CROSSOVER: Fourteenth Court Affirms Exclusion of Unauthenticated Jail/Prison Messages in Family-Violence Assault Case, Limiting Article 38.371 Use Without Proper Predicate
Harolyn Graves-Johnson v. The State of Texas, 14-25-00091-CR, April 30, 2026.
On appeal from 488th District Court of Harris County, Texas
Synopsis
The Fourteenth Court of Appeals held that the trial court acted within its discretion in excluding jail and prison communications the defense wanted to use for impeachment and relationship-context evidence. The problem was not article 38.371 in the abstract; it was the failure to authenticate the writings and digital messages and the failure to lay the predicate required by Texas Rule of Evidence 613.
Relevance to Family Law
This opinion matters to Texas family lawyers because the same evidentiary failures recur in divorce, SAPCR, protective-order, and enforcement proceedings involving alleged family violence, coercive control, harassment, or threats. Texts, jail calls, inmate messages, emails, and handwritten letters are often central to disproving or proving abuse dynamics, credibility, conservatorship restrictions, or just and right property arguments—but this case is a reminder that “relationship evidence” is only as useful as the predicate behind it. In family court, a practitioner who cannot authenticate the communication, connect it to the witness, and frame the exact impeachment point risks losing high-value evidence even when the content appears facially powerful.
Case Summary
Fact Summary
The defendant was convicted of aggravated assault of a family member with a deadly weapon after shooting her husband multiple times while he was in bed. At trial, she did not deny the shooting; instead, she advanced a justification theory, testifying that the complainant had beaten her, threatened her with a knife, and attempted to choke her shortly before the shooting. She claimed she believed he was retrieving a weapon and that she acted out of fear for herself and her adult children.
The complainant gave a materially different account. He acknowledged that the relationship was troubled and that he had been disrespectful and verbally abusive, but he denied physical violence. He testified that the parties argued about food, another woman, and divorce, and that he fell asleep while charging his ankle monitor before awakening to gunshots.
To support her defensive theory and to attack the complainant’s credibility, the defendant sought to admit 24 proffered exhibits: three handwritten letters and a series of digital prison messages allegedly sent by the complainant during incarceration. According to the defense, these communications reflected threats, hostility, misogyny, and the true nature of the parties’ relationship. The trial court excluded them after the State objected.
Issues Decided
- Whether the trial court abused its discretion by excluding handwritten letters and prison electronic messages offered to impeach the complainant.
- Whether the trial court abused its discretion by excluding those same communications as evidence of the nature of the parties’ relationship under article 38.371 of the Texas Code of Criminal Procedure.
- Whether the defense preserved and established admissibility through proper authentication and the predicate required by Texas Rule of Evidence 613.
Rules Applied
The court applied several familiar evidentiary rules and appellate standards:
- Trial courts have broad discretion in evidentiary rulings, and reversal is warranted only if the ruling falls outside the zone of reasonable disagreement.
- Impeachment by prior inconsistent statement requires compliance with Texas Rule of Evidence 613(a), including confronting the witness with the statement, the time and place, and the person to whom it was made before extrinsic evidence becomes admissible.
- If the witness admits making the prior inconsistent statement, the writing itself generally is not admissible for that purpose.
- Bias impeachment under Rule 613(b) likewise requires that the witness first be told the circumstances or statements tending to show bias or interest.
- Documentary and electronic communications must be authenticated before admission.
- The Confrontation Clause guarantees an opportunity for effective cross-examination, but it does not override ordinary evidentiary rules or create an unrestricted right to impeach by otherwise inadmissible means.
- The court relied on authorities including Johnson v. State, Shuffield v. State, Torres v. State, Lopez v. State, Moore v. State, Hammer v. State, Davis v. Alaska, and Delaware v. Van Arsdall.
Although the opinion references article 38.371, the court’s analysis underscores that the statute does not dispense with authentication, relevance, or predicate requirements.
Application
The appellate court focused less on the inflammatory content of the excluded communications and more on the mechanics of admissibility. The defense argued that the messages and letters were needed to impeach the complainant’s testimony and to show the nature of the relationship. But the court found that the exhibits were never properly proved up. The prison messages, in particular, reflected only one side of an ongoing exchange, lacked context, and were not authenticated in a manner sufficient to require admission. Some messages were also remote in time and unclear in target, making it difficult to know whether the complainant was speaking to the defendant, about her, or about other women.
Just as important, the court concluded that the defense never laid the Rule 613 predicate for impeachment. The complainant denied threatening the defendant with a knife and denied physical violence, but he was not asked whether he had made the specific statements contained in the proffered writings, whether he had threatened her or her children in writing, or whether he had authored messages threatening her business or reputation. In other words, the defense did not tether the extrinsic exhibits to a specific inconsistency in the witness’s trial testimony. Nor did it establish a proper bias examination by first confronting the witness with the circumstances allegedly showing bias.
The court also rejected the broader appellate framing that the messages showed the complainant’s “bias against women” or his general hostility toward the defendant. That characterization, the court said, sounded more like an attempt to attack general character for credibility than to expose a specific motive or bias related to testifying in this case. Without a developed predicate and a specific impeachment theory grounded in the witness’s testimony, the trial court’s exclusion remained well within its discretion.
Holding
The court held that the trial court did not abuse its discretion in excluding the handwritten letters and prison electronic messages offered for impeachment. On this record, the defense failed to authenticate the communications and failed to satisfy Texas Rule of Evidence 613 by confronting the complainant with the specific prior statements before offering the exhibits as extrinsic impeachment evidence.
The court likewise held that the defendant did not show improper exclusion of relationship evidence under article 38.371. Whatever room article 38.371 may provide for evidence illuminating the dynamics of a family-violence relationship, that statute did not rescue exhibits that lacked authentication and were not connected to a properly developed impeachment or relevance theory in the trial court.
Practical Application
For family-law litigators, this is a trial-preparation case disguised as an evidentiary case. In contested divorces and SAPCRs, lawyers routinely possess damaging screenshots, inmate emails, Securus records, handwritten letters, Facebook messages, and app-based communications that seem self-authenticating because everyone in the courtroom “knows” who sent them. This opinion is a reminder that appellate courts do not try cases on intuition.
In a custody modification involving family violence, for example, a parent may want to offer inmate messages to show coercive control, retaliatory intent, or threats directed at the other parent. In a divorce with a disproportionality claim, similar communications may support fault, cruel treatment, or dissipation-related motives. In a protective-order hearing, they may be central to showing the likelihood of future violence. But counsel must still establish authorship, account ownership, message integrity, and contextual relevance. If the communication is being used for impeachment, counsel must also force the witness to engage the specific statement before moving to extrinsic proof.
The case also has strategic significance in bench trials. Family lawyers often assume judges will simply “take it for what it’s worth.” That assumption is dangerous. Once the record shows no authentication and no Rule 613 predicate, exclusion becomes easy to defend on appeal. Conversely, the lawyer who lays the foundation carefully can convert what might otherwise look like mere vulgarity into admissible evidence of threats, control, fear, motive, parenting risk, or marital misconduct.
For litigators defending against this type of evidence, the opinion offers a clean roadmap: object on authentication, relevance, hearsay if applicable, and failure to lay impeachment predicate. Force the proponent to identify the exact testimony being impeached, the precise statement being used, and the evidentiary route by which the communication comes in.
Checklists
Authenticating Messages, Emails, and Jail Communications
- Identify the platform or system used for the communication.
- Obtain business records, custodian affidavits, or certified records where available.
- Tie the account or inmate identifier to the opposing party through independent evidence.
- Develop testimony showing how the witness received, stored, or preserved the communication.
- Be prepared to explain distinctive characteristics that support authorship.
- Preserve metadata, screenshots, downloads, and chain-of-custody information.
- Address completeness issues if the message reflects only one side of the exchange.
- Mark and organize exhibits individually rather than arguing a large group in the aggregate.
Laying the Rule 613 Predicate
- Ask the witness whether they made the specific statement.
- Identify when the statement was made.
- Identify where or through what medium it was made.
- Identify to whom it was made.
- Give the witness a fair chance to admit, deny, or explain the statement.
- If denied, then offer the extrinsic writing or message.
- If admitted, reassess whether the exhibit itself is still independently admissible for another purpose.
- State clearly on the record the exact portion of testimony you contend is inconsistent.
Using Relationship Evidence in Family-Violence Litigation
- Articulate why the communication is relevant to the relationship dynamic, not merely inflammatory.
- Connect the communication to a pleaded or disputed issue such as family violence, managing conservatorship, possession restrictions, protective relief, fault, or credibility.
- Distinguish between general bad character and specific threats, coercion, or motive.
- Be ready to explain temporal relevance, especially for older communications.
- Provide context so the court can understand who is being discussed and why it matters.
- Avoid offering fragmented messages that create ambiguity about meaning or target.
Preserving Error for Appeal
- Make a clear offer of proof for each excluded exhibit.
- Explain separately the basis for admissibility of each item.
- Specify whether the exhibit is offered for impeachment, substantive proof, relationship context, bias, state of mind, or another purpose.
- Respond to authentication objections with actual foundational testimony or records.
- If the court excludes the evidence, ensure the substance of the exhibit is in the appellate record.
- Avoid umbrella arguments that treat multiple exhibits as interchangeable.
Defending Against Dubious Electronic Evidence
- Object that the exhibit is unauthenticated.
- Object that the proponent failed to lay the Rule 613 predicate for impeachment.
- Argue lack of context where the message is incomplete or one-sided.
- Argue that the evidence shows only generalized character or vulgarity, not a relevant issue in dispute.
- Argue remoteness if the communication predates the material events by months or years.
- Require the proponent to identify the exact trial testimony the evidence allegedly impeaches.
Citation
Harolyn Graves-Johnson v. State of Texas, No. 14-25-00091-CR, 2026 WL ___ (Tex. App.—Houston [14th Dist.] Apr. 30, 2026, no pet.) (mem. op.).
Full Opinion
Family Law Crossover
This case can be weaponized in Texas divorce and custody litigation in two very different ways. If you represent the proponent of abuse-related communications, use the opinion as a cautionary checklist and make your record immaculate: authenticate the inmate or electronic messaging system, confront the witness with the exact statement, and explain why the message goes to coercive control, threats, parental fitness, or credibility rather than mere profanity. If you represent the target of the evidence, this opinion is an excellent authority for narrowing or excluding hostile texts, jail messages, or letters when opposing counsel tries to dump them into evidence without a sponsoring witness, without context, and without a Rule 613 predicate. In that sense, the case is less about criminal law than about evidentiary discipline in relationship-driven litigation—a lesson that applies directly to high-conflict family cases.
~~774c565d-55c8-4241-912e-96d1bda1b657~~
Share this content:
