapter. The operative scope of s 114 and the other provisions lies in the definition of a ‘statement’ as a representation of fact or opinion made by a person by whatever means, not made in oral evidence in the proceedings, but sought to be admissible as evidence of any matter stated.1 A matter stated is something which the maker of the statement intended someone (generally the recipient) to believe or to act upon, or to cause a machine to operate.2 Thus defined, s 114 retains the default exclusion of the hearsay rule in relation to statements intended to be acted on (express assertions), and operates to admit them in criminal proceedings within the parameters set out in s 114(1)(a)–(d) (although a number of common law exceptions are retained in statutory form by virtue of s 118(1) Criminal Justice Act 2003).

1Criminal Justice Act 2003, s 114(1) read with s 115(2).

2Criminal Justice Act 1995, s 115(3); R. v Twist (Andrew Terence) [2011] EWCA Crim 1143, [2011] 3 All ER 1055, [2011] 5 WLUK 320, [2011] 2 Cr App R 17, (2011) 175 JP 257, [2011] Crim LR 793, [2011] CLY 584.

3.35 In contrast, statements that are not intended to be acted on (implied assertions) fall outside the definition of a ‘statement’ as defined1 and are admissible pursuant to the abolition of the common law rules governing the admissibility of hearsay evidence in criminal proceedings.2 This has the effect of reversing the common law position in R v Kearley,3 but with the proliferation of records of electronic communications and the ubiquity of their use, it has in turn opened up new considerations regarding the scope of the rule as regards implied assertions and their relevance to the issues.

1See also the definition of ‘statement’ in New Zealand: Evidence Act 2006, s 4; in Australia, Evidence Act 1995 (Cth), s 59(1). See also Australian Law Reform Commission, Uniform Evidence Law (Report No 102, 2006) paras 7.19–7.22, http://www.alrc.gov.au/publications/7.%20The%20Hearsay%20Rule%20and%20Section%2060/unintended-assertions.

2Criminal Justice Act 2003, s 118(2). See also R. v Singh (Alexander Sukadave) [2006] EWCA Crim 660, [2006] 1 WLR 1564, [2006] 2 WLUK 590, [2006] 2 Cr App R 12, (2006) 170 JP 222, [2006] Crim LR 647, (2006) 170 JPN 571, Times, 8 March 2006, [2006] CLY 787, also known as R. v Singh (Alexander Sukadeve), R. v Singh (Alexander Sukedave), at [14].

3As explained in R. v Singh (Alexander Sukadave) [2006] EWCA Crim 660 at [14].

Telephone calls and messages

3.36 We start with the cases that deal with the inclusion of evidence of telephone calls and text messages sent on mobile telephones, especially in relation to cases involving illegal drugs, that have caused some confusion. For instance, in R v Chrysostomou (Mark)1 the trial judge admitted four text messages, apparently sent to the appellant by someone called ‘John’ who attempted to set up a supply of drugs, as evidence that the appellant was a dealer in drugs. In giving judgment for the court, Aikens LJ agreed that the text messages were not caught by the statutory code on hearsay in the Criminal Justice Act on the basis that the messages were adduced, not to prove, as fact, any matters stated in the messages, but ‘as evidence of an underlying state of affairs, which was the basis on which “John” apparently sent the texts to the appellant, namely that the appellant dealt with drugs and so could meet John’s demands’.2 In his commentary, Professor Ormerod agreed with the conclusion reached by Aikens LJ but disagreed with the reasoning, pointing out that the text messages were actually relied upon for the truth of the implied assertion contained in the message that the accused was a dealer in illegal drugs. This, however, did not render the message hearsay because, as Professor Ormerod noted,3 for a statement to be hearsay, the purpose of making the statement must be to cause another to believe the matter or to act on the matter stated,4 while ‘the purpose of the texter [“John”] was not to cause [the appellant] C to believe/act on his being a dealer’.5

1[2010] EWCA Crim 1403, [2010] 6 WLUK 547, [2010] Crim LR 942, [2011] CLY 609.

2[2010] EWCA Crim 1403 at [28].

3See the analysis of this precise point by Professor Ormerod: ‘R. v Bains: evidence – hearsay – admissibility of mobile phone text messages’, in which he cites R. v Singh (Alexander Sukadave) [2006] EWCA Crim 660, [2006] 1 WLR 1564, [2006] 2 WLUK 590, [2006] 2 Cr App R 12, (2006) 170 JP 222, [2006] Crim LR 647, (2006) 170 JPN 571, Times, 8 March 2006, [2006] CLY 787, also known as R. v Singh (Alexander Sukadeve), R. v Singh (Alexander Sukedave); R. v Mayers (Jordan) [2009] 1 WLR 1915, [2009] 2 All ER 145, [2008] EWCA Crim 2989, [2008] 12 WLUK 373, [2009] 1 Cr App R 30, [2009] Crim LR 272, [2009] CLY 768; R. v Leonard (Mark Alan) [2009] 4 WLUK 482, [2009] EWCA Crim 1251, (2009) 173 JP 366, [2009] Crim LR 802, [2009] CLY 756; R. v Fox (Craig) [2010] EWCA Crim 1280, [2010] 4 WLUK 461; R. v Bains (Pardeep Singh) [2010] EWCA Crim 873, [2010] Crim LR 937; regarding inferences to be drawn from the absence of an entry on a record, see R. v Shone (Robert Dowson) [1982] 6 WLUK 185, (1983) 76 Crim LR 72, [1983] CLY 666; M. Khan, ‘Hearsay’ (1984) 48(1) JCL 25, 25–27; Ben Fitzpatrick, ‘Criminal Justice Act 2003: hearsay provisions’ (2006) 70(5) Journal of Criminal Law 372; Ben Fitzpatrick, ‘Criminal Justice Act 2003: hearsay – implied assertions’ (2006) 70(5) Journal of Criminal Law 398.

