IN THE SUPREME COURT OF THE STATE OF DELAWARE
CHRISTOPHER WHEELER, §
§ No. 205, 2015
Defendant Below, §
Appellant, § Court Below:
§
v. § Superior Court
§ of the State of Delaware
STATE OF DELAWARE, §
§ Cr. I.D. No. 1310019248
Plaintiff Below, §
Appellee. §
Submitted: January 20, 2016
Decided: March 2, 2016
Before STRINE, Chief Justice; HOLLAND, VALIHURA, VAUGHN, and SEITZ,
Justices, constituting the Court en Banc.
Upon appeal from the Superior Court. REVERSED AND REMANDED.
Thomas A. Foley, Esquire, Wilmington, Delaware for Appellant.
Andrew J. Vella, Esquire, Department of Justice, Wilmington, Delaware for Appellee.
VALIHURA, Justice:
In this direct appeal, Christopher Wheeler (“Wheeler”) seeks to overturn his
conviction of Dealing in Child Pornography. He raises two issues. First, he challenges
a September 18, 2014 decision of the Superior Court denying his Amended and
Superseding Motion to Suppress (“Motion to Suppress”). The Motion to Suppress sought
to exclude evidence collected from Wheeler’s home and office during a search executed
pursuant to two warrants related to witness tampering. The challenged warrants covered
Wheeler’s entire digital universe and essentially had no limitations. In performing the
search, officers seized 19 electronic devices and other digital media. Despite the broad,
generalized language in the challenged warrants, the State found no evidence of witness
tampering on any of Wheeler’s devices. But when performing a cursory search of the
data on an iMac found in Wheeler’s piano room closet (the “iMac”), police discovered
files containing child pornography. Wheeler contends that the search warrants were in
the nature of “general warrants” and were overly broad in scope, in violation of the
Fourth Amendment to the United States Constitution and Article I, § 6 of the Delaware
Constitution.1
Second, Wheeler appeals from a December 22, 2014 decision of the Superior
Court denying his Motion to Dismiss and/or for Judgment of Acquittal (“Motion for
Judgment of Acquittal”). Wheeler was charged with 25 identical counts of Dealing in
Child Pornography based upon 25 images of child sexual exploitation—all of which were
found on the iMac. Wheeler argues that there was insufficient evidence to convict him
1
Wheeler is joined by amicus curiae, American Civil Liberties Union Foundation of Delaware
(the “ACLU”), which filed a brief in support of reversal.
1
because the State could not establish that he was aware of the existence of the offending
images in his “newsgroup cache.” The State admits it has no proof that Wheeler ever
viewed any of the images, which automatically “cached” on his computer, with no human
intervention, as a result of his subscription to certain “newsgroups.” Wheeler was
sentenced to 50 years at Level V.
Throughout these proceedings, Wheeler has asserted that the State utilized charges
of witness tampering stemming from his admission in 2013 that he had molested two
brothers in Pennsylvania in the 1980’s as a pretext to search broadly for child
pornography. The challenged warrants in this case are the witness tampering warrants—
not the later-obtained child pornography warrant. But the State admits that the
challenged witness tampering warrants were virtual copies of an off-the-shelf warrant for
child pornography.
Because we agree that the challenged witness tampering warrants were in the
nature of “general warrants” in violation of the United States and Delaware Constitutions,
we reverse the judgments of the Superior Court and remand this matter for further
proceedings in accordance with this Opinion.
I. FACTS
A. Christopher Wheeler
Christopher Wheeler is the former headmaster at the Tower Hill School (“Tower
Hill”) in Wilmington, Delaware. He has an adult son, NK,2 whom he adopted when NK
2
Because the victims in this matter were juveniles at the time they were subject to abuse, we
have assigned pseudonyms sua sponte.
2
was twelve or thirteen.3 In the 1980’s, Wheeler lived with the “W” family in West
Chester, Pennsylvania for months at a time. The Ws took in a number of students that
attended the Westtown School, where the three W brothers went to school.4 Wheeler was
one of these students. Wheeler was approximately 16 or 17 when he began living with
the Ws. Even after he left Westtown School, Wheeler maintained a relationship with the
W family.
Approximately 35 years ago, Wheeler sexually abused two of the W brothers. In
2005, Wheeler returned to the Delaware area after having spent time in Illinois with his
adopted son. Wheeler became the headmaster of Tower Hill. In 2008, Wheeler and NK
lived with the Ws before moving onto the Tower Hill campus.
B. In 2013, the W Brothers Confront Wheeler About the Abuse Wheeler Inflicted
on Them in the Early 1980’s
After the Jerry Sandusky scandal broke, one of the W brothers, MW, resolved to
tell his two adult brothers, SW and TW, that Wheeler had molested him when he was
approximately 11 to 13 years old, at a time when Wheeler was in his early-20’s. Upon
hearing this, SW told his brothers that Wheeler had also molested him when he was
approximately 13 to 15 years old. TW told MW and SW that, although Wheeler had
never physically or sexually abused him, Wheeler had inappropriate sexual conversations
with TW when TW was a boy.
After the W brothers told each other about their past experiences with Wheeler,
MW wrote Wheeler a letter. The letter read, in part: “I shudder at the notion that you, in
3
A27 (Affidavit 1 ¶ 6).
4
A135.
3
your career, have chosen an environment that brings you into daily contact with other
boys who are as old as I was when you molested me.”5 MW’s letter also provided that
MW “wants nothing to do with Chris Wheeler ever and wants him to stay away from him
and his family.”6 MW supplied Investigator Robert Schreiber (“Investigator Schreiber”)
of the Delaware Department of Justice with a copy of the letter.
On July 20, 2013, SW also wrote Wheeler. MW provided Investigator Schreiber
with a “draft” of SW’s letter. Unlike MW’s letter, SW’s three-page letter invited a
response from Wheeler. It read, in part:
If I had known the torment, pain, humiliation, and anger that your
molestation and abuse of me as a child would cause me these 35 years later,
I would have had greater strength to stand up to you and defend myself.
The fact that you preyed upon me in my own home, from the room next to
mine, is lewd and inexcusable. The reality that you continue to shirk any
responsibility for the harm that you caused, as if it never occurred, will
continue no longer.7
* * *
I will not keep quiet and hide from your abuses any longer. I have not yet
determined how or when to tell my parents of the harm, pain, and
humiliation that you have caused. . . . The real and full truth must be told
and brought to light; beginning now.
The only thing that I am sorry for is that it has taken me this long to gain
the fortitude to bring your past abuses to the surface, to move towards
holding you accountable for your predatory and abusive actions. Despite
my pain and anger, I am curious to return part of the burden to you; what
does justice look like for Chris Wheeler for the molestation you
perpetuated, culpability you willingly evade, and the harms that you
5
A27 (Affidavit 1 ¶ 10).
6
Id.
7
A130.
4
continue to cause? What role (if any) should you play in determining
appropriate resolution to and restitution for the abuses you have caused?8
On July 23, 2013, Wheeler responded to SW’s letter. In his reply letter, Wheeler
admits his wrongdoing. It reads, in part:
I will not compound your pain by attempting to deny or in any way deflect
responsibility for my actions 35 years ago. I did those things. I am the one
responsible.
I am profoundly sorry. Some things are unforgivable, so I don’t expect
forgiveness from any of you. Nevertheless, I ask for your forgiveness.
* * *
The truth is that I have carried inside of me a profound and loud
dissonance, an ever-present reminder that some evil has been done and it
cannot be undone. And I am responsible for it.
