-
IN THE COURT OF CRIMINAL APPEALS OF TEXAS NO. PD-0456-14 BILLY DEAN BUTLER, Appellant v. THE STATE OF TEXAS, Appellee ON STATE’S PETITION FOR DISCRETIONARY REVIEW FROM THE THIRTEENTH COURT OF APPEALS BEE COUNTY Y EARY, J., delivered the opinion of the Court in which K ELLER, P.J., and M EYERS, K EASLER, H ERVEY, A LCALA, R ICHARDSON and N EWELL, JJ., joined. J OHNSON, J., concurred in the result. OPINION Appellant was convicted of the aggravated kidnapping of his girlfriend, Ashley Salas. On direct appeal, he complained that the trial court admitted certain text messages into evidence that Appellant claimed were not properly authenticated. The State introduced the text messages through Salas, who testified that she recognized Appellant’s phone number displayed on the text messages, that the text messages were from Appellant, and that BUTLER — 2 Appellant even called her from that phone number at some point during the course of their text messaging back and forth. Relying upon this Court’s opinion in Tienda v. State,
358 S.W.3d 633(Tex. Crim. App. 2012), the Corpus Christi Court of Appeals held that Salas’s testimony did not adequately serve to authenticate the text messages. Butler v. State, No. 13-12-00608-CR,
2014 WL 1272232, at *4 (Tex. App.—Corpus Christi Mar. 27, 2014) (not designated for publication). Finding that the trial court erred by admitting the text messages and that their admission into evidence was not harmless, the court of appeals reversed Appellant’s conviction.
Id. at *4-6.Justice Perkes dissented.
Id. at *6-7.We granted the State’s petition for discretionary review in order to examine the court of appeals’s application of our holding in Tienda, and we now reverse. BACKGROUND Salas testified that, as of August 18 of 2011, she and Appellant had been living together for four or five months in a house in Beeville. That morning Salas received a phone call from her grandmother in nearby Kenedy, who was undergoing cancer treatment and did not expect to live for long. Salas decided to drive to Kenedy to join other family members in visiting her grandmother. Appellant was unhappy with Salas’s decision to visit her grandmother, and he began to harass her on her mobile phone, calling and texting her repeatedly from the time she left the house and continuing throughout the afternoon and into the evening. He accused her of BUTLER — 3 using the family visit as a cover for infidelity. At about 9:00 o’clock, Salas heard her car start outside, and she saw Appellant drive it away. Appellant immediately sent Salas a text message to say that she could find her car on the side of the highway. When Salas later returned with her mother to Beeville, she found her car and drove it to her mother’s house, arriving at about 11:00 o’clock. Appellant found Salas there and apologized profusely, eventually persuading her to return to their home. On the drive back to their house, Appellant once again accused Salas of infidelity and began to strike her. When she tried to exit the car, he restrained her by her hair. Once back at the house, Appellant pushed Salas inside and demanded to know the identity of her lover. He tore her clothes off and began to punch her and pull her hair. He would not let her leave the house, and for the rest of the night he continued intermittently to interrogate, threaten, berate, smother, strangle, kick, and otherwise batter her until she eventually fell asleep at around daylight. When she awoke later that morning, Appellant acted as if he did not know what had happened to her. Salas’s mother came in the afternoon and called an ambulance to take her to the hospital. A police detective photographed the numerous abrasions and contusions on Salas’s face and body. Appellant was then arrested and charged with aggravated kidnapping.1 Prior to trial, Salas gave a written statement to Appellant’s attorney in which she 1 See TEX . PENAL CODE § 20.04(a)(3), (4), (5) (“A person commits an offense if he intentionally or knowingly abducts another person with the intent to . . . facilitate the commission of a felony or . . . inflict bodily injury on him or . . . terrorize him[.]”). BUTLER — 4 provided a different account of the beating she had endured. She explained that she had arrived back at the house by herself only to find one of Appellant’s friend’s girlfriends and another woman sitting on the couch. Suspecting Appellant of infidelity, she attacked the women but suffered the worse for the encounter. On cross-examination, Salas admitted to making the written statement, but she denied that it was truthful, explaining that Appellant had persuaded her to concoct this alternative story several months after the incident when she discovered she was pregnant with his child. The week before trial began, Appellant and Salas shared an exchange of text messages in which, Salas believed, Appellant threatened “to come and hurt [her] or [her] family” should she testify against him. The State offered State’s Exhibit 