4Criminal Justice Act 2003, s 114(1) read with s 115(3)(a), (b).

5[2010] Crim LR 942 (note), 944 (emphasis added).

3.37 In contrast, in R. v Leonard (Mark Alan) the members of the Court of Appeal (Criminal Division) determined that two text messages sent by unknown people to the appellant on two separate mobile telephones were hearsay evidence, and should not have been admitted at trial in support of the case for the Crown that the appellant was a drug dealer (with the prosecution conceding that the evidence would not have been admitted following a consideration of all the factors set out in s 114(2)). The messages were set out as follows:

The first, timed at 10.24 on 2nd May 2008, reads:

‘Cheers for yday! Well sound gear:-S! feel well wankered today!’

The second text message was from a different phone number and was on the second mobile phone. It was timed at 10.51 on 6th May 2008. It read:

‘Mark, that was a proper dog cunt move mate, that joey was a £5 joey and that was my last £10. Thanks. I dont why I think u would not do that 2 me. I dont.1

1[2009] EWCA Crim 1251 at [3]‌.

3.38 It was assumed that the content described feedback on the quality of the drugs purported to have been supplied (the first one positive and the second one negative). Professor Ormerod considered the decision by the Court of Appeal to be incorrect because the Crown did not rely on the content of the text messages for the truth of whether the quality was good or bad, or the nature of what had been supplied. The issue was whether the appellant was the supplier of a controlled drug, not the quality of the drugs supplied, which was irrelevant.1 This must be undoubtedly correct, and the argument illustrates the absurdity of the largely arbitrary line between hearsay and non-hearsay statements.

1See MK, R v [2007] EWCA Crim 3150, [2007] 12 WLUK 47, (2008) 172 JP 538, (2008) 172 JPN 757, [2009] CLY 752, where a conversation over a telephone captured by covert recording equipment was not considered to be hearsay, and it was therefore admissible without having to comply with the statutory provisions relating to hearsay.

3.39 The Court of Appeal considered an entire set of electronic messages and their use in inculpating the defendants in R. v Twist (Andrew Terence),1 where the issue was the admissibility of text messages sent over mobile telephones as evidence against various defendants for a variety of offences. In determining the general approach to take as to whether the hearsay rules in the Criminal Justice Act applied, Hughes LJ set out the following approach:

i) identify what relevant fact (matter) it is sought to prove;2

ii) ask whether there is a statement of that matter in the communication. If no, then no question of hearsay arises (whatever other matters may be contained in the communication);

iii) If yes, ask whether it was one of the purposes (not necessarily the only or dominant purpose) of the maker of the communication that the recipient, or any other person, should believe that matter or act upon it as true? If yes, it is hearsay. If no, it is not.3

1[2011] EWCA Crim 1143, [2011] 3 All ER 1055, [2011] 5 WLUK 320, [2011] 2 Cr App R 17, (2011) 175 JP 257, [2011] Crim LR 793, [2011] CLY 584; note the criticism of Hirst, ‘Hearsay, confessions and mobile telephones’, 491–493.

2Hughes LJ indicated at [11] that it must be a relevant matter.

3[2011] EWCA Crim 1143 at [17], emphasis in the original.

3.40 Hughes LJ went on, at [18], to indicate that the ‘answers to these questions will be case-sensitive. The same communication may sometimes be hearsay and sometimes not, depending on the matter for which it is relied upon and the fact which it is sought to prove.’1 While correct, this line of argument emphasizes the largely arbitrary nature of the distinction. A text message commenting on the quality of drugs bought will not be a hearsay statement2 (even if they could amount to an implied assertion that the recipient was a drug supplier, the purpose of the sender(s) did not include causing him or anyone else to believe that he was3) and can be adduced in support of a contention that the recipient actually sold drugs. However, a statement to the effect of ‘thanks for selling me those drugs’ will be inadmissible hearsay because it contains a statement that the recipient had sold drugs. An argument might be made that what was sought to be established was the state of mind of the maker of the message, not whether drugs were actually sold by the recipient of the message. Depending on the issue to be proved, this argument may render the statement admissible.

1Note the criticism by Hirst, ‘Hearsay, confessions and mobile telephones’, 491–492.

2Assuming Leonard (Mark Alan) was decided wrongly as it was based on the concession by prosecution, as Hughes LJ noted [2011] EWCA Crim 1143 at [24].

3[2011] EWCA Crim 1143 at [29].

3.41 The tests set out in R. v Twist (Andrew Terence) were considered in the case of R. v Midmore (Billy Nathan),1 where a WhatsApp message containing an image of a box of sulphuric acid with the caption ‘This is the one face melter’ was considered by the trial judge to be hearsay. The members of the Court of Appeal determined it was not hearsay. One commentator considered this analysis to be unsound,2 because in relation to the second question in Twist (the question of relevance of the statement), it does not appear that there was a statement of the matter sought to be proved. McKeown suggested that the image, taken with the caption:

appears to be little more than a straightforward implied representation that One Shot was capable of causing serious harm to a person’s face. Yet the court read it as a representation by GM to his girlfriend that he had purchased the One Shot with the intention of using it to cause serious injury to C by throwing it over her face. This surely goes too far, and exposes a risk with the Twist formula for identifying hearsay if it is now to be used in relation to implied representations.3

1[2017] EWCA Crim 533, [2017] 4 WLR 107, [2017] 4 WLUK 529, [2017] 2 Cr App R 8, (2017) 181 JP 354, [2017] Crim LR 793, [2017] CLY 512.

2Paul McKeown, ‘Evidence: R. v Midmore’ (2017) Crim LR 793.

3(2017) Crim LR 796.

3.42 McKeown suggested that ‘[S]‌ince implied representations may now potentially be hearsay, a question arises as to whether the Twist formula should continue to be followed’1 and that another approach to identifying hearsay could be as follows:

(i) What is the matter stated, i.e. what is the express or implied representation in the statement? Where the representation is implied, care should be taken not to read something into it which is not there;

(ii) Is the party seeking to admit the statement for a purpose other than as evidence to establish the matter stated? If so, the statement is not hearsay and is admissible if it is relevant, subject to exclusion;

(iii) If the party is seeking to admit the statement as evidence to establish the matter stated, was one of the purposes of the maker of the statement to cause someone to believe or act, or a machine to operate, etc. on the basis that what is stated is true?

If yes, it is hearsay and inadmissible unless it is relevant and can pass through a statutory exception, subject to exclusion. If no, it is not hearsay and is admissible if it is relevant, subject to exclusion.2

1(2017) Crim LR 798.

2(2017) Crim LR 798.

3.43 To conclude that anything inferred from a statement is not hearsay, whereas anything directly stated is, is to establish a distinction that dances on the head of a pin. The better approach is to treat all types of assertion – express or intended and implied or unintended – as prima facie hearsay and leave their admission to the judge on the basis of an analysis of a list of balancing criteria.

3.44 With the abolition of implied or unintended assertions from the scope of the hearsay rule, not all assertions made with the intention to communicate will be qualifying hearsay statements. The inadmissible hearsay assertion has to be associated with the object for which it is tendered in evidence in support, failing which it could be admissible as an implied or unintended assertion. To amplify McKeown’s point, to enable the admission of implied representations as to the supposed mental state of the maker of the statement presupposes the relevance of such mental state in the first place. If sanctioned, this could allow for all statements to be classified as implied statements and bypass the hearsay exclusion against express statements. Indeed this was the concern that was well recognized at common law.1 In the same vein, Professor Hirst observed that if there is nothing to prove an established relationship, or an incriminating response or reaction from the defendant, the assertion may be inadmissible, regardless of whether it is hearsay or not.2

1R. v Blastland (Douglas) [1986] AC 41, [1985] 3 WLR 345, [1985] 2 All ER 1095, [1985] 7 WLUK 293, (1985) 81 Cr App R 266, [1985] Crim LR 727, [1985] CLY 578, holding that statements indicating knowledge of a third party of the commission of a murder were irrelevant to the issue of whether the murder was committed by him or by the accused.

2Hirst, ‘Hearsay, confessions and mobile telephones’, 491 fn 25, citing R. v O’Connell (William) [2003] EWCA Crim 502, [2003] 2 WLUK 291.

3.45 This illustrates the fundamental weakness of the rule. By excluding unintended assertions, there is a possibility that arbitrary limits may arise in that the difference between a hearsay statement and a non-hearsay statement will rest with the question of whether there exists an intention to communicate. The existence of an intention to communicate is of such little value as to render the distinction meaningless. Furthermore, such a distinction exposes the application of the exclusionary rule to the formulation of a clever submission of a lawyer in that the application of the rule might be avoided by classifying the statement as a reflection of the mindset of the maker as opposed to an intention of the maker, an approach made plausible given the ubiquity and accessibility of electronic devices. In such a case, no real distinguishing factor truly exists.

Representations other than by a person

3.46 Of particular relevance to electronic evidence is s 129 Criminal Justice Act 2003. It reads:

129 Representations other than by a person

(1) Where a representation of any fact—

(a) is made otherwise than by a person, but

(b) depends for its accuracy on information supplied (directly or indirectly) by a person, the representation is not admissible in criminal proceedings as evidence of the fact unless it is proved that the information was accurate.

(2) Subsection (1) does not affect the operation of the presumption that a mechanical device has been properly set or calibrated.

