In this case, we are tasked with determining the appropriate way to authenticate, for evidential purposes, electronically stored information printed from a social networking website,1 in particular, MySpace.2
Antoine Levar Griffin, Petitioner, seeks reversal of his convictions in the Circuit Court for Cecil County, contending that the trial judge abused his discretion in admitting, without proper authentication, what the State alleged were several pages printed from Griffin’s girlfriend’s MySpace profile.3 The Court of Special Appeals determined that the trial judge did not abuse his discretion, Griffin v. State, 192 Md.App. 518, 995 A.2d 791 (2010), and we granted Griffin’s Petition for Writ of Certiorari, 415 Md. 607, 4 A.3d 512 (2010), to consider the two questions, which we have rephrased:
1. Did the trial court err in admitting a page printed from a MySpace profile alleged to be that of Petitioner’s girlfriend? [4]
*3472. Did the trial court err in allowing the prosecutor to define reasonable doubt incorrectly over defense objection, including saying “it means this, do you have a good reason to believe that somebody other than Mr. Griffin was the person that shot Darvell Guest ... I’m not asking you whether you can speculate and create some construct of hypothetical possibilities that would have somebody else be the shooter.... I’m asking you the question, do you have right now any reason, any rational reason to believe that somebody other than he was the shooter or gunman?”[5]
The State presented a conditional cross-petition, which we also granted, in which one question was posed:
1. Is Griffin’s challenge to the probative value of the evidence preserved for appellate review? [6]
We shall hold that the pages allegedly printed from Griffin’s girlfriend’s MySpace profile were not properly authenticated pursuant to Maryland Rule 5-901,7 and shall, therefore, re*348verse the judgment of the Court of Special Appeals and remand the case for a new trial.
Griffin was charged in numerous counts with the shooting death, on April 24, 2005, of Darvell Guest at Ferrari’s Bar in Perryville, in Cecil County. During his trial, the State sought to introduce Griffin’s girlfriend’s, Jessica Barber’s, MySpace profile to demonstrate that, prior to trial, Ms. Barber had allegedly threatened another witness called by the State. The printed pages contained a MySpace profile in the name of “Sistasouljah,” describing a 23 year-old female from Port Deposit, listing her birthday as “10/02/1983” and containing a photograph of an embracing couple. The printed pages also contained the following blurb:
FREE BOOZY!!!! JUST REMEMBER SNITCHES GET STITCHES!! U KNOW WHO YOU ARE!!
When Ms. Barber had taken the stand after being called by the State, she was not questioned about the pages allegedly printed from her MySpace profile.
Instead, the State attempted to authenticate the pages, as belonging to Ms. Barber, through the testimony of Sergeant John Cook, the lead investigator in the case. Defense counsel objected to the admission of the pages allegedly printed from Ms. Barber’s MySpace profile, because the State could not sufficiently establish a “connection” between the profile and posting and Ms. Barber, and substantively, the State could not say with any certainty that the purported “threat” had any *349impact on the witness’s testimony; the latter argument is not before us.
Defense counsel was permitted to voir dire Sergeant Cook, outside of the presence of the jury, as follows:
[Defense Counsel]: How do you know that this is her [MySpace] page?....
[Sergeant Cook]: Through the photograph of her and Boozy on the front, through the reference to Boozy, [ ] the reference [to] the children, and [ ] her birth date indicated on the form.
[Defense Counsel]: How do you know she sent it?
[Sergeant Cook]: I can’t say that.
[The Court]: I failed—I am sorry. I misrepresented. I failed to realize there is a photograph there. It’s in the block that says “Sistasouljah,” and then there’s a photograph of a person that looks like Jessica Barber to me. [Defense Counsel]: When was it sent?
[Sergeant Cook]: That is a MySpace page. That wasn’t particularly sent. That is on the web, and it’s accessible to whoever views MySpace. It is open to the public.
[Defense Counsel]: I understand that. When did it get posted?
[Sergeant Cook]: The print date on the form, printed on 12/05/06.
[The Court]: You can tell by looking at it because that’s when he went to it.
[Defense Counsel]: So that would have been after the first trial. So how could that possibly affect [the witness]? He said it was before the first trial.
[The Court]: On its face, there is no way that you can conclude that on its face this establishes anything in regard to [the witness]. What it’s being offered for, as I understand it, is corroboration, consistency that she’s making a statement in a public forum, “snitches get stitches.” And I guess the argument is going to be made that that’s consistent with what [the witness] said, that she threatened him.
*350[Assistant State’s Attorney]: That’s correct.
[The Court]: It’s weak. I mean, there is no question it’s weak, but that’s what it is offered for.
The trial judge, thereafter, indicated that he would permit Sergeant Cook to testify in support of authentication of the redacted portion of the pages printed from MySpace, containing the photograph “of a person that looks like Jessica Barber” and the Petitioner, allegedly known as “Boozy,” adjacent to a description of the woman as a 23 year-old from Port Deposit, and the blurb, stating “FREE BOOZY!!!! JUST REMEMBER SNITCHES GET STITCHES!! U KNOW WHO YOU ARE!!”
In lieu of Sergeant Cook’s testimony, while maintaining his objection to the admissibility of the redacted MySpace page, defense counsel agreed to the following stipulation:
If asked, Sergeant Cook would testify that he went onto the Internet to the website known as MySpace.... [F]rom that site he downloaded some information of a posting that someone had put there.
That posting contains a photograph which the witness would say he recognizes as a photograph of Jessica ... Barber, who testified, ... that she is the defendant’s live-in fiance; and that it also contains a date of birth, to wit October 2nd, 1983, which the witness would testify is the date of birth that Jessica Barber gave as her date of birth.
When the exhibit, the download, comes to you, you are going to see that it has a great—that most of its content has been redacted; that is, blacked out. That’s because some of it, in my judgment, might tend to be inflammatory without proving anything one way or the other. There is one portion of it that will not be redacted when it comes to you, and this is the only portion of it which you should consider. And you certainly should not speculate as to what any of the redacted portions may be.
The portion that will not be redacted says, just remember snitches get stitches. You will see that. The phrase is, just remember snitches get stitches.... And ... the witness *351would testify that the date it was retrieved was ... December 5, 2006.
Whether the MySpace printout represents that which it purports to be, not only a MySpace profile created by Ms. Barber, but also upon which she had posted, “FREE BOOZY!!!! JUST REMEMBER SNITCHES GET STITCHES!! U KNOW WHO YOU ARE!!,” is the issue before us.
With respect to social networking websites in general, we have already had occasion, in Independent Newspapers, Inc. v. Brodie, 407 Md. 415, 424 n. 8, 966 A.2d 432, 438 n. 3 (2009), to describe those sites as “sophisticated tools of communication where the user voluntarily provides information that the user wants to share with others.”8 A number of social networking websites, such as MySpace, enable members “to create online ‘profiles,’ which are individual web pages on which members [can] post photographs, videos, and information about their lives and interests.” Doe v. MySpace, Inc., 474 F.Supp.2d 843, 845 (W.D.Tex.2007).
Anyone can create a MySpace profile at no cost, as long as that person has an email address and claims to be over the age of fourteen:
MySpace users create profiles by filling out questionnaire-like web forms. Users are then able to connect their profiles to those of other users and thereby form communities. MySpace profiles contain several informational sections, known as “blurbs.” These include two standard blurbs: “About Me” and “Who I’d Like to Meet.” Users may supplement those blurbs with additional sections about their interests, general additional details, and other personal information. MySpace profiles also incorporate several *352multimedia features. For instance, users may post photos, music, videos, and web logs to their pages.
Richard M. Guo, Stranger Danger and the Online. Social Network, 23 Berkeley Tech. L.J. 617, 621 (2008) (footnotes omitted). After a profile is established, the user may invite others to access her profile, as a “friend,” who if the user accepts the befriending, can access her profile pages without further ado:
Users establish virtual communities by linking their profiles in a process known as “friending” or “connecting.” One user requests to add another as a friend, and the recipient may either accept or reject the invitation. If the recipient accepts, the profiles are linked and the connected members are generally able to view one another’s online content without restriction. The network created by the linking process allows a user to chat with friends, display support for particular causes, “join interest groups dedicated to virtually any topic,” and otherwise “hang out.”
Nathan Petrashek, Comment, The Fourth Amendment and the Brave New World of Online Social Networking, 93 Marq. L.Rev. 1495, 1499-1500 (2009-2010) (footnotes omitted). Although a social networking site generally requires a unique username and password for the user to both establish a profile and access it, posting on the site by those that befriend the user does not. See Samantha L. Miller, Note, The Facebook Frontier: Responding to the Changing Face of Privacy on the Internet, 97 Ky. L.J. 541, 544 (2008-2009); Eric Danowitz, MySpace Invasion: Privacy Rights, Libel, and Liability, 28 J. Juv. L. 30, 37 (2007).
The identity of who generated the profile may be confounding, because “a person observing the online profile of a user with whom the observer is unacquainted has no idea whether the profile is legitimate.” Petrashek, 93 Marq. L.Rev. at 1499 n. 16. The concern arises because anyone can create a fictitious account and masquerade under another person’s name or can gain access to another’s account by obtaining the user’s username and password:
*353Although it may seem that, as creators of our own online social networking profiles, we are able to construct our own online persona, this is not always the case. There is no law that prevents someone from establishing a fake account under another person’s name, so long as the purpose for doing so is not to deceive others and gain some advantage. Moreover, fragments of information, either crafted under our authority or fabricated by others, are available by performing a Google search ... forever. Thus, online social networking poses two threats: that information may be (1) available because of one’s own role as the creator of the content, or (2) generated by a third party, whether or not it is accurate.
David Hector Montes, Living Our Lives Online: The Privacy Implications of Online Social Networking, Journal of Law and Policy for the Information Society, Spring 2009, at 507, 508. For instance, in one circumstance, Sophos, a Boston-based Internet security company, created a profile for a toy frog named “Freddi Staur,” and nearly 200 Facebook9 users *354chose to add the frog as a “friend.” Miller, 97 Ky. L.J. at 542.10
The possibility for user abuse also exists on MySpace, as illustrated by United States v. Drew, 259 F.R.D. 449 (D.C.D.Cal.2009), in which Lori Drew, a mother, was prosecuted under the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, for creating a MySpace profile for a fictitious 16 year-old male named “Josh Evans.” Drew had contacted a former friend of her daughter’s, Megan Meier, through the MySpace network, using the Josh Evans screen name or pseudonym, and began to “flirt with her over a number of days.” Id. at 452. Drew then had “Josh” inform Megan that he no longer “liked her” and that “the world would be a better place without her in it,” after which Megan killed herself. Id. Thus, the relative ease with which anyone can create fictional personas or gain unauthorized access to another user’s profile, with deleterious consequences, is the Drew lesson.
The potential for fabricating or tampering with electronically stored information on a social networking site, thus poses significant challenges from the standpoint of authentication of printouts of the site, as in the present case. Authentication, nevertheless, is generally governed by Maryland Rule 5-901, which provides:
(a) General provision. The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.
*355Potential methods of authentication are illustrated in Rule 5-901(b). The most germane to the present inquiry are Rules 5-901(b)(l) and 5-901(b)(4), which state:
(b) Illustrations. By way of illustration only, and not by way of limitation, the following are examples of authentication or identification conforming with the requirements of this Rule:
(1) Testimony of witness with knowledge. Testimony of a witness with knowledge that the offered evidence is what it is claimed to be.[11]
(4) Circumstantial evidence. Circumstantial evidence, such as appearance, contents, substance, internal patterns, location, or other distinctive characteristics, that the offered evidence is what it is claimed to be.
We and our colleagues on the Court of Special Appeals have had the opportunity to apply the tenets of Rule 5-901(b)(4) to a toxicology report, State v. Bryant, 361 Md. 420, 761 A.2d 925 (2000), to recordings from 911 emergency calls, Clark v. State, 188 Md.App. 110, 981 A.2d 666 (2009), and to text messages received on the victim’s cellular phone, Dickens v. State, 175 Md.App. 231, 927 A.2d 32 (2007), but neither we nor our appellate brethren heretofore has considered the Rule’s application to authenticate pages printed from a social networking site.
Rather, we turn for assistance to the discussion in Lorraine v. Market American Insurance Co., 241 F.R.D. 534 (D.Md. 2007), wherein Maryland’s own Magistrate Judge Paul W. *356Grimm, a recognized authority on evidentiary issues concerning electronic evidence, outlined issues regarding authentication of electronically stored information, in e-mail, websites,' digital photographs, computer-generated documents, and internet postings, etc. with respect to Rule 901 of the Federal Rules of Evidence:
(a) GENERAL PROVISION. The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.
(b) ILLUSTRATIONS. By way of illustration only, and not by way of limitation, the following are examples of authentication or identification conforming with the requirements of this rule:
(1) Testimony of Witness With Knowledge. Testimony that a matter is what it is claimed to be.
(4) Distinctive Characteristics and the Like. Appearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.