* * *
You hoped for proof of my conscience, my contrition, my sense of
accountability. Only you know if you see proof of those things in this
letter. Regarding my compunction to make right the many wrongs that I
have committed, perhaps this letter is evidence of at least a few steps in that
direction as well. I’ll wait to hear from you about further appropriate steps
towards resolution and restitution.9
MW provided the investigators with a copy of Wheeler’s response. SW told
investigators that he still had Wheeler’s original response letter and the corresponding
FedEx envelope in his possession.
Rather than writing a letter, TW held telephone conversations with Wheeler to
arrange a face-to-face meeting at Wheeler’s home on July 25, 2013. TW also exchanged
e-mails with Wheeler, who used his Tower Hill e-mail address. According to TW, at the
8
A130-32 (emphasis added).
9
A133 (emphasis added).
5
meeting, Wheeler apologized for his previous actions and told TW that he was going to
meet with NK to tell him about his abuse of the W brothers. Wheeler also told TW that
he had recently contemplated suicide.
C. The Witness Tampering Warrants Target Wheeler’s Entire Digital Universe and
are Cut-and-Pasted from Child Pornography Warrants
On October 22, 2013, the Wilmington Police Department, working in concert with
the State of Delaware, sought and obtained two search warrants from the Superior Court.
The first search warrant (“Warrant 1”) related to Wheeler’s residence in Wilmington,
Delaware and his 2011 Chevrolet Equinox. The second warrant (“Warrant 2” and jointly
with Warrant 1, the “Witness Tampering Warrants”) was for Wheeler’s office at Tower
Hill and for the same vehicle.
The Witness Tampering Warrants were substantially similar and were each
supported by a corresponding affidavit of probable cause.10 The Witness Tampering
Warrants and Affidavits together sought to gather evidence related to two witness
tampering crimes: (1) Tampering with a Witness under 11 Del. C. § 1263(3); and (2) Act
of Intimidation of a Witness under 11 Del. C. § 3532. The affiants were Detective
Cecilia E. Ashe (“Detective Ashe”) and Chief Investigator Robert J. Irwin (“Chief
Investigator Irwin”). On the date the Witness Tampering Warrants were issued,
Detective Ashe was an officer with the Wilmington Police Department. Chief
10
For purposes of this Opinion, Warrant 1’s affidavit of probable cause is referred to as
“Affidavit 1.” Warrant 2’s affidavit of probable cause is referred to as “Affidavit 2.”
Collectively, Affidavit 1 and Affidavit 2 are referred to as the “Affidavits.” Similarly, the
applications in support of the Witness Tampering Warrants are collectively referred to as the
“Applications.”
6
Investigator Irwin was with the Delaware Department of Justice and, at the time, was
assigned to the Child Predator Task Force. Investigator Schreiber is also mentioned
throughout the Affidavits, as he provided information to Detective Ashe and Chief
Investigator Irwin.
The Affidavits are based in large part on interviews with the W brothers, and
incorporate the brothers’ statements regarding communications they had with Wheeler in
July 2013. The police also interviewed MW’s wife and the W brothers’ parents. As to
NK, the sum of the witness tampering allegations contained in the Affidavits is that an
officer of the Bluffton Police Department in Bluffton, South Carolina told Investigator
Schreiber that, while investigating an incident at NK’s South Carolina residence, NK
informed him that Wheeler would “penetrate his anus and that [NK] never previously
reported this to the authorities because [Wheeler] would pay him off.”11 The Affidavits
suggest that this took place in Illinois, but provide no other details regarding Wheeler’s
alleged tampering with NK.
The Affidavits state that MW spoke with authorities during the week of October
14, 2013. MW told personnel in the Department of Justice that approximately 35 years
ago, when he was 12 or 13 years old, Wheeler molested him. At the time, Wheeler was
22 or 23 years old. MW also stated that Wheeler molested SW when SW was a boy.12
11
A28 (Affidavit 1 ¶ 20).
12
A26 (Affidavit 1 ¶ 2). SW told Investigator Schreiber that Wheeler molested him when he
was approximately 13 to 15 years old. A28 (Affidavit 1 ¶ 15). SW stated that “the sexual abuse
took place multiple times over a period of months, possibly for a year.” A28 (Affidavit 1 ¶ 15).
7
MW advised that the sexual abuse took place when Wheeler lived at the W family
residence in West Chester, Pennsylvania.
The Affidavits refer to and quote from the italicized portions of the letters in the
previous section. The Affidavits also recount that the W brothers decided to confront
Wheeler about the abuse he had inflicted upon them. The first communication from the
W brothers to Wheeler occurred in July 2013.
According to the Affidavits, in July 2013, MW sent a letter to Wheeler,
confronting him about what had happened. TW also confronted Wheeler in a face-to-
face meeting in Wilmington, Delaware. On October 22, 2013, TW told Investigator
Schreiber, according to the Affidavits, that he and Wheeler “communicated via telephone
and e-mail using [Wheeler’s] Tower Hill [e]-[m]ail address to coordinate a meeting in
Wilmington and then to communicate since.”
The Affidavits provide that NK complained about Wheeler to MW’s mother when
visiting her home in West Chester, Pennsylvania. During a visit, NK “stated that his
father had abused him[,]” according to the Affidavits. When MW’s mother asked NK
what he meant, NK responded: “You know. You know.”
According to the Affidavits, on October 22, 2013, Investigator Schreiber contacted
Officer Anson Singleton of the Bluffton Police Department. The Affidavits then recite
the following: “Officer Singleton stated that while investigating the incident at [NK’s]
residence, [NK] told him that his dad would penetrate his anus and that he never
previously reported this to the authorities because his father would pay him off. When
the officer asked [NK] where this occurred, [NK] said it occurred when they lived in
8
Illinois.” The Affidavits did not provide a time frame as to when these events allegedly
occurred.
The first three sections of the Affidavits set forth the background of the affiants
(“Section A”), “Terms and Definitions” (“Section B”), and “Issues of Staleness
Associated with [C]omputer [I]nvestigations” (“Section C”). Sections A and B highlight
the extensive background of Chief Investigator Irwin in the area of crimes against
children, and generally describe electronic data, electronic filing systems, hard drives,
storage media, and Internet and local networks. The broad, sweeping “staleness” section,
comprised of five paragraphs, emphasizes that digital data can often be forensically
recovered “years after it [i]s written.”13
Against the backdrop of this boilerplate language, which underscores technology’s
capacity to preserve digital data for lengthy periods of time and the ability of forensic
experts to recover it, the concluding paragraphs of the Affidavits recite the history and
facts underlying the complaint (“Section D”). The concluding paragraphs of Section D
refer to documents, e-mails, and “other electronically stored communications,” and state
that cellular phones may contain evidence, including text messages and e-mails.
Although the investigators had copies of the letters referenced above, the Affidavits state
that “there may be evidence of written communications at the residence and the personal
work place [sic] of the subject” and that “[w]ritten communications were sent to the
13
Section C also states that, “[w]ith the advent of larger capacity hard-drives, removable media,
and CD/DVD burners over the past several years, the retention and therefore recovery of, data
from digital media has greatly increased.” A25. With respect to DVDs and CDs, Section C
observes that “[t]he data stored on them is highly stable and not usually subject to corruption
barring physical damage to the media itself.” A25-26.
9
victims . . . .” The affiant averred that “evidence of this correspondence may be envelope
[sic], letters, address books and handwritten notes.”
Later on October 22, 2013, the Wilmington Police Department and the State of
Delaware obtained the Witness Tampering Warrants.14
Despite mention of written communications in the Affidavits, the Witness
Tampering Warrants listed, under “ITEMS TO BE SEARCHED FOR AND SEIZED[,]”
the following broad categories of items:
2. Search the following location within the residence described herein the
application and affidavit [sic] to include but not limited to: locked or unlocked
safes, boxes, bags, compartments, storage areas or things in the nature thereof,
found in or upon said residence that could be used to contain evidence[.]
