Admissibility of Text Messages

[Editor’s Note: Alicia Penn joined the NLST in September of 2023 from the District of South Carolina Federal Defender Office, where she represented clients charged with offenses involving everything from turtles to terrorism. A career Public Defender, she was forced to become proficient in electronically stored information after being assigned a 3-terabyte lottery scam case in 2013. Ever since, she has worked to adapt to the ever-changing electronic landscape and make it work in favor of her clients. In her new role her goal is to provide practical solutions to technological problems.]

Are screenshots of text messages admissible? The answer is everyone’s favorite: it depends!

There is no federal rule expressly forbidding the use of screenshots of text messages in court, but not all relevant evidence is admissible. To get a screenshot admitted and considered by a judge or jury there are procedural hurdles to overcome. Conversely, if your goal is to keep a screenshot out, the federal rules give you a framework to argue against admission.

The Rules:

Federal Rule of Evidence 901(a): In general, the proponent of the evidence must produce evidence sufficient to support a finding that the item is what the proponent claims it is. (b) gives examples of evidence that satisfies this requirement.

Other federal rules you can make hay with are: 1002 (Best Evidence), 401 (Relevance), 801 (Hearsay).

For a thorough and beautiful rubric of how to admit or challenge admission of electronic evidence, see

Admissibility of Electronic Evidence Chart by Hon. Paul W. Grimm and Kevin F. Brady (2018) craigball.com/Grimm Brady Evid Admiss Chart 2018.pdf

In addition, an excellent primer on admitting evidence in federal court is Lorraine v. Markel American Insurance Co., 2017 U.S. Dist. LEXIS 33020 (D. Md. May 4, 2007).

The Argument:

With reliability as a framework, there are two ways screenshots of text messages are inherently unreliable.

  1. The text message itself is fake.

With only the screenshot, there is no way to prove a text message is real. Anyone can create an image that looks like a text message using a free online program, screenshot it, and then send it or show it to someone and claim it is real. Without any other proof, such as a direct download from a cellphone, subscriber records, IP address data, etc. there is no way to prove that the text message itself was a real message that existed in the way the government witness may claim.

I made the fake chat at the beginning of this post online, for free, entering no personal identifying information, downloading no software program, in two minutes, after Googling, “fake chat generator.”

You can imagine the ways a fake text message could be used against a client. I have had a case where the government wanted to use screenshots of text messages, supposedly received from an informant, and claimed that these screenshots proved my client planned armed robberies. When I showed the screenshots to my client, he denied ever creating or sending them. The government had no other corroborating evidence or witness to show the text messages were real or received from my client. I objected and argued the supposed screenshot was unreliable.

  1. It is a real text message, but the sender/receiver is fake.

This scenario requires only a little more effort. There are apps like TextNow that allow you to send anonymous text messages. In one of my other cases, the government shared screenshots of threatening text messages sent from an anonymous number to my client’s ex-girlfriend and claimed my client had used TextNow to send these messages. Based on these screenshots of text messages, my client was detained, even though I argued the screenshots of text messages were unreliable and shouldn’t be considered. After the hearing, my investigator subpoenaed TextNow for subscriber information linked to the numbers used at the times the texts were sent. TextNow responded within a day, and the subscriber implicated the ex-girlfriend’s new partner as the person who created the text messages and sent the threats. After explaining and presenting this new information to the government and court, my client was released on an unsecured bond.

Cases that talk about screenshots and admissibility:

So, what is enough to admit a screenshot?

In United States v. Walker, 32 F.4th 377 (4th Cir. 2022), a government agent’s personal knowledge about the original report and the comparison of that report with a screenshot of letters calling a victim a snitch was “enough to show the screenshot was authentic. See Fed. R. Evid (b)(1)(4).

In United States v. Quintana, 763 Fed. Appx. 422 (6th Cir. 2019), an account in the defendant’s name, an email address with his name and moniker, a location linked to him, dates that corresponded to witness testimony, and a picture of him, plus other circumstantial evidence, was enough to authenticate a screenshot of a Facebook page presented by the government as the defendant’s.

In United States v. Vayner, 769 F.3d 125 (2nd Cir. 2014), the court did find a screenshot, alone, was not enough. The court expressed no view on what was enough but said that the fact the page with a defendant’s name and photograph existed on the internet was not enough to show the page was created by him or on his behalf.

Conclusion:

If the government presents you with a cellphone screenshot and claims your client is responsible, do not accept this at face value! Investigate it, even if it looks legitimate. Check to see if you received the file from the government in a PDF format, versus in an image format consistent with the device that allegedly took the screenshot. In addition, make the argument that the screenshot, alone, or even with other evidence, is unreliable, unauthenticated, and inadmissible. As part of this attack, educate the court and government on how easy it is to create fake messages. This is necessary to remove the gloss of reliability given to a screenshot of a text message that looks like what we are used to text messages looking like.

Because this question incorporates a technical inquiry, it is an area where working closely with an investigator, paralegal, or expert who understands the processes of the device at issue can help you argue to keep something out or let something in. A knowledgeable source can help you identify weaknesses or vulnerabilities to bring attention to during cross-examination. They should also be able to give you a factual assessment of a device’s or processes’ strengths and reliability. Either way, the more you know and understand, the better you can formulate and convey your argument.