Regarding Rule 901(a), Judge Grimm iterated in Lorraine that the “requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims,” to insure trustworthiness. Id. at 541-42. Judge Grimm recognized that authenticating electronically stored information presents a myriad of concerns because “technology changes so rapidly” and is “often new to many judges.” Id. at 544. Moreover, the “complexity” or “novelty” of electronically stored information, with its potential for- manipulation, requires greater scrutiny of “the foundational requirements” than letters or other paper records, to bolster reliability. Id. at 543-44, quoting Jack B. Weinstein & Margaret A. Berger, Weinstein’s Federal Evidence § 900.06[3] (Joseph M. McLaughlin ed., Matthew Bender 2d ed.1997).
In the present case, Griffin argues that the State did not appropriately, for evidentiary purposes, authenticate the *357pages allegedly printed from Jessica Barber’s MySpace profile, because the State failed to offer any extrinsic evidence describing MySpace, as well as indicating how Sergeant Cook obtained the pages in question and adequately linking both the profile and the “snitches get stitches” posting to Ms. Barber. The State counters that the photograph, personal information, and references to freeing “Boozy” were sufficient to enable the finder of fact to believe that the pages printed from MySpace were indeed Ms. Barber’s.
We agree with Griffin and disagree with the State regarding whether the trial judge abused his discretion in admitting the MySpace profile as appropriately authenticated, with Jessica Barber as its creator and user, as well as the author of the “snitches get stitches” posting, based upon the inadequate foundation laid. We differ from our colleagues on the Court of Special Appeals, who gave short shrift to the concern that “someone other than the alleged author may have accessed the account and posted the message in question.” Griffin, 192 Md.App. at 542, 995 A.2d at 805. While the intermediate appellate court determined that the pages allegedly printed from Ms. Barber’s MySpace profile contained sufficient indicia of reliability, because the printout “featured a photograph of Ms. Barber and [Petitioner] in an embrace,” and also contained the “user’s birth date and identified her boyfriend as ‘Boozy,’ ” the court failed to acknowledge the possibility or likelihood that another user could have created the profile in issue or authored the “snitches get stitches” posting. Id. at 543, 995 A.2d at 806.
We agree with Griffin that the trial judge abused his discretion in admitting the MySpace evidence pursuant to Rule 5—901(b)(4), because the picture of Ms. Barber, coupled with her birth date and location, were not sufficient “distinctive characteristics” on a MySpace profile to authenticate its printout, given the prospect that someone other than Ms. Barber could have not only created the site, but also posted the “snitches get stitches” comment. The potential for abuse and manipulation of a social networking site by someone other than its purported creator and/or user leads to our conclusion *358that a printout of an image from such a site requires a greater degree of authentication than merely identifying the date of birth of the creator and her visage in a photograph on the site in order to reflect that Ms. Barber was its creator and the author of the “snitches get stitches” language.12
In so holding, we recognize that other courts, called upon to consider authentication of electronically stored information on social networking sites, have suggested greater scrutiny because of the heightened possibility for manipulation by other than the true user or poster. In Commonwealth v. Williams, 456 Mass. 857, 926 N.E.2d 1162 (2010), the Supreme Judicial Court of Massachusetts considered the admission, over the defendant’s objection, of instant messages a witness had received “at her account at MySpace.” Id. at 1171. In the case, the defendant was convicted of the shooting death of Izaah Tucker, as well as other offenses. The witness, Ashlei Noyes, *359testified that she had spent the evening of the murder socializing with the defendant and that he had been carrying a handgun. She further testified that the defendant’s brother had contacted her “four times on her MySpace account between February 9, 2007, and February 12, 2007,” urging her “not to testify or to claim a lack of memory regarding the events of the night of the murder.” Id. at 1172. At trial, Noyes testified that the defendant’s brother, Jesse Williams, had a picture of himself on his MySpace account and that his MySpace screen name or pseudonym was “doit4it.” She testified that she had received the messages from Williams, and the document printed from her MySpace account indicated that the messages were in fact sent by a user with the screen name “doit4it,” depicting a picture of Williams. Id.