3. Any personal computer, computer system, device or component to include
desktop(s), laptop(s), notebook(s), PDA(s), or tower style systems capable of
storing, retrieving, and/or processing magnetic, digital or optical data and in
particular any such devices capable of connecting to or communicating with
the Internet or Internet Service Providers by any means including dial-up,
broadband, or wireless services.
4. Any digital or optical data storage device connected to, capable of being
connected to, read by, or capable of being read by, any item described in
paragraph 4, to include: internal or external hard drives (found within or
without any item seized pursuant to paragraph 4), mass storage devices, pen
drives, smart cards, compact disks(CD), compact disk – recordable (CD R) or
re-writable (CD RW), floppy diskettes, DVD+/- R or RW, or any other such
device that stores digital data optically, electronically, or magnetically.
5. Any cellular telephone, to include the registry entries, call logs, pictures, video
recordings[,] text messages, user names, buddy lists, screen names, telephone
numbers, writings or other digital material as it relates to this investigation.
14
The Applications, with respect to the items to be searched for and seized, are substantially
similar to the Witness Tampering Warrants. Compare A19, with A21-22. Compare A31, with
A33-34.
10
6. Any digital camera, digital video camera, optical camera, optical video camera,
cell phone, or other device capable of capturing and storing to any media,
photographs or images and the associated media there from [sic].
7. Any and all data, and the forensic examination thereof, stored by whatever
means on any items seized pursuant to paragraphs 4, 5, and 6, as described
above to include but not limited to: registry entries, pictures, images,
temporary internet files, internet history files, chat logs, writings, passwords,
user names, buddy names, screen names, email, connection logs, or other
evidence.
8. Any file, writing, log, artifact, paper, document, billing record or other
instrument, stored electronically or in printed form, which relates to or
references the owner of items seized pursuant to paragraphs [] 2, 3, 4, 5, 6, 7
and 8, as described above.15
After reviewing the Affidavits, a Superior Court judge (the “Issuing Judge”)
determined that there was probable cause for a search and seizure of Wheeler’s property.
The Witness Tampering Warrants were then issued.
D. The Search and Seizure
During the evening of October 22, 2013, law enforcement officers executed the
warrants for Wheeler’s home and office at Tower Hill. The team seized several
computers and other electronic devices, including: (1) two iMacs; (2) a Mac PowerBook
G4; (3) two external hard drives; (4) two iPhones; (5) a Tungsten Palm; (6) an iPad; (7) a
MacBook Pro; (8) 26 CDs; and (9) 23 DVDs.
After the Witness Tampering Warrants were executed, Sergeant Kevin Perna of
the Delaware State Police Department (“Sergeant Perna”)—a forensic examiner who, at
the time, had performed nearly 500 forensic examinations and taught classes related to
the subject at a local law school and the Delaware police academy—conducted a forensic
15
A19 (Warrant 1 ¶¶ 2-8) (emphasis added); A31 (Warrant 2 ¶¶ 2-8) (emphasis added).
11
search of the seized devices using EnCase. This was his first forensic examination using
EnCase, a software program utilized by law enforcement to forensically examine
computers and other electronics. Using this software, a forensic examiner can perform
keyword searches, access files that a standard computer search would not uncover, and
view “all the contents on [a] hard drive . . . .”16
Despite orders from Chief Investigator Irwin that directed Sergeant Perna to
search for “text-type” documents, Sergeant Perna’s forensic evaluation of Wheeler’s data
captured “image files” and “video files.”17 Sergeant Perna acknowledged that video and
image files were not implicated in the context of this case and were not subsumed within
his “more restrictive” marching orders from Chief Investigator Irwin.18
Sergeant Perna also acknowledged that the EnCase software enabled him to filter
Wheeler’s data by limiting the search results to certain file extensions, such as .doc, .text,
.pdf, which were among the items he was seeking, and that he could have removed image
and movie video files. He testified as follows:
Q. . . . So had you put those kind of conditions [sic] in, it would have
restricted the files that would have popped up and you would not have seen
video or image files; correct?
A. Yes.19
Instead of restricting his search, Sergeant Perna performed a review of the “folder
structure” on the iMac, including the “Desktop” folder, which enabled him to review all
16
A185 (Tr. 14:3-6).
17
See A194 (Tr. 47:6-8).
18
A193 (Tr. 43:10-13); A194 (Tr. 47:16-23).
19
A194 (Tr. 48:10-14).
12
of Wheeler’s digital files. He stated that he prefers to “see all of the files, . . . [so that he
can] find the ones that are pertinent and things that are not pertinent.”20 This cursory
search of the files on the hard drive of the iMac occurred while Sergeant Perna ran a
keyword search using the terms “witness intimidation” and “witness tampering.” During
this cursory review, he found files that appeared to be video files. Because these files—
labeled “GERBYS II” and “hippodrome boys large”—seemed suspicious, Sergeant Perna
asked Detective Scott Garland (“Detective Garland”) if he was familiar with them.
Detective Garland explained that these titles were related to child pornography.
Based upon Sergeant Perna’s discovery of these two files, on October 29, 2013,
the State obtained an additional search warrant from the Kent County Superior Court to
search previously seized devices for child pornography (the “Child Pornography
Warrant”).21 The Child Pornography Warrant authorized the search and seizure of digital
devices the investigators already had in their custody.22 The State did not open the video
files until it obtained the Child Pornography Warrant.23 After viewing the files, the State
sought and obtained an indictment against Wheeler on charges of Dealing in Child
Pornography under 11 Del. C. § 1109(4).
E. The Indictment
20
A197 (Tr. 62:19-21).
21
On October 23, 2013, a separate search warrant was obtained for Wheeler’s 2011 Chevrolet
Tahoe. On October 25, 2013, the State also obtained a search warrant for Wheeler’s airplane.
22
The application for the Child Pornography Warrant contained a broad “catch-all” provision
that was nearly identical to the catch-all provision in the Witness Tampering Warrants, all of
which permitted the search, seizure, and forensic examination of “[a]ny and all data” on
Wheeler’s devices.
23
Wheeler correctly maintains that, if his challenge to the Witness Tampering Warrants is
successful, all evidence seized and recovered thereafter represents “fruit of the poisonous tree.”
13
On December 9, 2013, a Grand Jury returned an indictment against Wheeler. The
indictment charged Wheeler with 25 counts of Dealing in Child Pornography in violation
of 11 Del. C. § 1109(4). In relevant part, the statute provides:
A person is guilty of dealing in child pornography when: . . . (4) The
person, intentionally compiles, enters, accesses, transmits, receives,
exchanges, disseminates, stores, makes, prints, reproduces or otherwise
possesses any photograph, image, file, data or other visual depiction of a
child engaging in a prohibited sexual act or in the simulation of such an
act.24
Of the 19 devices seized from Wheeler’s home and office, three contained images
of child pornography. The indictment was based upon 25 images recovered from the
newsgroup cache on Wheeler’s iMac. The iMac itself had not been turned on since
September 29, 2012.25 Of the 25 images of child pornography, only one was cached after
2009. Specifically, one image was cached on September 2, 2005, one image was cached
on January 1, 2010, and the remaining images were cached between July and September
2009.
F. The Motion to Suppress
On May 5, 2014, Wheeler filed the Motion to Suppress. On May 23, 2014, the
Superior Court held a hearing on the Motion to Suppress. The State presented the
testimony of Sergeant Perna. Wheeler presented testimony from his expert witness, Tami
L. Loehrs (“Loehrs”). Sergeant Perna testified that he was looking for evidence of
witness tampering and witness intimidation, particularly in the form of “text-type”
24
11 Del. C. § 1109(4).
25
A245 (Tr. 49:5-10). As Sergeant Perna testified, the forensic significance of the date of last
access merely signified the date on which the computer was last powered on, and it did not
reflect that any newsgroup or newsreader was accessed on that date. A245 (Tr. 49:11-17).
14
documents. On cross-examination, he agreed that the Witness Tampering Warrants’ lists
of items to be searched for and seized were “almost virtually identical to exactly the list
[one] would see in a child pornography case.” He also agreed that the Witness
Tampering Warrants essentially had no limitations and that the warrants, on their face,
were “wide open.”
The Superior Court heard final arguments from the parties on the Motion to
Suppress on July 11, 2014. The State, again, conceded that the substance of the Witness
Tampering Warrants “could be viewed as a cut-and-paste from a [warrant related to]
child porn[.]”26 Further, at oral argument before this Court, the State conceded that the
Witness Tampering Warrants did not contain “anything particularized from the evidence
that they were . . . searching.”27
On September 18, 2014, the Superior Court issued its Opinion denying Wheeler’s
Motion to Suppress.28 The Superior Court did not explicitly address the issue of whether
the Witness Tampering Warrants were general warrants in violation of the Fourth
Amendment to the United States Constitution, Article I, § 6 of the Delaware Constitution,
and 11 Del. C. § 2307(a).
G. The Bench Trial
26
A230 (Tr. 34:16-19) (The Superior Court: “How do you address the issue that this could be
viewed as a cut-and-paste from a child porn [warrant]?” Prosecutor: “Well, [Y]our Honor, I
don’t -- the State concedes that.”).
27
Videotape: Oral Argument before the Delaware Supreme Court, at 43:35 (Christopher
Wheeler v. State of Delaware, No. 205, 2015, Jan. 20, 2016), archived at
http://livestream.com/accounts/5969852/events/4710274/videos/109946633/player?autoPlay=fal
se&height=360&mute=false&width=640 [hereinafter, “Oral Argument at __”].
28
See generally State v. Wheeler, 2014 WL 4735126 (Del. Super. Sept. 18, 2014) [hereinafter,
“Wheeler I, 2014 WL 4735126, at __”].
15
On October 7, 2014, the Superior Court held a bench trial. The parties stipulated
to the facts that Wheeler was the sole user of each of the seized devices and that each of
the 25 images at issue constituted child pornography under Delaware law. Wheeler did
not take the stand in his defense, and the sole witness at trial was Sergeant Perna.
However, since becoming EnCase certified in 2013, Sergeant Perna had never performed
a child pornography-related forensic examination before his evaluation of Wheeler’s
digital universe.29
At trial, it was undisputed that the charged images came to be on each of
Wheeler’s devices through his subscription to newsgroups. Newsgroups are Internet
discussion groups in which people exchange, browse, upload, and download files, which
can be documents, photos, or videos. It was also undisputed that there is nothing illegal
about newsgroups as a general matter, and that they exist on a variety of legitimate
topics. Because the 25 indicted images were found in the newsgroup cache, the State
agreed throughout the proceedings that this was not an Internet case. Nor was an
indictment obtained with respect to Wheeler’s Internet activity.
Sergeant Perna testified that the 25 charged images were found in two newsgroups
that Wheeler subscribed to: “alt.binaries.pictures.asparagus” and “alt.fan.air.”30
However, Sergeant Perna acknowledged that there is no way to forensically determine
whether a newsreader user has viewed any particular file. Accordingly, at oral argument
29
Sergeant Perna’s testimony in this case represented the first time that he had ever testified as
an expert in a child pornography trial.
30
A240 (Tr. 29:8-31:6). Sergeant Perna found four newsgroups related to child pornography
that Wheeler subscribed to on the PowerBook: “alt.binaries.pictures.asparagus,”
“alt.fan.prettyboy,” “alt.fan.rdm,” and “alt.fan.snuffles.” Id. at Tr. 31:11-32:6.
16
before this Court, the State conceded that it could not conclusively prove that Wheeler
ever viewed the 25 charged images at issue.31
At trial, Sergeant Perna acknowledged that he had no expertise concerning
newsgroups or newsreaders.32 He explained that information from newsgroups
automatically caches on the subscriber’s computer, regardless of whether the user
accesses that information. But if Wheeler had downloaded the images of child
pornography from the newsgroups, Sergeant Perna agreed that such images should have
appeared somewhere other than the cache on Wheeler’s computer. Here, the 25 charged
images appeared only in the cache. Accordingly, Sergeant Perna conceded that the
government could not forensically establish that Wheeler ever viewed the 25 indicted
images:
Q. Fair to say that the 25 charged images here found in the cache, you cannot
forensically say whether or not they were ever viewed, correct, you can simply say
they cached?
A. Cached.33
* * *
Q. But it is possible that not only was the image never viewed, but the
news[]group wasn’t even visited on those dates when they cached, correct?
A. Correct.34
* * *
31
See Oral Argument at 52:20.
32
See A243 (Tr. 43:6-8) (Q. [Newsreaders are] not something that you had a lot of expertise
about, correct? A. No, sir.).
33
A250 (Tr. 71:4-8).
34
A251 (Tr. 76:12-15).
17
Q. And you cannot say that Mr. Wheeler actually opened up and viewed the
news[]groups on the days in question?
A. No.
Q. And you cannot say that he ever viewed any of the images that he has been
charged for, correct?
A. No.35
* * *
Q. All you can tell is what news[]group the person has selected a box [sic],
correct?
A. Yes.
Q. You can never know if they ever even viewed that particular news box,
much less the contents within?
A. No.36
Based upon such testimony, Wheeler argued that the State had not adequately proved that
he possessed the indicted images because the State failed to establish that he even viewed
the images.
H. The Motion for Judgment of Acquittal
Between the close of evidence and closing arguments, Wheeler filed his Motion
for Judgment of Acquittal. On December 22, 2014, the Superior Court denied Wheeler’s
Motion for Judgment of Acquittal, finding Wheeler guilty of each of the 25 indicted
counts of Dealing in Child Pornography. The trial court concluded that the evidence
demonstrated that “Wheeler developed a pattern of Internet browsing for child
35
A252 (Tr. 80:7-13).
36
A253 (Tr. 82:22:-83:5).
18
pornography.”37 In part, the trial court reasoned that “[t]he sheer number of images . . .
supports the reasonable inference that Mr. Wheeler intentionally, as opposed to
inadvertently, possessed child pornography.”38
On April 24, 2015, Wheeler was sentenced to 50 years at Level V. Two days
later, on April 26, 2015, Wheeler filed his Notice of Appeal in this Court.
I. Proceedings Before this Court
Wheeler appeals from the Superior Court’s denial of both of his motions, although
he focuses primarily on the trial court’s denial of his Motion to Suppress. As to the
Motion to Suppress, he contends that the Superior Court erred because: (1) the Affidavits
failed to establish probable cause that he committed the alleged witness tampering
crimes; (2) the State deliberately and recklessly omitted information from the Affidavits
that was material to the Issuing Judge’s probable cause determination; (3) the Affidavits
failed to establish the required nexus between evidence of witness tampering and the
items to be searched for and seized; and (4) the Witness Tampering Warrants were
unconstitutionally overbroad.
37
State v. Wheeler, 2014 WL 7474234, at *13 (Del. Super. Dec. 22, 2014) [hereinafter, “Wheeler
II, 2014 WL 7474234, at __”]. Although the State filed no charges relating to 2,000 images of
child pornography and 3,000 images of child erotica discovered across Wheeler’s digital
universe, it argued that these images were evidence of Wheeler’s intentional possession, receipt,
and compilation of the 25 charged images. Further, although the record is not entirely clear, the
State contends that these images were downloaded from the Internet through the use of
newsgroups. Ans. Br. 5. The trial court relied upon the 2,000 images of child pornography as
evidence that Wheeler intentionally, as opposed to inadvertently, possessed the 25 charged
images. Wheeler II, 2014 WL 7474234, at *13. Sergeant Perna found a program called
“NetShred X” on certain of Wheeler’s devices. According to Sergeant Perna, NetShred X is a
program that erases a user’s Internet activity from the computer’s hard drive. See A242 (Tr.