3.47 The UK Law Commission considered the admissibility of a computer printout, whether it is hearsay, and whether the printout itself is relevant:

The question is, on what basis should such evidence be excluded? One view is that it is hearsay, because it is tantamount to a statement made by the person who fed the data into the machine. An alternative view is that the statement by the machine, properly understood, is conditional on the accuracy of the data on which it is based; and that, if those data are not proved to have been accurate, the statement therefore has no probative value at all. The question of hearsay does not arise, because the statement is simply irrelevant.

We believe that the latter view is closer to the truth, and that it is therefore unnecessary to complicate our hearsay rule by extending it to statements made by machines on the basis of human input. On the other hand we do not think it would be safe to assume that everyone will share this view. We must anticipate the argument that, if such statements are inadmissible at present, that is because they are hearsay; that, under our recommendations, they would no longer be hearsay, because our formulation of the rule would apply only to representations made by people; and that they would therefore cease to be inadmissible.1

1Law Commission, Evidence in Criminal Proceedings: Hearsay and Related Topics (Law Com No 245, 1997) paras 7.48–7.49.

3.48 The effect of s 129 is to treat not as hearsay and as admissible representations of any fact made in a document emanating from a device that is adduced to prove something other than the truth of a statement previously entered into them by a human being.1 They are admissible subject to proof of the accuracy of any information supplied by a human to such a device,2 including its proper setup and calibration.3 But as previously noted, the proper treatment of such representations of facts by devices or machines requires a proper categorization of the function of such devices, and an identification and subsequent characterization of the different parts of the representation, as to whether they emanate from the device or are made by a person or persons.

1Cross & Tapper, 614.

2Criminal Justice Act 2003, s 129(1) proviso.

3Criminal Justice Act 2003, s 129(2).

3.49 This may be illustrated by the Australian case of Hansen Beverage Company v Bickfords (Australia) Pty Ltd.1 In this case, working television sets in homes were monitored by a meter system that recorded that a person was physically located in the home when he registered his presence by pressing a button when a television was on. This was for the purposes of establishing the size of the audience that might be watching a particular programme. That the evidence was produced on a printout and was automatically recorded by software was not at issue. It was argued that the evidence was not hearsay as there was no previous representation made by a person, as required by s 59(1) of the Australian Evidence Act 1995. Middleton J, it is suggested correctly, identified the evidence as hearsay because it was a representation of fact that a certain number of people clicked on the buttons. The judge commented:

Undoubtedly, Hansen seeks to prove the estimated audience sizes for a particular program derived by statistical methods from the data, but such data is not automatically recorded by the meters without the human intervention of deliberately pressing the button to show a person or persons are in the room where the television is on. When the people are in the room they intend to, and do, make the representation to assert the existence of this fact, the existence of which needs to be proved to form the basis of the statistical analysis. It seems to me that the necessary reliance by Hansen on the data derived from the sample homes must involve the representation … by a person that the person was in the room on the relevant occasion, namely when the television is operating.2

1[2008] FCA 406.

2[2008] FCA 406 at [125].

Body-worn camera footage

3.50 Body-worn cameras have rapidly become a normal feature of policing.1 In McGuinness v The Public Prosecution Service for Northern Ireland,2 on appeal by way of case stated from the County Court for the Division of Londonderry, the question arose whether the trial judge was correct to admit the recording from a body-worn video camera, which documented allegations made by the complainant of assault by the appellant, under the hearsay provisions of the Criminal Justice (Evidence) (Northern Ireland) Order 2004, in particular under articles 18(1)(b) and 22(1)(4)(a). Although the complainant withdrew her complaint, the appellant was charged and tried of the offence. The complainant was not called to give evidence, because she was reconciled to the appellant.

1For a general introduction, see Ben Bowling and Shruit Iyer, ‘Automated policing: the case of body-worn video’ (2019) 15(2) Int JLC 140.

2[2017] NICA 30, [2017] 5 WLUK 19.

3.51 In reaching their decision, the members of the Court of Appeal in Northern Ireland considered the tests set out by Lord Ackner in R. v Andrews (Donald Joseph)1 under the doctrine of res gestae exception to the hearsay rule where a conversation took place in such circumstances that the possibility of concoction or distortion by the victim could be disregarded:

1. The primary question which the judge must ask himself is – can the possibility of concoction or distortion be disregarded?

2. To answer that question the judge must first consider the circumstances in which the particular statement was made, in order to satisfy himself that the event was so unusual or startling or dramatic as to dominate the thoughts of the victim, so that his utterance was an instinctive reaction to that event, thus giving no real opportunity for reasoned reflection. In such a situation the judge would be entitled to conclude that the involvement or the pressure of the event would exclude the possibility of concoction or distortion, providing that the statement was made in conditions of approximate but not exact contemporaneity.

3. In order for the statement to be sufficiently ‘spontaneous’ it must be so closely associated with the event which has excited the statement, that it can be fairly stated that the mind of the declarant was still dominated by the event. Thus the judge must be satisfied that the event, which provided the trigger mechanism for the statement, was still operative. The fact that the statement was made in answer to a question is but one factor to consider under this heading.