The Supreme Judicial Court of Massachusetts determined that there was an inadequate foundation laid to authenticate the MySpace messages, because the State failed to offer any evidence regarding who had access to the MySpace page and whether another author, other than Williams, could have virtually-penned the messages:
Although it appears that the sender of the messages was using Williams’s MySpace Web “page,” there is no testimony (from Noyes or another) regarding how secure such a Web page is, who can access a MySpace Web page, whether codes are needed for such access, etc. Analogizing a MySpace [message] to a telephone call, a witness’s testimony that he or she has received an incoming call from a person claiming to be “A,” without more, is insufficient evidence to admit the call as a conversation with “A.” Here, while the foundational testimony established that the messages were sent by someone with access to Williams’s MySpace Web page, it did not identify the person who actually sent the communication. Nor was there expert testimony that no one other than Williams could communicate from that Web page. Testimony regarding the contents of the messages should not have been admitted.
Id. at 1172-73 (citations omitted). The court emphasized that the State failed to demonstrate a sufficient connection between *360the messages printed from Williams’s alleged MySpace account and Williams himself, with reference, for example, to Williams’s use of an exclusive username and password to which only he had access. The court determined that the error in admitting the improperly authenticated MySpace messages “did not create a substantial likelihood of a miscarriage of justice,” however, and, therefore, did not reverse Williams’s conviction, because Noyes’s testimony was significantly overshadowed “by the testimony of two witnesses to the murder who identified Williams as the shooter.” Id. at 1173.
Similarly, in People v. Lenihan, 30 Misc.3d 289, 911 N.Y.S.2d 588 (N.Y.Sup.Ct.2010), Lenihan challenged his second degree murder conviction because he was not permitted to cross-examine two witnesses called by the State on the basis of photographs his mother had printed from MySpace, allegedly depicting the witnesses and the victim making hand gestures and wearing clothing that suggested an affiliation with the “Crips” gang. The trial judge precluded Lenihan from confronting the witnesses with the MySpace photographs, reasoning that “[i]n light of the ability to ‘photo shop,’ edit photographs on the computer,” Lenihan could not adequately authenticate the photographs. Id. at 592.
In United States v. Jackson, 208 F.3d 633 (7th Cir.2000), Jackson was charged with mail and wire fraud and obstruction of justice after making false claims of racial harassment against the United Parcel Service in connection with an elaborate scheme in which she sent packages containing racial epithets to herself and to several prominent African-Americans purportedly from “racist elements” within UPS. Id. at 635. At trial, Jackson sought to introduce website postings from “the Euro-American Student Union and Storm Front,” in which the white supremacist groups gloated about Jackson’s case and took credit for the UPS mailings. Id. at 637. The court determined that the trial judge was justified in excluding the evidence because it lacked an appropriate foundation, namely that Jackson had failed to show that the web postings by the white supremacist groups who took responsibility for *361the racist mailings “actually were posted by the groups, as opposed to being slipped onto the groups’ websites by Jackson herself, who was a skilled computer user.” Id. at 638.
The State refers us, however, to In the Interest of F.P., 878 A.2d 91 (Pa.Super.Ct.2005), in which the Pennsylvania intermediate appellate court considered whether instant messages were properly authenticated pursuant to Pennsylvania Rule of Evidence 901(b)(4), providing that a document may be authenticated by distinctive characteristics or circumstantial evidence. In the case, involving an assault, the victim, Z.G., testified that the defendant had attacked him because he believed that Z.G. had stolen a DVD from him. The hearing judge, over defendant’s objection, admitted instant messages from a user with the screen name “Icp4Life30” to and between “WHITEBOY Z 404.” Id. at 94. Z.G. testified that his screen name was “WHITEBOY Z 404” and that he had printed the instant messages from his computer. In the transcript of the instant messages, moreover, Z.G. asked “who is this,” and the defendant replied, using his first name. Throughout the transcripts, the defendant threatened Z.G. with physical violence because Z.G. “stole off [him].” Id. On appeal, the court determined that the instant messages were properly authenticated through the testimony of Z.G. and also because “Icp4Life30” had referred to himself by first name, repeatedly accused Z.G. of stealing from him, and referenced the fact that Z.G. had told high school administrators about the threats, such that the instant messages contained distinctive characteristics and content linking them to the defendant. In the Interest of F.P. is unpersuasive in the context of a social networking site, because the authentication of instant messages by the recipient who identifies his own “distinctive characteristics” and his having received the messages, is distinguishable from the authentication of a profile and posting printed from MySpace, by one who is neither a creator nor user of the specific profile.13
*362Similarly, the State relies upon an unreported opinion, State v. Bell, 2009 WL 1395857, 2009 Ohio App. LEXIS 2112 (Ohio Ct.App.2009), in which the defendant, convicted of multiple counts of child molestation, asserted that the trial judge improperly admitted “online conversations and email messages” on MySpace, purportedly involving Bell and one of his victims. The defendant argued that the messages were not properly authenticated, because his laptop “was turned on after it was seized,” which he asserted altered hundreds of files on the hard drive. Id. at *4, 2009 Ohio App. LEXIS 2112 at *10. The appellate court rejected that argument because defense counsel had expressly approved the admission of the MySpace emails and messages. Griffin, in the present case, however, explicitly objected to the authenticity of the MySpace printout.