37:10-14). Notably, the State agrees that this is not an Internet case.
38
Wheeler II, 2014 WL 7474234, at *13.
19
Because we conclude that the Witness Tampering Warrants are prohibited general
warrants, we do not reach Wheeler’s assertion that no probable cause existed to issue the
Witness Tampering Warrants. We briefly address it only insofar as it bears on the
constitutional analysis and provides useful context.
The witness tampering charges relate to three individuals: NK and two of the W
brothers. As to NK, the Affidavits suggest that he never reported Wheeler’s sexual abuse
to the police because “his father would pay him off.”39 But the State conceded during
oral argument before this Court that there was likely no evidence of the witness
tampering that allegedly occurred in Illinois present in Wheeler’s Delaware home or
office: according to the State, the police were “not going to find anything regarding
[NK], the son.”40
That leaves the W brothers’ allegations as a possible basis for justifying the search
and seizure of Wheeler’s property. As to the W brothers, the Affidavits establish that
they initiated communication with Wheeler beginning in July 2013. But Sergeant Perna
searched Wheeler’s iMac for evidence of witness tampering related to such
communication, despite the fact that the iMac had not been powered on since September
2012. Upon discovering that the iMac had last been turned on in 2012, Sergeant Perna
39
Wheeler argues that “the [A]ffidavits do not allege that any witness tampering of [NK]
occurred in Delaware or within 5 years to satisfy [Delaware’s] statute of limitations.” Op. Br.
20. The record evidence indicates that Wheeler’s alleged “pay offs” to NK occurred in Illinois,
years before the underlying search. Specifically, the Affidavits suggest that this conduct
occurred when Wheeler and NK lived in Illinois, but do not indicate whether NK provided the
Bluffton Police with particular dates as to when the pay offs were made. Nor was any evidence
presented to this Court showing that such payments were made.
40
Oral Argument at 40:25.
20
should have terminated his forensic examination of the device since it could not contain
information from the relevant time frame.
Further, Wheeler argues that none of the evidence presented creates a reasonable
inference that he acted “knowingly and with malice.”41 In his July 20, 2013 letter to
Wheeler, SW first raised the matter of restitution and Wheeler responded that he would
wait to hear from SW “about further appropriate steps towards resolution and restitution.”
Whether an offer of civil restitution forms a sufficient basis for witness tampering and
intimidation charges—such that it establishes that the offeror acts knowingly and with
malice in attempting to undermine any trial, proceeding, or inquiry—presents a question,
where, as here, the offer of restitution is responsive to a request from the potential
witness, is accompanied by an admission of guilt, and does not indicate an intention to
prevent the potential witness from contacting law enforcement. We do not address these
other important arguments, since we think it is clear that the challenged warrants were of
a kind which it was the purpose of the Fourth Amendment to forbid—general warrants.
Thus, even accepting for the sake of argument that the Witness Tampering Warrants were
issued upon probable cause, the order denying the Motion to Suppress must be reversed.
41
See 11 Del. C. § 1263 (“A person is guilty of tampering with a witness when: . . . (3) The
person knowingly intimidates a witness or victim under circumstances set forth in subchapter III
of Chapter 35 of this title.”). A person is guilty of the Act of Intimidating a Witness when that
person “knowingly and with malice attempts to prevent another person who has been the victim
of a crime, or a witness to a crime (or any person acting on behalf of a victim or witness) from”
engaging in certain enumerated acts related to the administration or enforcement of the law. See
11 Del. C. § 3532.
Wheeler also raises a reverse-Franks claim pursuant to the United States Supreme
Court’s decision in Franks v. Delaware, 438 U.S. 154 (1978). He contends that the State
intentionally or recklessly omitted material information from the Affidavits. Because we find
that the Witness Tampering Warrants are unconstitutionally general, we also need not reach this
issue.
21
II. ANALYSIS
In assessing Wheeler’s challenge to the Witness Tampering Warrants on the
grounds that they violated the Fourth Amendment to the United States Constitution and
Article I, § 6 of the Delaware Constitution, we review such alleged constitutional
violations de novo.42 We also apply de novo review to the Superior Court’s legal
conclusions when reviewing the denial of a motion to suppress.43 “We review the
Superior Court’s factual findings to determine ‘whether there was sufficient evidence to
support the findings and whether those findings were clearly erroneous.’”44
A. The Fourth Amendment to the United States Constitution, Article I, § 6 of the
Delaware Constitution, and 11 Del. C. § 2307(a)
The Fourth Amendment to the United States Constitution provides: “The right of
the people to be secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation, and particularly describing the place to
be searched, and the persons or things to be seized.”45 The United States Supreme Court
has observed that “the ultimate touchstone of the Fourth Amendment is
‘reasonableness[.]’”46
Similarly, Article I, § 6 of the Delaware Constitution provides: “The people shall
be secure in their persons, houses, papers and possessions, from unreasonable searches
42
Bradley v. State, 51 A.3d 423, 433 (Del. 2012) (citing Swan v. State, 28 A.3d 362, 382 (Del.
2011); LeGrande v. State, 947 A.2d 1103, 1107 (Del. 2008)).
43
Id. (citing Lopez-Vazquez v. State, 956 A.2d 1280, 1284-85 (Del. 2008)).
44
Id. (quoting Lopez-Vazquez, 956 A.2d at 1285).
45
U.S. Const. amend. IV.
46
Brigham City v. Stuart, 547 U.S. 398, 403 (2006) (citations omitted).
22
and seizures; and no warrant to search any place, or to seize any person or thing, shall
issue without describing them as particularly as may be; nor then, unless there be
probable cause supported by oath or affirmation.”47 In addition to the Delaware
Constitution, 11 Del. C. § 2307(a), in part, provides: “The warrant shall designate the
house, place, conveyance or person to be searched, and shall describe the things or
persons sought as particularly as possible.”48
1. Our Founding Fathers Rejected “General Warrants”
Our nation’s constitutional history and jurisprudence reflects a long-standing
hostility towards general warrants. General warrants, when employed by the
government, afford officials “blanket authority” to indiscriminately search persons,
houses, papers, and effects.49 The United States Supreme Court has characterized “the
specific evil” of the general warrant abhorred by the colonists as “a general, exploratory
rummaging in a person’s belongings.”50 By contrast, a warrant that is simply overly
47
Del. Const. art. I, § 6.
48
11 Del. C. § 2307(a) (emphasis added).
49
Stanford v. Texas, 379 U.S. 476, 481 (1965); see also United States v. Tracey, 597 F.3d 140,
154 (3d Cir. 2010) (“Examples of general warrants are those authorizing searches for and
seizures of such vague categories of items as ‘smuggled goods,’ ‘obscene materials,’ ‘books,
records, pamphlets, cards, receipts, lists, memoranda, pictures, recordings and other written
instruments . . .,’ ‘illegally obtained films,’ and ‘stolen property.’”) (internal quotation marks
omitted) (citation omitted).
50
Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971) (citing Boyd v. United States, 116 U.S.
616, 624-30 (1886); Marron v. United States, 275 U.S. 192, 195-96 (1927); Stanford, 379 U.S.
476).
23
broad “‘describe[s] in both specific and inclusive generic terms what is to be seized,’ but
it authorizes the seizure of items as to which there is no probable cause.”51
The aversion to general warrants stems from the founding generation’s pre-
revolutionary experiences with England.52 As early as 1685, the English Parliament
objected to the Crown’s use of broad searches to limit freedom of the press.53 In 1765, an
English court denounced this practice in the well-known Entick v. Carrington54 case,
where a London publisher successfully sued for trespass after his home was searched
pursuant to a general warrant.55
During the colonial era, the English issued writs of assistance upon mere suspicion
and gave customs officials blanket authority to search where they pleased for smuggled
goods and evidence of libel in the homes of colonists.56 In 1761, a group of Boston
merchants, represented by James Otis, Jr., unsuccessfully contested the issuance of new
51
United States v. Ninety-Two Thousand Four Hundred Twenty-Two Dollars & Fifty-Seven
Cents ($92,422.57), 307 F.3d 137, 149 (3d Cir. 2002) (Alito, J.) (alteration in original) (quoting
United States v. Christine, 687 F.2d 749, 753-54 (3d Cir. 1982)).
52
The roots of this aversion are far more extensive. It stems from “a struggle against oppression
which had endured for centuries.” Stanford, 379 U.S. at 482 (“[I]t would be a needless exercise
in pedantry to review again the detailed history of the use of general warrants as instruments of
oppression from the time of the Tudors, through the Star Chamber, the Long Parliament, the
Restoration, and beyond.”).
53
1 WAYNE R. LAFAVE, SEARCH & SEIZURE § 1.1(a) (5th ed.) (citing F. SIEBERT, FREEDOM OF
THE PRESS IN ENGLAND: 1476-1776 48, 84-85, 173-76 (1952); N. LASSON, THE HISTORY AND
DEVELOPMENT OF THE FOURTH AMENDMENT TO THE UNITED STATES CONSTITUTION 38–39
(1937) (noting that Parliament recognized “the idea that general warrants were an arbitrary
exercise of governmental authority against which the public had a right to be safeguarded”)).
54
19 Howell’s St. Tr. 1029 (1765).
55
See Boyd, 116 U.S. at 625-26 (discussing Carrington and a similar case, Wilkes v. Wood);
LAFAVE, § 1.1(a) (citing Carrington, 19 Howell’s St. Tr. 1029).
56
Boyd, 116 U.S. at 625-26 (noting the English government’s practice of “searching private
houses for the discovery and seizure of books and papers that might be used to convict their
owner of the charge of libel”).
24
writs.57 John Adams witnessed Otis’s arguments at the Old State House in Boston.58 As
Adams later reported, the crowd departed “ready to take arms against writs of assistance.
. . . Then and there the Child Independence was born.”59 The United States Supreme
Court has characterized Otis’s denunciation of the Crown’s search power as “perhaps the
most prominent event which inaugurated the resistance of the colonies to the oppressions
of the mother country.”60
The Fourth Amendment “‘grew directly out of the events which immediately
preceded the revolutionary struggle with England.’”61 Its passage “was the founding
generation’s response to the reviled ‘general warrants’ and ‘writs of assistance’ of the
colonial era, which allowed British officers to rummage through homes in an
unrestrained search for evidence of criminal activity.”62 Indeed, initial efforts at crafting
a Federal Constitution met strong opposition due, in part, to the drafters’ failure to
impose limits on the government’s power to search.63 These objections ultimately led to
the inclusion of the Fourth Amendment in the Federal Bill of Rights.64
57
LAFAVE, § 1.1(a).
58
Id.
59
Id. (quoting 10 C. ADAMS, THE LIFE AND WORKS OF JOHN ADAMS 247–48 (1856)) (alteration
in original) (internal quotation marks omitted).
60
Boyd, 116 U.S. at 625.
61
LAFAVE, § 1.1(a) (quoting J. LANDYNSKI, SEARCH AND SEIZURE AND THE SUPREME COURT 19
(1966)).
62
Riley v. California, 134 S. Ct. 2473, 2494 (2014).
63
LAFAVE, § 1.1(a) (citing LASSON, at 92–96).
64
Cf. Mason v. State, 534 A.2d 242, 246-47 n.10 (Del. 1987) (“The amendment in the Bill of
Rights concerning searches and seizure was framed and adopted with the fresh recollection of the
debates on writs of assistance and the Revolution which followed.”) (citing Davis v. United
States, 328 U.S. 582, 605 (1946) (Frankfurter, J., dissenting)); id. at 246 (“The Framers were
aware of the attempts that had been made by representatives of the King of England, both in
25
2. Delaware’s Search and Seizure Protections
The search and seizure protections in the Delaware Constitution preceded the
adoption of the Fourth Amendment.65 In 1776, Delaware adopted its own constitutional
protections against general warrants66 and embraced the first search and seize safeguards
for its citizens.67 The Declaration of Rights and Fundamental Rules of the Delaware
State provided:
Sect. 17. That all warrants without oath to search suspected places, or to
seize any person or his property, are grievous and oppressive; and all
general warrants to search suspected places, or to apprehend all persons
suspected, without naming or describing the place or any person in special,
are illegal and ought not to be granted.68
This provision was the antecedent to the provision now found in Article I, § 6 of the
present Delaware Constitution.
On January 28, 1790, Delaware ratified the Bill of Rights to the United States
Constitution.69 But when Delaware subsequently adopted a new State Constitution in
1792, it closely tracked the language of the Pennsylvania Constitution of 1790.70 In
previous cases, this Court has held that our Constitution affords our citizens protections
England and in the American colonies, to exceed laws which confined governmental powers to
search.”).
65
Id. at 247 (“Delaware’s protections against unreasonable searches and seizures predate those
which are provided for in the Fourth Amendment.”); see also Jones v. State, 745 A.2d 856, 865
(Del. 1999).
66
See Dorsey v. State, 761 A.2d 807, 815-16 (Del. 2000).
67
See Jones, 745 A.2d at 865.
68
Id.
69
Id. (citation omitted).
70
Id. at 865-66.
26
somewhat greater than those of the Fourth Amendment.71 Here, the challenged Witness
Tampering Warrants violate both the United States and Delaware Constitutions.
The warrant requirement addresses the Framers’ concerns in two ways. “First, the
magistrate’s scrutiny is intended to eliminate altogether searches not based on probable
cause.”72 Second, the warrant requirement ensures that “those searches deemed necessary
[are] as limited as possible[,]” as the evil of unrestrained searches “is not that of intrusion
per se, but of a general, exploratory rummaging in a person’s belongings.”73
The second objective is achieved by enforcing the particularity requirement of the
Fourth Amendment. The warrant must describe the things to be searched with sufficient
particularity and be no broader than the probable cause on which it is based.74 “The
manifest purpose of this particularity requirement [i]s to prevent general searches. By
limiting the authorization to search to the specific areas and things for which there is
probable cause to search, the requirement ensures that the search will be carefully tailored
71
For instance, we note three cases in which this Court held that our State Constitution provides
somewhat broader constitutional protections. First, despite observing that the language of the
Fourth Amendment and Article I, § 6 is “nearly identical,” we have held that “the Delaware
Constitution provides a greater protection for the individual than the United States Constitution
in the determination of whether a seizure by the State has occurred.” Flonnory v. State, 805
A.2d 854, 857 (Del. 2001) (citing Jones, 745 A.2d at 863-64). Second, in Dorsey v. State, this
Court held that the “good faith” exception to the exclusionary rule did not apply in Delaware
because “exclusion is the constitutional remedy for a violation of the search and seizure
protections set forth in Article I[,] Section 6 of the Delaware Constitution.” Dorsey, 761 A.2d at
821 (citing Jones, 745 A.2d at 873-74) (citation omitted). Third, for more than 150 years, “a
Delaware statute has required more than probable cause for the issuance of a nighttime search
warrant.” Id. at 819 (citing Mason, 534 A.2d at 248) (emphasis in original).
72
Coolidge, 403 U.S. at 467 (emphasis added).
