People v. Bernard

Decision Date23 May 2013
Docket NumberCourt of Appeals No. 12CA0495
Citation305 P.3d 433
PartiesThe PEOPLE of the State of Colorado, Plaintiff–Appellee, v. Ronald Huey BERNARD, Jr., Defendant–Appellant.
CourtColorado Court of Appeals

OPINION TEXT STARTS HERE

El Paso County District Court No. 11CR2784, Honorable Gregory R. Werner, Judge.

John W. Suthers, Attorney General, Erin K. Grundy, Assistant Attorney General, Denver, Colorado, for PlaintiffAppellee.

Douglas K. Wilson, Colorado State Public Defender, Cynthia J. Jones, Deputy State Public Defender, Deana M. Feist, Deputy State Public Defender, Colorado Springs, Colorado, for DefendantAppellant.

Opinion by JUDGE TERRY

¶ 1 Defendant, Ronald Huey Bernard, Jr., appeals the judgment of conviction entered following a jury verdict finding him guilty of one count of violating a protection order. We affirm.

¶ 2 As an issue of first impression, we consider the requirements for proper authentication of e-mails under CRE 901. We conclude that e-mails may be authenticated (1) through testimony explaining that they are what they purport to be; or (2) through consideration of distinctive characteristics shown by an examination of their contents and substance in light of the circumstances of the case.

I. Background

¶ 3 On August 11, 2011, a mandatory protection order was entered, naming defendant as the restrained party and the victim and her son as the protected parties. The order restrained defendant from harassing, molesting, intimidating, contacting, or communicating with the victim, and ordered defendant to vacate the victim's home. He was advised of the order and its contents during an in-custody video advisement with a magistrate.

¶ 4 The victim testified that, on August 15, defendant called her to wish her a happy birthday and arranged to pick up some of his clothing that she planned to leave outside her door. He arrived at her apartment in the early hours of August 16 and banged and knocked on her doors and windows. The victim testified that it sounded as if he were trying to get in. During the incident defendant told her that if she showed up in court the next day, one of them would not be “making it back,” and that he would kill her if she called the police. The victim called her mother and then called the police.

¶ 5 Defendant testified that he was living with the victim on the days leading up to this incident, and they had spent the entire day together on August 15. He said that late that night and into the early morning of August 16, the two had an argument, after which he left to smoke a cigarette. When he had finished, he returned and attempted to get back into the apartment.

The responding police officers testified that when they arrived, they found defendant in a basement storage room in the victim's apartment complex. Defendant was arrested, and later charged with one count of intimidation of a witness and one count of violation of a protection order. He was acquitted of the witness intimidation charge, but was found guilty and convicted of violating a protection order.

II. Discussion
A. Admission of E–Mail into Evidence

¶ 7 Defendant first argues that the trial court erred in admitting an e-mail into evidence because it was not properly authenticated. We disagree.

¶ 8 We review evidentiary rulings, including foundation and authentication rulings, for an abuse of discretion. People v. Ibarra, 849 P.2d 33, 38 (Colo.1993); People v. Huehn, 53 P.3d 733, 736 (Colo.App.2002). A trial court abuses its discretion if its ruling is manifestly arbitrary, unreasonable, or unfair. People v. Melillo, 25 P.3d 769, 773 (Colo.2001).

¶ 9 On the morning that the victim was scheduled to testify in defendant's trial, an e-mail was sent to the victim from defendant's e-mail account. It stated, “I told you it wuz us r nobody u gettin ready 2 make the biggest mistake my God have mercy on Ur soul rip [sic].” The e-mail was admitted into evidence.

¶ 10 Contrary to defendant's argument, the e-mail was sufficiently authenticated. “The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.” CRE 901(a); see also People v. Crespi, 155 P.3d 570, 574 (Colo.App.2006); Huehn, 53 P.3d at 736. We conclude that e-mails may be authenticated (1) through testimony explaining that they are what they purport to be, seeCRE 901(b)(1); or (2) through consideration of distinctive characteristics shown by an examination of their contents and substance in light of the circumstances of the case, seeCRE 901(b)(4). See alsoUnited States v. Fluker, 698 F.3d 988, 999 (7th Cir.2012) (applying Fed.R.Evid. 901(b)(1) and (4), which are identical to CRE 901(b)(1) and (4), to e-mails); United States v. Siddiqui, 235 F.3d 1318, 1322 (11th Cir.2000) (applying Fed.R.Evid. 901(b)(4) to e-mails).

¶ 11 When the victim was shown a hard copy of the e-mail, she testified that it was a true and accurate copy of the e-mail that defendant had sent to her. She stated that she received it at 1:02 a.m. on the morning of her testimony, and that she recognized the e-mail address of the sender as one that belonged to defendant. She further testified that she understood the e-mail to be a threat that “scared [her] a lot.” Defendant did not contest that the sending e-mail address belonged to him. In addition, the contents of the e-mail indicated knowledge by the sender of defendant's previous relationship with the victim, as well as knowledge that the victim was scheduled to testify later that day.

