Knight v. State, 02-24-00479-CR, March 12, 2026.
On appeal from 396th District Court, Tarrant County, Texas.
Synopsis
The Second Court of Appeals affirmed a stalking conviction, holding that Texas Penal Code § 42.072 is constitutional as applied to a defendant who engaged in a multi-year campaign of digital surveillance and harassing communications. The court determined that the defendant’s conduct—which included tracking email activity and sending photos of the victim’s residence—constituted "true threats" and regulable conduct rather than protected free speech.
Relevance to Family Law
In high-conflict family law litigation, the line between "zealous advocacy" and "litigation abuse" is frequently blurred, particularly with the rise of pro se litigants and digital surveillance tools. This holding provides a critical appellate roadmap for family law practitioners seeking to protect clients from "legal stalking"—where an ex-spouse or opposing party uses a barrage of emails, meritless filings, and digital tracking (such as read-receipt software or location services) to intimidate. It affirms that the First Amendment does not shield a party who uses digital transparency and "I know where you live" rhetoric to instill fear, providing a powerful basis for both protective orders and potential criminal referrals in extreme custody or property disputes.
Case Summary
Fact Summary
The dispute originated from a seemingly mundane event: Joshua Paul Knight’s vehicle was towed by a company owned by the complainant, Debi Chesney. Following the tow, Knight engaged in a two-year campaign of escalating harassment. This "saga" included approximately 200 emails, numerous pro se civil lawsuits, and formal complaints to the State Bar of Texas and regulatory agencies. Knight was eventually declared a vexatious litigant in the civil context. However, the conduct moved beyond mere litigation. Knight utilized software to track when and how many times the complainant and her attorneys opened his emails. He recorded himself calling the complainant’s attorney at his private residence and posted the video to YouTube. The escalation peaked when Knight emailed the complainant a photograph of her and her husband alongside a photograph of the front of her private residence, captioned with the statement, “I know where you live,” and an invitation for others to “say hi to her around town.” Knight was indicted and convicted by a jury for stalking under Texas Penal Code § 42.072.
Issues Decided
- Whether the appellant preserved his as-applied constitutional challenge to the stalking statute by raising it in a motion for new trial.
- Whether Texas Penal Code § 42.072 is unconstitutional as applied to conduct involving the transmission of emails, tracking software, and the filing of lawsuits.
Rules Applied
- Texas Penal Code § 42.072 (Stalking): Prohibits a person from knowingly engaging in a course of conduct directed at a specific person that the actor knows or reasonably should know the other person will regard as threatening bodily injury, death, or property damage, causing the person to be in fear or feel harassed.
- As-Applied Constitutional Challenge: A claim that a statute, while generally valid, operates unconstitutionally as to the specific claimant’s facts and circumstances.
- True Threats Doctrine: A category of speech not protected by the First Amendment, encompassing statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual.
- Preservation of Error (Tex. R. App. P. 33.1): Requires a timely, specific objection or motion in the trial court to preserve an issue for appellate review.
Application
The court first addressed the State’s procedural hurdle regarding preservation. It held that because Knight’s motion for new trial explicitly raised an as-applied challenge citing the First Amendment and the specific facts of his prosecution, the issue was sufficiently preserved for review. On the merits, the court engaged in a narrative analysis of Knight’s conduct versus the protections of the First Amendment. The court rejected the notion that Knight was being punished for the "unsavory content" of his speech. Instead, the court viewed the emails and digital tracking as a "course of conduct." The court emphasized that the stalking statute regulates conduct that happens to include speech, rather than speech itself. Specifically, the court found that the combination of sending a photo of the victim's home, declaring "I know where you live," and utilizing software to monitor her digital behavior removed the speech from the realm of protected "harassment" and placed it squarely into the category of "true threats." The court noted that a reasonable person in the victim's position would fear for their safety given the defendant’s demonstrated obsession and implied physical surveillance.
Holding
The Second Court of Appeals held that Texas Penal Code § 42.072 is constitutional as applied to Knight. The court reasoned that the statute targets conduct intended to cause fear or harassment, and Knight’s specific actions—digital tracking and implied physical threats—fell outside the scope of First Amendment protection. The court further held that the evidence supported the jury's implicit finding that Knight’s behavior constituted a "true threat." Consequently, the conviction was affirmed, and the eight-year sentence was upheld.
Practical Application
For family law litigators, this case serves as a shield against the "pro se harasser" or the tech-savvy abusive spouse. Practitioners should look for the following "Knight factors" when evaluating whether an opposing party's behavior has crossed from annoying to criminal:
- The use of "read-receipt" or IP-tracking software to monitor an attorney's or client's communications.
- The inclusion of photographs of the client’s residence or children's schools in non-evidentiary communications.
- A pattern of "litigation abuse" (meritless bar complaints, BBB reports, or vexatious filings) used as a tool for emotional or financial attrition.
Checklists
Identifying Criminal Stalking in Family Litigation
- Document Frequency: Create a log of all non-litigation-related communications (emails, texts, calls) that exceed the scope of discovery or co-parenting.
- Analyze Metadata: Determine if the opposing party is using third-party software to track the client's location or digital activity.
- Identify Threat Escalation: Flag any communication that references the client’s physical location, "knowing where they live," or includes surreptitious photography.
- Review Cease and Desist Compliance: Document all instances where the party continued contact after being formally instructed by counsel to stop.
Defeating a First Amendment Defense
- Establish "Course of Conduct": Focus on the repetitive nature of the acts rather than the content of a single message.
- Argue the "True Threat" Exception: Highlight language or imagery that implies physical violence or surveillance (e.g., photos of the home).
- Demonstrate Reasonable Fear: Prepare testimony regarding the client's subjective fear and why that fear is objectively reasonable under the circumstances of the divorce or custody battle.
Citation
Knight v. State, __ S.W.3d __ (Tex. App.—Fort Worth 2026, no pet.).
Full Opinion
Family Law Crossover
This criminal ruling is a potent weapon in Texas divorce and custody proceedings. Under Texas Family Code § 153.004, a history of stalking—now clearly defined to include digital tracking and "litigation abuse" under Knight—can be used to rebut the presumption of Joint Managing Conservatorship. Furthermore, the Knight analysis assists in obtaining a "Lifetime Protective Order" under CCP Chapter 7B. If a spouse is tracking the other's emails or sending photos of their new residence during a temporary orders phase, practitioners can cite Knight to argue that this conduct is not protected speech but is a "true threat" that justifies restrictive conduct orders, supervised visitation, or a referral for criminal prosecution. ~~bf1c2dbf-d890-4f8b-ae59-8fa72af72cf8~~