73
Id. (citing Boyd, 116 U.S. at 624-30; Marron, 275 U.S. at 195-96; Stanford, 379 U.S. 476).
74
United States v. Zimmerman, 277 F.3d 426, 432 (3d Cir. 2002) (citation omitted).
27
to its justifications, and will not take on the character of the wide-ranging exploratory
searches the Framers intended to prohibit.”75
B. The Particularity Requirement Presents Difficult Challenges in the Context of
Computer Searches
Warrants directed to digital information present unique challenges in satisfying the
particularity requirement, given the unprecedented volume of private information stored
on devices containing such data.76 The expansive universe of digital and electronic
information, and the intermingling data, complicates balancing the privacy interests of
our citizens and the legitimate efforts of law enforcement in investigating criminal
activity.77
The United States Supreme Court, in Riley v. California,78 recognized the
enormous potential for privacy violations flowing from unconstrained searches of cell
phones.79 The Riley Court, in considering a warrantless search of a cell phone, observed
that, much like a computer search, “[a cell] phone not only contains in digital form many
75
Maryland v. Garrison, 480 U.S. 79, 84 (1987) (citations omitted); see also Arizona v. Gant,
556 U.S. 332, 345 (2009) (“[T]he central concern underlying the Fourth Amendment [is] the
concern about giving police officers unbridled discretion to rummage at will among a person’s
private effects.”) (citations omitted).
76
See Riley, 134 S. Ct. at 2494-95 (“Modern cell phones are not just another technological
convenience. With all they contain and all they may reveal, they hold for many Americans ‘the
privacies of life[.]’”) (quoting Boyd, 116 U.S. at 630).
77
Cf. Kyllo v. United States, 533 U.S. 27, 33-34 (2001) (Scalia, J.) (“It would be foolish to
contend that the degree of privacy secured to citizens by the Fourth Amendment has been
entirely unaffected by the advance of technology.”).
78
134 S. Ct. 2473 (2014).
79
See id. at 2489 (“Cell phones differ in both a quantitative and a qualitative sense from other
objects that might be kept on an arrestee’s person. The term ‘cell phone’ is itself misleading
shorthand; many of these devices are in fact minicomputers that also happen to have the capacity
to be used as a telephone. They could just as easily be called cameras, video players, rolodexes,
calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers.”).
28
sensitive records previously found in the home; it also contains a broad array of private
information never found in a home in any form . . . .”80 As the Supreme Court
acknowledged in Riley, digital searches permit the government access to “far more than
the most exhaustive search of a house . . . .”81
The United States Constitution “specifies only two matters that must be
‘particularly describ[ed]’ in the warrant: ‘the place to be searched’ and ‘the persons or
things to be seized.’”82 Satisfying the particularity requirement is difficult in the
electronic search warrant context, given the commingling of relevant and irrelevant
information and the complexities of segregating responsive files ex ante. As the United
States Court of Appeals for the Third Circuit observed, “it would be ‘folly for a search
warrant to structure the mechanics of the search’ because ‘imposing such limits would
unduly restrict legitimate search objectives . . . .’”83 Nonetheless, in an oft-quoted
passage of Marron v. United States,84 the United States Supreme Court observed that
“[t]he requirement that warrants shall particularly describe the things to be seized makes
general searches under them impossible and prevents the seizure of one thing under a
warrant describing another. As to what is to be taken, nothing is left to the discretion of
the officer executing the warrant.”85 Accordingly, the United States Supreme Court has
80
Id. at 2491.
81
Id. (emphasis in original).
82
United States v. Grubbs, 547 U.S. 90, 97 (2006) (alteration in original).
83
United States v. Stabile, 633 F.3d 219, 238 (3d Cir. 2011) (quoting United States v. Burgess,
576 F.3d 1078, 1094 (10th Cir. 2009), cert. denied, 558 U.S. 1097 (2009)), cert. denied, 132 S.
Ct. 399 (2011).
84
275 U.S. 192 (1927).
85
Id. at 196.
29
suggested that warrants that fail to describe the specific crime that has been or is being
committed do not satisfy the particularity requirement.86
Warrants “must be tested by courts in a commonsense and realistic fashion,” and
reviewing courts should avoid a “hypertechnical approach.”87 The majority of Federal
Courts of Appeals have rejected the suggestion of requiring specific computer search
protocols. For example, in United States v. Richards,88 the Court of Appeals for the Sixth
Circuit observed that:
[G]iven the unique problem encountered in computer searches, and the
practical difficulties inherent in implementing universal search
methodologies, the majority of federal courts have eschewed the use of a
specific search protocol and, instead, have employed the Fourth
Amendment’s bedrock principle of reasonableness on a case-by-case basis:
While officers must be clear as to what it is they are seeking on the
computer and conduct the search in a way that avoids searching files of
types not identified in the warrant, . . . a computer search may be as
extensive as reasonably required to locate the items described in the warrant
based on probable cause.89
86
See, e.g., Berger v. New York, 388 U.S. 41, 55-56 (1967) (“The Fourth Amendment commands
that a warrant issue not only upon probable cause supported by oath or affirmation, but also
‘particularly describing the place to be searched, and the persons or things to be seized.’ [The
scrutinized] statute lacks this particularization. . . . It lays down no requirement for particularity
in the warrant as to what specific crime has been or is being committed, nor ‘the place to be
searched,’ or ‘the persons or things to be seized’ as specifically required by the Fourth
Amendment.”). Here, while the Applications and Affidavits refer to the crimes alleged, the
Witness Tampering Warrants do not.
87
Christine, 687 F.2d at 760 (citations omitted) (internal quotation marks omitted).
88
659 F.3d 527 (6th Cir. 2011), cert. denied, 132 S. Ct. 2726 (2012).
89
Id. at 538 (citations omitted) (internal quotation marks omitted). But see In re Search
Warrant, 71 A.3d 1158 (Vt. 2012) (drawing from the guidelines set forth in United States v.
Comprehensive Drug Testing, Inc. (CDT I), 579 F.3d 989 (9th Cir. 2009) and the concurring
Opinion in United States v. Comprehensive Drug Testing, Inc. (CDT II), 621 F.3d 1162 (9th Cir.
2010) (en Banc) (per curiam) (Kozinski, C.J., concurring) regarding imposing ex ante limitations
on computer searches)), cert. denied, 133 S. Ct. 2391 (2013).
30
Some irrelevant files may have to be at least cursorily perused to determine whether they
are within the authorized search ambit. Accordingly, the proper metric of sufficient
specificity is whether it was reasonable to provide a more specific description of the
items at that juncture of the investigation.90
Further, the propensity of criminals to disguise files must be balanced against the
competing interest of avoiding unrestrained general searches: “It is unrealistic to expect
a warrant to prospectively restrict the scope of a search by directory, filename or
extension or to attempt to structure search methods—that process must remain
dynamic.”91 “[I]t is clear that because criminals can—and often do—hide, mislabel, or
manipulate files to conceal criminal activity, a broad, expansive search of the hard drive
may be required.”92 Consequently, it would likely unduly restrict law enforcement to
require the crafting of specific keyword searches or identification of file names and
extensions ex ante. In some instances, the technological reality may be that, “in the end,
there may be no practical substitute for actually looking in many (perhaps all) folders and
sometimes at the documents contained within those folders, and that is true whether the
90
See, e.g., Christine, 687 F.2d at 760 (“[T]he use of generic classifications in a warrant is
acceptable when a more precise description is not feasible.”) (citations omitted).
91
Burgess, 576 F.3d at 1093 (“While file or directory names may sometimes alert one to the
contents . . ., illegal activity may not be advertised even in the privacy of one’s personal
computer—it could well be coded or otherwise disguised.” (footnote omitted)).
