Skip to main content

Electronic Evidence and Electronic Signatures: Chapter 2

Electronic Evidence and Electronic Signatures
Chapter 2
    • Notifications
    • Privacy
  • Project HomeElectronic Evidence and Electronic Signatures
  • Projects
  • Learn more about Manifold

Notes

Show the following:

  • Annotations
  • Resources
Search within:

Adjust appearance:

  • font
    Font style
  • color scheme
  • Margins
table of contents
  1. Cover
  2. Title Page
  3. Copyright Page
  4. List of Contributors
  5. A note on our Creative Commons licence
  6. Dedication
  7. Contents
  8. Software is reliable and robust
  9. Preface
  10. Acknowledgments
  11. Table of statutes
  12. Table of cases
  13. 1. The sources and characteristics of electronic evidence and artificial intelligence
    1. Digital devices
      1. Processors
      2. Mobile devices
      3. Embedded devices
      4. Software
      5. Data storage facilities
      6. Data formats
      7. Starting a computer
    2. Networks
      1. Types of network
      2. Cloud computing
      3. The Internet of Things
      4. The deep web and the dark web
      5. Common network applications
    3. Types of evidence available on a digital device
      1. Files
      2. Metadata
      3. Imaging
      4. System and program logs
      5. Temporary files and cache files
      6. Deleted or ‘lost’ files
      7. Simulations, data visualizations, augmented and virtual reality
      8. Encryption and obfuscated data
    4. Artificial intelligence and machine learning
      1. Simulations, data visualizations, augmented and virtual reality
      2. Transparency and explainability
      3. AI adversarial attacks
    5. Defining electronic evidence
      1. The dependency on machinery and software
      2. The mediation of technology
      3. Speed of change
      4. Volume and replication
      5. Storage and disclosure
    6. Concluding remarks
  14. 2. The foundations of evidence in electronic form
    1. Direct and indirect evidence
    2. Evidence in both digital and analogue form
    3. Metadata and electronic evidence
    4. Means of proof
      1. Testimony and hearsay
      2. Real evidence
    5. Documents and disclosure or discovery
    6. Visual reading of a document
    7. Authentication
    8. Best evidence
    9. Analogue evidence
    10. Digital evidence
    11. Civil proceedings
    12. Criminal proceedings
    13. Admissibility
    14. Weight
    15. Video and audio evidence
      1. Testimonial use in legal proceedings
      2. Identification and recognition evidence
    16. Computer-generated animations and simulations
      1. Computer-generated evidence in England and Wales: civil proceedings
      2. Computer-generated evidence in England and Wales: criminal proceedings
  15. 3. Hearsay
    1. The rule of hearsay exclusion and its rationale
    2. The right of confrontation
    3. Hearsay and electronic evidence
    4. Electronic evidence and real evidence
    5. Testimonial and non-testimonial use of information
    6. Implied assertions
    7. Civil proceedings and the requirement to give notice
    8. Criminal proceedings
      1. Telephone calls and messages
      2. Representations other than by a person
      3. Body-worn camera footage
      4. Business and other documents
      5. Judicial discretion to include hearsay
      6. Judicial discretion to exclude hearsay
    9. Concluding observations
  16. 4. Software code as the witness
    1. The classification of digital data
      1. Category 1: Content written by one or more people
      2. Category 2: Records generated by the software that have not had any input from a human
      3. Category 3: Records comprising a mix of human input and calculations generated by software
    2. Challenging the code to test the truth of the statement
  17. 5. The presumption that computers are ‘reliable’
    1. The purpose of a presumption
    2. Presumptions and mechanical instruments
    3. Judicial formulations of the presumption that mechanical instruments are in order when used
      1. Judicial notice
      2. A ‘notorious’ class
      3. Common knowledge
    4. Evidential foundations of the presumption
    5. How judges assess the evidence of devices controlled by software
    6. Mechanical instruments and computer-like devices
    7. The nature of software errors
      1. Why software appears to fail
      2. Classification of software errors
    8. The development, maintenance and operation of software
      1. Developmental issues and software errors
      2. Increasing the risk of errors through modification of software
      3. Security vulnerabilities
      4. Software testing
      5. Writing software that is free of faults
      6. Software standards
      7. Summary
    9. Challenging ‘reliability’
      1. Aviation
      2. Financial products
      3. Motor vehicles
      4. Emergency services
      5. Medical
      6. The Post Office Horizon scandal
      7. Banking
      8. Interception of communications
    10. Most computer errors are either immediately detectable or result from input errors
    11. Challenging the authenticity of digital data – trial within a trial
      1. A protocol for challenging software in devices and systems
    12. Reintroduction of the common law presumption
    13. The statutory presumption
    14. Challenging the presumption
      1. ‘Working properly’
    15. Concluding remarks
  18. 6. Authenticating electronic evidence
    1. Authenticity and authentication
      1. An example: email
      2. Digital evidence compared to past paradigms
      3. Admissibility and authentication
      4. The best evidence rule
      5. Identity and integrity
      6. Reliability
    2. Methods of authentication
      1. Self-authentication
      2. System authentication
      3. Digital certification
      4. Digital forensics
      5. Extrinsic and circumstantial evidence
      6. Judicial notice
      7. Digital evidence in archival systems
    3. Technological authentication
      1. Digital signatures
      2. Blockchain
    4. Challenges to the authenticity of evidence in digital form
      1. The cloud
      2. The Internet of Things
      3. Digital preservation
      4. Migration and format changes
    5. The business records exception to the rule against hearsay
      1. The business records exception
      2. Authentication of digital business records
    6. Conclusion
  19. 7. Electronic signatures
    1. The purpose of a signature
    2. Dictionary definitions
    3. The manuscript signature
    4. Statutory definition of signature
    5. The functions of a signature
      1. The primary evidential function
      2. Secondary evidential functions
      3. Cautionary function
      4. Protective function
      5. Channelling function
      6. Record-keeping function
    6. Disputing a manuscript signature
      1. Defences
      2. Evidence of the manuscript signature
      3. Intention to authenticate and adopt the document
    7. The electronic signature
    8. Forms of electronic signature
      1. Authority, delegation and ratification
      2. Forged signatures
    9. Evidence of intent to sign
      1. The automatic inclusion of the signature
      2. Partial document with separate signature page
    10. The Electronic Communications Act 2000
      1. The definition of an electronic signature
      2. The elements of an electronic signature
      3. Liability of a certification service provider
      4. The power to modify legislation
      5. Regulation of Investigatory Powers Act 2000
    11. Electronic sound
    12. The ‘I accept’ and ‘wrap’ methods of indicating intent
      1. Click wrap
      2. Browse wrap
      3. ‘I accept’
    13. Personal Identification Number (PIN) and password
    14. Typing a name into an electronic document
      1. Acts by a lawyer as agent
      2. Interest in real property
      3. Loan of money
      4. Employment
      5. Contract
      6. Guarantees and debt
      7. Public administration, the judiciary and the police
      8. Statute of Frauds
      9. Wills
      10. Constitution of a legal entity
      11. Amending boilerplate contractual terms
    15. The name in an email address
      1. Limitation Act 1969 (NSW)
      2. Statute of Frauds
      3. Legal fees arrangement
      4. Civil Law Act
    16. A manuscript signature that has been scanned
      1. Mortgage redemption
      2. Writing
      3. Employment
    17. Biodynamic version of a manuscript signature
      1. Electoral register
      2. Contract formation
    18. Digital signatures
      1. Technical overview of digital signatures
      2. Algorithms and keys
      3. Control of the key
      4. Disguising the message
      5. Public key infrastructure
      6. Difficulties with public key infrastructure
      7. Authenticating the sender
      8. The ideal attributes of a signature in electronic form
      9. Methods of authentication
      10. Types of infrastructure for asymmetric cryptographic systems
      11. Management of the key and certificate
      12. The duties of a user
      13. Internal management of a certification authority
      14. Barriers to the use of the public key infrastructure
      15. Risks associated with the use of digital signatures
      16. What a digital signature is capable of doing
      17. What no form of electronic signature is capable of doing
      18. The weakest link
      19. The burden of managing the private key
      20. Evidence and digital signatures
      21. ‘Non-repudiation’
      22. Certifying certificates
      23. The burden of proof
      24. The recipient’s procedural and due diligence burden
      25. The sending party: the burden of proof of security and integrity
      26. Burden of proof – the jitsuin
      27. Burden of proof – summary
  20. 8. Encrypted data
    1. Encryption
    2. Methods to obtain encrypted data
      1. Breaking the encryption without obtaining the key
      2. Obtaining the key
    3. Compelling disclosure in England and Wales
      1. Protected information
      2. Notice requiring disclosure
      3. Obligations of secrecy and tipping off
      4. Circumventing the procedure
    4. The privilege against self-incrimination
      1. England and Wales
      2. The USA
      3. Canada
      4. Belgium
    5. Concluding observations
  21. 9. Proof: the technical collection and examination of electronic evidence
    1. Accreditation of the digital forensics discipline
    2. Guidelines for handling digital evidence
    3. Handling electronic evidence
      1. Identifying electronic evidence
      2. Gathering electronic evidence
      3. Gathering of data following legal retention or reporting obligations
      4. Copying electronic evidence
    4. Forensic triage
      1. Preserving electronic evidence
    5. Analysis of electronic evidence
      1. Tools
      2. Traces of evidence
    6. Reporting
    7. Analysis of a failure
    8. Anti-forensics and interpretation of evidence
      1. Data destruction
      2. Falsifying data
      3. Hiding data
      4. Attacks against computer forensics
      5. Trail obfuscation
    9. An intellectual framework for analysing electronic evidence
    10. Conclusions and future considerations
  22. 10. Competence of witnesses
    1. The need for witnesses
    2. Separating data reliability from computer reliability
    3. Lay experts as witnesses
    4. Qualification of witnesses
  23. Appendix 1: Draft Convention on Electronic Evidence
  24. Appendix 2: Cumulative vignettes
  25. Index

2

The foundations of evidence in electronic form

Stephen Mason and Daniel Seng

2.1 By taking into account the defining characteristics of the digital world, the use and admissibility of evidence in digital form have largely been accomplished through the definition and redefinition of legal concepts in the malleable rules of evidence. This chapter sets out to review the rules of evidence in the categorization of, means of proof of, treatment of and weight given to electronic evidence. An overview of the issues of hearsay, the treatment of software code as the witness, the presumption that computers are ‘reliable’ and authentication of electronic evidence are covered in detail in other chapters.

Direct and indirect evidence

2.2 The purpose of adducing evidence in legal proceedings is to prove the facts in issue. Facts in issue can also be properly inferred from any facts that are presented. Where evidence is used to prove the facts in issue, it is direct evidence. Where evidence is used to prove facts from which the facts in issue may be inferred, it is indirect evidence. If the facts in issue involve proving the existence of an electronic record, the electronic record itself constitutes direct evidence. Direct evidence refers to evidence which proves the facts in issue, and indirect evidence, or circumstantial evidence, is defined as evidence which proves facts which are relevant to the facts in issue.

2.3 Unless the existence, character or circumstance of the generation or storage of an electronic record is itself a fact in issue, it is more frequently the case that electronic evidence is used as indirect evidence to prove certain facts from which the facts in issue may be inferred. For instance, if an electronic record is adduced in evidence to show that A owes B a debt, the electronic record as indirect evidence only proves that there is a record that A owes B a debt, and it is necessary to make the additional inference that A actually owes B a debt.

Evidence in both digital and analogue form

2.4 Although there are differences in form and format between the analogue or non-electronic version of an item of evidence and its electronic equivalent, if the differences are not material, courts will not reject electronic evidence in favour of other forms of evidence.

2.5 The differences may be material depending on the facts in issue: the alternative representations of data in digital form and in human-readable form, on a screen or printed piece of paper, may become significant. In the Tasmanian case of Maynard,1 the trial magistrate declined to admit a printout purporting to indicate the dates and times when the accused obtained access to data stored in the computer on the basis that not all of the data that were evident on the computer screen were fully replicated on the printout. In a motion to review, Wright J upheld the magistrate’s decision. The judge observed that if all the data were relevant, the prosecution could have recorded the data on the screen by video. In this case, it was demonstrated that the information recorded on the printout was incomplete and not an accurate rendition of the data, and it did not involve only minor format changes, as the prosecution sought to contend.

Stephen Mason and Daniel Seng, ‘The foundations of evidence in electronic form’, in Stephen Mason and Daniel Seng (eds.), Electronic Evidence and Electronic Signatures (5th edn, University of London 2021) 51–84.

1(1993) 70 A Crim R 133, also cited as Rook v Maynard [1993] TASSC 137, (1993) 2 Tas R 97, (1993) 126 ALR 150.

2.6 In contrast, in People of the State of New York v Rose1 Morse J in City Court, City of Rochester, New York had to consider the use and admissibility of ‘computer generated simplified traffic information tickets’ or ‘e-tickets’. The defendants moved for dismissal of the charges for driving while intoxicated because the State Police had issued the charges in the computer-generated simplified information form rather than the multi-copy handwritten simplified traffic information form used across New York State. In a carefully reasoned judgment, Morse J set out how the system worked, and determined that the computer terminal used by the police generated each e-ticket with simplified traffic information for the defendants, printed duplicate originals of the e-ticket and affixed the arresting officer’s electronic signature to the e-ticket. Although there were minor format differences, such as the colour and the number of sides on which the e-tickets were printed, these differences were not sufficient to persuade the judge that the e-tickets conformed substantially to a paper ticket. Thus, the motion for dismissal was denied.

111 Misc.3d 200 (2005), 805 N.Y.S.2d 506, 2005 N.Y. Slip Op. 25526.

2.7 A similar consideration arose in Griffiths v DPP,1 where photographs taken with a speed camera on photographic film were admitted as evidence of a vehicle being driven at a speed greater than the speed limit. The evidence was also available in digital form, and the defence argued that the digital data should have been disclosed as well as the printed photographs. It was revealed that the camera technician had carried out a secondary check to confirm the speed of the vehicle on the digital files of the photographs. The judge indicated that the photographs were real evidence – they showed the times at which the vehicle crossed a number of pre-measured lines painted on the road – and that by using all this information it was possible to carry out the secondary check from the photographs themselves; it was not necessary to carry out the secondary check on the digital files. For this reason, it was held that whether the digital data were disclosed to the defendant or not was irrelevant.2

1[2007] EWHC 619 (Admin), [2007] 3 WLUK 572, [2007] RTR 44, [2007] CLY 3537.

2[2007] RTR 44 at [34].

