KENDRIA WALKER v. TAYLA HARLEY-ANDERSON ( 2020 )


Menu:
  •        DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA
    FOURTH DISTRICT
    KENDRIA WALKER,
    Appellant,
    v.
    TAYLA HARLEY-ANDERSON,
    Appellee.
    No. 4D19-2216
    [September 9, 2020]
    Appeal from the Circuit Court for the Seventeenth Judicial Circuit,
    Broward County; Michael G. Kaplan, Judge; L.T. Case No. DVCE 19-
    004177.
    Kendria Walker, Coral Springs, pro se.
    No appearance for appellee.
    WARNER, J.
    In this appeal of a final judgment of injunction for protection against
    stalking, the appellant contends that the trial court erred by admitting text
    messages showing threats made against the appellee, the sole evidence to
    support the entry of the injunction. We hold that the messages were not
    sufficiently authenticated and should not have been considered by the trial
    court. Therefore, we reverse.
    Appellee filed a petition for injunction for protection against stalking.
    In it she contended that appellant had sent her multiple text messages
    threatening her and her family. The court entered an ex parte temporary
    injunction. Appellant then filed a counterpetition against appellee, also
    alleging stalking through multiple text messages. The court proceeded to
    a final hearing on the petition and counter-petition.
    At the final hearing, appellee testified that she did not personally know
    appellant, but she knew that appellant had a relationship with appellee’s
    nephew, which apparently had fallen apart. As a result, appellee stated
    that she received twenty harassing messages over a period of about six
    months and then fifteen in one day, threatening violence against her and
    her family.
    Appellee offered a series of ten pages of text messages into evidence.
    Appellant objected, contending that she did not recognize the telephone
    numbers from which the messages were sent. Over objection, the court
    admitted the messages. The trial court asked appellee how she knew that
    the messages were from appellant. After much back and forth, appellee
    said she knew the messages were from appellant because of the content of
    the messages, that they were intended to harass her, and appellant had
    stated that she would harass appellee’s nephew’s family.
    The court then asked appellant if she sent the text messages. Appellant
    denied sending the text messages and testified that she did not know who
    sent them. She did not recognize the phone numbers. Her phone records
    were entered as an exhibit. The phone numbers on the texts to appellee
    did not match the phone number in appellant’s record. Appellant then
    presented the evidence of threatening text messages that she had received.
    Like appellee, she did not specifically know that the text messages were
    from appellee but concluded that, based on their content, they had to be
    from someone in the nephew’s family.
    After the presentation of evidence, the court acknowledged in its ruling
    that the texts sent to both appellant and appellee were threatening and
    would promote fear and anxiety in the receiver. As to appellant’s
    counterpetition, the court found that appellant candidly acknowledged
    that she did not know specifically who sent the messages. Therefore, the
    court could not enter a final judgment against appellee on the counter
    petition. As to appellee’s petition, the court found that the texts most likely
    came from appellant “because there’s no alternative that’s been provided.
    So, I don’t know who else would have done that and that may be just in
    part given the nature of the relationships here.” The court then entered a
    final judgment in favor of appellee, and appellant now appeals that
    judgment.
    Appellant argues that the court erred in admitting the text messages,
    because they were not authenticated.              Review of a trial court's
    determination regarding the authentication of evidence is for an abuse of
    discretion. Mullens v. State, 
    197 So. 3d 16
    , 25 (Fla. 2016). However, a
    trial court’s discretion is limited by the rules of evidence. Nardone v. State,
    
    798 So. 2d 870
    , 874 (Fla. 4th DCA 2001).
    Section 90.901, Florida Statutes (2019) provides: “[a]uthentication or
    identification of evidence is required as a condition precedent to its
    2
    admissibility. The requirements of this section are satisfied by evidence
    sufficient to support a finding that the matter in question is what its
    proponent claims.”
    “In determining whether the evidence submitted is sufficient for this
    purpose [of authentication], the trial judge must evaluate each instance
    on its own merits, there being no specific list of requirements for such a
    determination.” Justus v. State, 
    438 So. 2d 358
    , 365 (Fla. 1983);
    Symonette v. State, 
    100 So. 3d 180
    , 183 (Fla. 4th DCA 2012). “Evidence
    may be authenticated by appearance, content, substance, internal
    patterns, or other distinctive characteristics taken in conjunction with the
    circumstances. In addition, the evidence may be authenticated either by
    using extrinsic evidence, or by showing that it meets the requirements for
    self-authentication.” Jackson v. State, 
    979 So. 2d 1153
    , 1154 (Fla. 5th
    DCA 2008).
    A few cases involve the authentication of text messages. In Symonette,
    for instance, we addressed the question of whether text messages from the
    defendant’s phone were unauthentic hearsay. 
    100 So. 3d at 183
    . In that
    case, a detective recovered the cell phone from the defendant and then a
    search warrant was executed on the defendant’s phone which revealed the
    text messages. The co-defendant driver testified that she texted the
    defendant while they were sitting next to each other and then continued
    to text the defendant later after they were separated. The driver identified
    the text messages between her and the defendant and testified as to the
    context of the text messages. This court concluded that “[t]he extrinsic
    evidence offered by the State, as well as the circumstances surrounding
    the procurement of the phone and pictures, is sufficient to show that the
    matter in question is genuinely what the State claims – pictures of the
    defendant’s text messages to the driver.” 
    Id.
     Thus, the photographs of the
    text messages were sufficiently authenticated to be admissible at the
    murder trial. In State v. Lumarque, 
    44 So. 3d 171
     (Fla. 3d DCA 2010), the
    court held that text messages and photos were authenticated, because
    those images were found on the defendant’s phone which was seized
    pursuant to a search and extracted from it by a forensic expert who
    testified. Unlike the foregoing cases, appellant’s cell phone was not
    examined, and the appellee did not even testify that she recognized
    appellant’s phone number.
    “Testimony that a person received a text or email from another is not
    sufficient, by itself, to authenticate the identity of the sender.” Charles W.
    Ehrhardt, 1 West’s Fla. Practice Series section 901.1a (2020 ed.). Other
    factors can circumstantially authenticate the text. 
    Id.
     See, e.g., United
    States v. Siddiqui, 
    235 F. 3d 1318
    , 1322 (11th Cir. 2000) (finding that a
    3
    number of factors supported the authenticity of the email, that the address
    bore the defendant’s address and when the witness replied to the email
    the “reply function” of the witness’s email system automatically put the
    defendant’s address as the sender; the context of the email showed details
    of the defendant’s conduct and an apology that correlated to the
    defendant’s conduct; and the email referred to the author by defendant’s
    nickname and the witnesses confirmed that in phone conversations the
    defendant made the same requests as in the emails); Pavlovich v. State, 
    6 N.E. 3d 969
    , 978-79 (Ind. Ct. App. 2014) (finding text messages had been
    properly authenticated by circumstantial evidence by a witness who
    confirmed that the 2662 number was used to arrange a meeting with the
    defendant; that the witness recognized the defendant’s voice on the
    outgoing voicemail; and that the messages from the 2662 number
    indicated familiarity with the witness’ escort business, the prior meeting
    between the witness and defendant and their prior discussion); compare
    Commonwealth v. Koch, 
    39 A. 3d 996
    , 1005 (Pa. Super. Ct. 2011) (finding
    the trial court erred in admitting text messages into evidence; there was
    no testimony from the persons who sent or received the text messages and
    no contextual clues).
    “Circumstances recognized as sufficient to meet the test of authenticity
    include when a letter is written disclosing information which is likely
    known only to the purported author.” State v. Love, 
    691 So. 2d 620
    , 621
    (Fla. 5th DCA 1997) (citing ITT Real Estate Equities v. Chandler Ins. Agency,
    Inc., 
    617 So. 2d 750
    , 751 (Fla. 4th DCA 1993)). In Love, the letter
    “contained specific details concerning the crime, the relationship between
    the co-defendants, incriminating evidence, and a proposed plan to
    fabricate testimony. This information was likely known only by the three
    co-defendants.” 
    Id.
     The court cited other details in the letter and
    concluded that the trial court erred by excluding the letter because there
    was prima facie evidence that the defendant or someone acting as his
    scribe wrote the letter.
    In Gosciminski v. State, 
    132 So. 3d 678
     (Fla. 2013), the supreme court
    addressed a question of authentication of a receipt. In that case, the trial
    court found a Walgreens receipt admissible because it was printed on
    paper with a distinctive green Walgreens logo watermark, the Walgreens’
    return policy was printed on the back of the receipt; the front of the receipt
    showed no evidence of tampering; and the time and date stamp matched
    the account of the purchase. 
    Id. at 700
    . “These distinctive characteristics
    of the receipt in conjunction with the other circumstances, i.e., the trail of
    documentary evidence that supported [the witness’s] testimony . . . were
    adequate authentication.” 
