Com. v. Sodomsky, K.

J-S11045-15 2015 PA Super 133 COMMONWEALTH OF PENNSYLVANIA, : IN THE SUPERIOR COURT OF : PENNSYLVANIA Appellant : : v. : : KENNETH F. SODOMSKY, : : Appellee : No. 870 MDA 2014 Appeal from the Order entered on April 25, 2014 in the Court of Common Pleas of Berks County, Criminal Division, No. CR-06-CR-0001025-2005 BEFORE: PANELLA, OTT and MUSMANNO, JJ. OPINION BY MUSMANNO, J.: FILED JUNE 05, 2015 The Commonwealth of Pennsylvania appeals from the Order granting the suppression Motion filed by the defendant, Kenneth F. Sodomsky (“Sodomsky”).1 We affirm. In a prior appeal, this Court summarized the relevant history of this case as follows: Richard Kasting [“Mr. Kasting”] was the senior sales assistant in the technology department of the Circuit City [s]tore located on Woodland Road, Wyomissing, Berks County[, Pennsylvania]. Mr. Kasting testified that on October 15, 2004, [Sodomsky] came to Circuit City and asked Mr. Kasting to install an optical drive and DVD burner into his computer. The work order that [Sodomsky] executed that day authorized Circuit City to install and configure the optical drive unit and DVD in his desktop computer. 1 As required to take an appeal as of right under Pa.R.A.P. 311(d), the Commonwealth has certified that the suppression court’s Order substantially handicapped the Commonwealth’s ability to proceed in this case. J-S11045-15 In accordance with store practice, Mr. Kasting summarized to [Sodomsky] “what is done during the installation.” N.T. Suppression Hearing, 9/28/05, at 16. [Sodomsky] was informed that as part of the installation process, the installer would “have to make sure [that the DVD burner] works.” Id. at 17. There is no indication that [Sodomsky] asked how the DVD burner would be tested or in any manner restricted what procedure could be utilized to confirm the burner’s operability. [Sodomsky] requested that the work be performed on an expedited basis, and Mr. Kasting instructed him to return in approximately one hour. Toby Werner was in the middle of the installation process when Stephen Richert [“Mr. Richert”], the head of personal computer repairs at Circuit City, arrived. Mr. Richert testified that the DVD drive was installed when he arrived in the department, but the software had not yet been installed. Mr. Richert explained that all DVD burners and players were accompanied by software.[FN] Mr. Richert testified specifically that at Circuit City, with “every installation” of the hardware, “any supplementary software” was installed both as a courtesy “and to make sure when it leaves the store, we can guarantee that it is working.” Id. at 21. [FN] [Sodomsky] maintains that he did not request installation of the DVD software. However, it is clear that Circuit City could not test the hardware without installing the software and always installed any software accompanying a hardware installation. [Sodomsky] was told that the hardware would be tested. After the software was installed, Mr. Richert performed a general search for a video [file on Sodomsky’s computer] to test the new DVD drive. More specifically, he testified as follows: Well, after we installed the software, we did a generic search of the PC where you click on the start menu, you click on search, and this being the [W]indows XP, a search box comes up and it is custom made to this operating system. In this case, this system, it’s about half way down the screen on the left-hand side there’s a search, and you can enter—in this case, you could enter a specific name of a file that you’re looking for and find it. -2- J-S11045-15 We weren’t looking for anything specific, so we did a generic search. … * * * … [I]n this case, we wanted to make sure that all types of files were working fine so that you wouldn’t get any type of errors…. Id. at 22-23. Mr. Richert testified that once the search button was activated for a given object, the computer automatically loaded the requested files onto the screen, which continued to enlarge by itself. Thus, after the search was initiated, Mr. Richert did not manipulate the computer further to see the entire list of videos. Id. at 30-31. The first few video titles that appeared from [Sodomsky’s] video list were innocuous. However, as the video log continued to compile on the computer screen, which occurred without any human intervention, some of the files appeared to be pornographic in nature due to their titles[,] which included masculine first names, ages of either thirteen or fourteen, and sexual acts. Mr. Richert clicked on “the first one” that appeared questionable, and the video contained the lower torso of an unclothed male, and when a hand approached the male’s penis, Mr. Richert immediately stopped the video. Id. at 24. Mr. Richert contacted his manager and then