Metadata and electronic evidence

2.8 There is a distinction between a document in digital form (and the content of the digital document as a printout) and the metadata logically associated with the document in digital form. The metadata may be relevant, either as indirect evidence in relation to the document in digital form, or it may itself be relevant as direct evidence. For instance, when there are multiple versions of a digital document, the metadata as indirect evidence will enable the parties to identify the most relevant version of the document. On the other hand, where there is an allegation that the user manipulated the metadata of the file, such as its date–time stamp, to his own advantage, the correct date and time of the file becomes the fact in issue and the metadata is the direct evidence. In such a case the metadata may need to be rendered into human-readable form.

Means of proof

2.9 All direct and indirect evidence used to prove a fact in issue or a relevant fact takes one (or more) of the following forms: testimony, hearsay, documents and real evidence.

Testimony and hearsay

2.10 Testimony is the declaration (which must be admissible) in court of a person who actually perceived the fact in issue or facts from which facts in issue may properly be inferred. Thus the human perception of a computer display as narrated via oral testimony is admissible as evidence that a counterfeit computer game was being played in breach of copyright.1

1The image on a screen can constitute sufficient evidence of data copied onto the RAM of a computer used to play counterfeit games to establish an offence of breach of copyright, for which see Gilham v The Queen [2009] EWCA Crim 2293, [2010] ECDR 5.

2.11 If, however, the best that a witness can do is to depose as to what someone else said on the fact in issue, it will be hearsay, because it is ‘an assertion other than one made by a person while giving oral evidence in the proceedings … as evidence of any fact asserted’.1 In the context of digital evidence, what someone else said is typically recorded electronically. Hearsay is generally inadmissible unless it falls within one of the exceptions to the rule against hearsay. (A further treatment of this subject is found in Chapter 3.)

1R v Sharp [1988] 1 All ER 65 at 68, [1988] 1 WLR 7 at 11.

Real evidence

2.12 The term ‘real evidence’ has been used in three divergent senses: (i) evidence from things as distinct from persons; (ii) material objects produced for the inspection of the court; and (iii) perception by the court (or its results) as any perceptions by the court (or its results) as distinct from the facts perceived,1 and is best described as ‘Material objects other than documents, produced for inspection of the court’.2 Veronica Cowan considered that there is no authoritative definition of ‘real evidence’, and suggested that ‘where a document is tendered simply to prove the fact that a statement was made (and not to prove a fact stated therein), it is not properly described as “real evidence”’.3

1Hodge M. Malek (ed.), Phipson on Evidence (19th edn, Sweet & Maxwell 2018), 1.14. It was used in R. (on the application of O’Shea) v Coventry Magistrates Court [2004] EWHC 905 (Admin), [2004] 4 WLUK 120, [2004] ACD 50, (2004) 101(17) LSG 30, Times, 22 April 2004, [2004] CLY 686 regarding computer access logs.

2Malek, Phipson on Evidence, paras 1–14.

3Veronica Cowan, ‘Computer printouts – real evidence or documentary evidence?’ [1991] Crim LR 199 at 201, discussing R v Spiby (John Eric) [1990] 3 WLUK 150, (1990) 91 Cr App R 186, Times, 16 March 1990, Independent, 2 April 1990, Daily Telegraph, 30 March 1990, [1990] CLY 785.

2.13 To highlight the difference between real evidence and hearsay in electronic evidence, Professor Daniel Seng and Sriram S. Chakravarthi formulated the following categorizations: digital data that is stored on a device, a device that processes data, and a device that processes and stores data.1 The digital data is hearsay, because the device contains a record of human assertions. As for the second and third cases, where the data is produced without human intervention, it is real evidence. If the data is a record of human assertions, it is hearsay. Although the distinction is a clear one, it can be difficult to apply in practice,2 as the cases discussed below illustrate.

1Daniel Seng and Sriram S. Chakravarthi, Computer Output as Evidence: Consultation Paper (Singapore Academy of Law 2003), 87–88.

2Seng and Chakravarthi, Computer Output as Evidence, 137–138; a point also made by Adam Wolfson, ‘“Electronic fingerprints”: doing away with the conception of computer-generated records as hearsay’ (2005) 104(1) Michigan L Rev 165.

Evidence in analogue form

2.14 The treatment of evidence in analogue form (which preceded the use and acceptance of digital computers) first received detailed treatment in the case of R v Ali (Maqsud), R v Hussain (Ashiq),1 where the issue was the admissibility of a tape recording. In admitting the evidence, Marshall J analogized tape recordings with photographs, and noted that just as evidence of things seen through telescopes or binoculars which otherwise could not be picked up by the naked eye had been admitted, the same would apply to devices for picking up, transmitting and recording conversations, noted, at [701] (emphasis added):

For many years now photographs have been admissible in evidence on proof that they are relevant to the issues involved in the case and that the prints are taken from negatives that are untouched. The prints as seen represent situations that have been reproduced by means of mechanical and chemical devices. Evidence of things seen through telescopes or binoculars which otherwise could not be picked up by the naked eye have been admitted, and now there are devices for picking up, transmitting, and recording, conversations. We can see no difference in principle between a tape recording and a photograph. In saying this we must not be taken as saying that such recordings are admissible whatever the circumstances, but it does appear to this court wrong to deny to the law of evidence advantages to be gained by new techniques and new devices, provided the accuracy of the recording can be proved and the voices recorded properly identified; provided also that the evidence is relevant and otherwise admissible, we are satisfied that a tape recording is admissible in evidence. Such evidence should always be regarded with some caution and assessed in the light of all the circumstances of each case. There can be no question of laying down any exhaustive set of rules by which the admissibility of such evidence should be judged.

1R v Ali (Maqsud), R v Hussain (Ashiq) [1966] 1 QB 688, [1965] 3 WLR 229, [1965] 2 All ER 464, [1965] 4 WLUK 27, (1965) 49 Cr App R 230, (1965) 129 JP 396, (1965) 109 SJ 331, [1965] CLY 796.

2.15 Shortly thereafter, Sir Jocelyn Simon P determined in The Statue of Liberty, Sapporo Maru M/S (Owners) v Steam Tanker Statue of Liberty (Owners)1 that the film recording on a radar set of echoes of ships within its range was real evidence, even though it was recorded from a mechanical instrument.2 The judge considered there was no distinction in the manual operation of a camera by a photographer or the observations of a barometer operator and the equivalent operation by a trip switch, a clock or a dial-recording mechanism. The judge held, at [196], that ‘[t]‌he law is bound these days to take cognisance of the fact that mechanical means replace human effort’, and accepted that the film comprised real evidence because it recorded the information given out by the radar set, rejecting the submission that the evidence was hearsay.

1[1968] 1 WLR 739, [1968] 2 All ER 195, [1968] 1 Lloyd’s Rep 429, [1968] 3 WLUK 65, (1968) 112 SJ 380, [1968] CLY 1546.

2Oral evidence of the position of a ship as given by a radar set is acceptable, for which see Chen Yin Ten v Little (1976) 11 ALR 353, [1976] WASC 143.

Evidence in digital form

2.16 The characterization of evidence as real evidence or as hearsay becomes more complicated with evidence in digital form, especially when some computational processing is carried out. In R v Pettigrew (Stewart Douglas), R v Newark (John)1 the Court of Appeal held that the printout from a computer operated by an employee of the Bank of England was a hearsay statement. The operator fed bundles of bank notes with consecutive serial numbers into the machine, and the machine automatically rejected any notes that were defective. The machine recorded the first and last serial numbers of each bundle of 100 notes, and the operator also noted the first serial numbers in the bundle on a card as he fed them into the machine. It was the printout from this machine that was sought to be admitted in evidence. The purpose of adducing the evidence was to permit the prosecution to trace the issuance of the notes, and to link bank notes found in the possession of Pettigrew to a particular bundle of notes that had been stolen in a burglary. Counsel for the prosecution argued that the printout was admissible as a business record under the provisions of the Criminal Evidence Act 1965.2 However, s 1(1)(a) required that for such a record to be admissible as evidence of the truth of any matter dealt with in the record, the information would have to be supplied by a person who had, or may reasonably be supposed to have, personal knowledge of the matters. The members of the Court of Appeal reached the conclusion that the operator did not have personal knowledge of the numbers of the notes that were rejected, because the machine automatically compiled the list.

1[1980] 1 WLUK 561, (1980) 71 Cr App R 39, [1980] Crim LR 239, [1980] CLY 486; applied in R v Wiles [1982] Crim LR 669.

2The Criminal Evidence Act 1995 was repealed by the Police and Criminal Evidence Act 1984 sch 7 pt III.

2.17 While this was an accurate application of the hearsay rule, the analysis omitted any consideration that the printout might be considered real evidence.1 Professor J. C. Smith has noted that ‘the operator had personal knowledge of the first number of each bundle which he fed into the machine because he recorded that number on a card’,2 and suggested that because the operator had knowledge of the number at a given point in time, it was not material that he forgot it afterwards. Once the first number could be established, it could then be inferred that the new notes bore consecutive serial numbers.3 Professor Smith considered that this is not hearsay but direct evidence, because there was an absence of human intervention.4 On the other hand, Professor Colin Tapper took the view that the printout was partly hearsay and partly non-hearsay – the first number is hearsay and the last number and the numbers of the notes that were rejected were not hearsay because they were the output of the device.5

1Colin Tapper, Computer Law (4th edn, Longman 1989), 375; printouts were admitted under the provisions of s 1(1) of the Criminal Evidence Act 1965 in R v Ewing (Terence Patrick) [1983] QB 1039, [1983] 3 WLR 1, [1983] 2 All ER 645, [1983] 3 WLUK 125, (1983) 77 Cr App R 47, [1984] ECC 234, [1983] Crim LR 472, (1983) 127 SJ 390, Times, 15 March 1983, [1983] CLY 63, although Seng and Chakravarthi, in Computer Output as Evidence, 90, point out that ‘the electronic records are the manifestation of the transaction’.

2J. C. Smith, ‘The admissibility of statements by computer’ [1981] Crim LR 387, 388.

3R v Pettigrew (Stewart Douglas), R v Newark (John) (1980) 71 Cr App R 39 at 42. In effect, Professor Smith’s point was an argument pursued by counsel for the Crown.

4Smith, ‘The admissibility of statements by computer’, 389–390.

5Colin Tapper, ‘Reform of the law of evidence in relation to the output from computers’ (1995) 3 Intl J L & Info Tech 87.

2.18 Professor Seng considered that the views of Professors Smith and Tapper were both plausible: ‘The difference lies in whether the operator fed the first number into the machine, and whether the machine processed this number.’1 Seng continued:

the different views espoused by Professors Tapper and Smith can be resolved as follows: was the machine operating as a data storage device in relation to the first number, or a data processing device? Some form of hybrid function may also be possible, eg, the operator inputs the first number, which the machine records and then verifies against its own reading of the first number. If the machine behaved in this way, perhaps Professor Smith’s view is perhaps more accurate. This is all a question of the degree and extent of human intervention.2

1Daniel K. B. Seng, ‘Computer output as evidence’ [1997] SJLS 139.

2Seng, ‘Computer output as evidence’, 140.

2.19 As computers are designed to undertake a wide range of tasks, this means that the evidence available as output of a computer is equally as varied. A review of cases shows that whether electronic evidence is real evidence or hearsay turns on whether the evidence is characterized as being a product of a device’s processing functions or of its storage functions.

2.20 In R v Wood (Stanley William),1 the software in a computer that made calculations of chemical compositions based on spectrometer readings was considered to be a tool, and the printout was an item of real evidence. The basis of admitting a printout of an output as an item of real evidence was explained by Professor Tapper:

Evidence derived from a computer constitutes real evidence when it is used circumstantially rather than testimonially, that is to say that the fact that it takes one form rather than another is what makes it relevant, rather than the truth of some assertion which it contains.2

1[1982] 6 WLUK 191, (1983) 76 Cr App R 23, [1982] Crim LR 667, [1983] CLY 636. See also the earlier case of R v McCarthy (Colin Paul), R v Warren (Mark Stephen), R v Lloyd (Leigh Cedric), R v Warren (Robert John) [1997] 11 WLUK 347, [1998] RTR 374, [1998] CLY 867 and the Singapore case of PP v Ang Soon Huat [1990] 2 SLR(R) 246.

2Tapper, Computer Law, 373.

2.21 The same distinction was drawn by Professor Smith as regards the computer printout in R v Ewing (Terence Patrick),1 between its use as evidence to prove that a thing was done (money had been credited to a bank account) and as evidence that something was recorded as being done (the bank clerk records a payment, as opposed to creating the credit).2

1[1983] QB 1039, [1983] 3 WLR 1, [1983] 2 All ER 645, [1983] 3 WLUK 125, (1983) 77 Cr App R 47, [1984] ECC 234, [1983] Crim LR 472, (1983) 127 SJ 390, Times, 15 March 1983, [1983] CLY 63; see DPP v Thornley [2006] EWHC 312 (Admin), [2006] 2 WLUK 68, (2006) 170 JP 385, (2006) 170 JPN 656, (2006) 103(9) LSG 32, [2006] CLY 3578 where a speed violation detection deterrent system, a prescribed device approved by the Secretary of State under the Road Traffic Offenders (Prescribed Devices) Order 1999, was considered.

2[1983] Crim LR 472 (CA), 473.

2.22 The admissibility of more complex electronic evidence is illustrated in a case about the breath alcohol printout from a portable breath analyser device, the Intoximeter 3000. In Castle v Cross,1 it was determined that the printout was an item of real evidence and not hearsay.2 The judge compared the device to a speedometer, a calculator or a sophisticated tool. In this instance, the breath alcohol value in the printout comprised information that was produced by the Intoximeter because the data had not passed through a human mind. On the other hand, Kennedy J also remarked that ‘where a computer is used in respect of its memory function, it is possible to envisage where it might fall foul of the rule against hearsay’.3

1[1984] 1 WLR 1372, [1985] 1 All ER 87, [1984] 7 WLUK 180, [1985] RTR 62, [1984] Crim LR 682, (1984) 81 LSG 2596, (1984) 128 SJ 855, [1985] CLY 3048.

2The members of the Court of Appeal in Northern Ireland followed this line, admitting a copy of a printout as being real evidence, in Public Prosecution Service v Duddy [2008] NCIA 18, [2009] NI 19.

3[1984] 1 WLR 1372 (DC) at 1380.

2.23 In R v Spiby (John Eric),1 Taylor LJ held that there was a distinction between a printout as real evidence and as hearsay. Professor Smith2 noted the difference between the content of a printout as a mere recording of a fact, such as when data are processed by a computer without any human input of any description,3 and the content of a printout as being processed in some way by a human being. The printout in this case was a log of telephone calls made, which was generated by a computerized machine called a ‘Norex’ that monitored the telephone calls of hotel guests in order to work out how much to charge for telephone use. It was held to be real evidence.