    Id.
     Thus, the supreme court concluded the
    receipt was properly admitted. “[E]vidence may be authenticated by
    4
    examination of its appearance, contents, substance, internal patterns, or
    other distinctive characteristics taken in conjunction with the
    circumstances.” 
    Id.
     (citing Coday v. State, 
    946 So. 2d 988
    , 1000 (Fla.
    2006)).
    In this case, there was no direct evidence that the messages were sent
    by appellant. No one saw or heard appellant send the messages. The
    messages appear to be from different phone numbers, and none of the
    origination numbers match the phone number of appellant, according to
    her phone bill placed into evidence. The trial court did not analyze the
    content of the messages but simply found no other explanation as to who
    sent them. This is insufficient, particularly after our review of the
    messages themselves.
    Outside of a few references in the messages to the name of appellant’s
    boyfriend, the nephew of the appellee, and a reference to “aunty” there are
    no clues as to who sent the messages or what they are about. The discord
    between the nephew and appellant appears to be well known between the
    two families. The first five pages of texts offered by appellee are dated
    January 1, and appellee testified that the year was 2019. These texts
    purportedly come from three different phone numbers. None of the phone
    numbers match the phone numbers on appellant’s phone bill. Appellee
    did not testify that she recognized any of the numbers on the texts. Their
    substance generally refers to the nephew and threats to kill him but is
    populated with the pronoun “we” and not “I” indicating that multiple
    people are involved in these threats. One of the messages refers to
    appellant in the third person, indicating that it was sent from someone
    other than appellant.
    As noted by the court, the last five pages of texts look different than the
    first five pages of texts. None of these texts are dated. Only the first two
    pages of the photographs of the text messages have origination phone
    numbers. Neither of the origination phone numbers match appellant’s
    phone numbers on her bill. The remaining pages of text messages show
    only a day of the week and time, no origination phone number. In this
    group of texts, there is no mention of the nephew or of details known only
    to the appellant. In fact, one of the messages seems to convey that the
    sender has been wronged by a woman, not the nephew.
    To summarize, the contextual clues in the texts are insufficient to
    provide authentication that these texts were sent by appellant. The
    messages do not contain any information which would have been known
    only to the appellant. The direct evidence is insufficient as well. The
    messages do not show appellant’s telephone number as sender.
    5
    As the proponent of admission of the evidence, it was the appellee’s
    burden to prove the authenticity of the text messages as being sent by
    appellant. Thus, the trial court’s rationale that no other explanation for
    the messages was offered placed on appellant the obligation of disproving
    their authenticity. This was error.
    “[A]uthentication for the purpose of admission is a relatively low
    threshold that only requires a prima facie showing that the proffered
    evidence is authentic[.]” Mullens, 197 So. 3d at 25. Even so, the instant
    case lacks the “distinctive characteristics” of Gosciminski or the contextual
    clues of Love. The text messages were not obtained pursuant to a search
    warrant from appellant’s phone, and no circumstantial support shows
    appellant to be the author of the texts as in Symonette or Lumarque.
    The appellee failed to make a prima facie showing of authenticity, i.e.
    that the text messages were what appellee claimed – messages authored
    by appellant. Accordingly, the trial court abused its discretion in
    admitting the text messages into evidence.
    Because the text messages were the sole evidence to support the final
    judgment of injunction, and appellee has not contested this appeal, we
    conclude that we should reverse for vacation of the judgment and
    dismissal of the petition. Appellee should not get the proverbial “second
    bite at the apple” under the circumstances of this case. See Morales v.
    Fifth Third Bank, 
    275 So. 3d 197
     (Fla. 4th DCA 2019)(adopting the analysis
    of Tracey v. Wells Fargo, N.A., 
    264 So. 3d 1152
     (Fla. 2d DCA 2019) (“[W]hen
    fashioning remand for a civil appeal where the party with the burden of
    proof fails to sufficiently plead the claim it presents at trial or to establish
    a basis in admissible evidence for a claim at trial, an appellate panel may
    exercise some level of equitable discretion to consider the circumstances
    of the particular case. This discretion is bounded both by the substantive
    relief sought within the appeal and the strong preference for finality of trial
    proceedings.”)
    Reversed and remanded with directions to dismiss the petition.
    GROSS and GERBER, JJ., concur.
    *         *         *
    Not final until disposition of timely filed motion for rehearing.
    6