57, encompassing a number of photographs of the text messages taken from Salas’s Blackberry. The text messages, spanning a period of about eight minutes, read:2 3612153899: And add this cuz ur fon is taped that y u tex I’ll kill u myself bitch 3612153899: Pipe in ur mouth ho 3612153899: I can’t wait your teeth r going in ur throat Salas: Ok I said it once versus u sayin it over 10 times ok mmm wat u Don’t b a pussy tell me 3612153899: Snithin ass bitch ur dead I hope u lived it out cuz ur scum snitching bitching ass 2 The text messages are set forth in italics here because they were set out in their original form in italics. BUTLER — 5 3612153899: I’ll start with ur mono first Salas: Who I can’t understand ur writing 3612153899: Ur the pussy u run to the cops after u fuck me over 3612153899: Shut up bitch Salas: And wat?? Salas: Have some balls & take responsibly for your own ACTIONS Salas: U did the crime 3612153899: They sent u in there to take pics of me 3612153899: U deserved it Salas: I deserved wat 3612153899: Liers need that 3612153899: Lmfao 3612153899: Everyone counted The trial court admitted this exhibit over Appellant’s objection that, among other things, the “proper predicate” was lacking. The State offered the text messages after laying the following predicate through Salas’s testimony: Q. What is [Appellant’s] phone number? A. 361-215-3899. Q. Does that number appear on all the pages of the exhibit? BUTLER — 6 A. Yes. Q. How do you know that that is [Appellant’s] telephone number? A. Because that’s where he called me from and that’s what’s on the same exhibit in front of me. Q. You’ve read the text messages in the exhibit? A. Yes. Q. Who sen[t] you those text messages? A. He did. Q. How do you know that it was him? A. Because he was the one texting me back and forth and he had even called in between the conversations talking mess. The jury found Appellant guilty. Appellant pled true to one enhancement count for a prior aggravated assault, and the trial court assessed his punishment at fifty years’ confinement in the penitentiary and a fine of $10,000. On appeal, the court of appeals found the State’s predicate inadequate to establish that Appellant was the author of the text messages attributed to number 361-215-3899. Even Salas’s testimony that Appellant had called her “in between the conversations talking mess” failed, in the eyes of the court of appeals, to “provide a sufficient link between [Appellant] and the text messages to warrant the ultimate submission of the text message transcript to the jury.” Butler,
2014 WL 1272232, at * 4. The court of appeals elaborated: If the State sought to authenticate the text messages solely through Salas, rather than through the cellular phone company or any other means, it could BUTLER — 7 have done so by further developing Salas’s testimony to include other circumstantial evidence that would have linked [Appellant] to the text messages or to the telephone that was used to send the messages, such as whether [Appellant] identified himself, how she knew it was [Appellant] calling, or how she recognized his voice.
Id. THE LAWOF AUTHENTICATION “The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.” T EX. R. E VID. 901(a). In a jury trial, it is the jury’s role ultimately to determine whether an item of evidence is indeed what its proponent claims; the trial court need only make the preliminary determination that the proponent of the item has supplied facts sufficient to support a reasonable jury determination that the proffered evidence is authentic.
Tienda, 358 S.W.3d at 638. The trial court’s determination of whether the proponent has met this threshold requirement is subject to appellate review for an abuse of discretion and should not be countermanded so long as it is within the zone of reasonable disagreement.
Id. This hasbeen aptly described as a “liberal standard of admissibility.” Cathy Cochran, T EXAS R ULES OF E VIDENCE H ANDBOOK 922 (7th ed. 2007-08). CELL PHONE TEXT MESSAGES Text messages are “short messages [sent] over a cellular phone network, typically by means of a short message service (SMS).” Steven Goode, The Admissibility of Electronic Evidence, 29 R EV. L ITIG . 1, 16 n.66 (Fall 2009). As with other types of evidence, text BUTLER — 8 messages may be authenticated by “evidence sufficient to support a finding that the matter is what its proponent claims.” T EX. R. E VID. 901(a). This can be accomplished in myriad ways, depending upon the unique facts and circumstances of each case, including through the testimony of a witness with knowledge or through evidence showing distinctive characteristics. T EX. R. E VID. 901(b)(1) (testimony of a witness with knowledge); T EX. R. E VID. 901(b)(4) (distinctive characteristics and the like); see, also
Goode, supra, at 16-19, 31-33. A witness might have “knowledge” of the authorship of a text message for a number of reasons. One reason might be that the witness is the actual author of the text message.
Tienda, 358 S.W.3d at 640. Another reason might be that the witness personally observed the purported author actually type and/or send the message.
Id. A witnessmight also claim to have knowledge that a text message came from a phone number known to be associated with the purported sender. The association of a cell-phone number with a particular individual might suggest that the owner or user of that number may be the sender of a text message. Indeed, the suggestion may be quite strong. Unlike so-called “land lines,” commonly utilized by an entire household, cell phones tend to be personal and user-specific.3 3 Both the United States Supreme Court and this Court have lately recognized that cell phone users can have a reasonable expectation of privacy in the content of their cell phones, noting the plethora of highly personal information that may be found there—suggesting a certain unique relationship between owner and cell phone. See Riley v. California,
134 S. Ct. 2473, 2489 (2014) (“The term ‘cell phone’ is itself misleading shorthand; many of these devices are in fact minicomputers that also happen to have the capacity to be used as a telephone. They could just as easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers.”); State v. Granville,
423 S.W.3d 399, 417 n.66 (Tex. BUTLER — 9 Still, evidence that merely shows the association of a phone number with a purported sender—alone—might be too tenuous. We have advised caution in the event a trial court finds that this is the only fact underlying a witness’s knowledge linking a text message to the purported author.4 A logical gap may still exist—a gap that we can recognize by reason and common sense—because, as we recognized in Tienda, “cell phones can be purloined,” 5 and a cell-phone number does not necessarily establish the identity of the user at a particular moment in time with the same definitiveness that fingerprints, signatures, photographs, or DNA may establish the identity of the perpetrator of a crime. In isolation, a cell phone number is in some respects similar to a return address on a letter. If the return address is the location where the purported author happens to live, it may suggest that the person who lives at the address is the author of the letter. Or it might not—at least not on its own, if multiple people happen to live at or have access to that same address. But a letter bearing the return address of a purported author, combined with other Crim. App. 2014) (noting the different relationship people have with their phones than they did in the past). Along the way, the Supreme Court remarked that cell phones “place vast quantities of personal information literally in the hands of individuals” and “are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy.”
Riley, 134 S. Ct. at 2484-85. “Now it is the person who is not carrying a cell phone, with all that it contains, who is the exception. According to one poll, nearly three-quarters of smart phone users report being within five feet of their phones most of the time, with 12 % admitting that they even use their phones in the shower.”
Id. at 2490.Any parent or teacher can confirm how difficult it can be to separate a teenager from his cell phone. 4 Mindful that “cell phones can be purloined[,]” we observed in Tienda that, the fact “that a text message emanates from a cell phone number assigned to the purported author . . . without more,” might be “[in]sufficient to support a finding of
authenticity.” 358 S.W.3d at 641-42. 5
Id. at 641.BUTLER — 10 circumstances including its appearance and contents, may be sufficient to authenticate a letter as having been sent by the person purported to be its author.6 As with evidence in general, authenticating evidence may be direct or circumstantial.7 6 See, e.g., United States v. Thompson,
449 F.3d 267, 274-275 (1st Cir. 2006)(finding an anonymous letter properly admitted as an admission of the defendant where the sponsoring witness testified that the return address was known to him to be the address of the defendant and other circumstances tended to suggest that the letter had been written by the defendant); State v. Brown,
783 N.E.2d 539, 548-549 (Ohio. App. 2002) (finding a letter properly authenticated as having been authored by the defendant after observing that the return address on the letter was the same county jail where the defendant was incarcerated, along with a number of other factors, such as the date the letter was written, the fact that it was addressed to the judge presiding over the defendant’s trial, the fact that it mentioned that a hearing that was scheduled in the case did not take place when it was scheduled, the fact that it discussed the defendant’s history in the correctional system, and the fact that it was signed with the defendant’s name). As the Tyler Court of Appeals has also observed: Another traditional method of authentication permitted by Rule 901 is the “reply-letter doctrine.” Varkonyi v. State,
276 S.W.3d 27, 35 (Tex. App.—El Paso 2008, pet. ref’d) (citing Cathy Cochran, TEXAS RULES OF EVIDENCE HANDBOOK, Article IX, at 915 (6th ed. 2005). Under this doctrine, a letter received in the due course of mail purportedly in answer to another letter is prima facie genuine and admissible without further proof of authenticity.
Id. This doctrineapplies to e-mails.
Id. Therefore, ane-mail is sufficiently authenticated when a person responds to an e-mail that was sent to the person’s e-mail address.
Id. This rulehas been applied to other types of messages by analogy. See, e.g., People v. Pierre,
41 A.D.3d 289,
838 N.Y.S.2d 546, 548-49 (N.Y.App.Div. 2007) (applied to instant message where person sent instant message to screen name and received reply, content on reply supported conclusion that message was sent by defendant, and no evidence was admitted to show anyone else had motive or opportunity to impersonate defendant by using his screen name). Manuel v. State,
357 S.W.3d 66, 75-76 (Tex. App.—Tyler 2011, pet. ref’d). 7 See Wallace v. State,
782 S.W.2d 854, 858 (Tex. Crim. App. 1989) (finding that “the predicate for admission of audio tapes may be proven with circumstantial evidence”); and see also, e.g., United States v. Haldeman,
559 F.2d 31, 107 (D.C. Cir. 1976) (en banc) (“Although the evidence bearing on admissibility should be carefully scrutinized to see if it measures up . . . it may be circumstantial or direct, real or testimonial, and need not conform to any particular model.”). BUTLER — 11 In cases where a sponsoring witness may testify to an association between a cell-phone number and a purported author, other evidence may be available that might bridge the logical gap and permit a proper inference that the purported author sent the message. The other evidence might include the message’s “appearance, contents, substance, internal patterns, or other distinctive characteristics,” which considered in conjunction with other circumstances support a conclusion that a message indeed emanated from the purported author. T EX. R. E VID. 901(b)(1). For example, a cellular-phone company may provide records to show that a text message originated from the purported sender’s phone “under circumstances in which it is reasonable to believe that only the purported sender would have had access to the . . . cell phone.”
Tienda, 358 S.W.3d at 640. In other cases, the purported sender of a message may respond in such a way as to indicate his or her authorship of the message, such as by calling the recipient to confirm receipt of the message.
Id. at 641.And in still other cases, the content and/or context of a particular exchange of messages may create an inference supporting the conclusion that it was in fact the purported author who sent them. See
Id. at 641& n.34.8 ANALYSIS In the instant case, Salas testified that the text messages at issue emanated from phone number 361-215-3899. She had personal knowledge that this was Appellant’s phone number, 8 See also, Massimo v. State,
144 S.W.3d 210(Tex. App. - Forth Worth 2004, no pet.) (in an electronic communications harassment case, addressing both circumstances and content related factors, such as the fact that the offending email was sent shortly after an altercation between the defendant and the victim and referenced the altercation). BUTLER — 12 presumably from past experience. The court of appeals believed that the State’s predicate failed to establish any more than the bare fact that the text messages emanated from Appellant’s personal phone. Butler,
2014 WL 1272232*4 (“Salas’s testimony states that she had personal knowledge that it was Butler’s telephone number because he had called her from that number before. This testimony, without more, is exactly the type of evidence that the Tienda Court warned about in authenticating text messages.”). It concluded there was insufficient accompanying indicia of Appellant’s authorship.