1[1990] 3 WLUK 150, (1990) 91 Cr App R 186, Times, 16 March 1990, Independent, 2 April 1990, Daily Telegraph, 30 March 1990, [1990] CLY 785.

2Smith, ‘The admissibility of statements by computer’.

3Although no computer works on this basis – the code is written in the main by human beings, and the code comprises the instructions to the computer, upon which basis the computer undertakes activities, and the computer undertakes actions based on the instructions written by human beings.

2.24 In R v Robson (Kenneth), R v Mitchell (Bernard), R v Richards (Alan),1 a printout of telephone calls made on a mobile telephone was adduced as evidence of the calls made and received in association with the number. The defence’s challenge that the evidence was documentary hearsay failed. Orde J held that ‘where a machine observes a fact and records it, that record states a fact. It is evidence of what the machine recorded and this was printed out … The record was not the fact, but evidence of the fact.’2

1[1991] 2 WLUK 381, [1991] Crim LR 362, [1991] CLY 646.

2[1991] Crim LR 362, 363; Robert Bradgate, ‘The evidential status of computer output: confusion compounded’ (1992) 9(2) Applied Computer & Communications Law 1; see also McDonald v R [2011] EWCA Crim 2933, [2011] 12 WLUK 556 where a printout of telephone calls was admitted in the absence of the electronic records that no longer existed. Records of calls made by a mobile telephone were accepted as real evidence by the Court of Criminal Appeal of the Republic of Ireland in People v Colm Murphy [2005] 2 IR 125 (CCA) and in DPP v Brian Meehan [2006] IECCA 104, [2006] 3 IR 468 (CCA).

2.25 In the business context, two popular uses of computers are for the formation of records and the recording of the credits and debits of an account. In the latter, the records of computer payment transactions are considered real evidence, as Their Lordships made clear in R v Governor of Brixton Prison, ex p Levin.1 In this appeal against extradition, it was alleged that Levin had used a computer terminal in St Petersburg to gain unauthorized access to a Citibank terminal in Parsipanny, New Jersey to make 40 fraudulent transfers of funds from the accounts of clients of the bank to accounts which he or his associates controlled. Printouts of screen displays of the historical records of computer payment transactions were adduced, and a witness gave evidence as to how the records were created. Lord Hoffmann took the opportunity to make clear the difference between a hearsay statement and evidence of a record of a transaction:

The print-outs are tendered to prove that such transfers took place. They record the transfers themselves, created by the interaction between whoever purported to request the transfers and the computer program in Parsipanny. The evidential status of the print-outs is no different from that of a photocopy of a forged cheque. 2

1[1997] AC 741, [1997] 3 WLR 117, [1997] 3 All ER 289, [1997] 6 WLUK 335, [1998] 1 Cr App R 22, [1997] Crim LR 891, (1997) 94(30) LSG 28, (1997) 147 NLJ 990, (1997) 141 SJLB 148, Times, 21 June 1997, Independent, 2 July 1997, [1997] CLY 2418.

2[1997] AC 741 at 746; Assafa Endeshaw, ‘Admissibility of evidence and jurisdiction relating to online fraud’ (1998) 14(1) Computer Law and Security Report 29; Ben Fitzpatrick, ‘Computers, hearsay, and the status of extradition proceedings’ (1998) Web JCLI 1; Susan Nash, ‘The admissibility of evidence in extradition proceedings’ (1998) 2(3) E & P 198.

Documents and disclosure or discovery

2.26 In evidentiary discovery (or disclosure as it is called in England and Wales) a ‘document’ has been construed widely in both criminal and civil proceedings.1 While the emphasis is on the recording of the content by the application of (usually) text on to (usually) paper, early decisions such as the Court of Appeal in Lyell v Kennedy (No. 3)2 have admitted photographs of tombstones and houses as documents for the purposes of discovery. In R v Daye (Arthur John),3 Darling J suggested, at [340], that the meaning of ‘document’ should not be defined in a narrow way:

But I should myself say that any written thing capable of being evidence is properly described as a document and that it is immaterial on what the writing may be inscribed. It might be inscribed not on paper, but on parchment; and long before that it was on stone, marble, or clay, and it might be, and often was, on metal. So I should desire to guard myself against being supposed to assent to the argument that a thing is not a document unless it be a paper writing. I should say it is a document no matter upon what material it be, provided it is writing or printing and capable of being evidence.

1For the meaning of a ‘document’, see Stephen Mason, ‘Documents signed or executed with electronic signatures in English law’ (2018) 34(4) Computer Law and Security Report 933; also see Malek, Phipson on Evidence, para 41–02.

2(1884) 50 LT 730; for a discussion about the status of legal resources on the Internet, including case reports, see Richard J. Matthews, ‘When is case law on the web the “official” published source? Criteria, quandaries, and implications for the US and the UK’ (2007) 2 Amicus Curiae 19, 25.

3[1908] 2 KB 333 (KBD).

2.27 In Hill v R,1 Humphreys J held, at [332–333], ‘that a document must be something which teaches you something … To constitute a document, the form which it takes seems to me to be immaterial; it may be anything on which the information is written or inscribed – paper, parchment, stone or metal.’ Likewise, statutes adopt a similarly broad definition of a ‘document’. Section 13 of the Civil Evidence Act 1995 defines a ‘document’ as ‘anything in which information of any description is recorded’. The same definition is provided in s 20D(3) of the Taxes Management Act 1970. Schedule 1 of the Interpretation Act 1978 does not define ‘document’, but defines writing as follows:

‘Writing’ includes typing, printing, lithography, photography and other modes of representing or reproducing words in a visible form, and expressions referring to writing are construed accordingly.

1[1945] 3 KB 329.

2.28 Audio tapes were accepted by Walton J as a discoverable document in Grant v Southwestern and Country Properties Ltd,1 where a ‘document’ was defined as having the quality of conveying information. Television film is also considered a document,2 as are the output of facsimile transmissions3 and a label on a bottle containing a specimen of blood provided by the accused.4

1[1975] Ch 185, [1974] 3 WLR 221, [1974] 2 All ER 465, [1974] WLUK 81, [1974] 118 SJ 548, [1974] CLY 2941. See also R v Senat (Martin), R v Sin (Christopher Cho Him) [1968] 3 WLUK 56, (1968) 52 Cr App R 282, [1968] Crim LR 269, (1968) 112 SJ 252, [1968] CLY 71; R. v Stevenson (Ronald), R. v Hulse (Barry), R. v Whitney (Raymond), [1971] 1 WLR 1, [1971] 1 All ER 678, [1970] 10 WLUK 82, (1971) 55 Cr App R 171, (1971) 115 SJ 11, [1971] CLY 2264; R v Robson (Bernard Jack), R v Harris (Gordon Frederick) [1972] 1 WLR 651, [1972] 2 All ER 699, [1972] 3 WLUK 89, (1972) 56 Cr App R 450, [1972] Crim LR 316, (1972) 116 SJ 313, [1972] CLY 642.

2Senior v Holdsworth, Ex p Independent Television News [1976] QB 23, [1975] 2 WLR 987, [1975] 2 All ER 1009, [1975] 3 WLUK 106, (1975) 119 SJ 393, [1975] CLY 1393.

3Hastie and Jenkerson v McMahon [1990] 1 WLR 1575, [1991] 1 All ER 255, [1990] 3 WLUK 425, [1990] RVR 172, (1990) 134 SJ 725, [1991] CLY 2950.

4Khatibi v DPP [2004] EWHC 83 (Admin), [2004] 1 WLUK 531, (2004) 168 JP 361.

2.29 In Derby & Co Ltd v Weldon (No. 9),1 one of the earliest modern decisions on the point, it was held that data stored on a computer in the form of an online database constitutes a document for the purposes of the obligation to discover under the provisions of Order 24 of the Rules of the Supreme Court. In analysing this point, Vinelott J referred to the Australian case of Beneficial Finance Corp Co Ltd v Conway,2 in which McInerney J held that a tape recording was not a document because the information is not capable of being visually inspected. Vinelott J, however, preferred the opposing view in Grant v Southwestern and County Properties Ltd,3 in which Walton J pointed out that there is no difference between recording a conversation on a tape recorder and in shorthand. Both are methods of recording the same conversation. Vinelott J quoted Walton J with approval as follows:

the mere interposition of necessity of an instrument for deciphering the information cannot make any difference in principle. A litigant who keeps all his documents in microdot form could not avoid discovery because in order to read the information extremely powerful microscopes or other sophisticated instruments would be required. Nor again, if he kept them by means of microfilm which could [not] be read without the aid of a projector. 4

1[1991] 1 WLR 652, [1991] 2 All ER 901, [1990] 7 WLUK 300, [1992] CLY 3472.

2[1970] VR 321.

3[1975] 1 Ch 185, [1974] 3 WLR 221, [1974] 2 All ER 465, [1974] 2 WLUK 81, [1974] 118 SJ 548, [1974] CLY 2941; Walton J criticized the reasoning of McInerney J at 196F–197A.

4Derby & Co Ltd v Weldon (No. 9) [1991] 2 All ER 901 (CA) at 906B-C.

2.30 Thus the interposition of a computer to enable the retrieval of data stored in the online database did not disqualify the data from being considered a document. A similar issue for discovery as to the meaning of ‘document’ in the context of data stored on a computer was discussed in Alliance & Leicester Building Society v Ghahremani1 on a motion to commit Naresh Chopra, a solicitor, to prison for contempt of court. Mr Chopra was alleged to have deliberately deleted part of a file that showed crucial transaction details stored on his computer in contempt of court, when investigations into possible mortgage fraud and negligence were being conducted into his affairs. A court order had directed Chopra to restrain from destroying or altering any document relating to the transaction, and required him to deliver up all such documents in his control. In the contempt proceedings, counsel argued that the word ‘document’ required there to be some form of visible writing on paper or other material, and because there was no physical document, the order had not been breached. Hoffmann J noted the comments of Vinelott J in Derby & Co Ltd v Weldon (No. 9),2 and held that ‘document’ would bear the same meaning in the discovery order. Taking into account the expert evidence, Hoffmann J concluded that it was proved beyond reasonable doubt that Chopra did alter or destroy part of a document3 and granted the motion, although Chopra was eventually fined instead.4

1[1992] 2 WLUK 256, [1992] RVR 198, (1992) 142 NLJ 313, Times, 19 March 1992, Independent, 9 March 1992, [1993] CLY 3252.

2[1991] 1 WLR 652, [1991] 2 All ER 901, [1990] 7 WLUK 300, [1992] CLY 3472.

3Alliance & Leicester Building Society v Ghahremani [1992] 32 RVR 198 at 203. The amount of forged evidence has increased. For some examples in the context of England and Wales (this is not an exhaustive list), see ISTIL Group Inc v Zahoor [2003] EWHC 165 (Ch), [2003] 2 All ER 252, [2003] 2 WLUK 476, [2003] CP Rep 39, Independent, 7 April 2003, [2003] CLY 451 for a forged document; Fiona Trust & Holding Corporation v Privalov [2010] EWHC 3199 (Comm), [2010] 12 WLUK 346, (2011) 108(3) LSG 17 for a forged and backdated agreement and employment contract; Apex Global Management Ltd v FI Call Ltd [2015] EWHC 3269 (Ch), [2015] 11 WLUK 248 for forged emails; in the criminal context, see R v Brooker [2014] EWCA Crim 1998, also cited as AG’s Ref: 071 of 2014, R v B (R C A) [2014] EWCA Crim 1998 (this citation is available in the LexisNexis electronic database), where Brooker sent text messages from a second mobile telephone in her possession, claiming that her boyfriend had sent them (Simon de Bruxelles, ‘Trainee barrister faces jail for false rape allegations’ The Times, 6 June 2014, 19; Miranda Prynne, ‘Trainee barrister sentenced to three and a half years in prison for false rape allegations’, Daily Telegraph, 26 June 2014 (Online edition)); Islamic Investment Company of the Gulf (Bahamas) Ltd v Symphony Gems NV [2014] EWHC 3777 (Comm), [2014] 11 WLUK 521, for a case of fictitious litigation; Otkritie International Investment Management Ltd v Urumov (Rev 1 – amended charts) [2014] EWHC 191 (Comm), [2014] 2 WLUK 286, in which the allegations (and counter-allegations) included, among other things, the forgery of the contents of a laptop and metadata in relation to documents; Steven Morris, ‘Barrister becomes first to be jailed for perverting justice’, The Guardian (London, 20 September 2007).

4Communications by email between Nicholas Leviseur, counsel for Mr Chopra, and Stephen Mason dated 14 October 2006 and 23 November 2006.

2.31 There is judicial recognition that the acceptance and use of technology will increase the range of objects that fall within the definition of ‘document’. In R v McMullen,1 Linden J held that a current account ledger card printed from a computer was a document within the meaning of s 29(2) of the Canada Evidence Act. The judge commented that: ‘It is merely a new type of copy made from a new type of record. Though the technology changes, the underlying principles are the same.’2 On appeal, citing this comment, Morden JA observed that the ‘section should be considered as “always speaking” and “be applied to the circumstances as they arise”’.3 The same view was emphasized by Buxton LJ in Victor Chandler International v Customs and Excise Commissioners,4 where he observed, at [55], that ‘the word “document” is not constrained by the physical nature that documents took in 1952, so we are entitled, and indeed bound, to consider the appropriate application of the concept of circulation, etc, of a document in the light of current practice and technology’. In this case, an advertisement contained in a teletext transmission was held to be a document for the purposes of the Betting and Gaming Act 1981. This view was reinforced by Pumfrey J in Marlton v Tectronix UK Holdings,5 when the judge held that a computer database, in as far as it forms part of the business records of a company, is a document for the purposes of the Civil Procedure Rules, and therefore can be disclosed. Calvert Smith J also concluded, in Kennedy v Information Commissioner,6 that the word ‘document’ in s 32 of the Freedom of Information Act 2000 included information recorded in an electronic medium. The judge said, at [79]:

It seems clear to me that for the Act to work at all – and in particular for Section 32 to work at all – the word ‘document’ must now mean what everybody now thinks it means and includes both hard and electronic copies of documents.

11978 CanLII 244, 42 CCC (2d) 67, 6 CR (3d) 218.

242 CCC (2d) 67 at 69.

3R v McMullen 1979 CanLII 1867 (ON CA), 25 OR (2d) 301, 100 DLR (3d) 671, 47 CCC (2d) 499 (100 DLR (3d) 671 at 676).

