Text messages are routinely admitted as evidence in custody cases — and routinely excluded. The difference is almost never the content. It is how the texts were preserved, authenticated, and offered. This guide walks through the rules judges actually apply, the mistakes that get otherwise useful texts thrown out, and the preservation habits that hold up under cross-examination.
Updated: 2026-05-21
Legal disclaimer: This article is general information, not legal advice. Rules of evidence, especially around electronically stored information (ESI), vary by state and by court. Talk to a family law attorney in your jurisdiction before deciding what to file, preserve, or offer at a hearing.
Table of Contents
- The Short Answer: Yes, With Conditions
- The Rules of Evidence That Actually Apply
- Authentication: Proving the Text Is Real
- Hearsay: When Texts Get Excluded
- Screenshots vs. Forensic Export vs. Carrier Records
- How to Preserve Texts So They Hold Up
- The Co-Parenting App Advantage
- Common Mistakes That Get Texts Excluded
- Special Situations
- Working With Your Attorney
- Frequently Asked Questions
The Short Answer: Yes, With Conditions
Yes, text messages are admissible in custody court in every U.S. state — including screenshots, forensic exports, and carrier records — provided you clear two thresholds: authentication (proving the message is what you say it is) and a hearsay exception or non-hearsay use (proving the message is allowed in despite the rule against hearsay).
Most family-law judges have seen thousands of text exhibits. They tend to admit them if the offering parent can answer four questions cleanly:
- Who sent it?
- When was it sent?
- Has it been altered?
- Why is it relevant to the parenting issue in front of the court?
The rest of this guide is about how to answer those four questions with evidence the court trusts.
The Rules of Evidence That Actually Apply
Federal court uses the Federal Rules of Evidence (FRE). Most states have adopted a version of the FRE for their own courts, and the rules around electronically stored information track the federal language closely. The specific rules that matter for text messages:
- FRE 901 — Authentication. “To satisfy the requirement of authenticating or identifying an item of evidence, the proponent must produce evidence sufficient to support a finding that the item is what the proponent claims it is.” Read FRE 901 on Cornell LII.
- FRE 801(d)(2) — Statements by an Opposing Party. A statement by the other party in the case is, by definition, not hearsay. This is the rule that makes most texts from the other parent admissible without further work.
- FRE 803 — Hearsay Exceptions. Excited utterances, present-sense impressions, statements for medical diagnosis, and business records each have their own carve-outs that can rescue a text from the hearsay rule. Read FRE 803.
- FRE 1001–1004 — Best Evidence Rule. When you offer a writing, recording, or photograph, you generally need the original or a duplicate. For ESI, a printout or copy is treated as an “original” if it accurately reflects the data.
State rules can add wrinkles. California, New York, Texas, and Florida each have published case law on text-message authentication that family-law practitioners follow. Ask your attorney for the controlling cases in your state.
Authentication: Proving the Text Is Real
Authentication is the single most common failure point. Judges do not assume a screenshot is genuine. The proponent has to give them a reason to believe it.
Five methods of authentication are commonly accepted in family court:
- Witness testimony. The sender, the recipient, or a witness who saw the message being typed can testify under oath that the exhibit is accurate. This is the simplest path, and often sufficient.
- Distinctive characteristics. Phone number, screen name, photo, signature line, content only the sender would know, replies to the recipient’s earlier messages, or context that ties the message to the sender. (See United States v. Vayner and the line of state cases that follow it.)
- Self-authentication of carrier records. Records produced by a phone carrier (Verizon, AT&T, T-Mobile) under FRE 902(11) with a custodian’s certification are self-authenticating. You typically need a subpoena and 30–60 days of lead time.
- Metadata. Forensic extracts from the device — through Cellebrite, Oxygen Forensics, or a comparable tool — include creation timestamps, conversation threading, and deletion artifacts. They are difficult for the other side to challenge.
- Co-parenting app exports. Apps designed for court use (OurFamilyWizard, Talking Parents, AppClose) generate timestamped, immutable PDF exports with built-in custodian declarations.
The cleanest cases stack two methods. A screenshot plus the recipient’s testimony plus a matching carrier subpoena is essentially unimpeachable.

Hearsay: When Texts Get Excluded
Hearsay is an out-of-court statement offered for the truth of what it says. The rule against hearsay exists because the court cannot cross-examine a text message. Several situations move texts out of the hearsay bucket entirely:
- Statements by the other parent (party admission). Under FRE 801(d)(2), anything the opposing party said in writing is not hearsay. If the text is from the parent on the other side of the case, hearsay is usually a non-issue.
- Statements offered for context, not truth. A threatening text offered to show that you were threatened — not to prove the underlying claim in the text — is not hearsay.
- Present-sense impressions and excited utterances (FRE 803(1), 803(2)). Texts sent during or immediately after an event (“he’s outside the house again”) fall within these exceptions in many courts.
- State of mind (FRE 803(3)). Texts that show fear, intent, or planning are often admissible to show the sender’s state of mind.
Where texts get excluded as hearsay:
- Texts from third parties offered to prove the underlying facts — for example, a friend’s text saying “I saw him drinking with the kids in the car.” That is hearsay unless the friend testifies or a separate exception applies.
- Texts from your own children, when offered for the truth of what the child said. Many courts will not allow a parent to “introduce” a child’s testimony through a text. This is one of the most common rulings against well-intentioned parents.
Screenshots vs. Forensic Export vs. Carrier Records
Three formats account for most text-message exhibits in family court:
| Format | What it is | Strengths | Weaknesses |
|---|---|---|---|
| Screenshot | A photo of the message thread on the device | Fast, free, no third party needed | Easy to allege editing; sender info sometimes missing; timestamps depend on settings |
| Forensic export | A bit-level extraction by a digital forensic expert | Tamper-resistant, includes deleted messages, metadata, threading | Costs $1,000–$5,000; needs chain of custody |
| Carrier records | Subpoenaed records from the phone carrier | Self-authenticating under FRE 902(11); shows date/time/recipient | Most carriers retain content for 0–7 days only; usually shows headers, not message content |
For a routine custody case, well-preserved screenshots plus your own testimony are usually enough. For high-stakes cases — alleged abuse, contested protective orders, parental alienation claims — pay for a forensic export early. The chain-of-custody documentation a licensed examiner produces is worth far more than a stack of phone photos.

How to Preserve Texts So They Hold Up
Treat the moment you receive a noteworthy message as the start of an evidence chain.
- Do not delete anything. Even messages that hurt you. Selective preservation is the textbook definition of spoliation, and a court that smells spoliation will draw an adverse inference against the offering parent.
- Do not edit, annotate, or crop. Capture the entire screen, including sender info, the date header, and at least one message before and after the relevant one for context.
- Capture timestamps. Many phones hide individual message timestamps by default. Tap and hold a message to reveal the timestamp before screenshotting.
- Back up the device. Make a full iCloud or Google Drive backup the same week. Do not let backups roll off.
- Preserve the original device. If a case is heading to trial, keep the phone in airplane mode in a drawer rather than trading it in. You cannot run a forensic export on a device that no longer exists.
- Send yourself a contemporaneous note. A short email to yourself (“Received text at 8:14 PM from [name] saying [quote]”) creates an independent time-stamped record.
- Keep a court-ready safety plan and journal. Cross-reference messages to dated journal entries so the texts fit into a larger pattern.
When stakes are high, retain a licensed digital forensic examiner early — not the week of trial. Examiners can preserve a device in a way that survives challenges from the other side’s expert.
The Co-Parenting App Advantage
Court-recognized communication apps were designed to solve every problem listed above:
- Immutable records. Messages cannot be edited or deleted from the user side.
- Built-in timestamps and read receipts. Every message carries a date, time, and (in most apps) a read confirmation.
- Custodian declarations. Exports include a signed certification from the platform that the records are accurate, supporting FRE 902(11) self-authentication.
- Tone analysis (some apps). OurFamilyWizard’s ToneMeter and Talking Parents’ Accountable Calling features create extra context that judges sometimes find useful.
Courts in many states will now order one of these apps as the exclusive communication channel after a finding of high conflict, coercive control, or post-DV co-parenting. If your case has any of those elements, ask for the order in writing. See the co-parenting communication guide for a deeper treatment of the apps and the BIFF reply method.

Common Mistakes That Get Texts Excluded
Across hundreds of family-court rulings on text-message exhibits, a few mistakes recur:
- Cropped screenshots. A screenshot of one message with no context, no date header, and no sender info gets the foundation objection sustained.
- No sender identification. A thread that shows only “Me” and “Them” without a phone number, contact card, or testimony tying “Them” to the other parent is hearsay’s playground.