Id. In ourview, however, there was other evidence that bridged the gap and supplied the necessary predicate. Asked how she knew it was Appellant’s number, Salas replied: “[b]ecause that’s where he called me from[.]” But how did she know that it was Appellant who was using that phone to send her the particular text messages at issue in this case? According to Salas, “Because he was the one texting [her] back and forth and he had even called in between the conversations talking mess.”9 Although Salas’s responses are not without ambiguity, a rational jury could conclude that Salas recognized the texts to be coming from Appellant on this occasion (and not someone else who might have purloined his phone) because: (1) he had called her from that number on past occasions; (2) the content and context of the text messages convinced her that the messages were from him; and (3) he actually called her from that same phone number during the course of that very text message exchange. Aside from the fact that appellant had called Salas in the past from phone number 9 Emphasis added. BUTLER — 13 361-215-3899, the content and context of the text messages themselves constituted additional circumstantial evidence of the authenticity of the messages. See T EX. R. E VID. 901(b)(4) (distinctive characteristics and the like). When considering the admissibility of text messages, just as when considering the admissibility of letters, emails, instant messages, and other similar written forms of communications, courts must be especially cognizant that such matters may sometimes be authenticated by distinctive characteristics found within the writings themselves and by comparative reference from those characteristics to other circumstances shown to exist by the evidence presented at trial.10 Conversations and events that precede or follow the communications at issue, when identified or referred to within the written communication, can provide contextual evidence demonstrating the authenticity of such communications.11 Take, for example, the text-message exchange in this case, which occurred the week before Appellant’s trial began. One particular text message sent from Appellant’s phone during the exchange stated: “Snithin ass bitch ur dead I hope u lived it out cuz ur scum snitching bitching ass.” Appellant certainly had a reason to consider Salas a “snitch” since 10 Cathy Cochran, TEXAS RULES OF EVIDENCE HANDBOOK 934 (7th ed. 2007-08) (“[T]he language of the rule . . . obviously is aimed at permitting items to be authenticated by distinctive circumstantial evidence, [and t]hus, letters and other items may be authenticated by distinctive characteristics such as the document’s contents, appearance, and location.”). 11 See
id., at 936(“Factors to consider in determining the authenticity of e-mails and instant messages include . . . (6) any other circumstances, such as conversations or events either before or after the e-mail or instant message that tend to make it more likely that this message came from a certain person.”). BUTLER — 14 she was likely going to be the principal witness against him at his upcoming trial. Similarly, Appellant had a motive to try to prevent her from testifying against him at his trial by making threats to both her and her family. The record fails to suggest anybody else who might have had a similar motive to threaten Salas and her family in the week before Appellant’s trial began.12 What’s more, another of the text messages indicated a belief that the recipient of the message had complained about the sender to the police. Specifically, this message stated: “Ur the pussy u run to the cops after u fuck me over.” Who else other than Appellant might have complained—one week before appellant’s trial—that Salas had “fuck[ed] [him] over” and “run to the cops”? A rational inference is certainly available under the circumstances that Appellant was the author of these profane and threatening text messages. Finally, it is at least implicit in Salas’ ultimate response (to the question: “How do you know that it was him?”) that she knew it was Appellant who was texting her from his phone because of a contemporaneous call she received from a person whose voice she recognized to be Appellant’s. She testified that “he had even called in between the conversations talking mess.” The timing of that phone call (“in between the conversations”) is yet another 12 See Honorable Paul W. Grimm, Lisa Yurwit Bergstrom & Melissa M. O’Toole-Loureiro, SYMPOSIUM: Keynote Address: Authentication of Social Media Evidence, 36 AM . J. TRIAL ADVOC. 433, 458 (Spring 2013) (“When all that the objecting party offers is speculation or conjecture about who, other than the putative creator, ‘could’ have created the evidence, such questions are properly left to the jury in determining how much weight, if any, to give to the evidence -- provided that the trial judge is convinced that the proponent has met the relatively low threshold required by Rule 901(a) of producing facts that would be sufficient for a reasonable jury to conclude that the evidence was created by the putative creator.”). BUTLER — 15 circumstance which made it reasonable for Salas (and hence, the jury) to conclude that Appellant was the person who controlled the phone at the time that the text messages at issue were generated. The State could have endeavored to make all of these circumstantial indicia of authenticity more explicit and less ambiguous than it did. However, under the circumstances presented in this case, we cannot agree with the court of appeals that the trial court abused its discretion to conclude that there was sufficient evidence to support a jury finding that the text messages were indeed what the State and Salas purported them to be—namely, a text- message exchange between Salas and Appellant. Appellant insists that, because Salas’s credibility was seriously impeached by the fact that she had given a statement implicating someone other than Appellant in the beating she endured,13 the trial court erred to conclude her testimony could be relied upon to establish his authorship of the text messages. We disagree. Rule 901 provides for authentication “by evidence sufficient to support a finding that the matter is what its proponent claims.” T EX. R. E VID. 901. It requires merely “sufficient” evidence “to support” authentication. It does not 13 Indeed, the trial judge observed (out of the jury’s presence): And this -- this witness is something else. She’s already made two completely different stories under oath as to what happened. *** She’s -- she’s acting rather bizarrely for a witness that’s supposed to come in that’s been beaten up. BUTLER — 16 ordinarily require the trial court to make a threshold determination of the credibility of the evidence proffered by the proponent to establish authenticity. And as particularly applied to Rule 901(b)(1), it does not contemplate that, as a condition of admissibility, the trial court should have to find that the “witness with knowledge” is necessarily worthy of belief. T EX. R. E VID. 901(b)(1). Nothing in Rule 901 suggests that a witness whose credibility has been questioned in some way is precluded by that fact from sponsoring evidence as a “witness with knowledge.”