4[2000] 1 WLR 1296, [2000] 2 All ER 315, [2000] 2 WLUK 990, [2001] LLR 401 (2000), 97(11) LSG 36 (2000), 150 NLJ 341, (2000) 144 SJLB 127, Times, 8 March 2000, Independent, 10 March 2000, [2000] CLY 414.

5[2003] EWHC 383 (Ch), [2003] 2 WLUK 269, [2003] Info Tech LR 258, [2004] CLY 341; Trevor Mascarenhas, ‘The extent of disclosure relating to emails’, (2003) 3(2) ECL Rep 14.

6[2010] EWHC 475 (Admin), [2010] 1 WLR 1489, [2010] 1 WLUK 285, [2010] CLY 65.

2.32 As such, a ‘document’ is a medium upon which information is stored. The medium may sometimes determine the admissibility of the evidence, but the definition of ‘document’ is considered wide enough to bring any medium into its ambit without causing difficulties.1 This must be correct, because if information is not stored on a medium, the content is not available without the medium, and therefore the information remains oral evidence. As Lord Milligan in Rollo (William) v HM Advocate2 said, when he indicated that the information stored in a Sharp Memomaster 500 hand-held device was a document:

Unsurprisingly, the word ‘document’ in normal usage is most frequently used in relation to written, typed or printed paper documents. Where information is stored by other means on other surfaces we accept that the storing item concerned is more readily referred to by reference to the means of storage or surface for storage concerned rather than as a ‘document’. Hence reference to, for example, machines or tapes. However, terminological emphasis in description in such cases on the means or surface for recording information does not deprive such alternative stores of information from qualifying as ‘documents’ any more so than, for example, a tombstone, which is expressly included in the dictionary definition referred to. It seems to us that the essential essence of a document is that it is something concerning recorded information of some sort. It does not matter if, to be meaningful, the information requires to be processed in some way such as translation, decoding or electrical retrieval. 3

1Charles Hollander QC, Documentary Evidence (13th edn, Sweet & Maxwell 2018), 7–13; in Taylor v R. [2011] 2 Cr App Rep 4, [2011] WLR 1809, [2011] 2 Cr App R 4, [2011] 1 WLR 1809, [2011] EWCA Crim 728, [2011] Bus LR 1011, [2011] Lloyd’s Rep FC 348, the court determined that digital data came within the scope of the words ‘book or paper’ in s 206(1)(c) of the Insolvency Act 1986.

21997 JC 23, 1997 SLT 958 (HCJ).

31997 SLT 958, 960F-G.

Visual reading of a document

2.33 Although the meaning of ‘document’ has been construed widely, nevertheless it was held by the court in Darby (Yvonne Beatrice) v DPP1 that a visual reading cannot be a document. This must be correct. Unless the reading is stored in some way that enables it to be read at a later date, the reading is merely a transitory phenomenon that can only be captured by a person who provides original testimony by giving evidence about her perception.2

1[1994] 10 WLUK 343, [1995] RTR 294, (1995) 159 JP 533 (DC), Times, 4 November 1994, [1994] CLY 674.

2Owen v Chesters [1984] 11 WLUK 108, (1985) 149 JP 295, [1985] RTR 191, [1985] Crim LR 156, (1985) 82 LSG 443, (1984) 129 SJ 856, [1985] CLY 3054 where a police officer gave evidence of the reading from a breath test machine; see also (this list is not exhaustive) Denneny v Harding [1985] 10 WLUK 291, [1986] RTR 350, [1986] Crim LR 254, [1986] CLY 2881; Mayon v DPP [1988] 2 WLUK 53, [1988] RTR 281, [1988] CLY 3124; Greenaway v DPP [1993] 2 WLUK 40, (1994) 158 JP 27, [1994] RTR 17, (1993) 157 JPN 234, [1994] CLY 3978.

2.34 Oral testimony may be provided in lieu of documentary evidence. In a number of breath specimen cases, the defendants’ counsel have submitted that it is necessary to provide the printout as documentary evidence of the output recorded by the machine, and that substitute evidence given by a police officer as to the machine output is not admissible.1 In Thom v DPP,2 the printout from an Intoximeter was not produced, and the defence objected to testimony by a police officer as to what he had seen on the printout. Clarke J addressed this point as follows, at [14G]:

I can see no distinction in principle between evidence by a witness that he looked at his watch and read the time at, say, noon, and evidence from a witness that he looked at the Lion Intoximeter and that he read the proportion of alcohol in 100 millilitres of breath as being X.

1When radar speed meters were introduced in the late 1950s, police officers had to note down the reading in their notebooks, because this was the only method of recording a reading: J. M. W. McBride, ‘The radar speed meter’ [1958] Crim LR 349.

2[1993] 1 WLUK 823, (1994) 158 JP 414, [1994] RTR 11, [1994] CLY 3977.

2.35 Likewise, in Sneyd v DPP,1 when the printout from an Intoximeter was not produced, the court accepted the police officer’s testimony of what he had seen on the printout provided by the device, rather than what he had seen on the screen. Rejecting the objection on the basis that the testimony was secondary evidence, Richards LJ held, at [32], that ‘it is well established that evidence both as to the results of the analysis and as to the reliability of the machine can be given either in the form of a written print-out or orally by the officer who carried out the procedure’. He determined that there was no difference between the oral evidence of the results shown on the printout and oral evidence of the results on the screen of the machine – both were not inadmissible hearsay. In R (on the application of Leong) v DPP,2 Silber J applied the analysis of Richards LJ, holding admissible the oral evidence of the police officer’s reading from a printout, at [14]: ‘Where, as in the present case, there is evidence that the machine is working properly, there is no reason why the police officer concerned cannot give admissible evidence of what he saw in the print-out.’

1[2006] EWHC 560 (Admin), [2006] 2 WLUK 635, (2006) 170 JP 545, [2007] RTR 6, (2006) 170 JPN 998, [2006] CLY 799.

2[2006] EWHC 1575 (Admin), [2006] 6 WLUK 172.

Authentication

2.36 When a document is tendered as evidence of its contents, it is often accompanied by proof that the document ‘has some specific connection to a person or organization, whether through authorship or some other relation’.1 As noted by Austin J: ‘Authentication is about showing that the document is what it is claimed to be, not about assessing, at the point of the adducing of the evidence, whether the document proves what the tendering party claims it proves.’2 Similarly, where any object is tendered in evidence, an adequate foundation for admission will require testimony first that the object offered is the object which was involved in the incident, and further that the condition of the object is substantially unchanged.3

1Kenneth S. Broun (ed.), McCormick on Evidence, vol. 2 (7th edn, West Publishing 2013), 83–85 (§221).

2Australian Securities and Investment Commission v Rich (2005) 216 ALR 320, [118], [2005] NSWSC 417.

3Broun, McCormick on Evidence, 13–16 (§213).

2.37 As is the case for any other form of evidence, electronic evidence must be authenticated. The authentication process for electronic evidence is even more critical,1 and can occasionally be challenging.2 Undoubtedly the use of technology has afforded us convenience and efficiency. But if parties and investigative authorities choose to use the fruits of technology, they must also accept the need to prove the authenticity and integrity of the evidence produced by technology, even though the cost of such proof might be considered to be high. This is particularly the case where authentication evidence will shed light on the latent assumptions and hidden errors inherent in electronic evidence, which could affect the accuracy of the electronic evidence itself.

1Seng, ‘Computer output as evidence’, 159–166; Rosemary Pattenden, ‘Authenticating “things” in English law: principles for adducing tangible evidence in common law jury trials’ (2008) 12 E & P 290.

2The challenge of proving that evidence in digital form is authentic was the subject of R v Cochrane [1992] 6 WLUK 63, [1993] Crim LR 48 (CA), [1993] CLY 366; Allison Nyssens, ‘The law of evidence: on-line with the computer age?’ (1993) 15(10) EIPR 360; see Chapter 6 on authentication for a detailed discussion.

2.38 Authentication evidence may also demonstrate that the errors in question will not have an adverse effect on the evidence itself. For instance, in DPP v McKeown (Sharon), DPP v Jones (Christopher),1 the clocks on the Intoximeter 3000 used to measure the breath alcohol values of the defendants were not accurate. For this reason, the defendants challenged the admissibility of the printouts from the device. In addressing whether the accuracy of the clocks was relevant to the accuracy of the printout readings, Lord Hoffmann examined the functioning of these devices and concluded that, for the purposes of s 69 of the Police and Criminal Evidence Act 1984,2 a malfunction is irrelevant unless it affects the way in which the computer processes, stores or retrieves the information used to generate the statement.3 On the facts, the clock was not part of the processing mechanism of the Intoximeter, and the convictions of the defendants based on the printout readings were upheld.

1[1997] 1 WLR 295, [1997] 1 All ER 737, [1997] 2 WLUK 386, [1997] 2 Cr App R 155 (HL), (1997) 161 JP 356, [1997] RTR 162, [1997] Crim LR 522, (1997) 161 JPN 482, (1997) 147 NLJ 289, Times, 21 February 1997, Independent, 7 March 1997, [1997] CLY 1093; see also Jonathan S. W. Black, ‘Breath testing devices and computer evidence’ (1997) 141(10) SJ 236–; C.G., ‘Computers: evidence’ (1997) 3(3) CTLR T68; ‘Computer clock malfunction irrelevant’ (1997) 161(14) Justice of the Peace & Local Government Law 325; Renzo Marchini, ‘DPP v McKeown (Sharon)’ (1997) 8(2) Comps & Law 27; Philip Plowden, ‘Garbage in, garbage out – the limits of s.69 of the PACE Act 1984’ (1997) 61(3) Journal of Criminal Law 310; Gordon Cropper, ‘The evidential breath testing device as a computer’ (1997) 2(May) RTI 3; H. L. J. Makin, ‘PACE and the intoximeter’ (1998) 142(11) S.J. 250.

2Section 69 of the Police and Criminal Evidence Act 1984 was repealed by s 60 of the Youth Justice and Criminal Evidence Act 1999, although the relevant case law remains a useful authority.

3[1997] 1 All ER 737 at 744. A study later demonstrated that breath alcohol values measured on the Lion Intoximeter 3000 are not affected if the machine clock is incorrect by more than four minutes: R. C. Denny, ‘The Intoximeter 3000 and the four minute fallacy’ (1998) 38(2) Medical Science Law 163. Minor typographical errors on a printout do not alter the validity of the results: Reid v DPP [1998] 2 WLUK 401, [1999] RTR 357, [1998] Masons CLR 269, Times, 6 March 1998, [1998] CLY 897.

2.39 This does not mean that authentication evidence will always have to be supplied for each item of evidence. In civil proceedings in England and Wales, a party is deemed to admit the authenticity of a document disclosed under the provisions of Civil Procedure Rule (CPR) 31 unless notice is served that the party wishes the document to be proved at trial. Thus where the authenticity of a document is questioned, the party raising the issue is required to do so at an early stage of the proceedings, thereby providing the party submitting the document the opportunity of gathering evidence to prove the veracity of the document.

2.40 See Chapter 6 on authentication for a more detailed discussion.

Best evidence

2.41 The best evidence rule can be considered from two points of view. It can be regarded as an inclusionary rule under which whatever is the best evidence is admissible, thus overcoming exclusionary rules such as the hearsay rule; alternatively, it can be regarded as an exclusionary rule, so that anything which is not the best evidence is inadmissible. Since Omychund v Barker,1 the majority of the cases have used the rule in an exclusionary way to deny the use of copies of documents when the absence of the original was not satisfactorily accounted for.

11 Atk 22, 26 ER 15.

2.42 Reaction against this rule began in the nineteenth century,1 and by the latter part of the twentieth century it was recognized that the best evidence rule was no longer as relevant as it once was. In Kajala v Noble,2 Ackner LJ held that the rule is now confined to written documents in the strictest sense of the term. Echoing the robust comments of Lord Denning MR in Garton v Hunter (Valuation Officer),3 His Lordship said:

The old rule, that a party must produce the best evidence that the nature of the case will allow, and that any less good evidence is to be excluded, has gone by the board long ago. The only remaining instance of it is that, if an original document is available in one’s hands, one must produce it; that one cannot give secondary evidence by producing a copy. Nowadays we do not confine ourselves to the best evidence. We admit all relevant evidence. The goodness or badness of it goes only to weight, and not to admissibility … In our judgment, the old rule is limited and confined to written documents in the strict sense of the term, and has no relevance to tapes or films.4

1Malek, Phipson on Evidence, 7–42; see the discussion by Sargent J in the New Hampshire case of Howley v Whipple 48 N.H. 487 (1869) in respect of best evidence in the case of telegrams.

2[1982] 3 WLUK 133, (1982) 75 Cr App R 149, [1982] Crim LR 433, [1982] CLY 605.

3[1969] 2 QB 37, 44, [1969] 2 WLR 86, [1969] 1 All ER 451, [1968] 11 WLUK 46, (1969) 133 JP 162, 67 LGR 229, [1969] RA 11, 15 RRC 145, (1968) SJ 924, Times, 15 November 1962, [1969] CLY 3017.

4Kajala v Noble (1982) 75 Cr App R 149 at 152; whether it is necessary to produce the original when a photocopy is adduced in evidence will depend upon whether the production of the original is relevant and necessary, for which see Attorney-General v Lundin [1982] 2 WLUK 231, (1982) 75 Cr App R 90, [1982] Crim LR 296, [1982] CLY 2435.

2.43 By 1990, Lloyd LJ in R v Governor Ex p Osman (No 1) observed that the best evidence rule had become a rule of practice or procedure.1 He also made the following remarks about the rule:

this court would be more than happy to say goodbye to the best evidence rule. We accept that it served an important purpose in the days of parchment and quill pens.2 But since the invention of carbon paper and, still more, the photocopier and the telefascimile machine, that purpose has largely gone. Where there is an allegation of forgery the court will obviously attach little, if any, weight to anything other than the original; so also if the copy produced in court is illegible. But to maintain a general exclusionary rule for these limited purposes is, in our view, hardly justifiable. 3

1R v Governor Ex p Osman (No 1) sub nom Osman (No 1) [1990] 1 WLR 277, [1989] 3 All ER 701, [1988] 3 WLUK 391, (1990) 90 Cr App R 281, [1988] Crim LR 611, (1990) 87(7) LSG 32, (1990) 134 SJ 458, Times, 13 April 1988, Independent, 15 April 1988, Guardian, 19 April 1988 Daily Telegraph, 21 April 1988, [1990] CLY 1175.

2It will be interesting to know how many ancient documents previously admitted into evidence were actually copies: A Guide to Seals in the Public Record Office (2nd edn, HMSO 1968), 30; T. F. Tout, ‘Mediæval forgers and forgeries’ (1919) Bulletin of the John Rylands Library 208.

3[1990] 1 WLR 277 (DC) at 308B-C.

2.44 The best evidence rule has been effectively limited to requiring a party having possession of an original document who is relying on it for the statements recorded on the document (primary evidence) not to wilfully refuse to produce the original document as primary evidence, and instead produce copies or substitutes (secondary evidence) in its place.1

1Colin Tapper, Cross and Tapper on Evidence (8th edn, Butterworths 1995) 748, ch XVIII, s 1: Proof of the contents of a document. A. The general rule. 1. Statement and illustrations of the general rule. This statement of the rule was removed in subsequent editions. See also R. v Wayte (William Guy) [1982] 3 WLUK 247, (1982) 76 Cr App R 110, CA, Times, 24 March 1982, [1983] CLY 659, where photostat copies of two letters were not admissible in circumstances where the party seeking to rely on the documents refused to produce the original letters.

2.45 Where good reasons exist for the failure to produce the original document, secondary evidence, even in the form of oral testimony, is permissible. This may be illustrated by the case of Taylor v Chief Constable of Cheshire,1 a case involving the inadvertent destruction of evidence. In this case, video images of the accused allegedly committing theft from a store were recorded on the store video recorder, and the manager of the store, three police officers and the lawyer for the accused later saw these recordings. When the case was heard, it transpired that new security officers had erased the recording of the video images. The magistrates permitted the witnesses to give evidence of what they saw on the video recording. An appeal was made that the best evidence – the video recording – could not be admitted because it had been destroyed, and that testimonial evidence of the recording was not the best evidence. This was rejected. Although the best evidence in this instance was the video recording, its unavailability did not preclude the admission into evidence of the testimony of those witnesses who viewed the recording. The recollections of the witnesses ought not to be precluded because the best evidence was not available. The evidence offered by the witnesses was, as pointed out by Ralph Gibson LJ, ‘direct evidence of what was seen to be happening in a particular place at a particular time’, and it was for the trier of the facts to assess its weight, credibility and reliability.2

1[1986] 1 WLR 1479, [1987] 1 All ER 225, [1986] 10 WLUK 244, (1987) 84 Cr App R 191, (1987) 151 JP 103, [1987] Crim LR 119, (1987) 151 JPN 110, (1987) 84 LSG 412, (1986) 130 SJ 953, [1987] CLY 743; P. W. Ferguson, ‘Video identification and the best evidence rule’ (1987) 51(2) Journal of Criminal Law 125.

2[1987] 1 All ER 225, 230.

2.46 Since the statutory intercession of the Civil Evidence Act 1995 and the Criminal Justice Act 2003, the best evidence rule has further taken a simplified, statutory form. The judgment of the Court of Appeal in Masquerade Music Ltd v Springsteen1 suggests that the best evidence rule is hardly of any relevance. After considering the best evidence rule in detail and reviewing the case law extensively,2 Jonathan Parker LJ outlined the position with respect to the best evidence rule in the twenty-first century, at [85]:

In my judgment, the time has now come when it can be said with confidence that the best evidence rule, long on its deathbed, has finally expired. In every case where a party seeks to adduce secondary evidence of the contents of a document, it is a matter for the court to decide, in the light of all the circumstances of the case, what (if any) weight to attach to that evidence. Where the party seeking to adduce the secondary evidence could readily produce the document, it may be expected that (absent some special circumstances) the court will decline to admit the secondary evidence on the ground that it is worthless. At the other extreme, where the party seeking to adduce the secondary evidence genuinely cannot produce the document, it may be expected that (absent some special circumstances) the court will admit the secondary evidence and attach such weight to it as it considers appropriate in all the circumstances. In cases falling between those two extremes, it is for the court to make a judgment as to whether in all the circumstances any weight should be attached to the secondary evidence. Thus, the ‘admissibility’ of secondary evidence of the contents of documents is, in my judgment, entirely dependent upon whether or not any weight is to be attached to that evidence. And whether or not any weight is to be attached to such secondary evidence is a matter for the court to decide, taking into account all the circumstances of the particular case.

1[2001] EWCA Civ 563, [2001] 4 WLUK 239, [2001] CP Rep 85, [2001] CPLR 369, [2001] EMLR 25, Independent, 24 April 2001, Daily Telegraph, 17 April 2001, [2001] CLY 392.

2[2001] EWCA Civ 563, [64]–[85].

2.47 Waller and Laws LJJ concurred. In other words, there is no automatic bar to the failure to admit the original document as primary evidence. Instead, when the original document is no longer available, a copy of the original evidence is admissible, but an adjudicator must consider its weight as secondary evidence.

2.48 The modern application of this rule is illustrated by Post Office Counters Ltd v Mahida.1 In this case, the Post Office sought to claim an alleged deficiency of social security benefits paid out against the defendant, the sub-postmaster general. The deficiency was set out in a schedule prepared by investigators of the Post Office based on checks conducted against the underlying dockets and foils. Subsequently, the dockets and foils were destroyed as part of a routine process. The trial judge accepted the schedule as secondary evidence and found against the defendant. On appeal, the Court of Appeal was concerned that the secondary evidence was of insufficient weight to prove the precise amount of the debt claimed against the defendant. In particular, the Post Office as an institution could not readily be said to have discharged the burden of proving the precise amount of the debt when it was alleged that the defendant had been responsible for this loss, and had denied the defendant the opportunity to check those figures.2 For this reason, the very basic unfairness should have led the trial judge to consider that the amount of the debt was not proved, and the defendant’s appeal was allowed.

1[2003] EWCA Civ 1583, [2003] 10 WLUK 601, Times, 31 October 2003, [2004] CLY 248.

2[2003] EWCA Civ 1583 at [27].

Analogue evidence

2.49 Although the best evidence rule is now tightly confined, it applies to both civil and criminal proceedings.1 But as the statutory formulations of the rule in s 8 of the Civil Evidence Act 1995 and s 133 of the Criminal Justice Act 2003 retain the differentiation between primary and secondary evidence, the ramifications are different, depending on whether the evidence is in analogue or in electronic form.

1R. v Wayte (William Guy) [1982] 3 WLUK 247, (1982) 76 Cr App R 110, CA, Times, 24 March 1982, [1983] CLY 659.

2.50 In the physical world, primary evidence is an original document, and secondary evidence is in the form of copies of the original. The best evidence rule will require the production of the original document to prove the content in question, and the submission of copies is considered inferior evidence. But the fact that copies were made, for instance, by a reprographic process such as photocopying, will not prevent the copies themselves from being originals. In Miller-Foulds v Secretary of State for Constitutional Affairs1 regarding orders issued by Brentford County Court, Pelling J noted the following, at [26]:

The method of production involved copying an original draft [order] and then sealing the copies thus resulting. The copies, once sealed, were original orders. The original draft was just that: a draft. The fact that the documents that were sealed were produced by photocopying rather than copying out by hand the same document umpteen times is wholly irrelevant, in my judgment, as long as the document itself resulting from the copying process was sealed.

1[2008] EWHC 3443 (Ch), [2008] 11 WLUK 517. A subsequent application before Lloyd LJ was rejected: [2009] EWCA Civ 1132.

2.51 The concepts of ‘primary’ and ‘secondary’ evidence take a different shape when applied to material objects that must be processed to be viewed. Consider, for instance, a photograph taken with a camera containing film, or a plate. The negative or the plate comprises the only copy of the image in reverse.1 It is the negative or plate that is the material upon which the primary evidence is recorded. However, few people will be satisfied by looking at the primary image, if only because it is not easy to view, and is not intended to be viewed in this form unless by means of a projector, if the primary image is a negative. This means that the printed image is secondary evidence. Any number of copies of the primary object can be made, although no printed copy will be an exact copy of the film or plate. This is because the processes applied and the mix of chemicals used in transforming the negative into a print will determine how accurately the photograph reflects the image, in particular the degree of contrast (that is the range of grey tones) captured on the negative. For example, the degree of contrast will affect how bruising is reproduced on the photograph: a high contrast makes the bruising appear darker and more dramatic, while a low contrast will lessen the effect of the visual image, making the bruise seem somewhat less consequential.

1A point noted by Smith LJ in Griffiths v DPP [2007] RTR 44 at [21].

Digital evidence

2.52 In contrast to the discussion above, the range of evidence in digital form is vast, and it comprises not just printouts of what might be termed conventional files, such as copies of letters, contracts or spreadsheets. Other forms of digital documents include reports from computer databases, the electronic records of transactions and the digital store and reproduction of images, such as the scanned image of an original paper document. The treatment of evidence in digital form calls for different and occasionally difficult considerations.

2.53 First, there may be issues identifying the primary evidence of a digital document. In Derby & Co Ltd v Weldon (No. 9), Vinelott J considered the memory or database of a word processor or computer to be the ‘original document’,1 presumably on the basis that these are components ‘on which material fed into a simple word processor is stored’.2 However, Professor Tapper disagrees, and takes the view that the printout from the word-processed electronic document is the original and the document in computer memory is the copy.3 Both views are possible. Vinelott J’s analysis is plausible – where the printout is generated as a physical draft to aid in the editing of the word-processed document. But Professor Tapper’s view could also be justified where the object behind the use of the word processor is the generation of the printout as the final, definitive version of the document. In such a case, the authentic printout may be a better form of evidence than the state of the document in internal memory at a later time. This inversion provides a good illustration of the danger of assuming that the printout may not be the best evidence in any given situation.

1Derby & Co Ltd v Weldon (No. 9) [1991] 1 WLR 652 at 658C-D.

2[1991] 1 WLR 652 at 658C-D.

3Colin Tapper, ‘Evanescent evidence’ (1993) 1 Intl J L & Info Tech 35, 42.

2.54 In addition, the use of a digital device need not always produce an ‘original document’. Where the ‘original document’ is created in digital form but is never stored in a more permanent, non-ephemeral manner, the ‘original’ digital ‘document’ ceases to exist for all practical purposes. Instant messaging is an example of evidence that might not be stored, which makes it analogous to an oral conversation.

2.55 The issues may be further considered with the following extended illustration. For instance, the original of a physical document, such as a commercial contract between two parties, signed by the authorized representatives of both parties and acknowledged as the original, is primary evidence of the content of the contract. Even if the contract was created on a computer, the physical document will still be the original document as it was signed and adopted by both parties.1 However, should the contract, which is subsequently acted upon by both parties, exist only in digital form on a computer, the primary evidence of the document will be the digital contract residing on an identified computer storage device such as the hard drive of a computer. Printing out the document on paper will provide copies in a human-readable form, which will in turn comprise secondary evidence of the document.2

1The physical document might have a digital counterpart, as in Austria, for which see Friedrich Schwank ‘CyberDOC and e-government: the electronic archive of Austrian notaries’ (2004) 1 Digital Evidence and Signature Law Review 30, 32.

2The schedule produced in R v Nazeer (Mohammed Azad) [1998] Crim LR 750, [1998] 2 WLUK 93 cannot be considered to be hearsay or secondary evidence because it was real evidence produced by individuals using different sources of information (including computer records); Claire Barsby, ‘Evidence – documentary evidence held on computer’, [1998] Crim LR 750.

2.56 Now let us take the matter one stage further. Assume the original digital file is accessed multiple times after the contract is executed, but its file contents are not altered: perhaps particular clauses are copied for other reasons. The metadata for the digital file may have been changed to record the action of opening and closing the file, even if no substantive changes are made. Although the metadata might have been altered, the content of the file in question has not been affected. In these circumstances, it might be considered that the integrity of the original digital data is compromised. But as the content (rather than the metadata) of the digital document is unchanged, the digital document remains the primary evidence, and a printout of that document a faithful copy of the original.1 The metadata merely records when the file was opened and viewed. Metadata can be compared to a file register in the physical world that records the name of the person to whom the physical file was given, the date and time the person obtained the file, and the date and time it was returned: the register information does not alter the content of the statements made in the file (unless the person obtaining access to the file alters its contents). In such circumstances, the metadata does not affect the integrity of the digital data, which also means the secondary evidence of the file in the form of the printout remains a reliable reproduction of the digital file.

1Professor Tapper expressed the contrary view, that ‘the memory holds the copy and the original is the printed copy’ in ‘Evanescent evidence’, 42. This is correct if the printed version is a document such as a contract, where the contract is subsequently signed by the parties with manuscript signatures and excludes reference to any other version.

2.57 Consider another example: the drafting of a contract by an external lawyer for a multinational company. This task will comprise a number of stages, including: liaising with a number of people internally with different responsibilities to produce an initial draft of the contract; passing it to the other contracting party for comments; and producing a final version to the satisfaction of both parties, after a substantial period of negotiation. In all probability, various versions of the draft contract will exist in storage devices on computers, hand-held devices and backup devices belonging to several companies and their employees, perhaps across different jurisdictions. If the contract is then printed and signed by the authorized representatives of the two parties, the original document will be the printed version. If there is an issue regarding a particular version of the contract at a particular point in the negotiations, the draft digital version of the contract will be original evidence because that electronic copy is the best evidence of that version of the contract, and a printout of that version will be secondary evidence.

2.58 In addition, digital documents may themselves be stored, changed, compiled and collated into new documents, and the new documents may be original documents in themselves. The Canadian case of R v Bell1 is instructional in this regard. In this case, the bank’s computer software processed the various transactions of its customers’ chequing accounts into a monthly statement for each account. Two identical copies of the monthly statement were printed, one for the customer and one for the bank. The bank retained its copy of the monthly statement, but did not retain a record of the transactions. The trial judge held that a copy of the statement was not admissible because the transaction information stored on a computer was the record, and the original ‘record’ as a record of the dealings of a financial institution (and its subsequent copy) no longer existed. On appeal, this analysis was rejected. Weatherston JA noted that the form in which information is recorded may change from time to time, and a new form in which information is recorded, such as a compilation or collection of other records, is equally a record of that kind of information. The court found the monthly statement to be such a ‘record’ that consolidated the transactions of a financial institution and allowed the appeal.2

1(1982) 35 OR (2d) 164 (CA).

2(1982) 35 OR (2d) 164 (CA) at [13].

Civil proceedings

2.59 The admissibility of secondary evidence in civil proceedings is governed by of s 8 of the Civil Evidence Act 1995, which permits the introduction of copies of documents into evidence for the purpose of proving the statement contained in the document:

8.—(1) Where a statement contained in a document is admissible as evidence in civil proceedings, it may be proved—

(a) by the production of that document, or

(b) whether or not that document is still in existence, by the production of a copy of that document or of the material part of it, authenticated in such manner as the court may approve.

(2) It is immaterial for this purpose how many removes there are between a copy and the original.