telephoned the Wyomissing police. During cross-examination, Mr. Richert admitted that he had been told by a Pennsylvania State Police Officer to contact police if he ever ran across what appeared to be child pornography while at work. At the time, Mr. Richert was taking a course at a local college and hoped to enter the law enforcement field. Wyomissing Police Detective George Bell [“Detective Bell”] and two other police officers responded to the call and viewed the same video clip [while at the Circuit City store]. When [Sodomsky] arrived to retrieve his computer, Detective Bell informed him that his computer was being seized because police suspected that it contained child pornography. [Sodomsky] responded that he knew what they had found and that his “life -3- J-S11045-15 was over.” Id. at 87. Police took the computer to the police station, obtained a warrant to search it, and discovered child pornography. Commonwealth v. Sodomsky, 939 A.2d 363, 364-66 (Pa. Super. 2007) (one citation omitted; footnote in original). On March 11, 2005, Sodomsky was charged with two counts of sexual abuse of children, and one count of obscene and other sexual materials and performances.2 Subsequently, Sodomsky filed an Omnibus Pre-trial Motion to suppress the evidence seized from his computer. After a hearing, the trial court granted the suppression Motion, after which the Commonwealth filed an interlocutory appeal to this Court. On appeal, the Commonwealth argued that the trial court erred in concluding that [Sodomsky] retained a privacy interest in the computer because he volitionally relinquished any expectation of privacy in that item by delivering it to Circuit City employees knowing that those employees were going to install and test a DVD device…. Id. at 366 (emphasis added). A panel of this Court agreed, in part, with the Commonwealth’s contention. Id. Reversing the suppression court’s Order, the panel reasoned that, “when an individual evidences an intent to relinquish control over personal property, he or she has abandoned a privacy interest in property and cannot object to any ensuing search of the item by police.” Id. In so holding, the panel focused solely upon Sodomsky’s expectation of privacy: 2 18 Pa.C.S.A. §§ 6312(d), 5903(a)(3). -4- J-S11045-15 The issue is not abandonment in the strict property-right sense, but whether the person prejudiced by the search had voluntarily discarded, left behind, or otherwise relinquished his interest in the property in question so that he could no longer retain a reasonable expectation of privacy with regard to it at the time of the search. Id. at 366-67 (emphasis added) (quoting Commonwealth v. Shoats, 366 A.2d 1216, 1220 (Pa. 1976)). The panel additionally applied the Pennsylvania Supreme Court’s holding in Commonwealth v. Hawkins, 718 A.2d 265 (Pa. 1998), explaining that in Hawkins, the defendant handed an item to another individual, who then placed it in his mouth. Police seized the individual and extracted the property, which consisted of illicit drugs. Our Supreme Court refused to allow the defendant to object to the seizure of the drugs, noting that under current Fourth Amendment jurisprudence, a defendant cannot object to a search unless he establishes a legitimate expectation of privacy, “in the area searched or the effects seized” and that such interest must also be sanctioned by society as reasonable and justifiable.” [Hawkins,] … 718 A.2d at 267. … [A] “legitimate expectation of privacy is absent where an owner or possessor meaningfully abdicates his control, ownership or possessory interest” in his personal property. Id. … at 267. … Sodomsky, 939 A.2d at 367. Ultimately, the panel concluded that Sodomsky had no reasonable expectation of privacy because he had “abandoned” his computer, for one hour, for the installation of a DVD drive. Id. at 369. Accordingly, the panel reversed the suppression court’s Order, and remanded for further proceedings.3 3 The Pennsylvania Supreme Court denied allowance of appeal, and the United States Supreme Court denied Sodomsky’s Petition for Certiorari. Commonwealth v. Sodomsky, 962 A.2d 1196 (Pa. 2008), cert. denied, 556 U.S. 1282 (2009). -5- J-S11045-15 On remand, Sodomsky filed a Petition to introduce new evidence, claiming that such evidence was unavailable to the defense prior to the evidentiary hearing on his suppression Motion. The trial court issued a Rule to Show Cause why the Petition should not be granted, and scheduled an evidentiary hearing. At the hearing, Sodomsky presented two experts, who testified about industry standards and the methods used by Mr. Richert to install the DVD burner. First, William Scott Ardisson testified that opening the computer’s video files was not a proper method for testing the installation of a DVD burner. N.T., 2/15/11, at 15. Next, Charles Mance testified that the methods used by Mr. Richert to test the drive were not consistent with industry standards. Id. at 56. Based upon Sodomsky’s new evidence, the suppression court again found that Sodomsky had a reasonable expectation of privacy in the digital data on his computer. Therefore, on March 22, 2011, the suppression court granted Sodomsky’s suppression Motion. Once again, the Commonwealth appealed the suppression court’s ruling. During its second appeal, the Commonwealth argued, inter alia, that the trial court had erred in granting suppression “because [Sodomsky] ‘failed to establish that he retained any expectation of privacy in his computer after he turned it over to Circuit City employees.’” Commonwealth v. Sodomsky, 47 A.3d 1257 (Pa. Super. 2012) (unpublished memorandum at 10) (quoting Commonwealth’s Brief at 17)). The panel agreed, holding that -6- J-S11045-15 [a]fter careful review, we conclude that none of the evidence presented at the second suppression hearing alters this Court’s previous conclusion that [Sodomsky] relinquished control of the video files on his computer when he took the computer to Circuit City to install a DVD burner[,] and thereby abandoned his privacy interest in the files…. Id. (unpublished memorandum at 13). Based upon a theory of abandonment, the panel concluded that “the trial court erred in finding [that Sodomsky] retained a legitimate expectation of privacy in the video files.” Id. (unpublished memorandum at 14). The panel reversed and remanded for further proceedings.4 Id. On remand from this Court, on December 9, 2013, Sodomsky filed a Petition to Re-Open Suppression Hearing based on Intervening Change of Law, i.e., the United States Supreme Court’s decision in United States v. 4 The Pennsylvania Supreme Court again denied allowance of appeal. Commonwealth v. Sodomsky, 63 A.2d 1246 (Pa. 2013). Sodomsky’s subsequent Petition for Certiorari to the United States Supreme Court also was denied. Sodomsky v. Pennsylvania, ___ U.S. ___, 134 S. Ct. 212 (2013). -7- J-S11045-15 Jones, 565 U.S. ___, 132 S. Ct. 945 (2012).5 The suppression court granted Sodomsky’s Petition, and, after a hearing, again granted Sodomsky’s suppression Motion, based upon the Jones decision. Thereafter, the Commonwealth filed the instant timely appeal, and a court- ordered Pa.R.A.P. 1925(b) Concise Statement of matters complained of on appeal. The Commonwealth now presents the following claims for our review: a. Whether the trial court erred by re-opening the suppression hearing in this case since Jones … was decided before the Superior Court made its decision on the last appeal, before the [Pennsylvania] Supreme Court denied allocatur, and before the U.S. Supreme Court denied [certiorari] in the last appeal? b. Whether [Sodomsky] has identified any intervening changes in the law that would have affected the resolution of the issues raised by [Sodomsky] during the prior appeal in this case? c. Whether the trial court erred in holding that law enforcement officers interfered with the possessory interest in [Sodomsky’s] computer, or engaged in a physical intrusion of this computer property to the extent that they committed a trespass for the purposes of obtaining information, thereby violating [Sodomsky’s] Fourth Amendment rights[?] Brief for the Commonwealth at 5. 5 On January 23, 2012 (one week before the scheduled Superior Court oral argument for Sodomsky’s second appeal, but after appellate briefs had been filed), the United States Supreme Court filed its decision in Jones. The Superior Court’s Memorandum Opinion did not discuss the applicability of Jones. Rather, the decision discussed only Sodomsky’s lack of a reasonable expectation of privacy in the data on his computer. Sodomsky, 47 A.3d 1257 (unpublished memorandum at 14). -8- J-S11045-15 The Commonwealth first claims that the trial court erred in re-opening the issue of suppression, based upon Sodomsky’s claim of an intervening change of law. Id. at 13-14. The Commonwealth contends that the Jones decision is not an intervening change of law, as the Pennsylvania Superior Court was aware of the Jones decision during the second appeal. Id. at 14. The Commonwealth points out that Sodomsky’s counsel addressed the applicability of Jones during oral argument before the Pennsylvania Superior Court panel, and in his Petition for allowance of appeal to the Pennsylvania Supreme Court. Id. Our careful review of the record discloses that prior to the hearing and Order underlying the instant appeal, the suppression court had no opportunity to discuss or apply the United States Supreme Court’s decision in Jones. During the second appeal, this Court focused upon whether the suppression court had erred or abused its discretion when it ruled that Sodomsky had a reasonable expectation of privacy in his computer data. Because the applicability of Jones (an intervening change of law) previously has not been addressed by this Court, we are not barred from addressing the issue during the instant appeal. See Commonwealth v. Starr, 664 A.2d 1326, 1332 (Pa. 1995) (stating that the law of the case doctrine does not apply where there exists an intervening change in the applicable law). Accordingly, the Commonwealth is not entitled to relief on this claim. -9- J-S11045-15 In its second claim, the Commonwealth argues that Sodomsky failed to identify any intervening change in the law that applies to his suppression claim. Brief for Appellant at 15. The Commonwealth contends that Jones only reiterated that “a traditional property law analysis still existed ….” Id. The Commonwealth asserts that “any property right [Sodomsky] might have had in his computer, … he relinquished to Circuit City for the limited purpose of doing whatever the technicians need to do to make the DVD burner work correctly.” Id. at 17. Similarly, in its third claim, the Commonwealth argues that Jones does not apply where, as here, the defendant gave up his property rights. Id. at 18. The Commonwealth also contends that the “plain view exception applied to the police view of 19 seconds of the video Circuit City employees observed.” Id. at 19. The Commonwealth argues that, based upon the evidence, Sodomsky relinquished his property rights and any expectation of privacy in the video clip used by Mr. Richert to test the DVD burner. Id. “The appellate standard of review of suppression rulings is well- settled. This Court is bound by those of the suppression court’s factual findings which find support in the record, but we are not bound by the court’s conclusions of law.” Commonwealth v. Millner, 888 A.2d 680, 685 (Pa. 2005); see also Commonwealth v. Booze, 953 A.2d 1263, 1269 (Pa. Super. 2008) (stating that “[w]here the record supports findings of the - 10 - J-S11045-15 suppression court, we are bound by those facts and may reverse only if the legal conclusions drawn therefrom are in error.”) (citation omitted). Here, the suppression court granted Sodomsky’s suppression Motion, explaining that [t]he Katz[6] test of reasonable expectation of privacy is never reached, just as it was never reached in Jones. This court is again constrained, this time under the Jones holding, to suppress the evidence that was obtained by the unauthorized trespass by the government…. Suppression Court Opinion, 4/25/14, at 4 (footnote omitted, footnote added).7 The suppression court concluded that the search of Sodomsky’s computer files, and the seizure of his computer, violated the Fourth Amendment to the United States Constitution. Id. at 3-4. Upon careful review, we are constrained to agree. The Fourth Amendment provides “[t]he right of people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated.” U.S. CONST. amend. IV.8 A warrantless search is per se unreasonable under the Fourth Amendment. Katz, 389 U.S. at 357. 6 See Katz v. United States, 389 U.S. 347, 361 (1967). 7 The Commonwealth has not challenged Sodomsky’s ownership of the desktop computer, or that Sodomsky was told to retrieve his computer one hour after leaving it at Circuit City. 8 This right is enforceable against the states as part of the due process guarantee of the Fourteenth Amendment. Mapp v. Ohio, 367 U.S. 643, 655 (1961). Evidence obtained in violation of the constitutional protections must be excluded. Id. - 11 - J-S11045-15 The Amendment establishes a simple baseline, one that for much of our history formed the exclusive basis for its protections: When “the Government obtains information by physically intruding” on persons, houses, papers, or effects, “a ‘search’ within the original meaning of the Fourth Amendment has “undoubtedly occurred.” [] Jones, 565 U.S. [] ___, 132 S. Ct. 945, [951 n.3,] 181 L. Ed. 2d 911, 919 [n.3] (2012). By reason of [the United States Supreme Court’s] decision in Katz[,] … property rights “are not the sole measure of Fourth Amendment violations,” Soldal v. Cook County, 506 U.S. 56, 64, 113 S. Ct. 538, 121 L. Ed. 2d 450 (1992)[,] but though Katz may add to the baseline, it does not subtract anything from the Amendment’s protections “when the Government does engage in [a] physical intrusion of a constitutionally protected area[.]” United States v. Knotts, 460 U.S. 276, 286, 103 S. Ct. 1081, 75 L. Ed. 2d 55 (1983) (Brennan, J., concurring in the judgment). Florida v. Jardines, ___ U.S. ___, ___, 133 S. Ct. 1409, 1414 (2013) (emphasis in original). The United States Supreme Court has long held that the Fourth Amendment protects possessory and liberty interests, even when privacy rights are not implicated. Soldal, 506 U.S. at 63-64. While Katz and its progeny shifted the emphasis in Fourth Amendment law from property to privacy, “[t]here was no suggestion that this shift in emphasis had snuffed out the previously recognized protection for property under the Fourth Amendment.” Id. at 64. In Jones, the United States Supreme Court addressed whether police officers had engaged in a “search,” within the meaning of the Fourth Amendment, when they installed and monitored a Global Positioning System tracking device on a suspect’s car. Jones, 565 U.S. at ___, 132 S. Ct. at - 12 - J-S11045-15 946. In addressing this issue, the Supreme Court explained that “Fourth Amendment rights do not rise or fall with the Katz formulation.” Jones, 565 U.S. at ___, 132 S. Ct. at 950. Rather, the Supreme Court expressed “a particular concern for government trespass upon the areas (‘persons, houses, papers, and effects’) [the Fourth Amendment] enumerates.” Id. In rediscovering the trespassory origins of the Fourth Amendment, the Jones majority observed that the more recently adopted “reasonable-expectation- of-privacy test has been added to, not substituted for, the common-law trespassory test.” Id., 565 U.S. at ___, 132 S. Ct. at 952. Applying an “exclusively property-based approach,” the Supreme Court held that a search occurred when the government “physically occupied private property for the purpose of obtaining information,” which “would have been considered a ‘search’ within the meaning of the Fourth Amendment when it was adopted.” Id., 565 U.S. at ___, 132 S. Ct. at 949-50 (citation omitted). In Jardines, the Supreme Court again applied a property-based analysis of Fourth Amendment protections. The Supreme Court ruled that a warrantless search of the curtilage of a house by a drug-sniffing dog violated the Fourth Amendment, regardless of whether “the officers’ investigation of [the defendant’s] home violated his expectation of privacy under Katz.” Jardines, 133 S. Ct. at 1417. Applying this same property-based analysis, in Riley v. California, ___ U.S. ___, 134 S. Ct. 2473 (2014), the United States Supreme Court - 13 - J-S11045-15 held that police may not, without a warrant, search digital information on a cell phone seized incident to an arrest. Id. at 2480, 2495. In holding that an unconstitutional search of the defendant’s papers and effects had occurred, the Supreme Court emphasized the quantity and quality of information stored on a cell phone: Although the data stored on a cell phone is distinguished from physical records by quantity alone, certain types of data are also qualitatively different. An Internet search and browsing history, for example, can be found on an Internet-enabled phone and could reveal an individual’s private interests or concerns— perhaps a search for certain symptoms of disease, coupled with frequent visits to WebMD. Data on a cell phone can also reveal where a person has been. Historic location information is a standard feature on many smart phones and can reconstruct someone’s specific movements down to the minute, not only around town but also within a particular building…. Mobile application software on a cell phone, or “apps,” offer a range of tools for managing detailed information about all aspects of a person’s life. There are apps for Democratic Party news and Republican Party news; apps for alcohol, drug, and gambling addictions; apps for sharing prayer requests; apps for tracking pregnancy symptoms; apps for planning your budget; apps for every conceivable hobby or pastime; apps for improving your romantic life. There are popular apps for buying or selling just about anything, and the records of such transactions may be accessible on the phone indefinitely. There are over a million apps available in each of the two major app stores; the phrase “there’s an app for that” is now part of the popular lexicon. The average smart phone user has installed 33 apps, which together can form a revealing montage of the user’s life. Id. 134 S. Ct. at 2490 (citations omitted). Ultimately, the Supreme Court extended Fourth Amendment protections to the digital data stored on a cell phone: - 14 - J-S11045-15 Our holding, of course, is not that the information on a cell phone is immune from search; it is instead that a warrant is generally required before such a search, even when a cell phone is seized incident to arrest. Our cases have historically recognized that the warrant requirement is “an important working part of our machinery of government,” not merely “an inconvenience to be somehow ‘weighed’ against the claims of police efficiency.” Coolidge v. New Hampshire, 403 U.S. 443, 481, 91 S. Ct. 2022, 29 L. Ed. 2d 564 (1971). Recent technological advances similar to those discussed here have, in addition, made the process of obtaining a warrant itself more efficient. See [Missouri v.] McNeely, 569 U.S., at ___, 133 S. Ct. 1552[,] 1573, 185 L. Ed. 2d 696, 720 ); id., at ___ (Roberts, C. J., concurring in part and dissenting in part) (133 S. Ct. 1552; 1573, 185 L. Ed. 2d 696, 720) (describing jurisdiction where “police officers can e-mail warrant requests to judges’ iPads [and] judges have signed such warrants and e-mailed them back to officers in less than 15 minutes”). Riley, 134 S. Ct. at 2493. Here, the same quality and quantity of information found on a cell phone also is digitally stored on a desktop computer. 9 For the same reasons that the Riley Court considered it necessary to protect the digital data stored on a cell phone, such protections naturally extend to the digital data stored on a desktop computer. Applying the property-based Fourth Amendment analysis explained in Jones, and relied upon in Riley, we conclude that the digital data stored on Sodomsky’s desktop computer is subject to Fourth Amendment protections, regardless of his reasonable expectation of privacy. Under this rubric, we review the search of Sodomsky’s computer. 9 Similar to cell phones, desktop computers now have “apps,” store financial records, and even may store a back-up of the data from a cell phone. - 15 - J-S11045-15 “[A] search warrant is required before police may conduct any search.” Commonwealth v. Williams, 73 A.3d 609, 614 (Pa. Super. 2013) (citation omitted). “Absent the application of one of a few clearly delineated exceptions, a warrantless search or seizure is presumptively unreasonable.” Id. One of these exceptions is the “plain view” doctrine, upon which the Commonwealth relies. The plain view doctrine permits the warrantless search and seizure of an object when “(1) an officer views the object from a lawful vantage point; (2) it is immediately apparent to him that the object is incriminating; and [] (3) the officer has a lawful right of access to the object.” Commonwealth v. Whitlock, 69 A.3d 635, 637 (Pa. Super. 2013). In determining whether the incriminating nature of an object is “immediately apparent” to a police officer, courts should evaluate the “totality of the circumstances.” Id. “Although courts have recognized that a police officer can never be certain that an object in plain view is incriminating, the officer’s belief must be supported by probable cause.” Id. The parties here do not dispute that the police were lawfully present in the Circuit City store and that Sodomsky’s computer was in plain view. However, the record does not support a finding that the digital data forming the basis of the charges against Sodomsky was in plain view, or that the incriminating nature of Sodomsky’s computer was immediately apparent. - 16 - J-S11045-15 Our review of the record discloses that police officers were called to the Circuit City store after Mr. Richert, a Circuit City employee, conducted a search of video files on Sodomsky’s computer. N.T., 9/28/05, at 23-24, 26. Upon arriving at the scene, Wyomissing Police Officer John Phillips (“Officer Phillips”) asked Mr. Richert to describe what he had seen on Sodomsky’s computer. Id. at 42. Upon the express direction of Officer Phillips, Mr. Richert double-clicked on the file to open it, and then played the video file for the officer. Id. at 38. The file was not visible on Sodomsky’s computer until Officer Phillips directed Mr. Richert to open the video data file. Id. at 38, 42. Thus, the evidence, viewed in a light most favorable to Sodomsky, established that the suspect video file was not in “plain view” when Officer Phillips arrived at the scene, nor was its criminal nature readily apparent. The incriminating nature of the video became apparent only after Officer Phillips directed Mr. Richert to open and play the digital data file. By directing Mr. Richert to open and play the computer digital data file, Officer Phillips effectuated a warrantless search of the digital data stored on Sodomsky’s desktop computer. Under Jones and Riley, the warrantless search of Sodomsky’s digital data files, stored on his desktop computer, violated Sodomsky’s Fourth Amendment protections. Consequently, the officers’ subsequent seizure of the computer, and additional searches conducted thereafter, were unlawful - 17 - J-S11045-15 as “fruits of the poisonous tree.” See Wong Sun v. United States, 371 U.S. 471, 484-85 (1963) (recognizing that evidence discovered as a result of a search in violation of the Fourth Amendment must be excluded from evidence). Based upon the foregoing, we are constrained to affirm the Order of the suppression court. Order affirmed. Panella, J., joins the opinion. Ott, J., files a dissenting opinion. Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 6/5/2015 - 18 -