Feeds

Juror tweets could force retrial

'Twit' doesn't quite cover it

Beginner's guide to SSL certificates

A juror who published Twitter messages during the course of a trial has undermined the trial process and its verdict, lawyers have claimed while launching an appeal. The US juror told reporters he did not think posting the messages was wrong.

An appeal has been lodged in an Arkansas court against a $12.6 million ruling against a building materials firm. Lawyers for the firm have said that the messages, or 'tweets', revealed the juror's bias.

Twitter is a system which lets users post status updates, known as tweets, which are received by the people who 'follow' them.

Russell Wright and his company made 'stoam', a new material that it claimed was as strong as steel but insulated like foam. Two investors sought their money back, describing the company as "nothing more than a Ponzi scheme" such as that run in the financial world by Bernard Madoff.

"Nobody buy Stoam. Its bad mojo and they'll probably cease to Exist, now that their wallet is 12m lighter," said one of juror Johnathan Powell's messages, according to the Associated Press.

Another read: "I just gave away TWELVE MILLION DOLLARS of somebody else's money."

Wright's appeal seeks a new trial, claiming Powell was biased. He "was predisposed toward giving a verdict that would impress his audience", said Wright's application, the AP said.

"Juror Jonathan's public statements show us he that arrived at jury duty with the desire to get on the jury and 'rock' the jury. He researched this topic in advance. He arrived as a self described 'angry' man," the motion said, according to a local newspaper.

"Well, I'm off to see a judge. Hope they don't lock me under the jail, and forget about me for four days," Powell said from his Twitter account as the story broke. "Back from the courthouse. Judge would not see me without all lawyers involved present," he later wrote.

Powell told local paper The Morning News that he had not researched the case beforehand and discussed it with people who were not jurors, as the appeal suggests.

"I didn't do that," Powell told the Arkansas Morning News. "I'd be in hiding if I thought I did something wrong. I didn't."

Copyright © 2009, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Intelligent flash storage arrays

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.