2.60 A ‘document’ is in turn defined in s 13 as ‘anything in which information of any description is recorded’, and a ‘copy’ of a document as ‘anything onto which information recorded in the document has been copied, by whatever means and whether directly or indirectly’. There are two operative parts to s 8. Section 8(1)(a) provides that an admissible statement contained in a document may be proved by the production of the original document. Section 8(1)(b) provides that the same document may be proved by the production of a copy of that document or a material part of it, with the expression ‘whether or not that [primary] document is still in existence’ completely eviscerating the common law best evidence rule. And although s 8(1) uses the language of ‘a statement contained in a document’, suggesting that the statutory version of the best evidence rule only applies to documentary evidence used in a testimonial sense, a better reading is that s 8 applies to documentary evidence both as testimonial evidence and as real evidence. This means that s 8 will apply to the analogue record of the measurements of a device (the measurement constitutes the statement of the document)1 or the printout from an Intoximeter.

1Such as the film in The Statue of Liberty, Sapporo Maru M/S (Owners) v Steam Tanker Statue of Liberty (Owners) [1968] 1 WLR 739, [1968] 2 All ER 195, [1968] 1 Lloyd’s Rep 429, [1968] 3 WLUK 65, (1968) 112 SJ 380, [1968] CLY 1546.

2.61 The admissibility of the copied document as secondary evidence is subject to one condition and one qualification. The condition is that, as set out in the proviso to s 8(1), the copied document must be ‘authenticated in such manner as the court may approve’, just as the primary document must be authenticated. In other words, where the credibility of the digital data is in question, foundation evidence, typically in the form of testimony, will have to be introduced and tested to determine whether the secondary evidence can be accepted as ‘a copy’ of the original document. The residual judicial control over the admissibility of secondary evidence takes the form of judicial prescription of the requisite authentication evidence to prove that it is an accurate and reliable copy of the whole or a material part of the original document.

2.62 The qualification is that, by s 8(2), the number of removes between the copy and the original document is statutorily deemed to be irrelevant. This detracts from the judicial control role as explained above, and also undermines the judicial assessment of the authentication evidence as to the true accuracy and reliability of the secondary evidence.1

1For a broad discussion of electronic evidence in the civil context, see ‘Electronic evidence in civil and administrative proceedings: guidelines and explanatory memorandum’ (adopted by the Committee of Ministers of the Council of Europe, 30 January 2019), https://www.coe.int/en/web/cdcj/activities/digital-evidence.

Criminal proceedings

2.63 The starting point for the application of the best evidence rule in criminal proceedings is s 133 of the Criminal Justice Act 2003:

133 Proof of statements in documents

Where a statement in a document is admissible as evidence in criminal proceedings, the statement may be proved by producing either-

(a) the document, or

(b) (whether or not the document exists) a copy of the document or of the material part of it, authenticated in whatever way the court may approve.

2.64 The s 133 provisions are identical to those for civil proceedings in the Civil Evidence Act 1995, save for the fact that there is no mention of the number of times a copy is removed from the original in s 133 in the Criminal Justice Act. (It is suggested that the elimination of the number of removes qualification in s 133 is an improvement over the equivalent formulation of the best evidence rule in the Civil Evidence Act, in getting rid of the judicial handicap on assessment of the authentication evidence.) The other difference is that proof in criminal proceedings must rise to the appropriate standard, which is proof beyond reasonable doubt in the case of the prosecution, and proof on the balance of probabilities in the defence case. Otherwise, it should also be noted that, notwithstanding the reference to ‘a statement in a document’, for the same reasons as outlined above in relation to the Civil Evidence Act 1995, the best evidence provisions should apply equally to a document as real evidence and to a document as testimonial evidence.1 In other words, as in civil proceedings, secondary evidence of an electronic document is admissible subject to authentication evidence.

1In R v Minors (Craig), R v Harper (Giselle Gaile) [1989] 1 WLR 441, [1989] 1 All ER 208, [1988] 12 WLUK 161, (1989) 89 Cr App R 102, [1989] Crim LR 360, (1989) 133 SJ 420, [1989] CLY 546 it was held that s 24, Criminal Justice Act 1988 applied only to a ‘statement in a document’ and not to real evidence. Section 24, like s 27, the predecessor provision to s 133, is found in Part II (Documentary Evidence in Criminal Proceedings) of the Criminal Justice Act 1988. That notwithstanding, it could be argued that the holding in R v Minors (Craig), R v Harper (Giselle Gaile) should be confined to s 24 (an exception to the hearsay rule) and has no application to the interpretation of s 27 (a restatement of the best evidence rule); J. A. Coutts, ‘Admissibility of computer print-outs in evidence’ (1989) 53(4) Journal of Criminal Law 454; Lynne Knapman, ‘Computer printout – evidence – admissibility – procedure – s.68 PACE 1984’, [1989] Crim LR 360; Bernard Robertson, ‘Section 69 PACE and the intoximeter’ (1989) 153(41) Justice of the Peace & Local Government Law 653.

2.65 The effect is that while the original electronic document, if available, should be adduced into evidence, in practice a copy of the document tends to be adduced as secondary evidence. The copy may be at least one, if not two removes1 from the original. This should not matter, provided the digital copy has been produced in a way that captures the file in its entirety, including all its attributes, such as the metadata, without altering the original data. (On this point, please see the detailed discussion in Chapter 6 on authentication.)

1It is usually two removes from the original, if the original is considered to be the operational electronic document that is actively used on the computer system in question, and a copy is previously taken from that operational electronic document (in computer science terms, a ‘snapshot’ – the state of the system at a particular point in time, considering that some time would have lapsed between the taking of this copy and the current operational version of the electronic document), and a copy is in turn taken from that previous copy for purposes of preparation of proceedings.

2.66 To a certain extent, rather than question whether a document in digital form is an original or a copy, it might be more useful and relevant to refer to the proof of authenticity, or provenance, or reliability of a digital file. This is required under both s 133 of the Criminal Justice Act 2003 and s 8 of the Civil Evidence Act 1995. This in turn encapsulates proof of the integrity of the content of the data. Because of the ease with which a digital document may be migrated from one storage device to another, and thereby undergo formatting and other changes, including content and metadata changes, it is vital to require any such changes to be documented in such a way as to preserve the integrity and authenticity of the copy. Thus it might be more relevant, when referring to digital data, to concentrate on establishing which version of the data is required, particularly whether the making of copies of the digital document is properly documented.

Admissibility

2.67 That evidence takes electronic form has not been an impediment to its admissibility. Judges have admitted digital records of the product of mechanical devices and automatic recordings, photographs,1 tape recordings,2 automated film recordings of the movements of a ship as traced by radar,3 microfilm,4 printouts of test results undertaken on a breath test machine,5 video recordings,6 computer printouts7 and a recording of an oral statement of testamentary intentions on a DVD.8 The types and categories of electronic evidence are not closed.

1R v The United Kingdom Electronic Telegraph Company (Limited) (1862) 3 F & F 73, 176 ER 33, where a photograph was admitted to show the nature of the surface of a highway in respect of an allegation of an obstruction, although photographs have to be verified on oath to be considered as more than mere pictures: Hindson v Ashby [1896] 2 Ch 1 (CA) 21; R. v Tolson (1864) 4 F & F 103, 176 ER 488 where a photograph was admitted in a case of alleged bigamy to illustrate oral testimony (Willes J commented in his summing up to the members of the jury: ‘The photograph was admissible because it is only a visible representation of the image or impression made upon the minds of the witnesses by the sight of the person or the object it represents; and, therefore, is, in reality, only another species of the evidence which persons give of identity, when they speak merely from memory’ – the jury subsequently entered a verdict of not guilty); D. W. Elliott, ‘Mechanical aids to evidence’ [1958] Crim LR 5; Chris Nicoll, ‘E.D.I. evidence and the Vienna Convention’, (1995) Jan Journal of Business Law 21; Elliott Goldstein, ‘Photographic and videotape evidence in the criminal courts of England and Canada’ [1987] Crim LR 384.

2Harry Parker v Mason [1940] 2 KB 590, [1940] 4 All ER 199, [1940] 8 WLUK 1; R v Burr and Sullivan [1956] Crim LR 442; R. v Ali (Maqsud), R. v Hussain (Ashiq) [1966] 1 QB 688, [1965] 3 WLR 229 (CA), [1965] 2 All ER 464, [1965] 4 WLUK 27, (1965) 49 Cr App R 230, (1965) 129 JP 396, (1965) 109 SJ 331, (1965) CLY 796; for an example in Scotland, see Hopes and Lavery v HM Advocate [1960] Crim LR 566, 1960 JC 104, 1960 SLT 264.

3The Statue of Liberty Owners of Motorship Sapporo Maru v Owners of Steam Tanker Statue of Liberty [1968] 1 WLR 739, [1968] 2 All ER 195, [1968] 1 Lloyd’s Rep 429, [1968] 3 WLUK 65, (1968) 112 SJ 380, [1968] CLY 1546.

4Barker v Wilson [1980] 1 WLR 884, [1980] 2 All ER 81, [1980] 2 WLUK 2, (1980) 70 Cr App R 283 (DC), [1980] Crim LR 373, (1980) 124 SJ 326, [1980] CLY 469, in respect of the Bankers’ Books Evidence Act 1879.

5Castle v Cross [1984] 1 WLR 1372 (DC), [1985] 1 All ER 87, [1984] 7 WLUK 180, [1985] RTR 62, [1984] Crim LR 682, (1984) 81 LSG 2596, (1984) 128 SJ 855, [1985] CLY 3048.

6Kajala v Noble [1982] 3 WLUK 133, (1982) 75 Cr App R 149, [1982] Crim LR 433 (DC), [1982] CLY 605; R v Grimer [1982] 6 WLUK 204, [1982] Crim LR 674, 126 SJ 641 (CA), [1982] CLY 606; R v Thomas (Steven) [1986] 7 WLUK 85, [1986] Crim LR 682, [1986] CLY 594 regarding video recording of the route taken made in lieu of maps and still photographs; XXX v YYY and ZZZ [2004] EWCA Civ 231, [2004] 2 WLUK 196, [2004] IRLR 471 regarding video recording of a nanny in a home which was also a place of work; R v Nikolovski (1996) 111 CCC (3d), [1996] 3 SCR 1197 403.

7R v Wood (Stanley William) [1982] 6 WLUK 191, (1983) 76 Cr App R 23, [1982] Crim LR 667 (CA), [1983] CLY 636 considering the results of an automated analysis; R v Sinha (Arun Kumar) [1994] 7 WLUK 34, [1998] Masons CLR 35, [1995] Crim LR 68 (CA), Times, 13 July 1994, Independent, 1 August 1994, [1994] CLY 1137 concerning the alteration of medical data recorded on a computer.

8Re Estate of Wai Fun Chan, Deceased [2015] NSWSC 1107.

2.68 Evidence is admitted into legal proceedings if it is relevant to an issue in dispute, subject to a number of exceptions.1 It is a matter of law for a judge to determine whether evidence is admissible. Generally, judges are required to determine whether evidence is to be excluded in criminal trials far more frequently than in civil matters, especially where admitting the evidence might not be in the interests of justice.2 For instance, in R v Fowden and White3 the Court of Appeal held that a video film showing activities that were consistent with the acts of theft had been improperly admitted.4 The prejudicial value outweighed its probative effect, because the witnesses who identified the accused knew them from a similar case of theft that occurred a week after the events recorded in the video film, and the defence was therefore not able to test the accuracy of the identification without causing prejudice and embarrassment.5

1For a more detailed discussion, see Malek, Phipson on Evidence, ch 2 and 7–01 to 7–16.

2Police and Criminal Evidence Act 1984, s 78; Criminal Justice Act 2003, s 114(1)(d).

3[1982] 2 WLUK 48, [1982] Crim LR 588, [1982] CLY 607.

4For the US, see Nicole Chauriye, ‘Wearable devices as admissible evidence: technology is killing our opportunity to lie’, (2016) 24(2) Cath UJL & Tech 495; Katherine E. Vinez, ‘The admissibility of data collected from wearable devices’, (2017) 4 Stetson J Advocacy & L 1.

5In R v Caldwell, R v Dixon [1993] 5 WLUK 237, (1994) 99 Cr App R 73, [1993] Crim LR 862, [1995] CLY 933 the members of the court considered it would be useful to have a set of procedures in relation to the use of video recordings for the purposes of identification.

2.69 In civil proceedings, evidence that is admissible can be excluded in accordance with the provisions of CPR 32.1(2), which provides a judge with the explicit general power to exclude evidence when in the role of managing a case:

32.1 (1) The court may control the evidence by giving directions as to –

(a) the issues on which it requires evidence;

(b) the nature of the evidence which it requires to decide those issues; and

(c) the way in which the evidence is to be placed before the court.

(2) The court may use its power under this rule to exclude evidence that would otherwise be admissible.

2.70 However, in adopting the argument of the appellants in Great Future International Ltd v Sealand Housing Corporation, Arden LJ pointed out, at [24], that the power ‘must be used with great circumspection for the purpose of achieving the overriding objective’.1 The modern tendency is to admit evidence, and then consider its weight, as illustrated by the comment of Cockburn CJ in The Queen v Churchwardens, Overseers and Guardians of the Poor of the Parish of Birmingham: ‘People were formerly frightened out of their wits about admitting evidence lest juries should go wrong. In modern times we admit the evidence and discuss its weight.’2

1[2002] EWCA Civ 1183, [2002] 7 WLUK 689, [2003] CP Rep 3, [2003] CLY 276.

2(1861) 1 B & S 763, 767; 121 ER 897.

Weight

2.71 The questions of weight, credibility and sufficiency of the evidence are decisions for the members of a jury, and for the judge where a case is tried without a jury. There are no fixed rules to determine what weight to give to any item of evidence. In R v Madhub Chunder Giri Mohunt, Birch J observed: ‘For weighing evidence and drawing inferences from it, there can be no canon. Each case represents its own peculiarities and in each common sense and shrewdness must be brought to bear upon the facts elicited’,1 and Lord Blackburn commented in Lord Advocate v Blantyre that ‘[t]he weight of evidence depends on rules of common sense’.2

1(1874) 21 WRCr (India) 13 at19.

2(1879) 4 App Cas 770 at 792.

2.72 When conducting a trial with members of a jury, the judge may withdraw an issue because the proponent has failed to adduce sufficient evidence in support of the claim. Furthermore, in summing up to the members of the jury at the end of the trial, the judge is required to provide directions on a range of issues, including, but not limited to: who has the burden of proof; what presumptions, if any, apply; when supporting evidence should be considered before putting weight on certain types of evidence; and to offer comments on matters including the weight of the evidence, although it must be made explicit that such comments are meant only to help the members of the jury in reaching their own decision.1 In addition, there are a number of factors set out in s 114(2) of the Criminal Justice Act 2003 that deal with the assessment of the weight of hearsay in criminal proceedings.

1Crown Court Compendium, https://www.judiciary.uk/publications/crown-court-compendium-published/.

Video and audio evidence

Testimonial use in legal proceedings

2.73 In exceptional instances, video-recorded and tape-recorded evidence may be used in lieu of testimonial evidence. In civil proceedings, evidence may be given by means of a video link or any other means, subject to leave being obtained from the court.1 In criminal matters, it is possible to record the initial interview with children2 and admit the recording in evidence, subject to leave of the court and any editing that the court decides is necessary.3 Leave is required to adduce a video recording of the testimony of a witness in accordance with the provisions of s 27 of the Youth Justice and Criminal Evidence Act 1999.4

1Civil Procedure Rule 32.3, which is supplemented by Practice Direction 32 – Evidence Annex 3.

2Section 35A of the Criminal Justice Act 1988 was added by s 54 of the Criminal Justice Act 1991.

3Criminal Justice Act 1988, s 35A(2).

4For further details, see the most up-to-date editions of the following practitioner texts: Archbold: Criminal Pleading, Evidence and Practice (Sweet & Maxwell); Blackstone’s Criminal Practice (Oxford University Press); Archbold: Magistrates’ Courts Criminal Practice (Sweet & Maxwell).

2.74 Video-conferencing and web-conferencing technology have also made it possible to provide testimonial evidence from outside the court.

Identification and recognition evidence

2.75 Surveillance cameras are very much part of life in the twenty-first century, ever since the foundations of their use were laid in the latter decades of the twentieth century. Evidence of images from security cameras can be very helpful in identifying the perpetrators of crimes. Such evidence has been admitted in English courts, mainly in criminal cases.1 The widespread availability of video-recorded and tape-recorded evidence has opened up the possibility that such evidence may be augmented with more advanced techniques, and the enhancement of the sounds or images, together with the use of techniques such as aural identification and facial mapping, can help to identify the parties in a recording.

1A list that is not exhaustive includes: McShane (Yolande Tregenna) [1977] 7 WLUK 2, (1978) 66 Cr App R 97, [1977] Crim LR 737, (1977) 121 SJ 632, [1978] CLY 636; R v Fowden and White [1982] 2 WLUK 48, [1982] Crim LR 588 (CA), [1982] CLY 607; R v Grimer [1982] 6 WLUK 204, [1982] Crim LR 674, (1982) 126 SJ 641 (CA), [1982] CLY 606; R v Dodson (Patrick); R v Williams (Danny Fitzalbert Williams) [1984] 1 WLR 971, [1984] 4 WLUK 121, (1984) 79 Cr App R 220, [1984] Crim LR 489, (1984) 81 LSG 1677, (1984) 128 SJ 364, [1984] CLY 605; Stockwell (Christopher James) [1993] 3 WLUK 119, (1993) 97 Cr App R 260, Times, 11 March 1993, [1994] CLY 914; R v Clarke (Robert Lee) [1994] 12 WLUK 118, [1995] 2 Cr App R 425, Times, 26 December 1994, Independent, 30 January 1995, [1996] CLY 1373 also known as R v Clarke (Bobby Lee); Clare (Richard), Peach (Nicholas William) [1995] 4 WLUK 107, [1995] 2 Cr App R 333, (1995) 159 JP 412, [1995] Crim LR 947, (1995) 159 JPN 424, (1995) 92(17) LSG 47, (1995) 139 SJLB 117, Times, 7 April 1995, Independent, 7 April 1995, [1996] CLY 1378; R v Feltis (Jeremy) [1996] EWCA Crim 776, [1966] 8 WLUK 104; R v Hookway [1999] Crim LR 750, also known as R v H (Stephen James) (A Juvenile) [1999] Crim LR 750 (CA (Crim Div)); R v Breddick (Christopher), also known as R v Briddick (Christopher) [2001] EWCA Crim 984, [2001] 3 WLUK 790, Independent, 21 May 2001; R v Loveridge (William), R v Lee (Charles Sonny), R v Loveridge (Christine) [2001] EWCA Crim 973, [2001] 4 WLUK 290, [2001] 2 Cr App R 29, (2001) 98(23) SJLB 120, Times, 3 May 2002, [2001] CLY 983 – in this instance the accused were recorded by video in the court, an act prohibited by s 41 of the Criminal Justice Act 1925, and the recording was also held to have infringed the rights of the accused under article 8 of the Human Rights Act 1998. However, neither infringement was held to have interfered with the right to a fair trial: Elliott Goldstein, ‘Photographic and videotape evidence in the criminal courts of England and Canada’ [1987] Crim LR 384; Michael C. Bromby, ‘At face value?’ [2003] 153(7069) NLJ Expert Witness Supplement 302; Rob R. Jerrard, ‘Police video of defendants in magistrates’ court for comparison with security video recording’ (2002) 75(3) Pol J 263.

2.76 Before such evidence is used, there should be a careful examination1 of the technology in question. A good example of this judicial scrutiny was that done by Steyn LJ in R v Clarke (Robert Lee),2 where His Lordship analysed the technique of facial mapping3 by video superimposition. The court carefully considered the reliability of the underlying scientific techniques, noting that the techniques themselves could be fit for debate, and their improper use by an expert in the particular case could in turn affect the probative value of such evidence. It was only after the court was satisfied on these two grounds that the identification evidence from the application of the technique was admitted.

1The careful examination may be done in a trial within a trial, also called a ‘voir dire’.

2[1994] 12 WLUK 118, [1995] 2 Cr App R 425, Times, 26 December 1994, Independent, 30 January 1995, [1996] CLY 1373, also known as R v Clarke (Bobby Lee).

3[1995] 2 Cr App R 425 at 430F; Bromby, ‘At face value?’, 302–304; R v Jung [2006] NSWSC 658.

2.77 Issues regarding the reliability and application of these techniques are very much for expert evidence, depending on the nature and sophistication of each technique. But some guidance may be sought that stems from the best practices for handling electronic evidence. For instance, for evidential techniques that involve manipulating and enhancing digital imagery, Gregory Joseph has noted that the following steps must be taken before enhanced digital imagery can usefully be used:1

1. The original image needs to be properly authenticated.

2. The original image must remain intact to enable the original to be compared with the enhanced version.

3. The original image should be preserved in such a way that its integrity cannot be impugned.

4. The process of enhancement should be fully documented.

5. The process of enhancement should be carried out in such a way that the process can be repeated by the other party.

6. The enhanced images should be preserved in such a way that prevents them from being manipulated, thereby preserving their integrity.

1Gregory P. Joseph, ‘Modern visual evidence’ (2009) 8(4) L J Seminars Press 4.

2.78 Important lessons were also spelt out regarding the use of voice recognition technologies and techniques for identification purposes in R v Flynn and St John.1 In this case, the prosecution sought to identify the two appellants as conspirators of a robbery through voice recognition techniques. Before the robbery, the police secretly fitted a listening and transmitting device to one of the vehicles it was assumed (correctly) that the conspirators would use for the robbery. Four police officers testified that they recognized the appellants’ voices from the 60 minutes of covert recording made by the device. The trial judge ruled admissible the evidence of the police officers and the transcripts of the recording, and placed the evidence before the jury. The appellants challenged the decision of the trial judge to admit the voice recognition evidence of the officers and the judge’s failure to give an appropriate direction to this evidence.

1[2008] EWCA Crim 970, [2008] 5 WLUK 53, [2008] 2 Cr App R 20, [2008] Crim LR 799, [2008] CLY 701; Damian Warburton and Thomas Lewis, ‘Opinion evidence; admissibility of ad hoc expert voice recognition evidence: R v Flynn’ (2009) 13(1) E & P 50; Ken Shaw, ‘The quasi-expert witness: fish or fowl?’, (2009) 73(2) Journal of Criminal Law 146; Jeremy Robson, ‘A fair hearing? The use of voice identification parades in criminal investigations in England and Wales’ [2017] Crim LR 36.

2.79 In giving judgment on appeal, Gage LJ noted that there are two categories of voice recognition evidence: expert evidence using either auditory analysis or acoustic/spectrographic analysis, or lay listener evidence, where the lay listener as a witness is required to possess some special knowledge of the suspect that enables him to recognize the suspect’s voice. Such witnesses may be close relatives or friends, but they may also be persons who acquire such familiarity by the frequency of their contact with the suspect. Gage LJ also noted that suspect identification by voice recognition is more difficult than visual identification, that voice identification by experts using sophisticated auditory, acoustic and spectrographic techniques are likely to be more reliable than identification by a lay listener, and that the quality of identification by a lay listener is highly variable. In addition, research has shown that a confident recognition by a lay listener of a familiar voice may nevertheless be wrong, because while an expert is able to draw up an overall profile of the individual’s speech patterns, in combination with instrumental analysis and reference research, a lay listener’s response is fundamentally opaque because he cannot know and has no way of explaining which aspects of the speaker’s speech patterns he is responding to, and has no way of assessing the significance of the individually observed features relative to the overall speech profile. This makes it more difficult to challenge the accuracy of his evidence.

2.80 For all these reasons, the Court of Appeal allowed the appeal, holding that the police officers as lay listeners had a limited opportunity to acquire familiarity with the appellants’ voices, and that the quality of the covert recording was poor. In contrast, both experts, one representing the prosecution and the other representing the appellants, were unable to identify the voices as being those of the appellants, further casting doubt on the officers’ voice recognition evidence.

2.81 While R v Flynn and St John did not close the door on voice recognition evidence, Gary Edmond, Kristy Martire and Mehera San Roquem suggest the following minimal safeguards be required before the prosecution can seek to admit voice recognition evidence from lay listeners:1

1. The process must be properly recorded, and the amount of time spent in contact with the defendant will be very relevant to the issue of familiarity.

2. The date and time spent by the police officer compiling a transcript of a covert recording must be recorded. If the police officer annotates the transcript with his views as to which person is speaking, that must be noted.

3. A police officer attempting the voice recognition exercise must do so without the aid of a transcript that bears another officer’s annotations of whom he or she believes is speaking.

4. It is highly desirable that a voice recognition exercise should be carried out by someone other than an officer investigating the offence.

1For a critical analysis of this topic and the discussion of further case law, see: David Ormerod, ‘Sounding out expert voice identification’ [2002] Crim LR 771; Gary Edmond, Kristy Martire and Mehera San Roque, ‘Unsound law: issues with (“expert”) voice comparison evidence’ (2011) 35(1) Melbourne U L Rev 52; Geoffrey Stewart Morrison, ‘Distinguishing between forensic science and forensic pseudoscience: testing of validity and reliability, and approaches to forensic voice comparison’ (2014) 54(3) Science & Justice 245; Gary Edmond, ‘Legal versus non-legal approaches to forensic science evidence’ (2016) 20(1) E & P 3; Geoffrey Stewart Morrison, ‘Admissibility of forensic voice comparison testimony in England and Wales’ [2018] Crim LR 20.

2.82 These safeguards are certainly in line with the issues raised by Gage LJ in R v Flynn and St John, and highlight the care with which both the parties and the courts must proceed when seeking to admit computer-generated and computer-augmented evidence, in order to safeguard the evidential process.

Computer-generated animations and simulations

2.83 Digital visual evidence presentation systems (including digital displays, computer-generated graphical presentations, animated graphics and immersive virtual environment technology) have been used in legal proceedings in many jurisdictions. Such tools can be used to present evidence and illustrate hypotheses based on scientific data, or to depict the perception of a witness, or to illustrate what may have occurred (as seen from a specific viewpoint) during a particular incident. Digital reconstruction technology may also be applied in a court to explore and illustrate ‘what if’ scenarios and questions, to test competing hypotheses and to expose any possible inconsistencies and discrepancies within the evidence.

2.84 Computer animations and interactive virtual simulations are potentially unparalleled in their capabilities for presenting complex evidence.1 The use of such enabling visualization technologies can affect the manner in which evidence is assimilated and correlated by the viewer. In many instances, visual media can potentially help make the evidence more relevant and easier to understand.2 In other cases it may be seen to be unfairly prejudicing the members of a jury.

1Gregory P. Joseph, Modern Visual Evidence (L J Seminars Press 2009); Neal Feigenson and Christina Spiesel, Law on Display: The Digital Transformation of Legal Persuasion and Judgment (New York University Press 2009); David M. Paciocco seems to fail to have understood this serious issue when commenting that the introduction of computer-enhanced photographs did not require any special evidential foundations or relevant expert evidence: ‘Proof and progress: coping with the law of evidence in a technological age’, (2013) 11(2) Canadian Journal of Law and Technology 181, 186–187.

2A. M. Burton, D. Schofield and L. M. Goodwin, ‘Gates of global perception: forensic graphics for evidence presentation’ in ACM Multimedia 2005: Proceedings of the 13th Annual ACM International Conference on Multimedia (Association for Computing Machinery 2005), 103 and Jeffrey Mervis, ‘Court views engineers as scientists’ (1999) 284(5411) Science 21.

2.85 At first glance, these computer-generated graphical reconstructions may be seen as potentially useful in any court, and they are often treated like any other form of digital evidence regarding their admissibility. In particular, they are admitted as part of expert testimonial evidence or as a special type of real evidence.1 However, this specific form of digital media warrants special care and attention due to its inherently persuasive nature, and the undue reliance that the viewer may place on evidence presented through a (potentially photorealistic) visualization medium such as this, often to the exclusion of the underlying evidence and the assumptions made in generating these graphical representations. This is often referred to as the ‘seeing is believing’ tendency.2

1For example, see R v Clarke (Robert Lee) [1994] 12 WLUK 118, [1995] 2 Cr App R 425, Times, 26 December 1994, Independent, 30 January 1995, [1996] CLY 1373, also known as R v Clarke (Bobby Lee).

2Fred Galves, ‘Where the not so wild things are: computers in the courtroom, the federal rules of evidence, and the need for institutional reform and more judicial acceptance’ (2000) 13(2) Harv J L & Tech 161; Christine O. Spiesel, Richard K. Sherwin and Neal Feigenson, ‘Law in the age of images: The challenges of visual literacy’ in Anne Wagner, Tracey Summerfield and Farid S. B. Vanegas (eds) Contemporary Issues of the Semiotics of Law (Oñati International Series in Law and Society 2005); Richard Sherwin, ‘Visual literacy in action: law in the age of images’ in James Elkins (ed) Visual Literacy in Action (Routledge 2007), 179; Damian Schofield, ‘The use of computer generated imagery in legal proceedings’ (2016) 9 Digital Evidence and Electronic Signature Law Review 1.

