The Forensics Take: Authenticating Trump Jr.'s 'Russia Meeting' Evidence

On July 8, The New York Times reported that during the 2016 U.S. presidential election campaign, Donald Trump Jr. met with individuals connected to the Russian government. The individuals purported to have incriminating evidence against then-Democratic presidential candidate Hillary Clinton.

In the days that followed, The New York Times obtained and shared excerpts from emails between Trump Jr. and Rob Goldstone, a former British reporter and publicist with connections to the Trump organization that documented the two organizing the meeting. The paper also showed that Goldstone "checked-in" at Trump Tower on June 9, 2016, the date of the meeting, on Facebook, writing: "preparing for a meeting."

On July 11, Trump Jr. himself verified the authenticity of the emails, releasing them in full on his Twitter account. It was a rare confirmation from a direct source, one all investigators, whether in journalism, regulatory agencies or law firms, desire.

But what if said emails were not released? And what if The New York Times could not rely on witness sources or direct evidence to support their authenticity, or for that matter, the authenticity of Goldstone's social media post?

Authenticating the digital evidence, especially in a way that could hold up as evidence in court, would be far more difficult though it would not be entirely impossible, depending on the nature of the evidence itself.

With emails, authentication is a fairly straightforward process. "What people don't realize is that every email has a hidden thing called an email header," said John Rosenthal, partner and chair of the e-discovery and information governance practice at Winston & Strawn.

Acting as a type of metadata container, the header usually provides "a whole lot of information about where the document came from; it's actually going to reflect every server that it touched to the point [to where] it got to you, and it's also going to identify the IP address [and estimated location] of the original sender," he explained.

John Simek, vice president of Sensei Enterprises, added that such email headers can also include information about "what workstation and email client was used [to send the email], and if it was web-based or not."

With this metadata information at hand, Simek said, one can "with a high degree of confidence, say that these were authentic messages that were sent form this account to that account and sent back."

The data gleaned from email headers will likely be more than enough to meet the evidence authentication requirements mandated by the Federal Rules of Evidence (FRE) Rule 901, a standard commonly used by both federal and nonfederal courts around the country.