4. Quite apart from the time factor, there may be special features in the case, which relate to the possibility of concoction or distortion. … The judge must be satisfied that the circumstances were such that having regard to the special feature of malice, there was no possibility of any concoction or distortion to the advantage of the maker or the disadvantage of the accused.

5. As to the possibility of error in the facts narrated in the statement, if only the ordinary fallibility of human recollection is relied upon, this goes to the weight to be attached to and not to the admissibility of the statement and is therefore a matter for the jury. However, here again there may be special features that may give rise to the possibility of error. … In such circumstances the trial judge must consider whether he can exclude the possibility of error.2

1[1987] AC 281, [1987] 2 WLR 413, [1987] 1 All ER 513, [1987] 2 WLUK 72, (1987) 84 Cr App R 382, [1987] Crim LR 487, (1987) 151 JPN 254, [1987] CLY 659.

2[1987] AC 281 at 300G–301F.

3.52 In giving the judgment of the court, Weatherup LJ said, at [36]:

In the exercise of the discretion whether to exclude the evidence, the Judge considered each of the factors set out in Article 18(2) of the 2004 Order before deciding to admit the body-cam video statement of the complainant under the res gestae exception. The recording was stated to have strong probative value, there was other evidence from the two police officers as to the condition of and the injuries to the complainant, the recording was very important, there was no indication that the complainant was other than reliable, the evidence of the making of the recording was reliable and the complainant was unwilling to give evidence because of reconciliation. As to the appellant’s difficulty in challenging the statement and the likely prejudice arising, there was stated to be some such difficulty and some prejudice but not such as to render unfair the admission of the evidence.

3.53 The court noted, at [41], that the prosecution relied on the res gestae exception in order to provide support to the complainant in the changed circumstances brought about by the reconciliation of the parties, while seeking to deal with the alleged previous conduct of the appellant. The prosecution had to balance the competing interests when deciding to prosecute the appellant. The trial judge was correct to admit the recording under the statutory provisions.

3.54 The res gestae exception at common law has been expressly preserved in the Criminal Justice Act 2003.1

1s 118(4).

3.55 The case of DPP v Young1 has a similar set of circumstances. The complainant was not able to appear to give evidence. The prosecution sought the admission of an audio recording of a 999 call and a recording from a body-worn video camera from one of the police officers attending the scene. Both items of evidence overlapped, because the telephone line on which the 999 call was made remained open up to the time the police officers attended the scene, and the telephone recording contained identical evidence to that in the body-worn video camera recording. Both recordings were admitted as real evidence. No consideration was given to the tests set out in R. v Andrews (Donald Joseph). The defence submitted that there was no case to answer, given, it was argued, that the evidence was tenuous in nature, weak and vague. The lay magistrates accepted the submission and dismissed the case against the defendant. The Divisional Court quashed the decision of the justices. Lord Justice Holroyde, in giving the judgment, indicated, at [19]:

Having considered the evidence which was before the justices, for my part, I have no doubt that the evidence was sufficient to support a conviction and that the submission of no case to answer should have been rejected. Indeed, I very much doubt whether the submission should ever have been made. There was before the justices clear evidence that Ms Robertshaw made a 999 call to the effect that a man was going berserk at her home. Given the speed with which the police officers arrived on the scene and the overlap of recordings to which I have referred, there could be no realistic doubt but that the man concerned was the respondent. There was then a clear audio recording from which, in my view, a reasonable bench, properly directed, undoubtedly could find that the 999 call recorded an assault actually taking place with the victim of that assault uttering cries of pain against a background of sounds of physical exertion by the respondent. In those circumstances it was, in my judgment, not properly open to the justices to allow the submission of no case to answer. Whether at the conclusion of all the evidence they would have convicted is of course a separate matter. The issue they had to determine, and in respect of which in my judgment they fell into error, was whether a reasonable bench, properly directed, could properly convict.

1[2018] EWHC 3616 (Admin), [2018] 12 WLUK 76.

Business and other documents

3.56 In this regard, it is useful to start with a review of the cases that considered s 24 of the Criminal Justice Act 1988. This provision, concerning the admission in criminal proceedings of business and other documents, was the predecessor provision to s 117 of the Criminal Justice Act 2003. In Brown v Secretary of State for Social Security,1 the Secretary of State adduced evidence of statements from computer records by way of two witnesses where the identity of the persons who supplied the information could not be established. It was submitted on behalf of the appellant that the two statements were inadmissible because they did not comply with the terms of s 24. Section 24 was written to enable business documents to be admissible without the need to call the maker where the documents formed part of records about which the maker could not be expected to know anything in detail, and which were created in the course of trade or business. The members of the Divisional Court, Balcombe LJ and Collins J, agreed that the statements were not admissible under s 24(4) of the Criminal Justice Act 1988 ‘as there was no evidence that it was impossible that the makers of the statements would have no recollection of the matters referred to in their statements’.2 In comparison, the members of the Court of Appeal (Criminal Division) in the case of R. v Derodra (Kishor),3 rightly it is suggested, admitted the contents of a police ‘CRIS’ report, which was a computerized record of incidents of crime under s 24. In this instance, the person who reported the crime to the police – the lodger of the appellant – could not be found to give evidence of his complaint. It was the statement of the lodger that was to be relied upon testimonially, not that of the police officer who made the relevant entry.4

1[1994] 11 WLUK 283, [1995] COD 260, Times, 7 December 1994, [1994] CLY 904.

