✓ Updated December 2025

Authentication of Digital Evidence in Illinois Family Court (2025 Guide)

Authentication of Digital Evidence in Illinois Family Court (2025 Guide)

How do I authenticate text messages in Illinois family court?

Quick Answer: Under Illinois Rule of Evidence 901, text messages can be authenticated through testimony of a witness with knowledge, distinctive characteristics (speech patterns, personal info), corroborating phone records, or forensic extraction. Screenshots alone are vulnerable to challenge—use native format exports or carrier records. The reply doctrine allows authentication when responses are contextually connected to original messages.

Authentication Of Digital Evidence

Illinois Family Court Practice Guide Illinois Rules of Evidence 901, 902, 803(6), and 1002 December 2024

Part I: Authentication Fundamentals

Illinois Rule of Evidence 901(a): General Requirement The foundational rule for authenticating any evidence in Illinois is Rule 901(a), which states: "The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims." Ill. R. Evid. 901(a). This standard is intentionally modest—a "prima facie" showing suffices. The proponent need only present enough evidence for a reasonable juror to conclude that the evidence is genuine. The ultimate determination of authenticity is left to the trier of fact. See People v. Downin, 828 N.E.2d 341 (Ill. App. Ct. 3d Dist. 2005) ("A finding of authentication is merely a finding that there is sufficient evidence to justify presentation of the offered evidence to the trier of fact and does not preclude the opponent from contesting the genuineness of the writing after the basic authentication requirements are satisfied."). Illinois Rule of Evidence 901(b): Methods of Authentication Rule 901(b) provides a non-exhaustive list of ten methods for authenticating evidence. The most relevant for digital evidence include:

Self-Authenticating Evidence Under Rule 902 Illinois Rule of Evidence 902 establishes categories of evidence that are "self-authenticating"—requiring no extrinsic evidence of authenticity. Key provisions for digital evidence include:

Practice Note: Under Rule 902(11), the party intending to offer a record must provide written notice of intent to all adverse parties and make the record and certification available for inspection sufficiently in advance of trial to provide a fair opportunity to challenge them.

Part Ii: Text Message Authentication

The Governing Standard Illinois courts analyze text message authenticity under the same standards as traditional documents. See People v. Chromik, 408 Ill. App. 3d 1028 (3d Dist. 2011) (holding that documentary evidence including text messages may be authenticated by either direct or circumstantial evidence). The Reply Doctrine The reply doctrine provides that when a message is sent to a person and a response is received that appears contextually related to the original message, the response may be presumed authentic. The doctrine creates circumstantial evidence of authorship based on:

See People v. Downin, 357 Ill. App. 3d 193 (3d Dist. 2005) (authenticating emails through evidence of "recurring exchanges" containing "private information between identifiable parties who later acted in furtherance of the messages"). Circumstantial Authentication Methods People v. Hauck, 2022 IL App (2d) 191111, clarified that text messages "may be authenticated by circumstantial evidence" including:

Screenshots vs. Native Format The Problem with Screenshots: Screenshots are easily manipulated using readily available software. While not per se inadmissible, courts and opposing counsel increasingly challenge screenshot authenticity. Best Practices:

Sample Foundation Questions — Text Messages

Part Iii: Social Media Evidence

The Illinois Standard: People v. Kent People v. Kent, 2017 IL App (2d) 140917, is the seminal Illinois case on social media authentication. The Second District reversed a first-degree murder conviction because a Facebook post was admitted without proper authentication, holding:

Key Holding: "The authentication of social media poses unique issues regarding what is required to make a prima facie showing that the matter is what the proponent claims." Kent at ¶ 105 (quoting Smith v. State, 136 So.3d 424 (Miss. 2014)). What "Something More" Means The Kent court suggested evidence that would have been sufficient:

Platform-Specific Considerations Facebook & Instagram (Meta Platforms)

TikTok

Snapchat

Sample Foundation Questions — Social Media

For certified platform records:

Part Iv: Email Authentication

The Illinois Rule: No Authentication by Production Unlike some jurisdictions, Illinois does not recognize "authentication by production"—emails produced in discovery are not automatically deemed authentic. See Complete Conference Coordinators, Inc. v. Kumon North America, Inc., 394 Ill. App. 3d 105 (2d Dist. 2009). Emails must be authenticated through the same methods as traditional documents. Methods of Email Authentication

Email Headers and Metadata Full email headers contain critical authentication information:

Practice Tip: Request production of emails in native format (.eml or .msg files) rather than PDFs to preserve all metadata and headers. Chain of Custody Considerations When producing emails as evidence, be prepared to establish:

Part V: The "I Didn'T Send That" Defense

Common Defense Theories

How to Defeat These Defenses

Remember: "Once the document is admitted, the ultimate issue of authorship is left to the trier of fact to determine." People v. Fillyaw, 123 N.E.3d 113 (Ill. App. Ct. 2d Dist. 2018). The defense can challenge authenticity after admission—this goes to weight, not admissibility.

Part Vi: Video And Audio Evidence

Illinois Eavesdropping Law Critical Threshold Issue: Illinois is an all-party consent state for audio recordings. Under 720 ILCS 5/14-2, recording a private conversation without the consent of all parties is a felony. However, effective January 1, 2015, the statute was amended to permit recording of conversations when:

Practice Note: Recordings made in violation of the eavesdropping statute may be inadmissible AND subject the recording party to criminal prosecution. Screen record only your own side of conversations unless all parties consent or there is no reasonable expectation of privacy. Ring Doorbell and Home Security Footage Home security footage is generally admissible when properly authenticated. Key considerations:

Voicemail Authentication Voicemails may be authenticated through:

Sample Foundation Questions — Video Evidence

Part Vii: Business Records & Financial Documents

Illinois Rule 803(6): Records of Regularly Conducted Activity The business records exception permits admission of records kept in the regular course of business. Under Illinois Rule 803(6), a record is admissible if:

Who Can Lay Foundation? The author of the record need not testify. "Anyone familiar with the business and its procedures may testify about how the business record was prepared." In re V.T., 306 Ill. App. 3d 817, 820 (1999). Under Illinois Rule 902(11), no live testimony is required—a written certification from a custodian or qualified person is sufficient. See People v. Hauck, 2022 IL App (2d) 191111, ¶ 47 ("The purpose of Rule 902(11) is to provide an alternative means of establishing a proper foundation for business records, without the need for a representative of the business to testify in court."). Bank and Financial Records Bank records are paradigmatic business records. Courts have recognized that "foundation for admissibility may at times be predicated on judicial notice of the nature of the business and the nature of the records... particularly in the case of bank and similar statements." Key Holding for Successor/Assignee Records: "When business records pass from a predecessor entity to a successor entity under a merger or receivership, the successor entity is able to authenticate the business records of its predecessor." A bank need not have a witness with personal knowledge of the predecessor's record-keeping—the bank's reliance on such records renders them equivalent to its own. Sample Foundation Questions — Bank Records

Alternative (with certification): Q: Your Honor, I offer Petitioner's Exhibit 10, bank records from [institution], accompanied by the Certificate of Authenticity of Business Records pursuant to Illinois Supreme Court Rule 236 and Illinois Rules of Evidence 803(6) and 902(11).

Part Viii: Cell Phone Forensics And Extraction Reports

Types of Forensic Extractions

Cellebrite and Similar Tools Cellebrite UFED is the industry-standard tool for mobile device forensics. In United States v. Williams, 83 F.4th 994 (5th Cir. 2023), the Fifth Circuit held that testimony about Cellebrite extractions does not require expert qualification: "Operating a Cellebrite device and understanding its report require knowledge in the realm of a reasonably tech-savvy lay person... Without a showing of specialized knowledge, the mere use and understanding of a Cellebrite extract at trial is insufficient to require an expert." Caveat: "There are cases in which the collection of digital data would require testimony due, for example, to the sophisticated nature of the particular forensic analysis or the equipment deployed, or the technical nature of the testimony." Complex analyses may still require expert testimony. Hash Values and Data Integrity A hash value is a unique digital "fingerprint" generated by a mathematical algorithm based on the contents of a file or drive. If two files have identical hash values, they are exact copies. Federal Rules 902(13) and (14) (mirrored in Illinois) permit self-authentication of electronic data through certification of hash value verification. Common hash algorithms: MD5, SHA-1, SHA-256. Forensic reports should document the hash values of both the source device/file and the extracted copy.

Part Ix: The Best Evidence Rule And Electronic Documents

Illinois Rule 1002: Requirement of Original "To prove the content of a writing, recording, or photograph, the original writing, recording, or photograph is required, except as otherwise provided in these rules or by statute." Ill. R. Evid. 1002. What Constitutes an "Original" for Electronic Documents? Under Illinois Rule 1001(d): "For electronically stored information, 'original' means any printout—or other output readable by sight—if it accurately reflects the information." Practical effect: A printed email, screenshot of a text message, or PDF of a social media post can all be "originals" if they accurately reflect the underlying data. This reflects the reality that electronic documents exist as data, not physical objects. Duplicates Under Rule 1003 "A duplicate is admissible to the same extent as the original unless a genuine question is raised as to the authenticity of the original or, in the circumstances, it would be unfair to admit the duplicate in lieu of the original." Ill. R. Evid. 1003. Rule 106: Completeness "When a writing or recorded statement or part thereof is introduced by a party, an adverse party may require the introduction at that time of any other part or any other writing or recorded statement which ought in fairness to be considered contemporaneously with it." Ill. R. Evid. 106. Practice tip: When opposing counsel introduces only part of an email thread or text conversation, invoke Rule 106 to require production of the complete exchange.

Part X: Subpoenaing Records From Tech Platforms

The Stored Communications Act Barrier The federal Stored Communications Act (18 U.S.C. § 2701 et seq.) generally prohibits electronic communication service providers from disclosing the contents of stored communications to third parties. This means:

What You CAN Obtain Directly from Platforms Meta (Facebook/Instagram): With valid legal process—name, length of service, email, phone number, login/logout IP addresses, credit card info Google: Basic subscriber information, account creation date, IP logs (but not email contents) Apple: Device registration, iCloud subscriber info, connection logs Cell carriers (Verizon, AT&T, T-Mobile): Call detail records, cell tower data, text message logs (times/numbers, typically not content) Obtaining Content from the Party Since platforms cannot produce content to civil litigants, use these discovery methods:

Preservation Demands Most platforms will preserve data pending legal proceedings upon receipt of a proper preservation request:

Important: Send preservation demands immediately upon learning of potentially relevant digital evidence. Content may be deleted or accounts deactivated.

Part Xi: Common Objections And How To Overcome Them

"Objection: Lack of Authentication" Response: "Your Honor, the witness has testified that [she recognizes this as a text message conversation she had with Respondent / the phone number shown belongs to Respondent / the content references private matters only Respondent would know]. Under Illinois Rule of Evidence 901(a), this is sufficient to support a finding that the exhibit is what it purports to be. The ultimate question of authenticity is for the trier of fact." "Objection: Hearsay" Response options:

"Objection: Best Evidence Rule" Response: "Under Illinois Rule of Evidence 1001(d), for electronically stored information, an 'original' includes any printout or output readable by sight if it accurately reflects the information. This [printout/screenshot] accurately reflects the electronic data and is an original under the rule." "Objection: Foundation — Anyone Could Have Sent This" Response: "Your Honor, the possibility that someone else might have sent this message goes to weight, not admissibility. The witness has identified sufficient distinctive characteristics—[the phone number, content, writing style, references to private matters]—to support a prima facie finding of authenticity under Rule 901. Respondent is free to challenge authorship through cross-examination or evidence." "Objection: This Screenshot Could Have Been Manipulated" Response: "Your Honor, the mere possibility of alteration does not bar admission. The standard is whether there is sufficient evidence to support a finding of authenticity—not certainty. The witness has testified this accurately depicts the messages as they appeared on the device. Opposing counsel has presented no specific evidence of manipulation, only speculation. The question of whether the exhibit is genuine is for the trier of fact."