- Selective preservation. Producing only the messages that help your case, with gaps in the thread, raises spoliation concerns and credibility problems.
- Late disclosure. Texts not produced during discovery are often excluded at trial. Disclose early, even if you are not sure you will use them.
- Altered images. Markup, highlights, or annotations on a screenshot are sometimes treated as a different document. Keep the original capture separately.
- Children’s texts offered for truth. As above, courts often disallow these because the child is not a testifying witness.
- Texts obtained by accessing the other parent’s device without permission. In many states this implicates wiretap, stored-communications, or computer-trespass statutes and can result in exclusion plus other consequences.
Special Situations
A few patterns require extra care.
Texts from the children. Courts generally prefer to hear from the child through an age-appropriate interview, a guardian ad litem, or a custody evaluator — not through a screenshot. Save the texts, but do not assume they will be admitted. Discuss with counsel.
Shared family phone plans. If the other parent is on the same plan, the carrier records may be obtainable directly without a subpoena. That can be a fast path, but it can also raise privacy issues; ask your attorney before pulling records.
Deleted texts you suspect exist. A subpoena to the carrier and a forensic extraction of the device may recover deleted messages, especially on iPhones with iCloud sync. Move quickly — carriers retain content for short windows.
DV and coercive-control contexts. Patterns of monitoring, threats, and isolation often show up in texts. The coercive control and custody framework explains how to present those patterns alongside other evidence. If safety is at risk, call 911 or the National Domestic Violence Hotline at 1-800-799-7233 before doing any preservation work.

Working With Your Attorney
Bring the following to your first meeting:
- A complete export of the message threads at issue, including at least two weeks of context on either side.
- A short timeline matching key texts to dated incidents.
- Notes on what is missing — gaps in the thread, deletions you noticed, replies that arrived out of order.
- Any contemporaneous notes, emails, or journal entries.
- A list of witnesses who saw any of the underlying events.
Ask your attorney three direct questions:
- Which texts in this set do you think will be admitted, and on what authentication theory?
- Which texts are likely to draw a hearsay objection, and is there a workaround?
- Is a forensic examiner worth retaining at this stage?
A clean, organized set of message evidence often shifts the case before trial — opposing counsel reads the exhibits, and settlement positions move. Preserve well, disclose early, and let the texts do the work.
Frequently Asked Questions
Are screenshots of text messages admissible in court?
Yes, in every U.S. state, provided they are properly authenticated and not hearsay (or fall within an exception). The screenshot needs to show sender information, a date or timestamp, and enough context that the court can identify what the message is. Witness testimony from the sender or recipient is the most common way to authenticate a screenshot.
How do you authenticate a text message in court?
Five common methods: testimony from the sender or recipient, distinctive characteristics that tie the message to the sender, self-authenticating carrier records under FRE 902(11), forensic metadata from a licensed examiner, and exports from court-recognized co-parenting apps with custodian declarations. Stacking two methods is the strongest approach.
Can the other parent’s text messages be used against them in a custody case?
Yes. Under Federal Rule of Evidence 801(d)(2), statements by an opposing party are not hearsay. As long as the message is authenticated and relevant to a parenting issue, it can be offered for the truth of what it says.
Can you subpoena text messages from a phone carrier?
You can subpoena phone records (date, time, sender, recipient, length) easily, but most U.S. carriers retain message content for only 0–7 days. Plan to move within a week if you need the actual content from the carrier. Verizon, AT&T, and T-Mobile each publish slightly different retention windows.
Are deleted text messages admissible?
Yes, if they can be recovered and authenticated. Forensic extraction of an iPhone or Android device, especially with cloud sync enabled, often recovers deleted messages along with deletion timestamps. The deletion itself can be evidence of spoliation in some cases.
Are text messages considered hearsay?
It depends on who sent them and why they are being offered. Texts from the other parent in the case are usually not hearsay because of the party-opponent rule. Texts from third parties are often hearsay unless an exception applies. Texts offered to show context, fear, intent, or planning are often not hearsay even when they would be otherwise.
What is the best way to preserve text messages for a custody case?
Stop deleting anything, capture full-screen screenshots with sender info and timestamps visible, back up the device, send yourself a dated note describing each significant message, keep the original device in a drawer if trial is realistic, and retain a digital forensic examiner early if the stakes warrant.
If you are dealing with a custody case that involves domestic violence or coercive control, support is available 24/7 through the National Domestic Violence Hotline at 1-800-799-7233 or thehotline.org.