2[1995] COD 260 at 262.

3[1999] 5 WLUK 342, [2000] 1 Cr App R 41, [1999] Crim LR 978, Independent, 10 June 1999, [1999] CLY 873.

4R. v Derodra (Kishor) [1999] 5 WLUK 342, [2000] 1 Cr App R 41, [1999] Crim LR 978, Independent, 10 June 1999, [1999] CLY 873; note the criticism by Roderick Munday, ‘Section 24 of the Criminal Justice Act 1988: the great escape’ (1999) 7 Arch News 5.

3.57 In Vehicle and Operator Services Agency v George Jenkins Transport Limited,1 the prosecution had to prove that certain commercial drivers had failed to properly record their journeys with the tachographs in their vehicles, and had worked beyond the number of hours that were permitted without the prescribed rest periods or breaks. To discharge this burden, the prosecution sought to put in evidence a number of drivers’ time sheets pursuant to s 24. On a preliminary point, the trial judge ruled them inadmissible and dismissed all charges against the defendants. The prosecutor appealed, and the appeal raised a number of issues regarding the interpretation of these provisions. First, the provisions in s 24, described by Mackay J at [10] as ‘criteria or gateway’ provisions,2 must be satisfied before the second issue is addressed, that is whether the documents in question can be admitted in evidence. Mackay J quoted3 from the judgment of Roch LJ in R. v Foxley (Gordon):

Section 24 deals with the statements in a document and makes such statements admissible of any fact of which direct oral evidence would be admissible if two conditions are satisfied. The wording of condition (ii) demonstrates that Parliament anticipated that courts would draw inferences as to the personal knowledge of the person supplying the information of the matters dealt with. The purpose of section 24 is to enable the document to speak for itself; the safeguard being the two conditions and the other statutory provisions applicable, for example in the case of a statement made for the purpose of a criminal investigation, one of the requirements of section 23(2) or the requirements of section 23(3) have to be fulfilled.4

1[2003] EWHC 2879 (Admin), [2003] 11 WLUK 528, Times, 5 December 2003, [2004] CLY 3852.

2R. v Foxley (Gordon) [1995] 2 WLUK 75, [1995] 2 Cr App R 523, [1995] 16 Cr App R (S) 879, [1995] Crim LR 636, Times, 9 February 1995, Independent, 3 April 1995 [1995] CLY 918.

3[2003] EWHC 2879 (Admin) at [24].

4[1995] 2 WLUK 75, [1995] 2 Cr App R 523 at 536F–G, [1995] 2 Cr App Rep 523, [1995] 16 Cr App R (S) 879, [1995] Crim LR 636, Times, 9 February 1995, Independent, 3 April 1995, [1995] CLY 918.

3.58 In this instance, Mackay J and Kennedy LJ agreed that the documents satisfied the criteria provisions, and were admissible and self-proving in evidence.1 Kennedy LJ also noted the criticisms that Professor Smith made of the decision in R. v Foxley (Gordon), although it was observed that a further analysis of another case2 by Professor Smith was capable of applying to the case in hand if it was adjusted slightly.3

1[2003] EWHC 2879 (Admin) at [30], [34].

2R. v Ilyas (Mohammed); R. v Knight (Paul) [1996] 5 WLUK 330, [1996] Crim LR 810.

3[2003] EWHC 2879 (Admin) at [34].

3.59 Section 24 is succeeded by s 117 of the Criminal Justice Act 2003. Section 117(1) to (5) reads:

Business and other documents

(1) In criminal proceedings a statement contained in a document is admissible as evidence of any matter stated if—

(a) oral evidence given in the proceedings would be admissible as evidence of that matter,

(b) the requirements of subsection (2) are satisfied, and

(c) the requirements of subsection (5) are satisfied, in a case where subsection (4) requires them to be.

(2) The requirements of this subsection are satisfied if—

(a) the document or the part containing the statement was created or received by a person in the course of a trade, business, profession or other occupation, or as the holder of a paid or unpaid office,

(b) the person who supplied the information contained in the statement (the relevant person) had or may reasonably be supposed to have had personal knowledge of the matters dealt with, and

(c) each person (if any) through whom the information was supplied from the relevant person to the person mentioned in paragraph (a) received the information in the course of a trade, business, profession or other occupation, or as the holder of a paid or unpaid office.

(3) The persons mentioned in paragraphs (a) and (b) of subsection (2) may be the same person.

(4) The additional requirements of subsection (5) must be satisfied if the statement—

(a) was prepared for the purposes of pending or contemplated criminal proceedings, or for a criminal investigation, but

(b) was not obtained pursuant to a request under section 7 of the Crime (International Co-operation) Act 2003 (c. 32) or an order under paragraph 6 of Schedule 13 to the Criminal Justice Act 1988 (c. 33) (which relate to overseas evidence).

(5) The requirements of this subsection are satisfied if—

(a) any of the five conditions mentioned in section 116(2) is satisfied (absence of relevant person etc), or

(b) the relevant person cannot reasonably be expected to have any recollection of the matters dealt with in the statement (having regard to the length of time since he supplied the information and all other circumstances).

3.60 The provisions of s 117, dealing with the business document exception, are very wide and permit the admission into evidence of multiple hearsay,1 although the various foundational conditions set out in s 117 must be satisfied. In R. v Humphris (Andrew James),2 the Crown sought to adduce evidence of the appellant’s previous convictions under s 117. For that purpose, they relied on a statement of Police Officer Grimes, who retrieved relevant records from the Essex Police computer facility, the contents of which were in turn derived from staff of the Essex Police Force, who acted under a duty to record information and who either had or may reasonably be supposed to have had personal knowledge of the matters dealt with in the records. These records were attached to Police Officer Grimes’ statement. Section 117 provides certain conditions that must be fulfilled before evidence can be admitted. The defence accepted that the provisions of s 117(2)(a) were complied with, but argued that for each record of the appellant’s previous conviction, s 117(2)(b) required the statement to have been obtained from each complainant as the relevant person, rather than the police officer who recorded the information. Although Lord Woolfe upheld the conviction of the appellant, he agreed and held that the necessary foundations for the admissibility of the evidence were not properly laid.

1A point made by Professor Tapper, when he indicated that some electronic information will be collated from other statements, thus constituting multiple hearsay: Colin Tapper, ‘Electronic evidence and the Criminal Justice Act 2003’ (2004) 10 CTLR 161; an example would be proving the links of the continuity of evidence between the withdrawal of cash from an ATM to demonstrating the entering of the transaction in the customer’s account.

2[2005] EWCA Crim 2030, [2005] 7 WLUK 538, (2005) 169 JP 441, (2005) 169 JPN 718, Times, 19 September 2005, [2006] CLY 813; for a similar point, also see Maher v DPP [2006] EWHC 1271 (Admin), [2006] 5 WLUK 333, (2006) 170 JP 441, (2006) 170 JPN 780, [2006] CLY 789.

3.61 Where a document is put in under the provisions of s 114 and s 117, care must be taken over any content that is hearsay.1 In addition, the trial judge must ensure that the members of the jury understand the purpose of admitting the document. In R. v Horncastle (Michael Christopher),2 there was an email statement made by an ISP which identified the appellant and his address as being the possible holder of an email account suspected to have been used to send abusive images of children. The ISP acknowledged that this information could have been supplied by the email account holder impersonating the appellant. The prosecution adduced this email to show the address of the place (the appellant’s home) where the police raid took place, but not to prove the fact that the account was that of the appellant or used by the appellant. (In fact, no evidence of abusive images of children was found on the appellant’s computer, although there was evidence that the appellant’s lodger had used the email account.) No directions were given by the trial judge as to the limited purpose for which the ISP’s email was adduced. On appeal, Thomas LJ held that the judge’s failure to explain the use was a material misdirection, as the jury could have used the ISP’s email to link the appellant to the email account. The appellant’s appeal was allowed and his conviction was set aside.

1For an example of where a printout from the Police National Computer was correctly admitted into evidence, all of the conditions under s 117 having been met, see R. (on the application of Wellington) v DPP [2007] EWHC 1061 (Admin), [2007] 5 WLUK 5, (2007) 171 JP 497, (2007) 171 JPN 868, [2007] CLY 836.

2[2009] EWCA Crim 964, [2009] 4 All ER 183, [2009] 5 WLUK 566, [2009] 2 Cr App R 15, (2009) 153(21) SJLB 28, Times, 3 June 2009, [2009] CLY 761; note also DPP v Leigh [2010] EWHC 345 (Admin), [2010] 2 WLUK 136, where the prosecution did not rely on a record for the purpose of establishing the veracity of any of the matters recorded.

Judicial discretion to include hearsay

3.62 Notwithstanding the other routes of admissibility in s 114(1), one particularly wide1 route is to admit hearsay evidence ‘in the interests of justice’ under s 114(1)(d),2 subject only to the conditions in s 114(2).

1For example, see R. v Humphris (Andrew James) [2005] EWCA Crim 2030, [2005] 7 WLUK 538, (2005) 169 JP 441, (2005) 169 JPN 718, Times, 19 September 2005, [2006] CLY 813.

2R. v Xhabri (Agrol) [2005] EWCA Crim 3135, [2006] 1 All ER 776, [2005] 12 WLUK 182, [2006] 1 Cr App R 266, 20 BHRC 233, Times, 10 January 2006, [2006] CLY 788; however, note the commentary (and references to other relevant articles): Billal Malik, ‘The hearsay rule under the Criminal Justice Act 2003: R v Xhabri (Agrol)’ (2006) 10(4) E & P 316; Tom Worthen, ‘The hearsay provisions of the Criminal Justice Act 2003: So far, not so good?’ [2008] Crim LR 431; Roderick Munday, ‘Athwal and all that: previous statements, narrative, and the taxonomy of hearsay’ (2010) 74(5) JCL 415; Michael Stockdale and Emma Piasecki, ‘The safety-valve: discretion to admit hearsay evidence in criminal proceedings’ (2012) 76(4) JCL 314.

3.63 Careful consideration needs to be made of the provisions of s 114(2) regarding evidence in digital form when it is obtained from the Internet and where the evidence relating to the material, such as its authorship and ownership of the website from which it originates, is not known, as in the case of R. v Bucknor (Ashley Dwayne).1 In this case, the trial judge admitted evidence found by the police on BEBO (https://www.bebo.com), consisting of 46 separate website ‘pages’. The material included a number of photographs of Bucknor that he had taken of himself after he had left prison. The photographs had been placed on the page by someone in such a manner as to portray Bucknor as a member of the Organised Criminals (OC) gang. There was a hyperlink to a YouTube page that portrayed the OC gang as violent. The YouTube page was also shown to the jury in the form of a DVD. The prosecution did not have any evidence of the IP address from which the material was uploaded. The trial judge admitted the evidence as part of the background to the case, but on appeal the appellant argued that the judge failed to give a sufficient direction regarding the ownership of the website in question. The members of the Court of Appeal agreed with the submission. The material was clearly hearsay because it seemed likely that the maker as the source of the material was representing as fact or opinion that Bucknor was a member of the OC gang. In considering the issues set out in s 114(2), Hooper LJ, giving the judgment for the court, said that the judge ought to have considered the reliability of the maker of the statement (sub-paragraph (e)), whom the judge failed to identify.2 Failing to identify the maker meant that it was not obvious how many levels of hearsay were involved. The judge also failed to consider the reliability of the statement that the appellant was a member of the OC. Hooper LJ concluded:

44. Furthermore it seems to us on the facts of this case that the judge should have considered how reliable the statement was. He should also have asked whether the prosecution could call the maker of the statement and if not why not.

45. In our view the judge did not approach section 114 as he should have done. In any event, as we have said, his direction to the jury invited them to reach conclusions which no reasonable jury could have reached. 3

1[2010] EWCA Crim 1152, [2010] 5 WLUK 731.

2[2010] EWCA Crim 1152 at [42]–[43].

3[2010] EWCA Crim 1152 at [44]–[45].

Judicial discretion to exclude hearsay

3.64 A trial judge also has the ability to refuse to admit a statement in accordance with s 126(1)(b) where ‘the court is satisfied that the case for excluding the statement, taking account of the danger that to admit it would result in undue waste of time, substantially outweighs the case for admitting it, taking account of the value of the evidence’.1

1A similar provision exists in s 8, New Zealand Evidence Act 2006.

3.65 The Law Commission described the necessity of this judicial discretion as the power to exclude superfluous hearsay evidence. The concern is not with evidence that is wholly irrelevant, but evidence which has some relevance, yet ‘where the probative value of the evidence is so slight that almost nothing is gained by admitting it’.1 Although this discretion is intended to be exercised only in exceptional cases, the existence of the discretion serves as an important counterweight to address concerns about the expansionary rules for the admission of barely relevant hearsay evidence.2

1Law Commission, Evidence in Criminal Proceedings: Hearsay and Related Topics (Law Com No 245, 1997) para 11.18.

2Law Commission, Evidence in Criminal Proceedings: Hearsay and Related Topics (Law Com No 245, 1997) para 11.18.

Concluding observations

3.66 Almost everybody now uses digital data, whether this interaction is by way of the ether – a terminal linked by software to a server located in an unknown location – or from a physical device. Software code has become part of the everyday fabric of the majority of people. This means we are all, wittingly or unwittingly, assessing electronic evidence every day: from whether to trust that incoming email from an unknown source, to dealing with the veracity of content from networking sites.

3.67 The digital world is now awash with evidence: direct statements over the Internet; communications between telephones and other devices; messages made by a known author, anonymously or by somebody who cannot be traced. Every day we are dealing with the multiplicity of direct and indirect assertions (whether factually accurate or not), in the form of statements by one person or relayed, correctly or incorrectly, by others, and the interplay between them and the reality of the physical world. For the first time, we are all assessing evidence every day.

3.68 This chapter seeks to demonstrate the importance for lawyers to be aware of the dangers of admitting hearsay evidence and the need to distinguish between the various hearsay representations and ‘representations’ made by devices that may be embedded in electronic evidence. The identification of the nature of the device that stored or produced the electronic evidence and the testimonial or non-testimonial use that is made of the evidence remain important steps for determining the admissibility and relevance of the evidence, even in a statutory regime for admitting hearsay. It is only with a careful understanding of the nuances of both the hearsay rules as well as the nature of electronic evidence that the principle of testing the evidence can be observed, to ensure that any rational inference from evidence admitted against the defendant is objective and fair, and that the law, in its quest to establish the truth of what is contained in the statement, has indeed been true to itself.

Annotate

Next Chapter
Chapter 4
PreviousNext
All rights reserved
Powered by Manifold Scholarship. Learn more at
Opens in new tab or windowmanifoldapp.org