Text Messages and Phone Data Evidence in NSW Criminal Cases

CORE Defence Lawyers | Updated January 2026

How Police Obtain Phone Data

Police access to mobile phone data has expanded significantly. Data is obtained through:

  • Consensual access: Where the phone owner provides access voluntarily
  • Search warrants: Authorising seizure and examination of devices
  • Crime scene powers: Seizing phones as evidence at crime scenes
  • Carrier records: Metadata from telecommunications providers

Once seized, phones are typically subjected to forensic extraction using tools such as Cellebrite or similar software. This extraction can recover active data, deleted data, and metadata including location information.

How Prosecutors Rely on Phone Evidence

Text messages and phone data feature in prosecutions across offence categories:

Drug Offences

  • Messages discussing supply arrangements
  • Contact patterns with known associates
  • Financial transactions via phone banking apps

Domestic Violence

  • Threatening or intimidating messages
  • Messages contradicting complainant versions
  • Contemporaneous complaints to third parties

Fraud and Financial Offences

  • Communications evidencing knowledge or intent
  • Banking and financial app records
  • Documents stored on devices

Sexual Offences

  • Communications between parties before or after alleged offences
  • Statements relevant to consent
  • Subsequent complaint messages

Common Weaknesses in Phone Evidence

Context and Interpretation

Text messages are excerpts from ongoing conversations. Prosecutors often tender selected messages without surrounding context. Critical issues include:

  • Messages may be sarcastic, hypothetical, or joking
  • Abbreviations and slang may be misinterpreted
  • Preceding and subsequent messages may change meaning
  • Non-textual communication (voice calls, in-person) is not captured

Key Principle

Text messages are fragments of communication. Their meaning depends on context that may not be apparent from the messages alone. Courts should approach interpretation cautiously where context is incomplete.

Attribution Issues

Messages from a phone are not automatically attributable to the phone's owner:

  • Others may have access to the device
  • Phones may be shared within households
  • Accounts may be compromised or spoofed
  • Messages may be sent without the owner's knowledge

Deleted and Recovered Data

Forensic tools can recover deleted messages, but recovery raises additional issues:

  • Metadata may be incomplete for recovered messages
  • Fragments may be recovered without full context
  • Deletion timing may be unclear
  • Technical artefacts may be misinterpreted as meaningful data

Selective Presentation

Police brief summaries often present selected messages supporting the prosecution case. Defence practitioners must review complete extractions to identify:

  • Exculpatory messages not included in the brief
  • Context for selected messages
  • Inconsistencies with prosecution versions

Authentication Requirements

Phone evidence must be authenticated under the Evidence Act 1995 (NSW). Authentication typically requires:

  • Evidence linking the device to the defendant
  • Evidence of extraction methodology
  • Chain of custody documentation
  • Confirmation data has not been altered

For extracted reports (Cellebrite reports), the extraction analyst may provide a statement or certificate. Defence practitioners should consider whether to require the analyst for cross-examination.

Relevant Evidence Act Provisions

Section 69: Business Records

Carrier records and automated system logs may be admissible as business records. This includes call logs, cell tower data, and billing records.

Section 71: Electronic Communications

Section 71 facilitates proof of electronic communications by allowing inference of matters such as authorship from addresses and other indicia.

Section 137: Exclusion for Prejudice

Where phone evidence has limited probative value but high prejudicial effect (e.g., unrelated inflammatory messages), exclusion may be warranted.

Defence Approaches to Phone Evidence

CORE Defence Lawyers applies a comprehensive approach to phone data:

1. Obtain Complete Extraction

Request the full Cellebrite or equivalent report, not just prosecution-selected pages. Review the complete extraction for context and exculpatory material.

2. Challenge Attribution

Where identity of sender is in issue, require prosecution proof that the defendant authored the relevant messages. Consider who else had device access.

3. Examine Context

Place selected messages in context by examining surrounding communications. Identify how conversation tone, history, or subsequent messages affect interpretation.

4. Consider Technical Evidence

In appropriate cases, engage digital forensics experts to review extraction methodology, identify limitations, or provide alternative interpretations.

5. Cross-Examine on Interpretation

Challenge police interpretations of message meaning. Officers may assign criminal meaning to innocent communications without proper basis.

Related Resources