2.86 As courts begin increasingly to use multimedia and cinematic displays, this has profound implications for the legal processes taking place that are intrinsically tied to the application of such technology. It must be questioned whether the decisions made in courts using such technologies are adversely affected by the manner in which the evidence is presented.1

1Jonathan Chambers, ‘Shipping law – collision – responsibility for collision – expert evidence – admissibility of expert evidence on seamanship – nautical assessors – plotting – simulations’ (1999) 6(1) Int M L 281; Moya Clifford and Katie Kinloch, ‘The use of computer simulation evidence in court’, (2008) 24(2) Computer Law and Security Report 169; Joanna Gallant and Lauren Shepherd, ‘Effective visual communication: scientific principles and research findings’, in Samuel H. Solomon, Joanna Gallant and John P. Esser (eds) The Science of Courtroom Litigation: Jury Research and Analytical Principals (ALM Publishing 2009); Ken Fowle and Damian Schofield, ‘Visualising forensic data: investigation to court’ in Dr Andrew Woodward and Professor Craig Valli (eds) Proceedings of the 9th Australian Digital Forensics Conference (Security Research Centre 2011); Peer Watterson, ‘Appeal court reluctance: complex evidence, obviousness and related matters’, (2012) 7(5) JIPLP 358; David-John Gibbs, Stephen Emmitt, Kirti Ruikar and Wayne Lord, ‘Recommendations on the creation of computer generated exhibits for construction delay claims’ (2014) 30(4) Const LJ 236.

Computer-generated evidence in England and Wales: civil proceedings

2.87 An early occurrence of the use of computer-generated evidence is seen in the civil case of The Owners of the Ship Pelopidas v The Owners of the Ship TRSL Concord.1 In 1996 a collision took place in the Access Channel to Buenos Aires between two vessels: the Pelopidas and TRSL Concord. The issue for the court to decide was the liability for the collision and the apportionment of that liability. The items of computer-generated evidence submitted were two-dimensional computer-generated simulations of the trajectories of both vessels; these were, in effect, animated maps. A ‘black box’ on the Concord recorded various positioning, speed and heading data at 15-second intervals for the relevant collision time period. Both sides accepted the accuracy of the plot. David Steel J concluded that a fair apportionment of liability was 60:40 in favour of the Pelopidas, and stated:

there is a danger of losing sight of the true value of reconstructions. Of course they enable the Court and the parties to have a broad bird’s eye view of the events leading up to collision. But their true probative value is that they may sometimes enable the Court to determine, not what may have happened, but what could not possibly have happened.2

1[1999] 2 All ER 737 (Comm), [1999] 2 Lloyd’s Rep 675, [1999] 10 WLUK 259, [2000] CLY 4677.

2[1999] 2 Lloyd’s Rep 675 at 682.

2.88 In stating the above, David Steel J was remarking on his accumulated experience of the usefulness of computer-generated reconstruction evidence.1 Computer simulations are now more frequently used in civil proceedings.2

1Charles Macdonald QC, ‘Case note Owners of the Ship Devotion v Owners of the Ship Golden Polydinamos’ (1995) 4 Int ML 77, where the members of the Court of Appeal endorsed the comments of the trial judge respecting the use of computer simulations as evidence of a collision.

2This list is not exhaustive: in criminal proceedings, R. v Maloney (Gerald) [2003] EWCA Crim 1373, [2003] 5 WLUK 565; Mitrasinovic v Stroud [2020] EWHC 914 (QB), [2020] 4 WLUK 156; others include: Halliburton Energy Services Inc v Smith International (North Sea) Ltd [2006] EWCA Civ 1715, [2006] 12 WLUK 379, (2007) 30(2) IPD 30009; Maersk Oil UK Ltd v Dresser-Rand (UK) Ltd [2007] EWHC 752 (TCC), [2007] 4 WLUK 50.

Computer-generated evidence in England and Wales: criminal proceedings

2.89 The Court of Appeal has indicated that it favours the use of digital images in criminal proceedings, as indicated in R v Smith (Peter Kenneth)1 by Thomas LJ, at [61]:2

The presentation of the evidence to the jury made no attempt to use modern methods of presentation. The presentation to this court was similar; a large amount of time was wasted because of this. It was incomprehensible to us why digital images were not provided to the jury; the refusal of NAFIS [National Automated Finger Print Identification System] to permit a digital image to be supplied to the court was a further example of the lack of a contemporary approach to the presentation of evidence. The presentation to the jury must be done in such a way that enables the jury to determine the disputed issues.

1[2011] EWCA Crim 1296, [2011] 5 WLUK 644, [2011] C App R 16, [2011] CLY 602.

2See also Rosemary Pattenden, ‘Fingerprint evidence – United Kingdom’, (2011) 15(4) E & P 371; for New Zealand, see R v Garrett [2001] DCR 955 and R v Little [2007] NZCA 491.

2.90 Because of the critical nature of criminal trials, it is crucial that any computer-generated evidence that is put forward be thoroughly examined.1 The use of a jury in criminal cases is another important reason for assessing the relevance, accuracy and possible prejudicial effect of computer-generated evidence carefully. For this reason, it is important for defence counsel to be aware of the issues that can arise and be suitably prepared to test the evidence. In R. v Gardner (Trevor Elton),2 a person was killed during a fire in a block of flats. One of the experts who gave identification evidence for the prosecution used a new technique that deployed computer software to provide an analysis of video surveillance footage, as described by Waller LJ at [34]:3

[The expert] had developed a different technique. He had developed equipment to enable the images on a video surveillance film to be presented so as to extract as much information from it as possible. This included enhancing the film by computer to allow frame by frame examination, the ability to zoom in on part of the frame to alter the contrast and brightness to bring out detail and to run the film backwards and forwards. The second purpose of the equipment is to assist in making comparisons between one frame and another. To help in that [the expert] has developed three techniques. He called the first of them ‘image addition’. By means of his computer he takes an image from one sequence of movements and selects from another sequence an image of a person who displays approximately the same stance and is about the same distance from the camera as the first. The second image is superimposed on the first so the viewer can observe whether the two images are like one another and whether there are any differences. The difference, depending on what it is, may show that the images are of different people. The second technique is referred to as ‘image subtraction’. [The expert] takes the two images selected because of their comparable poses and distances from the camera and turns the first computerised image into a negative and superimposes the second on it in a positive form. The result is that the features which are common to both images disappear and only what is different remains. [The expert’s] third technique is a ‘blink comparison’ whereby he can switch from one image to another. When there are differences between the two they generate an illusion of movement so that the eye is able to pick up the differences. That technique also enables the viewer to see that when one image is removed an element which had appeared to belong to the picture which has been removed in fact belongs to the picture which remains.

1For an examination of the issues and case law, see Tony Ward, ‘Surveillance cameras, identification and expert evidence’ (2012) 9 Digital Evidence and Electronic Signature Law Review 42; Gareth Norris, ‘The influence of computer generated animations on juror decision making’, (2014) 11 Digital Evidence and Signature Law Review 46.

2[2004] EWCA Crim 1639, [2004] 6 WLUK 615; Andy Roberts, ‘Expert evidence: facial mapping; image analysis’ (2004) 68(5) Journal of Criminal Law 372; Ruth Costigan, ‘Identification from CCTV: the risk of injustice’ [2007] Crim LR 591.

3The admissibility of such evidence was approved in R v Breddick (Christopher), also known as R v Briddick (Christopher) [2001] EWCA Crim 984, [2001] 3 WLUK 790, Independent, 21 May 2001.

2.91 Even though the defence did not have any material in relation to which they could cross-examine the expert witness and enable the jury to judge the accuracy of the expert’s analysis and assessment that the person identified in the surveillance footage was the defendant, the court guardedly accepted the admissibility of this evidence. In doing so, Waller LJ also sounded a note of caution regarding new techniques relating to identification. The judge quoted, at [45], the following statement of Lord Hope in Hopes and Lavery v HM Advocate:

If admitting evidence of this kind seems unfamiliar and an extension of established evidential practice, the answer must be that, as technology develops, evidential practice will need to be evolved to accommodate it. Whilst the courts must be vigilant to ensure that no unfairness results, they should not block steps which enable the jury to gain full assistance from the technology.

2.92 But even if juries are to be enabled to benefit from the full spectrum of technological evidence, they are particularly vulnerable, often more so than judges and coroners, to any prejudicial effect and inaccuracy of scientific animations. Perhaps this is because juries do not have the same level of cynicism that years of experience of analysing evidence has given judges and, to a lesser degree, coroners. In the case of R v Ore,1 Tucker J stated the defence’s apprehension regarding the admissibility of a computer-generated animation:

The concern which is expressed by [the defence] … is as to the impact which this evidence will have upon the jury and I understand that concern. [The defence] fears that the weight which the jury may place upon the graphic animation will be disproportionate to its value in the case. [The defence] fears that they may be distracted from concentrating as they ought to do upon the evidence to be given by the expert witnesses on either side and is concerned, naturally, that the graphic animation reproduces simply one particular side of the coin.

1(1998, Birmingham Crown Court, unreported). Stephen Mason tried to obtain a copy of the transcript of the case for the first edition of this text, but the tapes were destroyed in accordance with the relevant retention and disposal policy (correspondence with Michael Ives of Marten Walsh Cherer Limited). Stephen Mason subsequently corresponded with Sir Richard Tucker, who indicated that he no longer had the notes of this trial, but kindly confirmed the remarks that are attributed to him as quoted in this text.

2.93 The concerns stated above are highly relevant and illustrate real fears about any computer-generated evidence. This is especially true for forensic reconstructions. Hence, any computer-generated reconstructions should be made as precisely and in as unbiased a way as possible, and their use has to be shown to be necessary.1 Their probative value should outweigh any potential prejudicial effect.

1In R. v Maloney (Gerald) [2003] EWCA Crim 1373, [2003] 5 WLUK 565, a reconstruction was developed using computer simulation software in preparation for an appeal against conviction, a technology that was not available at the time of trial. The members of the Court of Appeal decided, in the light of the opinion of the expert who undertook the simulation not being conclusive, that the evidence would have no effect upon the safety of the conviction, and the court did not receive it and dismissed the appeal. It is not clear whether Mr Adrian Redgrave, QC, who appeared for the Crown at trial and on the reference to the Court of Appeal (Criminal Division), explored the technical integrity or the assumptions upon which the program was prepared.

2.94 These lessons may be illustrated by the case of R v Ore, which introduced one of the first forensic computer-generated animations to an English criminal trial. The Crash Investigation and Training Unit of the West Midlands Police Service produced the animation. The case involved a collision between two vehicles at a junction; one of the drivers was killed as he pulled out in front of an oncoming vehicle. The views of both drivers were partially obscured by large hedges and walls around the junction.1 Tucker J, who presided over this case, further stated in his ruling on 25 November 1998:2

I am told that this is the first time in which it has been suggested that a jury in a trial such as this should be shown a computer aided animation which pictorially represents a reconstruction of a road traffic accident. It may be that in years to come such displays will be commonplace and that lawyers will marvel that anyone should ever have questioned their admissibility.

… I am satisfied that it would be right to admit this evidence and, indeed, wrong to refuse so to do, provided, as I shall try to do, that I give the jury proper directions as to their approach to this evidence and provided I ensure, so far as I can, that they do not place disproportionate weight upon it. Accordingly, I rule that the evidence is admissible.

1M. Doyle, ‘Working model: helping the police with their enquiries’ (1997) CAD User 62 (no longer available online).

2R v Ore (1998, Birmingham Crown Court, unreported).

2.95 A well-known example from Northern Ireland is the computer-generated evidence that was extensively used during the Bloody Sunday Inquiry.1 In 1972, 13 people were killed during a peaceful demonstration. The original inquiry produced a report within 11 weeks of the incident, and acquitted the soldiers involved. In 1998, a Tribunal of Inquiry was established to reassess the events.2 Lord Saville, the chair of the tribunal, took full advantage of ensuing improvements in technology, and used a computer software system designed especially for use in the Inquiry to amplify the testimony of witnesses. The Northern Ireland Centre for Learning and Resources produced the computer-generated virtual models, which reconstructed a large area of Londonderry that had been extensively altered since 1972. The user was able to compare the same scene as it appeared at the time of the Inquiry and as it was in 1972. There were 80 locations stored in the system that could be explored, with specific points of view being recalled when switching between the representations. The system could also store oral evidence about location and movement, and export scenes to a mark-up system so that witnesses could draw on top of images. The computer software system that was admitted was deemed to be unbiased and accurate.

1See The Bloody Sunday Inquiry http://www.bloody-sunday-inquiry.org.uk/.

2Statement by Tony Blair, Prime Minister: HC Deb 29 January 1998, vol 305, col 501.

2.96 The Bloody Sunday Inquiry computer system was not interactive in three-dimensions. Virtual reality or VR, by definition, is an interactive computer-generated simulated environment with which users can interact using a computer monitor or specialized hardware. The computer system used for the Bloody Sunday Inquiry was interactive in the sense that viewers were able to view images of different scenes at varied times. However, the viewer was not able to move around a full three-dimensional virtual environment of Londonderry itself, since such a three-dimensional virtual model of the area did not exist. But since then, courts in England and Wales have begun to introduce interactive three-dimensional VR crime scene environments for a number of high-profile criminal cases.1 There is little doubt that, with the increasing complexity of criminal investigations, we will see more use of virtual environments and immersive virtual environments in legal proceedings.

1Damian Schofield, ‘Playing with evidence: using video games in the courtroom’ (2011) 2(1) J of Entertainment Computing (Special Issue: Video Games as Research Instruments) 47.

2.97 Virtual environments possess the potential to sway juries and decision makers, even more so than computer animations in general. Creating an environment that allows viewers to take different perspectives and manipulate objects in that environment do indeed allow for ‘what if’ scenarios to be played out, and could lead to more robust decisions. But the reconstructions of scenes in these environments are based on various assumptions and premises, not all of which can be elucidated or are transparent, or easily accessible for review by opposing experts and by decision makers. Analyses of computer-generated displays show that they can be extremely advantageous in the court, provided they are used appropriately. The consequences of a failure to investigate these issues cannot be underestimated, since errors, inaccuracies, misuse, tampering or biases within visualizations are capable of leading to miscarriages of justice.1

1Marcel Worring and Rita Cucchiara, ‘Multimedia in forensics’ in Proceedings of the 17th ACM International Conference on Multimedia (Association for Computing Machinery 2009), 1153.

Annotate

Next Chapter
Chapter 3
PreviousNext
All rights reserved
Powered by Manifold Scholarship. Learn more at
Opens in new tab or windowmanifoldapp.org