In the case sub judice, the MySpace printout was used to show that Ms. Barber had threatened a key witness, who the State had characterized as “probably the most important witness in this case;” the State highlighted the importance of *363the “snitches get stitches” posting during closing argument, as follows:
Sergeant Cook told you that he went online and went to a website called MySpace and found a posting that had been placed there by the defendant’s girlfriend, Jessica Barber, recognized her picture, able to match up the date of birth on the posting with her date of birth, and the posting included these words, “Free Boozy. Just remember, snitches get stitches. You know who you are.”
In addition, during rebuttal argument, the State again referenced the pages printed from MySpace, asserting that Ms. Barber had employed MySpace as a tool of intimidation against a witness for the State. It is clear, then, that the MySpace printout was a key component of the State’s case; the error in the admission of its printout requires reversal.
In so doing, we should not be heard to suggest that printouts from social networking sites should never be admitted. Possible avenues to explore to properly authenticate a profile or posting printed from a social networking site, will, in all probability, continue to develop as the efforts to evidentially utilize information from the sites increases. See, e.g., Katherine Minotti, Comment, The Advent of Digital Dianes: Implications of Social Networking Web Sites for the Legal Profession, 60 S.C.L.Rev. 1057 (2009). A number of authentication opportunities come to mind, however.
The first, and perhaps most obvious method would be to ask the purported creator if she indeed created the profile and also if she added the posting in question, i.e. “[tjestimony of a witness with knowledge that the offered evidence is what it is claimed to be.” Rule 5-901(b)(l). The second option may be to search the computer of the person who allegedly created the profile and posting and examine the computer’s internet history and hard drive to determine whether that computer was used to originate the social networking profile and posting in question. One commentator, who serves as Managing Director and Deputy General Coun*364sel of Stroz Friedberg,14 a computer forensics firm, notes that, “[s]ince a user unwittingly leaves an evidentiary trail on her computer simply by using it, her computer will provide evidence of her web usage.” Seth P. Berman, et al, Web 2.0: What’s Evidence Between “Friends”?, Boston Bar J., Jan.Feb.2009, at 5, 7.
A third method may be to obtain information directly from the social networking website that links the establishment of the profile to the person who allegedly created it and also links the posting sought to be introduced to the person who initiated it. This method was apparently successfully employed to authenticate a MySpace site in People v. Clevenstine, 68 A.D.3d 1448, 891 N.Y.S.2d 511 (2009). In the case, Richard Clevenstine was convicted of raping two teenage girls and challenged his convictions by asserting that the computer disk admitted into evidence, containing instant messages between him and the victims, sent via MySpace, was not properly authenticated. Specifically, Clevenstine argued that “someone else accessed his MySpace account and sent messages under his username.” Id. at 514. The Supreme Court of New York, Appellate Division, agreed with the trial judge that the MySpace messages were properly authenticated, because both victims testified that they had engaged in instant messaging conversations about sexual activities with Clevenstine through MySpace. In addition, an investigator from the computer crime unit of the State Police testified that “he had retrieved such conversations from the hard drive of the computer used by the victims.” Id. Finally, the prosecution was able to attribute the messages to Clevenstine, because a legal compliance officer for MySpace explained at trial that “the messages on the computer disk had been exchanged by users of accounts created by [Clevenstine] and the victims.” Id. The *365court concluded that such testimony provided ample authentication linking the MySpace messages in question to Clevenstine himself.15
JUDGMENT OF THE COURT OF SPECIAL APPEALS REVERSED. CASE REMANDED TO THAT COURT WITH INSTRUCTIONS TO REVERSE THE JUDGMENT OF THE CIRCUIT COURT FOR CECIL COUNTY AND REMAND THE CASE TO THE CIRCUIT COURT FOR A NEW TRIAL. COSTS IN THIS COURT AND IN THE COURT OF SPECIAL APPEALS TO BE PAID BY CECIL COUNTY.
HARRELL and MURPHY, JJ., dissent.