Part Xii: Demonstrative Vs. Substantive Evidence

The Distinction

Application to Digital Evidence

Practice tip: If opposing counsel objects to foundation for your entire exhibit, consider offering the underlying data as substantive evidence and using clean visual aids as demonstratives to explain it.

Part Xiii: Key Illinois Cases (2017-2024)

Social Media Authentication People v. Kent, 2017 IL App (2d) 140917: Seminal case requiring "something more" than name and photograph to authenticate social media posts. Reversed murder conviction due to improperly admitted Facebook post. Court emphasized risk of false attribution in social media context. People v. Maya, 88 N.E.3d 10 (Ill. App. Ct. 2017): Discussed circumstantial authentication of social media through distinctive characteristics and corroborating evidence. People v. Curry, 2020 IL App (2d) 180148: Illinois courts willing to consider Facebook records as self-authenticating under amended Rule 902, but relevance still required. Text Messages and Emails People v. Chromik, 408 Ill. App. 3d 1028 (3d Dist. 2011): Text messages analyzed under same standards as traditional documents; circumstantial evidence including carrier records and content sufficient for authentication. People v. Hauck, 2022 IL App (2d) 191111: Affirmed that text messages "may be authenticated by circumstantial evidence." Clarified Rule 902(11) provides alternative foundation for business records without live testimony. People v. Fillyaw, 123 N.E.3d 113 (Ill. App. Ct. 2d Dist. 2018): "Once the document is admitted, the ultimate issue of authorship is left to the trier of fact to determine." Business Records and Computer-Generated Evidence Complete Conference Coordinators, Inc. v. Kumon North America, Inc., 394 Ill. App. 3d 105 (2d Dist. 2009): Illinois does not recognize "authentication by production"—emails produced in discovery must still be authenticated. People v. Downin, 357 Ill. App. 3d 193 (3d Dist. 2005): Emails authenticated through recurring exchanges containing private information between identifiable parties. Preski v. Warchol: Clarified that many courts incorrectly read limitations into Rule 236 (business records) that are not in the text of the rule.

Summary: Essential Foundation Checklist

For ANY digital evidence:

For business records:

For platform records:

* * * This guide is intended as a practice resource and does not constitute legal advice.

Frequently Asked Questions

What is authentication of digital evidence?

AUTHENTICATION OF DIGITAL EVIDENCE Illinois Family Court Practice Guide
 Illinois Rules of Evidence 901, 902, 803(6), and 1002
 December 2024 PART I: AUTHENTICATION FUNDAMENTALS Illinois Rule of...

How does Illinois law address authentication of digital evidence?

Illinois family law under 750 ILCS 5 governs authentication of digital evidence. Courts consider statutory factors, case law precedent, and the best interests standard when making determinations. Each case is fact-specific and requires individualized legal analysis.

Do I need an attorney for authentication of digital evidence?

While Illinois law allows self-representation, authentication of digital evidence involves complex legal, financial, and procedural issues. An experienced Illinois family law attorney ensures your rights are protected, provides strategic guidance, and navigates court procedures effectively.

Jonathan D. Steele

Written by Jonathan D. Steele

Chicago divorce attorney with cybersecurity certifications (Security+, ISC2 CC, Google Cybersecurity Professional Certificate). Illinois Super Lawyers Rising Star 2016-2025.

Free Consultation

For more insights, read our Divorce Decoded blog.