IN THE COURT OF CRIMINAL APPEALS
OF TEXAS
NO. PD-0456-14
BILLY DEAN BUTLER, Appellant
v.
THE STATE OF TEXAS, Appellee
ON STATE’S PETITION FOR DISCRETIONARY REVIEW
FROM THE THIRTEENTH COURT OF APPEALS
BEE COUNTY
Y EARY, J., delivered the opinion of the Court in which K ELLER, P.J., and
M EYERS, K EASLER, H ERVEY, A LCALA, R ICHARDSON and N EWELL, JJ., joined.
J OHNSON, J., concurred in the result.
OPINION
Appellant was convicted of the aggravated kidnapping of his girlfriend, Ashley Salas.
On direct appeal, he complained that the trial court admitted certain text messages into
evidence that Appellant claimed were not properly authenticated. The State introduced the
text messages through Salas, who testified that she recognized Appellant’s phone number
displayed on the text messages, that the text messages were from Appellant, and that
BUTLER — 2
Appellant even called her from that phone number at some point during the course of their
text messaging back and forth.
Relying upon this Court’s opinion in Tienda v. State, 358 S.W.3d 633 (Tex. Crim.
App. 2012), the Corpus Christi Court of Appeals held that Salas’s testimony did not
adequately serve to authenticate the text messages. Butler v. State, No. 13-12-00608-CR,
2014 WL 1272232, at *4 (Tex. App.—Corpus Christi Mar. 27, 2014) (not designated for
publication). Finding that the trial court erred by admitting the text messages and that their
admission into evidence was not harmless, the court of appeals reversed Appellant’s
conviction. Id. at *4-6. Justice Perkes dissented. Id. at *6-7. We granted the State’s petition
for discretionary review in order to examine the court of appeals’s application of our holding
in Tienda, and we now reverse.
BACKGROUND
Salas testified that, as of August 18 of 2011, she and Appellant had been living
together for four or five months in a house in Beeville. That morning Salas received a phone
call from her grandmother in nearby Kenedy, who was undergoing cancer treatment and did
not expect to live for long. Salas decided to drive to Kenedy to join other family members
in visiting her grandmother.
Appellant was unhappy with Salas’s decision to visit her grandmother, and he began
to harass her on her mobile phone, calling and texting her repeatedly from the time she left
the house and continuing throughout the afternoon and into the evening. He accused her of
BUTLER — 3
using the family visit as a cover for infidelity. At about 9:00 o’clock, Salas heard her car start
outside, and she saw Appellant drive it away. Appellant immediately sent Salas a text
message to say that she could find her car on the side of the highway. When Salas later
returned with her mother to Beeville, she found her car and drove it to her mother’s house,
arriving at about 11:00 o’clock. Appellant found Salas there and apologized profusely,
eventually persuading her to return to their home.
On the drive back to their house, Appellant once again accused Salas of infidelity and
began to strike her. When she tried to exit the car, he restrained her by her hair. Once back
at the house, Appellant pushed Salas inside and demanded to know the identity of her lover.
He tore her clothes off and began to punch her and pull her hair. He would not let her leave
the house, and for the rest of the night he continued intermittently to interrogate, threaten,
berate, smother, strangle, kick, and otherwise batter her until she eventually fell asleep at
around daylight. When she awoke later that morning, Appellant acted as if he did not know
what had happened to her. Salas’s mother came in the afternoon and called an ambulance to
take her to the hospital. A police detective photographed the numerous abrasions and
contusions on Salas’s face and body. Appellant was then arrested and charged with
aggravated kidnapping.1
Prior to trial, Salas gave a written statement to Appellant’s attorney in which she
1
See TEX . PENAL CODE § 20.04(a)(3), (4), (5) (“A person commits an offense if he
intentionally or knowingly abducts another person with the intent to . . . facilitate the commission
of a felony or . . . inflict bodily injury on him or . . . terrorize him[.]”).
BUTLER — 4
provided a different account of the beating she had endured. She explained that she had
arrived back at the house by herself only to find one of Appellant’s friend’s girlfriends and
another woman sitting on the couch. Suspecting Appellant of infidelity, she attacked the
women but suffered the worse for the encounter. On cross-examination, Salas admitted to
making the written statement, but she denied that it was truthful, explaining that Appellant
had persuaded her to concoct this alternative story several months after the incident when she
discovered she was pregnant with his child.
