Authentication Requirements
To authenticate text messages, you must establish:
- Source identification: Whose phone the messages came from
- Recipient identity: Who received the messages
- Acquisition method: How you obtained the messages
- Completeness: Whether the exhibit shows the full conversation or excerpts
- Context: The relationship and circumstances surrounding the communication
Declaration Format
Your declaration should include statements such as:
"I am the owner of phone number (XXX) XXX-XXXX. Attached as Exhibit A are true and accurate screenshots of text message conversations between myself and [Party Name] from [Date Range]. These messages were sent to and received on my iPhone [Model]. The messages were obtained directly from my phone's Messages application. The phone number displayed as the sender is [Number], which I know to belong to [Party Name] because [reason for knowledge]."
Best Practices for Text Message Evidence
Screenshot Format:
- Include phone numbers and contact names
- Show timestamps for each message
- Capture multiple messages per screenshot to show context
- Ensure text is legible and not cropped
Metadata Preservation:
- Note the device and application used
- Document when screenshots were taken
- Preserve original messages when possible
- Consider using export features if available
Organization:
- Present messages chronologically
- Number screenshots if submitting multiple pages
- Highlight relevant portions if messages are extensive
- Include full context, even if some messages are unfavorable
Authentication Challenges
The opposing party may challenge authentication by claiming messages were fabricated, arguing sender identity is uncertain, or asserting messages lack proper foundation.
Strengthen authentication by:
- Providing corroborating evidence (emails referencing the texts)
- Including metadata when available
- Referencing unique details only the sender would know
- Noting response patterns consistent with the identified sender
Technical Tools and Methods
iPhone Users: Use native screenshot function (Side button + Volume Up), export conversations via third-party apps for better formatting, and utilize iCloud backups to preserve message history.
Android Users: Screenshot methods vary by manufacturer. Some devices offer scrolling screenshots. Export options available through certain messaging apps.
Third-Party Tools: SMS backup applications create formatted exports. Some tools generate PDFs with timestamps and metadata. Verify court acceptance of digital exports before relying solely on third-party tools.
Frequently Asked Questions
QWhat if the other party claims I altered the messages?▾
QCan I submit only relevant portions of a conversation?▾
QCan I authenticate messages from WhatsApp, Facebook, or other apps?▾
Sources
- Federal Rules of Evidence - Rule 901 — Authentication requirements for electronic evidence
- Federal Rules of Evidence — Complete text with annotations on authentication
- Electronic Evidence Guide — Best practices for authenticating digital communications