February 28, 2017 Practice Points

How to Authenticate Authorship of Text Messages, Emails, or Similar Communications

A recent state appellate court case shed some light on the intersection between one of the oldest conditions for admissibility of evidence and one of the newer types of evidence.

By Kenneth J. Duvall

In Garnett v. Commonwealth, No. 1573-15-2 (Virginia Ct. App., Dec. 20, 2016), the Virginia Court of Appeals reversed the trial court’s admission of text messages against the defendant because the prosecution had not carried its burden of proving that the defendant had owned the cell phone in question. Citing cases from Mississippi, Texas, and Illinois, the court described several non-exhaustive ways by which to prove that someone sent an electronic communication: (1) "the purported sender admits authorship;" (2) "the purported sender is seen composing the communication;" (3) "business records of an internet service provider or cell phone company show that the communication originated from the purported sender's personal computer or cell phone under circumstances in which it is reasonable to believe that only the purported sender would have access to the computer or cell phone;" (4) "the communication contains information that only the purported sender could be expected to know;" or (5) "the purported sender responds to an exchange in such a way as to indicate circumstantially that he was in fact the author of the communication."

In Garnett, the prosecutor offered evidence only that the cell phone was found in the car with the defendant, who was the only occupant. The common-sense inference may be that the defendant owned the phone, but the court required more and ruled that the trial court had abused its discretion.

While Garnett was a criminal case, the test for authenticity of electronic communications probably does not differ much in civil cases in most jurisdictions. Likewise, while Garnett dealt with text messages on cell phones, the same principles apply to any number of electronic communications on various devices.

The upshot? Make it a habit to issue a subpoena to the service provider for authenticating documents (though you should expect pushback from those companies). Absent that, you might need to secure testimony from someone who communicated with the author in question at the cell phone number, email address, etc. in question. Or perhaps you will be lucky and find a message that speaks for itself in that the purported author reveals peculiar personal knowledge or otherwise effectively admits his or her identity.


Kenneth J. Duvall is an associate with Bilzin Sumberg Baena Price & Axelrod LLP in Miami, Florida.


Copyright © 2017, American Bar Association. All rights reserved. This information or any portion thereof may not be copied or disseminated in any form or by any means or downloaded or stored in an electronic database or retrieval system without the express written consent of the American Bar Association. The views expressed in this article are those of the author(s) and do not necessarily reflect the positions or policies of the American Bar Association, the Section of Litigation, this committee, or the employer(s) of the author(s).