The week before trial began, Appellant and Salas shared an exchange of text messages
in which, Salas believed, Appellant threatened “to come and hurt [her] or [her] family”
should she testify against him. The State offered State’s Exhibit 57, encompassing a number
of photographs of the text messages taken from Salas’s Blackberry. The text messages,
spanning a period of about eight minutes, read:2
3612153899: And add this cuz ur fon is taped that y u tex I’ll kill u
myself bitch
3612153899: Pipe in ur mouth ho
3612153899: I can’t wait your teeth r going in ur throat
Salas: Ok I said it once versus u sayin it over 10 times ok mmm
wat u Don’t b a pussy tell me
3612153899: Snithin ass bitch ur dead I hope u lived it out cuz ur scum
snitching bitching ass
2
The text messages are set forth in italics here because they were set out in their original
form in italics.
BUTLER — 5
3612153899: I’ll start with ur mono first
Salas: Who I can’t understand ur writing
3612153899: Ur the pussy u run to the cops after u fuck me over
3612153899: Shut up bitch
Salas: And wat??
Salas: Have some balls & take responsibly for your own
ACTIONS
Salas: U did the crime
3612153899: They sent u in there to take pics of me
3612153899: U deserved it
Salas: I deserved wat
3612153899: Liers need that
3612153899: Lmfao
3612153899: Everyone counted
The trial court admitted this exhibit over Appellant’s objection that, among other things, the
“proper predicate” was lacking.
The State offered the text messages after laying the following predicate through
Salas’s testimony:
Q. What is [Appellant’s] phone number?
A. 361-215-3899.
Q. Does that number appear on all the pages of the exhibit?
BUTLER — 6
A. Yes.
Q. How do you know that that is [Appellant’s] telephone number?
A. Because that’s where he called me from and that’s what’s on the
same exhibit in front of me.
Q. You’ve read the text messages in the exhibit?
A. Yes.
Q. Who sen[t] you those text messages?
A. He did.
Q. How do you know that it was him?
A. Because he was the one texting me back and forth and he had
even called in between the conversations talking mess.
The jury found Appellant guilty. Appellant pled true to one enhancement count for a prior
aggravated assault, and the trial court assessed his punishment at fifty years’ confinement in
the penitentiary and a fine of $10,000.
On appeal, the court of appeals found the State’s predicate inadequate to establish that
Appellant was the author of the text messages attributed to number 361-215-3899. Even
Salas’s testimony that Appellant had called her “in between the conversations talking mess”
failed, in the eyes of the court of appeals, to “provide a sufficient link between [Appellant]
and the text messages to warrant the ultimate submission of the text message transcript to the
jury.” Butler, 2014 WL 1272232, at * 4. The court of appeals elaborated:
If the State sought to authenticate the text messages solely through Salas,
rather than through the cellular phone company or any other means, it could
BUTLER — 7
have done so by further developing Salas’s testimony to include other
circumstantial evidence that would have linked [Appellant] to the text
messages or to the telephone that was used to send the messages, such as
whether [Appellant] identified himself, how she knew it was [Appellant]
calling, or how she recognized his voice.
Id.
THE LAW OF AUTHENTICATION
“The requirement of authentication or identification as a condition precedent to
admissibility is satisfied by evidence sufficient to support a finding that the matter in question
is what its proponent claims.” T EX. R. E VID. 901(a). In a jury trial, it is the jury’s role
ultimately to determine whether an item of evidence is indeed what its proponent claims; the
trial court need only make the preliminary determination that the proponent of the item has
supplied facts sufficient to support a reasonable jury determination that the proffered
evidence is authentic. Tienda, 358 S.W.3d at 638. The trial court’s determination of whether
the proponent has met this threshold requirement is subject to appellate review for an abuse
of discretion and should not be countermanded so long as it is within the zone of reasonable
disagreement. Id. This has been aptly described as a “liberal standard of admissibility.”
Cathy Cochran, T EXAS R ULES OF E VIDENCE H ANDBOOK 922 (7th ed. 2007-08).
CELL PHONE TEXT MESSAGES
Text messages are “short messages [sent] over a cellular phone network, typically by
means of a short message service (SMS).” Steven Goode, The Admissibility of Electronic
Evidence, 29 R EV. L ITIG . 1, 16 n.66 (Fall 2009). As with other types of evidence, text
BUTLER — 8
messages may be authenticated by “evidence sufficient to support a finding that the matter
is what its proponent claims.” T EX. R. E VID. 901(a). This can be accomplished in myriad
ways, depending upon the unique facts and circumstances of each case, including through
the testimony of a witness with knowledge or through evidence showing distinctive
characteristics. T EX. R. E VID. 901(b)(1) (testimony of a witness with knowledge); T EX. R.
E VID. 901(b)(4) (distinctive characteristics and the like); see, also Goode, supra, at 16-19,
31-33.
A witness might have “knowledge” of the authorship of a text message for a number
of reasons. One reason might be that the witness is the actual author of the text message.
Tienda, 358 S.W.3d at 640. Another reason might be that the witness personally observed
the purported author actually type and/or send the message. Id. A witness might also claim
to have knowledge that a text message came from a phone number known to be associated
with the purported sender. The association of a cell-phone number with a particular
individual might suggest that the owner or user of that number may be the sender of a text
message. Indeed, the suggestion may be quite strong. Unlike so-called “land lines,”
commonly utilized by an entire household, cell phones tend to be personal and user-specific.3
3
Both the United States Supreme Court and this Court have lately recognized that cell phone
users can have a reasonable expectation of privacy in the content of their cell phones, noting the
plethora of highly personal information that may be found there—suggesting a certain unique
relationship between owner and cell phone. See Riley v. California, 134 S.Ct. 2473, 2489 (2014)
(“The term ‘cell phone’ is itself misleading shorthand; many of these devices are in fact
minicomputers that also happen to have the capacity to be used as a telephone. They could just as
easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries,
albums, televisions, maps, or newspapers.”); State v. Granville, 423 S.W.3d 399, 417 n.66 (Tex.
BUTLER — 9
Still, evidence that merely shows the association of a phone number with a purported
sender—alone—might be too tenuous. We have advised caution in the event a trial court
finds that this is the only fact underlying a witness’s knowledge linking a text message to the
purported author.4 A logical gap may still exist—a gap that we can recognize by reason and
common sense—because, as we recognized in Tienda, “cell phones can be purloined,” 5 and
a cell-phone number does not necessarily establish the identity of the user at a particular
moment in time with the same definitiveness that fingerprints, signatures, photographs, or
DNA may establish the identity of the perpetrator of a crime.
In isolation, a cell phone number is in some respects similar to a return address on a
letter. If the return address is the location where the purported author happens to live, it may
suggest that the person who lives at the address is the author of the letter. Or it might not—at
least not on its own, if multiple people happen to live at or have access to that same address.
But a letter bearing the return address of a purported author, combined with other
Crim. App. 2014) (noting the different relationship people have with their phones than they did in
the past). Along the way, the Supreme Court remarked that cell phones “place vast quantities of
personal information literally in the hands of individuals” and “are now such a pervasive and
insistent part of daily life that the proverbial visitor from Mars might conclude they were an
important feature of human anatomy.” Riley, 134 S.Ct. at 2484-85. “Now it is the person who is not
carrying a cell phone, with all that it contains, who is the exception. According to one poll, nearly
three-quarters of smart phone users report being within five feet of their phones most of the time,
with 12 % admitting that they even use their phones in the shower.” Id. at 2490. Any parent or
teacher can confirm how difficult it can be to separate a teenager from his cell phone.
4
Mindful that “cell phones can be purloined[,]” we observed in Tienda that, the fact “that
a text message emanates from a cell phone number assigned to the purported author . . . without
more,” might be “[in]sufficient to support a finding of authenticity.” 358 S.W.3d at 641-42.
5
Id. at 641.
BUTLER — 10
circumstances including its appearance and contents, may be sufficient to authenticate a letter
as having been sent by the person purported to be its author.6
As with evidence in general, authenticating evidence may be direct or circumstantial.7
6
See, e.g., United States v. Thompson, 449 F.3d 267, 274-275 (1st Cir. 2006)(finding an
anonymous letter properly admitted as an admission of the defendant where the sponsoring witness
testified that the return address was known to him to be the address of the defendant and other
circumstances tended to suggest that the letter had been written by the defendant); State v. Brown,
783 N.E.2d 539, 548-549 (Ohio. App. 2002) (finding a letter properly authenticated as having been
authored by the defendant after observing that the return address on the letter was the same county
jail where the defendant was incarcerated, along with a number of other factors, such as the date the
letter was written, the fact that it was addressed to the judge presiding over the defendant’s trial, the
fact that it mentioned that a hearing that was scheduled in the case did not take place when it was
scheduled, the fact that it discussed the defendant’s history in the correctional system, and the fact
that it was signed with the defendant’s name).
As the Tyler Court of Appeals has also observed:
Another traditional method of authentication permitted by Rule 901 is the
“reply-letter doctrine.” Varkonyi v. State, 276 S.W.3d 27, 35 (Tex. App.—El Paso
2008, pet. ref’d) (citing Cathy Cochran, TEXAS RULES OF EVIDENCE HANDBOOK,
Article IX, at 915 (6th ed. 2005). Under this doctrine, a letter received in the due
course of mail purportedly in answer to another letter is prima facie genuine and
admissible without further proof of authenticity. Id. This doctrine applies to e-mails.
Id. Therefore, an e-mail is sufficiently authenticated when a person responds to an
e-mail that was sent to the person’s e-mail address. Id. This rule has been applied to
other types of messages by analogy. See, e.g., People v. Pierre, 41 A.D.3d 289, 838
N.Y.S.2d 546, 548-49 (N.Y.App.Div. 2007) (applied to instant message where
person sent instant message to screen name and received reply, content on reply
supported conclusion that message was sent by defendant, and no evidence was
admitted to show anyone else had motive or opportunity to impersonate defendant
by using his screen name).
Manuel v. State, 357 S.W.3d 66, 75-76 (Tex. App.—Tyler 2011, pet. ref’d).
7
See Wallace v. State, 782 S.W.2d 854, 858 (Tex. Crim. App. 1989) (finding that “the
predicate for admission of audio tapes may be proven with circumstantial evidence”); and see also,
e.g., United States v. Haldeman, 559 F.2d 31, 107 (D.C. Cir. 1976) (en banc) (“Although the
evidence bearing on admissibility should be carefully scrutinized to see if it measures up . . . it may
be circumstantial or direct, real or testimonial, and need not conform to any particular model.”).
BUTLER — 11
In cases where a sponsoring witness may testify to an association between a cell-phone
number and a purported author, other evidence may be available that might bridge the logical
gap and permit a proper inference that the purported author sent the message. The other
evidence might include the message’s “appearance, contents, substance, internal patterns, or
other distinctive characteristics,” which considered in conjunction with other circumstances
support a conclusion that a message indeed emanated from the purported author. T EX. R.
E VID. 901(b)(1).
For example, a cellular-phone company may provide records to show that a text
message originated from the purported sender’s phone “under circumstances in which it is
reasonable to believe that only the purported sender would have had access to the . . . cell
phone.” Tienda, 358 S.W.3d at 640. In other cases, the purported sender of a message may
respond in such a way as to indicate his or her authorship of the message, such as by calling
the recipient to confirm receipt of the message. Id. at 641. And in still other cases, the content
and/or context of a particular exchange of messages may create an inference supporting the
conclusion that it was in fact the purported author who sent them. See Id. at 641 & n.34.8
ANALYSIS
In the instant case, Salas testified that the text messages at issue emanated from phone
number 361-215-3899. She had personal knowledge that this was Appellant’s phone number,
8
See also, Massimo v. State, 144 S.W.3d 210 (Tex. App. - Forth Worth 2004, no pet.) (in an
electronic communications harassment case, addressing both circumstances and content related
factors, such as the fact that the offending email was sent shortly after an altercation between the
defendant and the victim and referenced the altercation).
BUTLER — 12
presumably from past experience. The court of appeals believed that the State’s predicate
failed to establish any more than the bare fact that the text messages emanated from
Appellant’s personal phone. Butler, 2014 WL 1272232 *4 (“Salas’s testimony states that she
had personal knowledge that it was Butler’s telephone number because he had called her
from that number before. This testimony, without more, is exactly the type of evidence that
the Tienda Court warned about in authenticating text messages.”). It concluded there was
insufficient accompanying indicia of Appellant’s authorship. Id. In our view, however, there
was other evidence that bridged the gap and supplied the necessary predicate.
Asked how she knew it was Appellant’s number, Salas replied: “[b]ecause that’s
where he called me from[.]” But how did she know that it was Appellant who was using that
phone to send her the particular text messages at issue in this case? According to Salas,
“Because he was the one texting [her] back and forth and he had even called in between the
conversations talking mess.”9 Although Salas’s responses are not without ambiguity, a
rational jury could conclude that Salas recognized the texts to be coming from Appellant on
this occasion (and not someone else who might have purloined his phone) because: (1) he
had called her from that number on past occasions; (2) the content and context of the text
messages convinced her that the messages were from him; and (3) he actually called her from
that same phone number during the course of that very text message exchange.
Aside from the fact that appellant had called Salas in the past from phone number
9
Emphasis added.
BUTLER — 13
361-215-3899, the content and context of the text messages themselves constituted additional
circumstantial evidence of the authenticity of the messages. See T EX. R. E VID. 901(b)(4)
(distinctive characteristics and the like). When considering the admissibility of text messages,
just as when considering the admissibility of letters, emails, instant messages, and other
similar written forms of communications, courts must be especially cognizant that such
matters may sometimes be authenticated by distinctive characteristics found within the
writings themselves and by comparative reference from those characteristics to other
circumstances shown to exist by the evidence presented at trial.10 Conversations and events
that precede or follow the communications at issue, when identified or referred to within the
written communication, can provide contextual evidence demonstrating the authenticity of
such communications.11
Take, for example, the text-message exchange in this case, which occurred the week
before Appellant’s trial began. One particular text message sent from Appellant’s phone
during the exchange stated: “Snithin ass bitch ur dead I hope u lived it out cuz ur scum
snitching bitching ass.” Appellant certainly had a reason to consider Salas a “snitch” since
10
Cathy Cochran, TEXAS RULES OF EVIDENCE HANDBOOK 934 (7th ed. 2007-08) (“[T]he
language of the rule . . . obviously is aimed at permitting items to be authenticated by distinctive
circumstantial evidence, [and t]hus, letters and other items may be authenticated by distinctive
characteristics such as the document’s contents, appearance, and location.”).
11
See id., at 936 (“Factors to consider in determining the authenticity of e-mails and instant
messages include . . . (6) any other circumstances, such as conversations or events either before or
after the e-mail or instant message that tend to make it more likely that this message came from a
certain person.”).
BUTLER — 14
she was likely going to be the principal witness against him at his upcoming trial. Similarly,
Appellant had a motive to try to prevent her from testifying against him at his trial by making
threats to both her and her family. The record fails to suggest anybody else who might have
had a similar motive to threaten Salas and her family in the week before Appellant’s trial
began.12
What’s more, another of the text messages indicated a belief that the recipient of the
message had complained about the sender to the police. Specifically, this message stated: “Ur
the pussy u run to the cops after u fuck me over.” Who else other than Appellant might have
complained—one week before appellant’s trial—that Salas had “fuck[ed] [him] over” and
“run to the cops”? A rational inference is certainly available under the circumstances that
Appellant was the author of these profane and threatening text messages.
Finally, it is at least implicit in Salas’ ultimate response (to the question: “How do you
know that it was him?”) that she knew it was Appellant who was texting her from his phone
because of a contemporaneous call she received from a person whose voice she recognized
to be Appellant’s. She testified that “he had even called in between the conversations talking
mess.” The timing of that phone call (“in between the conversations”) is yet another
12
See Honorable Paul W. Grimm, Lisa Yurwit Bergstrom & Melissa M. O’Toole-Loureiro,
SYMPOSIUM: Keynote Address: Authentication of Social Media Evidence, 36 AM . J. TRIAL ADVOC.
433, 458 (Spring 2013) (“When all that the objecting party offers is speculation or conjecture about
who, other than the putative creator, ‘could’ have created the evidence, such questions are properly
left to the jury in determining how much weight, if any, to give to the evidence -- provided that the
trial judge is convinced that the proponent has met the relatively low threshold required by Rule
901(a) of producing facts that would be sufficient for a reasonable jury to conclude that the evidence
was created by the putative creator.”).
BUTLER — 15
circumstance which made it reasonable for Salas (and hence, the jury) to conclude that
Appellant was the person who controlled the phone at the time that the text messages at issue
were generated.
The State could have endeavored to make all of these circumstantial indicia of
authenticity more explicit and less ambiguous than it did. However, under the circumstances
presented in this case, we cannot agree with the court of appeals that the trial court abused
its discretion to conclude that there was sufficient evidence to support a jury finding that the
text messages were indeed what the State and Salas purported them to be—namely, a text-
message exchange between Salas and Appellant.
Appellant insists that, because Salas’s credibility was seriously impeached by the fact
that she had given a statement implicating someone other than Appellant in the beating she
endured,13 the trial court erred to conclude her testimony could be relied upon to establish his
authorship of the text messages. We disagree. Rule 901 provides for authentication “by
evidence sufficient to support a finding that the matter is what its proponent claims.” T EX.
R. E VID. 901. It requires merely “sufficient” evidence “to support” authentication. It does not
13
Indeed, the trial judge observed (out of the jury’s presence):
And this -- this witness is something else.
She’s already made two completely different stories under oath as to what
happened.
***
She’s -- she’s acting rather bizarrely for a witness that’s supposed to come in
that’s been beaten up.
BUTLER — 16
ordinarily require the trial court to make a threshold determination of the credibility of the
evidence proffered by the proponent to establish authenticity. And as particularly applied to
Rule 901(b)(1), it does not contemplate that, as a condition of admissibility, the trial court
should have to find that the “witness with knowledge” is necessarily worthy of belief. T EX.
R. E VID. 901(b)(1).
Nothing in Rule 901 suggests that a witness whose credibility has been questioned in
some way is precluded by that fact from sponsoring evidence as a “witness with knowledge.”
Id. Even when a trial court judge personally harbors some doubt as to the general credibility
of a sponsoring witness, a decision to admit particular evidence sponsored by that witness
may not necessarily be outside the zone of reasonable disagreement.14 So long as the ultimate
fact-finder could rationally choose to believe the sponsoring witness, and the witness’s
testimony would establish that the item proffered “is what its proponent claims[,]” the trial
court will not abuse its discretion to admit it.15 As we said in Tienda, “[t]he ultimate question
whether an item of evidence is what its proponent claims [is] a question for the fact-
14
Tienda, 358 S.W.3d at 638 (“If the trial court’s ruling . . . is at least ‘within the zone of
reasonable disagreement,’ a reviewing court should not interfere.”).
15
We do not discount a remote possibility that, under some yet unknown set of facts, the
balance of the record may so irrefutably contradict a sponsoring witness’s authentication testimony
that it might be appropriate for the trial court to determine that no rational ultimate fact-finder could
choose to believe the sponsoring witness’s testimony. Cf. Carmouche v. State, 10 S.W.3d 323, 331-
33 (Tex. Crim. App. 2000) (in the context of an appellate review of a motion to suppress, despite
a reviewing court’s usual deference to the fact and credibility determinations of the trial court as
original fact-finder, the trial court could not rationally accept the testimony of a law enforcement
officer whose testimony was conclusively refuted by the videotape taken from his patrol car). This
is not such a case.
BUTLER — 17
finder—the jury, in a jury trial.” Tienda, 358 S.W.3d at 638.
In this case, the jury could have rationally chosen to believe Salas’s testimony about
the text message exchange, despite her equivocation with respect to the offense itself. Salas
explained her equivocation at trial, and a rational jury might readily have accepted her
explanation as credible. The jury might also have found her testimony about the text-message
exchange to be reliable and therefore concluded that Appellant was the one and only author
who composed the messages and the threats contained therein.16 The trial court’s decision
to admit the content of the text messages and leave the ultimate question of authenticity to
the jury was well within the zone of reasonable disagreement.
CONCLUSION
Accordingly, we reverse the judgment of the court of appeals and remand the cause
to that court to consider any other issues that were properly before the court.17
DELIVERED: April 22, 2015
PUBLISH
16
See, e.g., State v. Thompson, 777 N.W.2d 617, 626 (N.D. 2010) (“Here, the district court
heard sufficient evidence from the complainant, including the circumstances of that day and his
knowledge of Thompson’s cell phone number and signature on text messages, to authenticate the
complainant’s testimony about the text messages he received on October 31, 2008.”); People v.
Chromik, 946 N.E.2d 1039, 1056 (Ill. App. Ct. 2011) (citing Thompson to hold that text messages
were properly authenticated by, among other things, the victim’s testimony).
17
Although Appellant brought only a single point of error on direct appeal, it appears he may
have made more than one substantive argument. Having reversed the conviction on the basis of
Appellant’s argument with respect to authentication, the court of appeals found it unnecessary to
address his alternative arguments that the text messages were also inadmissible because they were
simply irrelevant, or inadmissible under Rules 403 and 404(b) of the Texas Rules of Evidence.
Butler, 2014 WL 1272232, at *2 & *6 n.4.