¶ 12 While the victim admitted that she had had access to defendant's e-mail account in the past, any doubt about whether defendant had actually sent the e-mail went only to the weight of the evidence and not to its admissibility. See Crespi, 155 P.3d at 574.

¶ 13 We therefore conclude that the court did not abuse its discretion in admitting the e-mail into evidence.

B. Sufficiency of the Evidence

¶ 14 Defendant next argues that the prosecution failed to present sufficient evidence proving beyond a reasonable doubt that he was guilty of violating a protection order. We disagree.

1. Standard of Review

¶ 15 We review de novo whether the evidence was sufficient to support the conviction. Dempsey v. People, 117 P.3d 800, 807 (Colo.2005); People v. Randell, 2012 COA 108, ¶29, 297 P.3d 989.

¶ 16 In assessing the sufficiency of the evidence, we must determine whether the evidence, both direct and circumstantial, when viewed as a whole and in the light most favorable to the prosecution, is substantial and sufficient to support a conclusion by a rational trier of fact that the defendant is guilty beyond a reasonable doubt. Dempsey, 117 P.3d at 807; People v. Davis, 2012 COA 56, ¶12, 296 P.3d 219. The prosecution is given the benefit of every reasonable inference that might fairly be drawn from the evidence. People v. Poe, 2012 COA 166, ¶14, ––– P.3d ––––, 2012 WL 4829493. And it is the fact finder, not the reviewing court, that determines the credibility of witnesses, weighs the evidence, and resolves conflicts, inconsistencies, and disputes in the evidence. Id.

2. Analysis

¶ 17 A person commits the crime of violation of a protection order if (1) he or she has been “personally served with a protection order that identifies the person as a restrained person” or has otherwise “acquired from the court or law enforcement personnel actual knowledge of the contents of [the] protection order,” and (2) he or she [c]ontacts, harasses, injures, intimidates, molests, threatens, or touches the protected person or protected property” or violates any other provision of that protection order. § 18–6–803.5(1)(a), C.R.S.2012.

¶ 18 There is no dispute that a protection order was issued, which identified defendant as the restrained person and the victim and her son as the protected persons. The order prohibited defendant from harassing, molesting, intimidating, or contacting the victim, and ordered de...

To continue reading

Request your trial
10 cases
  • People v. Heisler
    • United States
    • Colorado Court of Appeals
    • May 4, 2017
    ...impression in Colorado. In setting this standard, we find the reasoning of the divisions in People v. Bernard , 2013 COA 79, ¶¶ 7-13, 305 P.3d 433, and Glover , ¶¶ 20-34, both of which concern the authentication of other forms of electronic communications, instructive.¶ 9 In Bernard , a div......
  • People v. Dominguez-Castor
    • United States
    • Colorado Court of Appeals
    • January 2, 2020
    ...went to the weight of the evidence rather than its admissibility. N.T.B. , ¶ 16 ; A.C.E-D. , ¶ 50 ; People v. Bernard , 2013 COA 79, ¶ 12, 305 P.3d 433.¶61 Lastly, because the record supports a finding that Dominguez-Castor authored the messages from the relevant Facebook account, we reject......
  • People v. Hamilton
    • United States
    • Colorado Court of Appeals
    • July 3, 2019
    ...they are claimed to be. See Heisler , ¶ 12, ––– P.3d at –––– ; Glover , ¶ 24, 363 P.3d at 741 ; People v. Bernard , 2013 COA 79, ¶ 10, 305 P.3d 433, 435.3. The Prosecutor Did Not Establish That the Reports Were Reliable and Authentic ¶ 37 The prosecutor did not show that the Reports were re......
  • People v. Glover
    • United States
    • Colorado Court of Appeals
    • February 26, 2015
    ...review all evidentiary rulings, including those regarding authentication, for an abuse of discretion. People v. Bernard, 2013 COA 79, ¶ 8, 305 P.3d 433. A court abuses its discretion if it misconstrues or misapplies the law or otherwise reaches a manifestly arbitrary, unreasonable, or unfai......
  • Request a trial to view additional results
1 books & journal articles
  • The Admissibility of Facebook Communications
    • United States
    • Colorado Bar Association Colorado Lawyer No. 44-7, July 2015
    • Invalid date
    ...382 S.W.3d 545, 550 (Tex.App. 2012) (authentication of Facebook messages)). [16] Smith, 136 So.3d at 433. [17] See People v Bernard, 305 P.3d 433, 435 (Colo.App. 2013). [18] Id. [19] Id. [20] Id. [21] Id. at *5, 6. [22] Id. at *6. [23] See ;'d. [24] CRE 801(c). [25] G/oi/er, 2015 WL 795690 ......

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT