Site icon Thomas J. Daley

CROSSOVER: Accessing an Ex‑Spouse’s Stored Voicemails Can Be ‘Interception’: Criminal Wiretap Construction with Direct Family‑Law Leverage

New Texas Court of Appeals Opinion - Analyzed for Family Law Attorneys

Riley v. State, 13-23-00359-CR, March 16, 2026.

On appeal from the 23rd District Court, Wharton County, Texas.

Synopsis

The Thirteenth Court of Appeals held that accessing an ex-spouse’s stored voicemail messages—using a known passcode and without consent—can constitute an “interception” of a wire/electronic communication under Texas Penal Code § 16.02. The court rejected the defense attempt to narrow “interception” to only contemporaneous acquisition during transmission, affirming that post-delivery acquisition from storage may still satisfy the statute.

Relevance to Family Law

For Texas family-law litigators, this opinion is not academic—it’s a litigation accelerant. It reframes “I just checked her voicemail” (or “I knew the passcode”) from a credibility issue into potential felony conduct that can drive temporary-orders outcomes (exclusive use, protective orders, supervised visitation, injunctions against digital access), discovery posture (forensic imaging and spoliation framing), and settlement leverage (risk management for the accused party, and safety narrative for the targeted party). It also supplies a clean evidentiary theme: once the victim changed the voicemail code, the “mysterious knowledge” stopped—supporting causation, intent, and the need for injunctive relief.

Case Summary

Fact Summary

The appellant and complainant were divorced and shared children. The complainant testified that during the marriage her phone was not locked because appellant did not want it locked; post-divorce she obtained a new iPhone, changed service providers, changed passwords, and began using device locks—yet did not change her voicemail passcode, which was tied to a personal number the appellant knew.

In late 2018 and early 2019, she received voicemails from dating services (including Elite Match Making and It’s Just Lunch). Shortly after the voicemails arrived, appellant sent text messages referencing the services and even the timing/location of appointments—information she had not otherwise shared. She later recorded a call in which appellant admitted he had “checked” her voicemails, coupled the admission with coercive language discouraging legal action, and claimed he had her password “all [his] life.” After she changed the voicemail passcode, the targeted conduct stopped.

The State charged two counts alleging appellant intentionally intercepted the complainant’s voicemail by using her phone password and voicemail passcode without her knowledge or consent. Appellant moved to quash, arguing stored voicemail cannot be “intercepted” because interception requires contemporaneous capture during transmission. The trial court denied the motion. The jury convicted on both counts, and the appellate court affirmed as modified.

Issues Decided

Rules Applied

Application

The appellant’s core move was to characterize voicemail as a “stored communication,” then argue that stored communications can only be accessed, not intercepted, because interception supposedly requires capturing the communication in flight. The court rejected that narrowing construction. It treated the unauthorized acquisition of the voicemail contents—achieved by using the victim’s credentials/passcode—as the actionable “interception” for purposes of § 16.02.

Equally important for practitioners reading between the lines: the case was tried with classic “knowledge-of-private-information” proof. The complainant received third-party voicemails with sensitive details; appellant then demonstrated knowledge of those details and later admitted he accessed voicemails. Once the passcode changed, the pattern stopped. That narrative gave the State a straight-line theory of unauthorized acquisition, intent, and lack of consent—without requiring technical testimony about packet capture, carrier-level interception, or real-time monitoring.

Holding

The court held that the unauthorized acquisition of stored electronic or wire communications, including voicemail messages, can constitute an “interception” under Texas Penal Code § 16.02 when obtained without the user’s knowledge or consent using a passcode. The court expressly rejected the argument that interception requires contemporaneous acquisition during transmission, affirming the conviction theory premised on accessing messages in storage.

Practical Application

Family-law litigators should treat Riley as a ready-made bridge between digital misconduct and courtroom remedies—particularly at temporary orders, in protective-order litigation, and when framing best-interest and coercive-control narratives.

Checklists

Preserve and Package the “Voicemail Interception” Proof

Temporary Orders and Protective-Order Pleading Targets (Digital Misconduct)

Defensive Checklist (If Your Client Is Accused)

Decree / Temporary Orders Language to Prevent Recurrence

Citation

Riley v. State, No. 13-23-00359-CR (Tex. App.—Corpus Christi–Edinburg Mar. 16, 2026).

Full Opinion

Read the full opinion here

Family Law Crossover

Although Riley is a criminal wiretap prosecution, the holding can be weaponized (and defended against) in divorce and SAPCR litigation because it upgrades common “digital snooping” fact patterns into a legally cognizable theory of unlawful interception. For the moving party, it supports fast, focused relief: you are no longer arguing abstract “privacy”—you are arguing that the opposing party’s access to stored voicemails may meet the statutory concept of interception, which strengthens (1) the immediacy of temporary restraining/injunctive requests, (2) the credibility of coercive-control allegations, and (3) the need for protective provisions tied to best interest and safety. For the responding party, it is an early-warning case: a casual “I knew the passcode” narrative can become Exhibit A for restrictive temporary orders, adverse credibility findings, and a settlement dynamic dominated by risk containment rather than merits.

~~c3076b16-bbce-468a-abb8-c7b052b661ed~~

Share this content:

Exit mobile version