Pierre Grosdidier 2016-05-03 03:33:15
Authenticating Can cellphone text messages stand up in court? Parties seeking to admit cellphone text messages at trial face two authentication challenges. They must show that the documents they want to admit into evidence are accurate copies of the original text messages, and they must show that the persons to whom they seek to ascribe the messages actually wrote them.1 Courts have uniformly held that existing rules of evidence are “generally ‘adequate to the task’ ” of authenticating electronic information and have declined to create new and special rules.2 The authentication threshold of Texas Rule of Evidence Rule 901(a) is met “by evidence sufficient to support a finding that the matter in question is what its proponent claims.” Only a threshold showing is necessary. The trial court must simply decide “whether the proponent of the evidence has supplied facts that are sufficient to support a reasonable jury determination that the” proffered evidence is authentic.3 The jury ultimately decides the weight to give the admitted evidence. Rule 901(a)’s liberal admissibility standard can be met in a number of ways. As the cases discussed in this article show, electronic evidence, including cellphone text messages, is most often authenticated through witness testimony and circumstantial evidence.4 The first authentication hurdle is that of the text messages themselves, which reside on cellphones from which they are not easily extracted and transcribed into print. Forensic extraction is always possible but costly. Fortunately, simpler methods work just as well. In Montoya v. State, an incriminating text message was read into the record, the cellphone was admitted into evidence, and the witness “pulled out [the] phone and pulled up the ... text message for the attorneys to review.”5 In Butler v. State, the court admitted photographs of text messages displayed on a BlackBerry.6 Ascribing text messages to their putative senders is not as straightforward. The Texas Court of Criminal Appeals held in Tienda v. State that showing that a “text message emanates from a cellphone number assigned to the purported author” is not sufficient to establish the message’s authenticity.7 As the court noted, “cellphones can be purloined” and someone other than the cellphone owner might have sent the messages. Authenticating cellphone text message authorship, therefore, requires something more than establishing originating cellphone ownership. But as the following cases show, that “something more” is not very demanding under Rule 901(b)(4). In Butler, the Court of Criminal Appeals reversed the decision of the 13th Court of Appeals in Corpus Christi, which had reversed the defendant’s conviction because of allegedly inadequately authenticated text messages. The trial court had found Butler guilty of the aggravated kidnapping of his then-girlfriend. A week before trial, Butler sent his ex-girlfriend a series of emails threatening her and her family should she testify against him. Butler’s profane messages contained death threats and accusations of snitching and betrayal. The victim testified that the messages came from a phone number that belonged to Butler, and that, between text messages, Butler also called her from that number “talking mess.” The Court of Criminal Appeals held that enough evidence “supplied the necessary predicate” for the text messages’ admissibility. In particular, the substance and context of the text messages accusing the victim of assisting authorities and the threatening phone calls in between text messages provided “circumstantial evidence” sufficient to authenticate the messages. Similarly, in Chavezcasarrubias v. State, the witness authenticated incriminating text messages as Chavezcasarrubias’s because the witness had previously communicated with him at that number by voice and via text messages and the text messages contained information that only she and Chavezcasarrubias would have known.9 Taken together, these cases show the relative ease with which cellphone text messages can be authenticated, provided that the substance and context of the messages can be linked to the facts of the case. NOTES 1) Hearsay objections to text messages’ admissibility are usually addressed through the party-opponent exception. See, e.g., Aekins v. State, No. 04-13-00064-CR, 2013 WL 5948188, at *6 (Tex. App.—San Antonio [4th Dist.] Nov. 6, 2013 (mem. op.), aff’d, 447 S.W.3d 270 (Tex. Crim. App. 2014). 2) Tienda v. State, 358 S.W.3d 633, 638-39 (Tex. Crim. App. 2012). 3) See generally, id. at 637-38. 4) See generally, Steven Goode, The Admissibility of Electronic Evidence, 29 Rev. Litig. 1, 9 (2009). 5) No. 05-10-01468-CR, 2012 WL 1059699, at *3 (Tex. App.—Dallas [5th Dist.] Mar. 30, 2012, no. pet.) (mem. op.). 6) 459 S.W.3d 595, 599 (Tex. Crim. App. 2015); see also Aekins, 2013 WL 5948188, at **5−6 (photos of cellphone text messages admissible); Manuel v. State, 357 S.W.3d 66, 76 (Tex. App.—Tyler [12th Dist.] 2011, no pet.) (same). 7) Tienda, 358 S.W.3d at 642. 8) Butler, 459 S.W.3d at 598. 9) No. 02-14-00418-CR, 2015 WL 6081502, at 1 (Tex. App.—Fort Worth [2nd Dist.] Oct. 15, 2015, no pet.) (mem. op.); see also Gardner v. State, No. 02-14-00459-CR, 2015 WL 4652718, at 1 (Tex. App.—Fort Worth [2nd Dist.] Aug. 6, 2015, pet. ref’d) (mem. op.) (circumstantial evidence authenticated text messages); Aekins, 2013 WL 5948188, at *6 (same). PIERRE GROSDIDIER is an attorney in Haynes and Boone’s Litigation Department in Houston. His practice focuses on complex commercial litigation, especially lawsuits and arbitrations with strong technical elements. He has litigated cases involving construction, oil and gas, software copyright, the Computer Fraud and Abuse Act, the Stored Communications Act, and trade secret claims. Grosdidier holds a Ph.D. from Caltech and a J.D. from the University of Texas School of Law.
Published by State Bar of Texas. View All Articles.
This page can be found at http://mydigimag.rrd.com/article/Technology/2473690/300841/article.html.