Id. Even whena trial court judge personally harbors some doubt as to the general credibility of a sponsoring witness, a decision to admit particular evidence sponsored by that witness may not necessarily be outside the zone of reasonable disagreement.14 So long as the ultimate fact-finder could rationally choose to believe the sponsoring witness, and the witness’s testimony would establish that the item proffered “is what its proponent claims[,]” the trial court will not abuse its discretion to admit it.15 As we said in Tienda, “[t]he ultimate question whether an item of evidence is what its proponent claims [is] a question for the fact- 14
Tienda, 358 S.W.3d at 638(“If the trial court’s ruling . . . is at least ‘within the zone of reasonable disagreement,’ a reviewing court should not interfere.”). 15 We do not discount a remote possibility that, under some yet unknown set of facts, the balance of the record may so irrefutably contradict a sponsoring witness’s authentication testimony that it might be appropriate for the trial court to determine that no rational ultimate fact-finder could choose to believe the sponsoring witness’s testimony. Cf. Carmouche v. State,
10 S.W.3d 323, 331- 33 (Tex. Crim. App. 2000) (in the context of an appellate review of a motion to suppress, despite a reviewing court’s usual deference to the fact and credibility determinations of the trial court as original fact-finder, the trial court could not rationally accept the testimony of a law enforcement officer whose testimony was conclusively refuted by the videotape taken from his patrol car). This is not such a case. BUTLER — 17 finder—the jury, in a jury trial.”
Tienda, 358 S.W.3d at 638. In this case, the jury could have rationally chosen to believe Salas’s testimony about the text message exchange, despite her equivocation with respect to the offense itself. Salas explained her equivocation at trial, and a rational jury might readily have accepted her explanation as credible. The jury might also have found her testimony about the text-message exchange to be reliable and therefore concluded that Appellant was the one and only author who composed the messages and the threats contained therein.16 The trial court’s decision to admit the content of the text messages and leave the ultimate question of authenticity to the jury was well within the zone of reasonable disagreement. CONCLUSION Accordingly, we reverse the judgment of the court of appeals and remand the cause to that court to consider any other issues that were properly before the court.17 DELIVERED: April 22, 2015 PUBLISH 16 See, e.g., State v. Thompson,
777 N.W.2d 617, 626 (N.D. 2010) (“Here, the district court heard sufficient evidence from the complainant, including the circumstances of that day and his knowledge of Thompson’s cell phone number and signature on text messages, to authenticate the complainant’s testimony about the text messages he received on October 31, 2008.”); People v. Chromik,
946 N.E.2d 1039, 1056 (Ill. App. Ct. 2011) (citing Thompson to hold that text messages were properly authenticated by, among other things, the victim’s testimony). 17 Although Appellant brought only a single point of error on direct appeal, it appears he may have made more than one substantive argument. Having reversed the conviction on the basis of Appellant’s argument with respect to authentication, the court of appeals found it unnecessary to address his alternative arguments that the text messages were also inadmissible because they were simply irrelevant, or inadmissible under Rules 403 and 404(b) of the Texas Rules of Evidence. Butler,
2014 WL 1272232, at *2 & *6 n.4.
Document Info
Docket Number: NO. PD-0456-14
Citation Numbers: 459 S.W.3d 595, 2015 Tex. Crim. App. LEXIS 491
Judges: Yeary, Keller, Meyers, Keasler, Hervey, Alcala, Richardson, Newell, Johnson
Filed Date: 4/22/2015
Precedential Status: Precedential
Modified Date: 10/19/2024