Guns, Gams & Gumshoes

A blog for PIs and writers/readers of the PI genre

  • Writing a Sleuth?

    A Guide for Writing Fictional Sleuths from a Couple of Real-Life Sleuths

    "How to Write a Dick is the best work of its kind I’ve ever come across because it covers the whole spectrum in an entertaining style that will appeal to layman and lawmen alike."

    Available on Kindle

  • Copyright Notices

    All rights reserved by Colleen Collins. Any use of the content on this site (including images owned by Colleen Collins) requires specific, written authority.

    It has come to our attention that people are illegally copying and using the black and white private eye at a keyboard image that is used on our site. NOTE: This image is protected by copyright, property of Colleen Collins.

  • Writing PIs on Twitter

  • Guns, Gams, and Gumshoes

When Is a Private Investigator’s Evidence Admissible in Court?

Posted by Writing PIs on August 9, 2014

 

gavel and scales

 

WRITER’S QUESTION: While a PI is conducting an investigation (looking for a skip or doing surveillance) and he/she learns, overhears, or discovers evidence that may help the prosecutor (or defense) in a trial, is it admissible? For example, if cops search without a search warrant, except under well-defined circumstances anything they find is not admissible.  What might be some examples of information a PI might learn that would or could be used in a trial?

GUNS, GAMS, AND GUMSHOES’ ANSWER:  As private citizens, PIs are not limited by the Fourth Amendment because it applies to governmental action, meaning that private investigators are not governmental agents and are therefore not restricted by the Fourth Amendment. Police officers, parole officers, district attorney investigators, or anyone working in publicly compensated law enforcement (crime scene technicians, coroners, deputy sheriffs, etc.) are bound by the Fourth Amendment.

Therefore, anything a private investigator sees/documents is admissible evidence in court. However, PIs are not obligated by law (as law enforcement is obligated by law) to reveal their observations or seizures to the other side. For example, in one of our cases, we were lawfully in our client’s estranged wife’s residence when we documented extensive drug use and manufacture. We photographed the scene and our client’s attorney used these photographs to obtain sole custody for our client’s son. What if the estranged wife’s attorney had caught wind of this evidence and subpoenaed us to turn over this documentation? We would have used the work-product doctrine (which has nothing to do with Fourth Amendment protection and has everything to do with attorney-client privileges) to bar the revelation of the documents and our testimony. However, this is an empty hypothetical because the other side had no interest in seeing damning evidence.

When people speak in a public place, anything they say or are observed doing is admissible in court.

Eavesdropping, on the other hand, is listening in (or documenting) private conversations/actions, and those are not admissible in court. For example, if someone has a “legitimate expectation of privacy in the communication” (for example, they’re in their living room having a conversation in a hushed tone of voice), it would be eavesdropping to use a parabolic microphone to record that conversation. If, however, they’re leaning out the window of their living room, talking to someone inside the house, but their voice can be heard from the street, that is not a legitimate expectation of privacy in communication and can be documented and forwarded as evidence. Colleen captured such a conversation in an insurance investigation, and it was used as evidence at trial.

Have a great weekend, Writing PIs

fedora black and white

All rights reserved by Colleen Collins. Any use of the content requires specific, written authority. The images in this article are licensed and the author does not have the legal authority to share with others. 

Sorry, the comment form is closed at this time.

 
%d bloggers like this: