CROSSOVER: Text-Message Authentication & Best-Evidence Gatekeeping: Criminal Robbery‑Capital Murder Opinion Offers Civil Playbook for Digital Evidence in Texas Family Violence/Divorce Trials
Christopher Peoples v. The State of Texas, 12-25-00094-CR, March 25, 2026.
On appeal from 369th Judicial District Court, Cherokee County, Texas
Synopsis
The Twelfth Court of Appeals affirmed a robbery-based capital murder conviction and held the trial court correctly refused a self-defense instruction on capital murder (while allowing it on the lesser-included murder charge). Under settled Texas law, when the capital theory is murder “in the course of” robbery, a robber has no right of self-defense against the intended victim—foreclosing the justification at the capital level.
Relevance to Family Law
Although this is a criminal opinion, it is unusually useful in divorce and SAPCR trials because it lays out—cleanly and at length—the current “gatekeeping” framework for authenticating text-message evidence and satisfying the best-evidence rule for electronically stored information. In family-violence protective-order hearings, custody modification trials, and fault-based divorce disputes where digital communications drive intent, coercive control, or credibility, Peoples is a ready-made roadmap for (1) admitting partial extractions when attachments are missing and (2) defeating overbroad “best evidence” objections that are often deployed tactically to keep damning texts away from the factfinder.
Case Summary
Fact Summary
The State charged Christopher Peoples with capital murder under Penal Code § 19.03(a)(2), alleging he intentionally killed Valentine Sanchez with a knife while in the course of committing or attempting to commit robbery. The evidence showed Sanchez was found outside his home with his throat slit, pants pockets turned inside out, and his truck missing. In a recorded interview, Peoples admitted cutting Sanchez’s throat but claimed he acted in self-defense after Sanchez became angry, produced a pistol, and the pistol misfired. Peoples further admitted that after the killing he searched Sanchez’s pockets and left in Sanchez’s truck with various items.
Over objection, the State introduced two text-message chains. The investigating witness conceded that the data extraction did not capture all message attachments because attachments are often unrecoverable. The messages included statements about “just robbing someone,” overdrawn accounts, and making a “move of desperation just to live”—evidence the State used to support the robbery intent component necessary for robbery-based capital murder.
At the charge conference, Peoples requested a self-defense instruction as to capital murder. The trial court granted self-defense on the lesser-included murder charge but refused it for capital murder. The jury convicted on capital murder and assessed life without parole.
Issues Decided
- Whether the trial court erred by refusing a self-defense instruction on the charged offense of capital murder alleged under Penal Code § 19.03(a)(2) (robbery-based), while submitting self-defense only as to the lesser-included offense of murder.
- Whether the trial court abused its discretion by admitting two text-message chains over authenticity and best-evidence objections.
Rules Applied
- Jury charge / defensive issues: A requested statutory defense must be submitted if raised by “some evidence” on each element, viewed in the light most favorable to the defendant; trial court credibility assessments do not control submission. See, e.g., Arteaga v. State, 521 S.W.3d 329 (Tex. Crim. App. 2017); Walters v. State, 247 S.W.3d 204 (Tex. Crim. App. 2007); Gamino v. State, 537 S.W.3d 507 (Tex. Crim. App. 2017); Shaw v. State, 243 S.W.3d 647 (Tex. Crim. App. 2007).
- Self-defense limitation for provocation / robbery theory: Use of force is not justified if the actor provoked the other’s use or attempted use of unlawful force. TEX. PENAL CODE § 9.31(b)(4). Texas precedent holds a robber has no right of self-defense against the intended victim. See Westley v. State, 754 S.W.2d 224 (Tex. Crim. App. 1988); cases applying the rule to robbery-based capital murder include Aguilar v. State, 702 S.W.3d 797 (Tex. App.—Houston [1st Dist.] 2024, no pet.) and Blackmon v. State, 926 S.W.2d 399 (Tex. App.—Waco 1996, pet. ref’d).
- Capital murder / robbery intent timing: For § 19.03(a)(2), the State must show intent to obtain or maintain control of property before or during the murder; “afterthought” theft is insufficient. Conner v. State, 67 S.W.3d 192 (Tex. Crim. App. 2001).
- Authentication: TEX. R. EVID. 901(a) requires evidence sufficient to support a finding the item is what the proponent claims; the standard is liberal and may be satisfied by circumstantial links. See Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. 2012); Fowler v. State, 544 S.W.3d 844 (Tex. Crim. App. 2018).
- Best evidence for ESI: TEX. R. EVID. 1002 (original required to prove content), with TEX. R. EVID. 1001(d) defining “original” for ESI to include any printout/output readable by sight if it accurately reflects the information; TEX. R. EVID. 1004 provides routes when an original cannot be obtained.
Application
On the jury-charge question, the court framed the dispute as a mismatch between Peoples’s narrative (self-defense in response to an alleged gun presentation) and the legal consequence of the charged theory (capital murder predicated on robbery). Even if Peoples produced “some evidence” supporting classic self-defense elements as to a homicide, the court treated the robbery predicate as dispositive: once the State proceeds on a robbery-based capital murder theory, Texas law does not allow the accused—cast as the robber—to claim self-defense against the intended victim of the robbery. In that posture, a self-defense instruction on capital murder would misstate the law; the correct vehicle is submission of self-defense only on murder, leaving the jury to decide whether the robbery predicate (and thus capital murder) was proved.
On the digital-evidence question (the portion family litigators should read twice), the opinion walks through the modern evidentiary path: authentication under Rule 901 is a threshold “support a finding” showing, not a requirement of conclusive proof. The court also addresses the real-world problem that forensic extractions frequently do not retrieve every component of a message thread, especially attachments. That limitation did not render the text chains per se inadmissible; instead, it went to weight and the jury’s ultimate assessment, so long as the proponent could sufficiently link the messages to the purported author and show that the proffered output accurately reflected what was recovered.
Holding
The court held the trial court did not err by limiting the self-defense instruction to the lesser-included offense of murder and refusing to submit self-defense as to capital murder alleged under Penal Code § 19.03(a)(2). Because the capital theory was robbery-based, and because Texas law treats a robber as lacking a right of self-defense against the intended victim, submission of self-defense on capital murder was legally improper.
The court further held the trial court did not abuse its discretion in admitting the text-message chains over objections grounded in authentication and the best-evidence rule. Rule 901’s liberal standard and the ESI “original” definitions in Rules 1001–1002 allowed admission of the printout/output that accurately reflected the extracted data, even though not all attachments were recoverable.
Practical Application
For Texas family-law litigators, Peoples is less about robbery-capital murder and more about how to win (or stop) the text-message fight—especially in cases where the other side tries to rebrand evidentiary weight issues as admissibility defects.
- Temporary orders and protective orders: Use Peoples to blunt the “attachments are missing, so the whole thread is inadmissible” objection. The case supports the position that incomplete recovery is common and does not automatically defeat admissibility if the recovered content is authenticated and accurately reflected in an output.
- Custody and modification trials (best-interest + credibility): When one parent denies authorship of hostile, coercive, or manipulative texts, the Tienda/Fowler framework cited in Peoples gives you the structure: marshal circumstantial “linking” facts (phone number, context, nicknames, timing, corroborating events) and argue authentication is for the court at threshold and the factfinder on ultimate weight.
- Fault divorce / disproportionate division: If texts show intent (planning to hide money, pressure a spouse, fabricate allegations), Peoples helps you get the messages admitted even if the extraction is imperfect—then argue the gaps go to weight, not admissibility.
- Cross-examination posture: If you’re opposing admission, Peoples signals where to aim: attack the link to the purported author and the proponent’s “accurately reflects” predicate under Rule 1001(d), rather than relying solely on the existence of missing attachments. In other words, turn the fight into “this output is not reliable,” not “it’s incomplete.”
Checklists
Text-Message Authentication (Rule 901) Foundation
- Identify the device and custodian (whose phone, how maintained, who had access).
- Establish the identifier(s): phone number, contact name, user handle, or account tied to the party.
- Tie content to real-world events (dates, locations, exchanges that match independent evidence).
- Elicit distinctive characteristics (nicknames, writing style, insider references, emojis/abbreviations used consistently).
- Obtain corroboration (screenshots on recipient’s phone, carrier logs, app download history, admission/partial admission).
- Prepare to argue “threshold only”: the judge decides whether a reasonable juror could find authenticity.
Best-Evidence / “Original” for ESI (Rules 1001–1002) Predicate
- Offer an “output readable by sight” (PDF export, forensic report pages, or properly generated printout).
- Lay testimony that the exhibit accurately reflects what was extracted/received/stored.
- Document the method of capture (forensic tool name/version if available; or screenshot procedure + chain of custody).
- Address missing components proactively (e.g., attachments not recovered) and frame as a limitation affecting weight.
- Be ready with Rule 1004 arguments if an “original” is not obtainable through reasonable means.
Offense/Allegation Theory Control (Lesson for Pleadings and Trial Themes)
- Identify early what “theory” the opposing party is trying to lock in (e.g., violence framed as mutual combat vs. coercive control).
- In family cases, don’t let the other side force an all-or-nothing narrative: plead and request alternative findings (family violence, but also conservatorship limitations; or fraud/waste, but also reimbursement).
- Draft proposed findings and charge-like questions that preserve your alternative pathways (so the court can reject a predicate and still grant relief).
Opposing Texts: How to Make the Objection Stick
- Attack authorship linkage (shared devices, spoofing, multiple users, recycled numbers, lack of corroboration).
- Attack “accurately reflects” (editing indicators, cropping, inconsistent metadata, missing surrounding messages that change meaning).
- Demand the proponent commit to the source (native export vs. screenshot vs. third-party extraction) and impeach deviations.
- Request a Rule 403 ruling where the probative value depends on missing context (selective thread excerpts).
Citation
Christopher Peoples v. The State of Texas, No. 12-25-00094-CR (Tex. App.—Tyler Mar. 25, 2026) (mem. op.).
Full Opinion
Family Law Crossover
Family litigators can weaponize Peoples in two strategic ways. First, it is a turnkey brief for admitting “imperfect” digital extractions: when the opposing party argues that missing attachments, incomplete threads, or extraction limitations render texts inadmissible, Peoples re-centers the analysis on Rule 901’s low threshold and Rule 1001(d)’s definition of an ESI “original”—pushing the dispute to credibility and weight where you can win with corroboration. Second, it models how theory selection can foreclose defenses: just as the robbery predicate legally blocked self-defense at the capital level, in family-violence and custody litigation the way you frame the predicate conduct (coercive control pattern, stalking course of conduct, waste/fraud intent) can narrow the other side’s “explanations” and keep the court focused on the legally operative elements rather than sympathetic narratives.
~~260f93aa-2adc-4d8d-a4b0-8192308ea1c1~~
Share this content:
