Butler, Billy Dean , 2015 Tex. Crim. App. LEXIS 491 ( 2015 )


Menu:
  •            IN THE COURT OF CRIMINAL APPEALS
    OF TEXAS
    NO. PD-0456-14
    BILLY DEAN BUTLER, Appellant
    v.
    THE STATE OF TEXAS, Appellee
    ON STATE’S PETITION FOR DISCRETIONARY REVIEW
    FROM THE THIRTEENTH COURT OF APPEALS
    BEE COUNTY
    Y EARY, J., delivered the opinion of the Court in which K ELLER, P.J., and
    M EYERS, K EASLER, H ERVEY, A LCALA, R ICHARDSON and N EWELL, JJ., joined.
    J OHNSON, J., concurred in the result.
    OPINION
    Appellant was convicted of the aggravated kidnapping of his girlfriend, Ashley Salas.
    On direct appeal, he complained that the trial court admitted certain text messages into
    evidence that Appellant claimed were not properly authenticated. The State introduced the
    text messages through Salas, who testified that she recognized Appellant’s phone number
    displayed on the text messages, that the text messages were from Appellant, and that
    BUTLER — 2
    Appellant even called her from that phone number at some point during the course of their
    text messaging back and forth.
    Relying upon this Court’s opinion in Tienda v. State, 
    358 S.W.3d 633
    (Tex. Crim.
    App. 2012), the Corpus Christi Court of Appeals held that Salas’s testimony did not
    adequately serve to authenticate the text messages. Butler v. State, No. 13-12-00608-CR,
    
    2014 WL 1272232
    , at *4 (Tex. App.—Corpus Christi Mar. 27, 2014) (not designated for
    publication). Finding that the trial court erred by admitting the text messages and that their
    admission into evidence was not harmless, the court of appeals reversed Appellant’s
    conviction. 
    Id. at *4-6.
    Justice Perkes dissented. 
    Id. at *6-7.
    We granted the State’s petition
    for discretionary review in order to examine the court of appeals’s application of our holding
    in Tienda, and we now reverse.
    BACKGROUND
    Salas testified that, as of August 18 of 2011, she and Appellant had been living
    together for four or five months in a house in Beeville. That morning Salas received a phone
    call from her grandmother in nearby Kenedy, who was undergoing cancer treatment and did
    not expect to live for long. Salas decided to drive to Kenedy to join other family members
    in visiting her grandmother.
    Appellant was unhappy with Salas’s decision to visit her grandmother, and he began
    to harass her on her mobile phone, calling and texting her repeatedly from the time she left
    the house and continuing throughout the afternoon and into the evening. He accused her of
    BUTLER — 3
    using the family visit as a cover for infidelity. At about 9:00 o’clock, Salas heard her car start
    outside, and she saw Appellant drive it away. Appellant immediately sent Salas a text
    message to say that she could find her car on the side of the highway. When Salas later
    returned with her mother to Beeville, she found her car and drove it to her mother’s house,
    arriving at about 11:00 o’clock. Appellant found Salas there and apologized profusely,
    eventually persuading her to return to their home.
    On the drive back to their house, Appellant once again accused Salas of infidelity and
    began to strike her. When she tried to exit the car, he restrained her by her hair. Once back
    at the house, Appellant pushed Salas inside and demanded to know the identity of her lover.
    He tore her clothes off and began to punch her and pull her hair. He would not let her leave
    the house, and for the rest of the night he continued intermittently to interrogate, threaten,
    berate, smother, strangle, kick, and otherwise batter her until she eventually fell asleep at
    around daylight. When she awoke later that morning, Appellant acted as if he did not know
    what had happened to her. Salas’s mother came in the afternoon and called an ambulance to
    take her to the hospital. A police detective photographed the numerous abrasions and
    contusions on Salas’s face and body. Appellant was then arrested and charged with
    aggravated kidnapping.1
    Prior to trial, Salas gave a written statement to Appellant’s attorney in which she
    1
    See TEX . PENAL CODE § 20.04(a)(3), (4), (5) (“A person commits an offense if he
    intentionally or knowingly abducts another person with the intent to . . . facilitate the commission
    of a felony or . . . inflict bodily injury on him or . . . terrorize him[.]”).
    BUTLER — 4
    provided a different account of the beating she had endured. She explained that she had
    arrived back at the house by herself only to find one of Appellant’s friend’s girlfriends and
    another woman sitting on the couch. Suspecting Appellant of infidelity, she attacked the
    women but suffered the worse for the encounter. On cross-examination, Salas admitted to
    making the written statement, but she denied that it was truthful, explaining that Appellant
    had persuaded her to concoct this alternative story several months after the incident when she
    discovered she was pregnant with his child.
    The week before trial began, Appellant and Salas shared an exchange of text messages
    in which, Salas believed, Appellant threatened “to come and hurt [her] or [her] family”
    should she testify against him. The State offered State’s Exhibit 57, encompassing a number
    of photographs of the text messages taken from Salas’s Blackberry. The text messages,
    spanning a period of about eight minutes, read:2
    3612153899:            And add this cuz ur fon is taped that y u tex I’ll kill u
    myself bitch
    3612153899:            Pipe in ur mouth ho
    3612153899:            I can’t wait your teeth r going in ur throat
    Salas:                 Ok I said it once versus u sayin it over 10 times ok mmm
    wat u Don’t b a pussy tell me
    3612153899:            Snithin ass bitch ur dead I hope u lived it out cuz ur scum
    snitching bitching ass
    2
    The text messages are set forth in italics here because they were set out in their original
    form in italics.
    BUTLER — 5
    3612153899:          I’ll start with ur mono first
    Salas:                Who I can’t understand ur writing
    3612153899:          Ur the pussy u run to the cops after u fuck me over
    3612153899:          Shut up bitch
    Salas:                And wat??
    Salas:                Have some balls & take responsibly for your own
    ACTIONS
    Salas:                U did the crime
    3612153899:          They sent u in there to take pics of me
    3612153899:          U deserved it
    Salas:                I deserved wat
    3612153899:          Liers need that
    3612153899:          Lmfao
    3612153899:          Everyone counted
    The trial court admitted this exhibit over Appellant’s objection that, among other things, the
    “proper predicate” was lacking.
    The State offered the text messages after laying the following predicate through
    Salas’s testimony:
    Q.   What is [Appellant’s] phone number?
    A.   361-215-3899.
    Q.   Does that number appear on all the pages of the exhibit?
    BUTLER — 6
    A.     Yes.
    Q.     How do you know that that is [Appellant’s] telephone number?
    A.     Because that’s where he called me from and that’s what’s on the
    same exhibit in front of me.
    Q.     You’ve read the text messages in the exhibit?
    A.     Yes.
    Q.     Who sen[t] you those text messages?
    A.     He did.
    Q.     How do you know that it was him?
    A.     Because he was the one texting me back and forth and he had
    even called in between the conversations talking mess.
    The jury found Appellant guilty. Appellant pled true to one enhancement count for a prior
    aggravated assault, and the trial court assessed his punishment at fifty years’ confinement in
    the penitentiary and a fine of $10,000.
    On appeal, the court of appeals found the State’s predicate inadequate to establish that
    Appellant was the author of the text messages attributed to number 361-215-3899. Even
    Salas’s testimony that Appellant had called her “in between the conversations talking mess”
    failed, in the eyes of the court of appeals, to “provide a sufficient link between [Appellant]
    and the text messages to warrant the ultimate submission of the text message transcript to the
    jury.” Butler, 
    2014 WL 1272232
    , at * 4. The court of appeals elaborated:
    If the State sought to authenticate the text messages solely through Salas,
    rather than through the cellular phone company or any other means, it could
    BUTLER — 7
    have done so by further developing Salas’s testimony to include other
    circumstantial evidence that would have linked [Appellant] to the text
    messages or to the telephone that was used to send the messages, such as
    whether [Appellant] identified himself, how she knew it was [Appellant]
    calling, or how she recognized his voice.
    
    Id. THE LAW
    OF AUTHENTICATION
    “The requirement of authentication or identification as a condition precedent to
    admissibility is satisfied by evidence sufficient to support a finding that the matter in question
    is what its proponent claims.” T EX. R. E VID. 901(a). In a jury trial, it is the jury’s role
    ultimately to determine whether an item of evidence is indeed what its proponent claims; the
    trial court need only make the preliminary determination that the proponent of the item has
    supplied facts sufficient to support a reasonable jury determination that the proffered
    evidence is authentic. 
    Tienda, 358 S.W.3d at 638
    . The trial court’s determination of whether
    the proponent has met this threshold requirement is subject to appellate review for an abuse
    of discretion and should not be countermanded so long as it is within the zone of reasonable
    disagreement. 
    Id. This has
    been aptly described as a “liberal standard of admissibility.”
    Cathy Cochran, T EXAS R ULES OF E VIDENCE H ANDBOOK 922 (7th ed. 2007-08).
    CELL PHONE TEXT MESSAGES
    Text messages are “short messages [sent] over a cellular phone network, typically by
    means of a short message service (SMS).” Steven Goode, The Admissibility of Electronic
    Evidence, 29 R EV. L ITIG . 1, 16 n.66 (Fall 2009). As with other types of evidence, text
    BUTLER — 8
    messages may be authenticated by “evidence sufficient to support a finding that the matter
    is what its proponent claims.” T EX. R. E VID. 901(a). This can be accomplished in myriad
    ways, depending upon the unique facts and circumstances of each case, including through
    the testimony of a witness with knowledge or through evidence showing distinctive
    characteristics. T EX. R. E VID. 901(b)(1) (testimony of a witness with knowledge); T EX. R.
    E VID. 901(b)(4) (distinctive characteristics and the like); see, also 
    Goode, supra, at 16-19
    ,
    31-33.
    A witness might have “knowledge” of the authorship of a text message for a number
    of reasons. One reason might be that the witness is the actual author of the text message.
    
    Tienda, 358 S.W.3d at 640
    . Another reason might be that the witness personally observed
    the purported author actually type and/or send the message. 
    Id. A witness
    might also claim
    to have knowledge that a text message came from a phone number known to be associated
    with the purported sender. The association of a cell-phone number with a particular
    individual might suggest that the owner or user of that number may be the sender of a text
    message. Indeed, the suggestion may be quite strong. Unlike so-called “land lines,”
    commonly utilized by an entire household, cell phones tend to be personal and user-specific.3
    3
    Both the United States Supreme Court and this Court have lately recognized that cell phone
    users can have a reasonable expectation of privacy in the content of their cell phones, noting the
    plethora of highly personal information that may be found there—suggesting a certain unique
    relationship between owner and cell phone. See Riley v. California, 
    134 S. Ct. 2473
    , 2489 (2014)
    (“The term ‘cell phone’ is itself misleading shorthand; many of these devices are in fact
    minicomputers that also happen to have the capacity to be used as a telephone. They could just as
    easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries,
    albums, televisions, maps, or newspapers.”); State v. Granville, 
    423 S.W.3d 399
    , 417 n.66 (Tex.
    BUTLER — 9
    Still, evidence that merely shows the association of a phone number with a purported
    sender—alone—might be too tenuous. We have advised caution in the event a trial court
    finds that this is the only fact underlying a witness’s knowledge linking a text message to the
    purported author.4 A logical gap may still exist—a gap that we can recognize by reason and
    common sense—because, as we recognized in Tienda, “cell phones can be purloined,” 5 and
    a cell-phone number does not necessarily establish the identity of the user at a particular
    moment in time with the same definitiveness that fingerprints, signatures, photographs, or
    DNA may establish the identity of the perpetrator of a crime.
    In isolation, a cell phone number is in some respects similar to a return address on a
    letter. If the return address is the location where the purported author happens to live, it may
    suggest that the person who lives at the address is the author of the letter. Or it might not—at
    least not on its own, if multiple people happen to live at or have access to that same address.
    But a letter bearing the return address of a purported author, combined with other
    Crim. App. 2014) (noting the different relationship people have with their phones than they did in
    the past). Along the way, the Supreme Court remarked that cell phones “place vast quantities of
    personal information literally in the hands of individuals” and “are now such a pervasive and
    insistent part of daily life that the proverbial visitor from Mars might conclude they were an
    important feature of human anatomy.” 
    Riley, 134 S. Ct. at 2484-85
    . “Now it is the person who is not
    carrying a cell phone, with all that it contains, who is the exception. According to one poll, nearly
    three-quarters of smart phone users report being within five feet of their phones most of the time,
    with 12 % admitting that they even use their phones in the shower.” 
    Id. at 2490.
    Any parent or
    teacher can confirm how difficult it can be to separate a teenager from his cell phone.
    4
    Mindful that “cell phones can be purloined[,]” we observed in Tienda that, the fact “that
    a text message emanates from a cell phone number assigned to the purported author . . . without
    more,” might be “[in]sufficient to support a finding of 
    authenticity.” 358 S.W.3d at 641-42
    .
    5
    
    Id. at 641.
                                                                                          BUTLER — 10
    circumstances including its appearance and contents, may be sufficient to authenticate a letter
    as having been sent by the person purported to be its author.6
    As with evidence in general, authenticating evidence may be direct or circumstantial.7
    6
    See, e.g., United States v. Thompson, 
    449 F.3d 267
    , 274-275 (1st Cir. 2006)(finding an
    anonymous letter properly admitted as an admission of the defendant where the sponsoring witness
    testified that the return address was known to him to be the address of the defendant and other
    circumstances tended to suggest that the letter had been written by the defendant); State v. Brown,
    
    783 N.E.2d 539
    , 548-549 (Ohio. App. 2002) (finding a letter properly authenticated as having been
    authored by the defendant after observing that the return address on the letter was the same county
    jail where the defendant was incarcerated, along with a number of other factors, such as the date the
    letter was written, the fact that it was addressed to the judge presiding over the defendant’s trial, the
    fact that it mentioned that a hearing that was scheduled in the case did not take place when it was
    scheduled, the fact that it discussed the defendant’s history in the correctional system, and the fact
    that it was signed with the defendant’s name).
    As the Tyler Court of Appeals has also observed:
    Another traditional method of authentication permitted by Rule 901 is the
    “reply-letter doctrine.” Varkonyi v. State, 
    276 S.W.3d 27
    , 35 (Tex. App.—El Paso
    2008, pet. ref’d) (citing Cathy Cochran, TEXAS RULES OF EVIDENCE HANDBOOK,
    Article IX, at 915 (6th ed. 2005). Under this doctrine, a letter received in the due
    course of mail purportedly in answer to another letter is prima facie genuine and
    admissible without further proof of authenticity. 
    Id. This doctrine
    applies to e-mails.
    
    Id. Therefore, an
    e-mail is sufficiently authenticated when a person responds to an
    e-mail that was sent to the person’s e-mail address. 
    Id. This rule
    has been applied to
    other types of messages by analogy. See, e.g., People v. Pierre, 
    41 A.D.3d 289
    , 
    838 N.Y.S.2d 546
    , 548-49 (N.Y.App.Div. 2007) (applied to instant message where
    person sent instant message to screen name and received reply, content on reply
    supported conclusion that message was sent by defendant, and no evidence was
    admitted to show anyone else had motive or opportunity to impersonate defendant
    by using his screen name).
    Manuel v. State, 
    357 S.W.3d 66
    , 75-76 (Tex. App.—Tyler 2011, pet. ref’d).
    7
    See Wallace v. State, 
    782 S.W.2d 854
    , 858 (Tex. Crim. App. 1989) (finding that “the
    predicate for admission of audio tapes may be proven with circumstantial evidence”); and see also,
    e.g., United States v. Haldeman, 
    559 F.2d 31
    , 107 (D.C. Cir. 1976) (en banc) (“Although the
    evidence bearing on admissibility should be carefully scrutinized to see if it measures up . . . it may
    be circumstantial or direct, real or testimonial, and need not conform to any particular model.”).
    BUTLER — 11
    In cases where a sponsoring witness may testify to an association between a cell-phone
    number and a purported author, other evidence may be available that might bridge the logical
    gap and permit a proper inference that the purported author sent the message. The other
    evidence might include the message’s “appearance, contents, substance, internal patterns, or
    other distinctive characteristics,” which considered in conjunction with other circumstances
    support a conclusion that a message indeed emanated from the purported author. T EX. R.
    E VID. 901(b)(1).
    For example, a cellular-phone company may provide records to show that a text
    message originated from the purported sender’s phone “under circumstances in which it is
    reasonable to believe that only the purported sender would have had access to the . . . cell
    phone.” 
    Tienda, 358 S.W.3d at 640
    . In other cases, the purported sender of a message may
    respond in such a way as to indicate his or her authorship of the message, such as by calling
    the recipient to confirm receipt of the message. 
    Id. at 641.
    And in still other cases, the content
    and/or context of a particular exchange of messages may create an inference supporting the
    conclusion that it was in fact the purported author who sent them. See 
    Id. at 641
    & n.34.8
    ANALYSIS
    In the instant case, Salas testified that the text messages at issue emanated from phone
    number 361-215-3899. She had personal knowledge that this was Appellant’s phone number,
    8
    See also, Massimo v. State, 
    144 S.W.3d 210
    (Tex. App. - Forth Worth 2004, no pet.) (in an
    electronic communications harassment case, addressing both circumstances and content related
    factors, such as the fact that the offending email was sent shortly after an altercation between the
    defendant and the victim and referenced the altercation).
    BUTLER — 12
    presumably from past experience. The court of appeals believed that the State’s predicate
    failed to establish any more than the bare fact that the text messages emanated from
    Appellant’s personal phone. Butler, 
    2014 WL 1272232
    *4 (“Salas’s testimony states that she
    had personal knowledge that it was Butler’s telephone number because he had called her
    from that number before. This testimony, without more, is exactly the type of evidence that
    the Tienda Court warned about in authenticating text messages.”). It concluded there was
    insufficient accompanying indicia of Appellant’s authorship. 
    Id. In our
    view, however, there
    was other evidence that bridged the gap and supplied the necessary predicate.
    Asked how she knew it was Appellant’s number, Salas replied: “[b]ecause that’s
    where he called me from[.]” But how did she know that it was Appellant who was using that
    phone to send her the particular text messages at issue in this case? According to Salas,
    “Because he was the one texting [her] back and forth and he had even called in between the
    conversations talking mess.”9 Although Salas’s responses are not without ambiguity, a
    rational jury could conclude that Salas recognized the texts to be coming from Appellant on
    this occasion (and not someone else who might have purloined his phone) because: (1) he
    had called her from that number on past occasions; (2) the content and context of the text
    messages convinced her that the messages were from him; and (3) he actually called her from
    that same phone number during the course of that very text message exchange.
    Aside from the fact that appellant had called Salas in the past from phone number
    9
    Emphasis added.
    BUTLER — 13
    361-215-3899, the content and context of the text messages themselves constituted additional
    circumstantial evidence of the authenticity of the messages. See T EX. R. E VID. 901(b)(4)
    (distinctive characteristics and the like). When considering the admissibility of text messages,
    just as when considering the admissibility of letters, emails, instant messages, and other
    similar written forms of communications, courts must be especially cognizant that such
    matters may sometimes be authenticated by distinctive characteristics found within the
    writings themselves and by comparative reference from those characteristics to other
    circumstances shown to exist by the evidence presented at trial.10 Conversations and events
    that precede or follow the communications at issue, when identified or referred to within the
    written communication, can provide contextual evidence demonstrating the authenticity of
    such communications.11
    Take, for example, the text-message exchange in this case, which occurred the week
    before Appellant’s trial began. One particular text message sent from Appellant’s phone
    during the exchange stated: “Snithin ass bitch ur dead I hope u lived it out cuz ur scum
    snitching bitching ass.” Appellant certainly had a reason to consider Salas a “snitch” since
    10
    Cathy Cochran, TEXAS RULES OF EVIDENCE HANDBOOK 934 (7th ed. 2007-08) (“[T]he
    language of the rule . . . obviously is aimed at permitting items to be authenticated by distinctive
    circumstantial evidence, [and t]hus, letters and other items may be authenticated by distinctive
    characteristics such as the document’s contents, appearance, and location.”).
    11
    See 
    id., at 936
    (“Factors to consider in determining the authenticity of e-mails and instant
    messages include . . . (6) any other circumstances, such as conversations or events either before or
    after the e-mail or instant message that tend to make it more likely that this message came from a
    certain person.”).
    BUTLER — 14
    she was likely going to be the principal witness against him at his upcoming trial. Similarly,
    Appellant had a motive to try to prevent her from testifying against him at his trial by making
    threats to both her and her family. The record fails to suggest anybody else who might have
    had a similar motive to threaten Salas and her family in the week before Appellant’s trial
    began.12
    What’s more, another of the text messages indicated a belief that the recipient of the
    message had complained about the sender to the police. Specifically, this message stated: “Ur
    the pussy u run to the cops after u fuck me over.” Who else other than Appellant might have
    complained—one week before appellant’s trial—that Salas had “fuck[ed] [him] over” and
    “run to the cops”? A rational inference is certainly available under the circumstances that
    Appellant was the author of these profane and threatening text messages.
    Finally, it is at least implicit in Salas’ ultimate response (to the question: “How do you
    know that it was him?”) that she knew it was Appellant who was texting her from his phone
    because of a contemporaneous call she received from a person whose voice she recognized
    to be Appellant’s. She testified that “he had even called in between the conversations talking
    mess.” The timing of that phone call (“in between the conversations”) is yet another
    12
    See Honorable Paul W. Grimm, Lisa Yurwit Bergstrom & Melissa M. O’Toole-Loureiro,
    SYMPOSIUM: Keynote Address: Authentication of Social Media Evidence, 36 AM . J. TRIAL ADVOC.
    433, 458 (Spring 2013) (“When all that the objecting party offers is speculation or conjecture about
    who, other than the putative creator, ‘could’ have created the evidence, such questions are properly
    left to the jury in determining how much weight, if any, to give to the evidence -- provided that the
    trial judge is convinced that the proponent has met the relatively low threshold required by Rule
    901(a) of producing facts that would be sufficient for a reasonable jury to conclude that the evidence
    was created by the putative creator.”).
    BUTLER — 15
    circumstance which made it reasonable for Salas (and hence, the jury) to conclude that
    Appellant was the person who controlled the phone at the time that the text messages at issue
    were generated.
    The State could have endeavored to make all of these circumstantial indicia of
    authenticity more explicit and less ambiguous than it did. However, under the circumstances
    presented in this case, we cannot agree with the court of appeals that the trial court abused
    its discretion to conclude that there was sufficient evidence to support a jury finding that the
    text messages were indeed what the State and Salas purported them to be—namely, a text-
    message exchange between Salas and Appellant.
    Appellant insists that, because Salas’s credibility was seriously impeached by the fact
    that she had given a statement implicating someone other than Appellant in the beating she
    endured,13 the trial court erred to conclude her testimony could be relied upon to establish his
    authorship of the text messages. We disagree. Rule 901 provides for authentication “by
    evidence sufficient to support a finding that the matter is what its proponent claims.” T EX.
    R. E VID. 901. It requires merely “sufficient” evidence “to support” authentication. It does not
    13
    Indeed, the trial judge observed (out of the jury’s presence):
    And this -- this witness is something else.
    She’s already made two completely different stories under oath as to what
    happened.
    ***
    She’s -- she’s acting rather bizarrely for a witness that’s supposed to come in
    that’s been beaten up.
    BUTLER — 16
    ordinarily require the trial court to make a threshold determination of the credibility of the
    evidence proffered by the proponent to establish authenticity. And as particularly applied to
    Rule 901(b)(1), it does not contemplate that, as a condition of admissibility, the trial court
    should have to find that the “witness with knowledge” is necessarily worthy of belief. T EX.
    R. E VID. 901(b)(1).
    Nothing in Rule 901 suggests that a witness whose credibility has been questioned in
    some way is precluded by that fact from sponsoring evidence as a “witness with knowledge.”
    
    Id. Even when
    a trial court judge personally harbors some doubt as to the general credibility
    of a sponsoring witness, a decision to admit particular evidence sponsored by that witness
    may not necessarily be outside the zone of reasonable disagreement.14 So long as the ultimate
    fact-finder could rationally choose to believe the sponsoring witness, and the witness’s
    testimony would establish that the item proffered “is what its proponent claims[,]” the trial
    court will not abuse its discretion to admit it.15 As we said in Tienda, “[t]he ultimate question
    whether an item of evidence is what its proponent claims [is] a question for the fact-
    14
    
    Tienda, 358 S.W.3d at 638
    (“If the trial court’s ruling . . . is at least ‘within the zone of
    reasonable disagreement,’ a reviewing court should not interfere.”).
    15
    We do not discount a remote possibility that, under some yet unknown set of facts, the
    balance of the record may so irrefutably contradict a sponsoring witness’s authentication testimony
    that it might be appropriate for the trial court to determine that no rational ultimate fact-finder could
    choose to believe the sponsoring witness’s testimony. Cf. Carmouche v. State, 
    10 S.W.3d 323
    , 331-
    33 (Tex. Crim. App. 2000) (in the context of an appellate review of a motion to suppress, despite
    a reviewing court’s usual deference to the fact and credibility determinations of the trial court as
    original fact-finder, the trial court could not rationally accept the testimony of a law enforcement
    officer whose testimony was conclusively refuted by the videotape taken from his patrol car). This
    is not such a case.
    BUTLER — 17
    finder—the jury, in a jury trial.” 
    Tienda, 358 S.W.3d at 638
    .
    In this case, the jury could have rationally chosen to believe Salas’s testimony about
    the text message exchange, despite her equivocation with respect to the offense itself. Salas
    explained her equivocation at trial, and a rational jury might readily have accepted her
    explanation as credible. The jury might also have found her testimony about the text-message
    exchange to be reliable and therefore concluded that Appellant was the one and only author
    who composed the messages and the threats contained therein.16 The trial court’s decision
    to admit the content of the text messages and leave the ultimate question of authenticity to
    the jury was well within the zone of reasonable disagreement.
    CONCLUSION
    Accordingly, we reverse the judgment of the court of appeals and remand the cause
    to that court to consider any other issues that were properly before the court.17
    DELIVERED:             April 22, 2015
    PUBLISH
    16
    See, e.g., State v. Thompson, 
    777 N.W.2d 617
    , 626 (N.D. 2010) (“Here, the district court
    heard sufficient evidence from the complainant, including the circumstances of that day and his
    knowledge of Thompson’s cell phone number and signature on text messages, to authenticate the
    complainant’s testimony about the text messages he received on October 31, 2008.”); People v.
    Chromik, 
    946 N.E.2d 1039
    , 1056 (Ill. App. Ct. 2011) (citing Thompson to hold that text messages
    were properly authenticated by, among other things, the victim’s testimony).
    17
    Although Appellant brought only a single point of error on direct appeal, it appears he may
    have made more than one substantive argument. Having reversed the conviction on the basis of
    Appellant’s argument with respect to authentication, the court of appeals found it unnecessary to
    address his alternative arguments that the text messages were also inadmissible because they were
    simply irrelevant, or inadmissible under Rules 403 and 404(b) of the Texas Rules of Evidence.
    Butler, 
    2014 WL 1272232
    , at *2 & *6 n.4.