92
Stabile, 633 F.3d at 237 (citing Burgess, 576 F.3d at 1092-94).
31
search is of computer files or physical files.”93 “[N]o tenet of the Fourth Amendment
prohibits a search merely because it cannot be performed with surgical precision.”94
This Court has addressed Fourth Amendment challenges in the digital context on
two occasions. But in neither case did we confront directly a challenge that a warrant
seeking digital information failed to satisfy the particularity requirement in the United
States and Delaware Constitutions.
In the more recent of the cases, Bradley v. State,95 we considered whether the
search exceeded the scope of the warrants, but not whether the warrants were
unconstitutionally general. Bradley argued, among other things, that the police exceeded
the scope of the warrant in executing the instrument and that the supporting affidavit
failed to establish probable cause that patient files would be found in digital format. This
Court concluded that “the computers and digital storage devices could reasonably contain
the patient files described in the warrant, whether in text or image form.”96 Thus, in
Bradley, there was no basis for segregating text files from other types of files because
probable cause allowed for the search of both.
Likewise, in the earlier case of Fink v. State,97 the State obtained a warrant to
search the residence and automobile of the defendant, who was an attorney, for “client
files including but not limited to” specifically listed clients and the personal banking
93
Burgess, 576 F.3d at 1094; see also Ninety-Two Thousand, 307 F.3d at 150 (suggesting that, in
some instances, it may be “necessary to search for and seize all” files when executing a search
warrant).
94
Christine, 687 F.2d at 760.
95
51 A.3d 423 (Del. 2012).
96
Id. at 435.
97
817 A.2d 781 (Del. 2003).
32
records of the defendant. During the execution of the third of three search warrants, the
police recovered a computer compact disk and three zip disks, each of which contained
child pornography. The defendant argued that the warrant lacked sufficient particularity
and that the words, “client files including but not limited to,” were overly broad and
failed to adequately limit the search to those items for which probable cause had been
established. This Court rejected the overbreadth claim, since the defendant’s financial
dealings at issue “effectively opened all his financial records to potential scrutiny by the
police.”98 Accordingly, we held that “the warrant’s authorized search did not
unreasonably exceed a logical scope of inquiry.”99 However, this Court did not more
directly address the permissible scope of warrants seeking digital information.100
Thus, we consider more directly, for the first time, a challenge to warrants seeking
to seize and search computer-based and digital items on the grounds that they are in the
nature of a general warrant, unconstitutionally overbroad, and lack sufficient
particularity. We have considered how other courts have addressed similar claims. In
98
Id. at 787.
99
Id.; see also United States v. Am. Investors of Pittsburgh, Inc., 879 F.2d 1087, 1105-06 (3d
Cir. 1989) (“The fact that the warrant authorized a search for a large amount of documents and
records does not necessarily render the search invalid so long as there exists a sufficient nexus
between the evidence to be seized and the alleged offenses.”).
100
In Starkey v. State, 2013 WL 4858988 (Del. Sept. 10, 2013), this Court addressed a claim that
the search warrants at issue were overbroad, ambiguous, and failed to provide the relevance of
the defendant’s “cell phone files” to the alleged crimes. This Court rejected the claim that the
warrants were vague since “they specifically limited the officer’s search of the cell phones to
certain types of data, media, and files that were ‘pertinent to th[e] investigation.’” Id. at *4. We
held that “[t]his language effectively limited the scope of the warrants, and prevented a
boundless search of the cell phones.” Id. (citing Fink, 817 A.2d at 786).
33
United States v. Riccardi,101 for example, the United States Court of Appeals for the
Tenth Circuit considered whether a warrant to seize and examine a defendant’s computer
failed to satisfy the Fourth Amendment’s particularity requirement. There, the defendant
was convicted of two counts of possession of child pornography and two counts of use of
an instrumentality of interstate commerce to entice a minor to engage in a prohibited sex
act.
The Tenth Circuit held that the challenged warrant failed to satisfy the Fourth
Amendment’s particularity requirement. It stated that the warrant “was not limited to any
particular files, or to any particular federal crime. The warrant authorized the ‘seizure’ of
[the defendant’s] computer”
and all electronic and magnetic media stored therein, together with all
storage devises [sic], internal or external to the computer or computer
system, including but not limited to floppy disks, diskettes, hard disks,
magnetic tapes, removable media drives, optical media such as CD–ROM,
printers, modems, and any other electronic or magnetic devises [sic] used
as a peripheral to the computer or computer system, and all electronic
media stored within such devises [sic].102
The Tenth Circuit observed that, “[b]y its terms, the warrant thus permitted the officers to
search for anything—from child pornography to tax returns to private correspondence. It
seemed to authorize precisely the kind of ‘wide-ranging exploratory search[] that the
Framers intended to prohibit.’”103 Ultimately, however, the Tenth Circuit affirmed the
101
405 F.3d 852 (10th Cir. 2005), cert. denied, 546 U.S. 919 (2005), petition for reh’g denied,
546 U.S. 1083 (2005); see also United States v. Galpin, 720 F.3d 436, 448 (2d Cir. 2013)
(finding that an electronic search warrant related to a registration offense was facially overbroad,
in part, because it “authorized a search for images depicting child sexual activity”).
102
Riccardi, 405 F.3d at 862.
103
Id. at 863 (quoting Garrison, 480 U.S. at 84).
34
trial court’s decision that the evidence seized pursuant to the invalid warrant need not be
suppressed, on the basis of the good faith exception to the exclusionary rule.104
Recently, in State v. Castagnola,105 the Supreme Court of Ohio considered the
application of the particularity requirement of the Fourth Amendment to the search of a
computer. There, the initial search warrant related to the crimes of retaliation, criminal
trespassing, criminal damaging, and possession of criminal tools.106 The warrant sought
the following:
Records and documents either stored on computers, ledgers, or any other
electronic recording device to include hard drives and external portable
hard drives, cell phones, printers, storage devices of any kind, printed out
copies of text messages or emails, cameras, video recorders or any photo
imaging devices and their storage media to include tapes, compact discs, or
flash drives.107
Looking for “evidence of intimidation” on the defendant’s computer, the forensic
examiner used a software program that “go[es] through documents, images, videos on the
hard drive.”108 The examiner also performed a keyword search that did not yield any
responsive results, before proceeding to open a tab that maintained “all the images
associated with the drive being examined.”109 After accessing the tab, the examiner
discovered images that she thought were child pornography, stopped her investigation,
and applied for another warrant. When performing a search based on the second search
104
Id. at 863-64.
105
2015 WL 1934723 (Ohio Apr. 28, 2015).
106
Id. at *2. The forensic examiner in Castagnola testified that the defendant’s computer “was
brought in for [a case involving] menacing, threatening, and intimidation.” Id. at *3 (alteration
in original).
107
Id. at *16.
108
Id. at *3 (internal quotation marks omitted) (alteration in original).
109
Id. (internal quotation marks omitted).
35
warrant, the forensic examiner discovered “over a thousand videos and images of
suspected child pornography.”110
In considering the defendant’s motion to suppress,111 the Supreme Court of Ohio
scrutinized the instrument’s grant of authority to search and seize “[r]ecords and
documents . . . stored on computers,” finding that its plain language “demonstrate[d] that
there [wa]s no limitation on what records and documents were to be searched for in [the
defendant’s] computer.”112 The court held that the challenged search warrant failed to
satisfy the particularity requirement for two reasons. First, “the language of the search
warrant did not ‘guide and control’ [the forensic examiner’s] judgment as to what was to
be seized on the computer[,]” leaving the determination as to what to seize within the
discretion of the examiner.113 Second, “the broad language of th[e] search warrant clearly
included items that were not subject to seizure[,]” such that the instrument was not as
specific as “the circumstances and the nature of the activity under investigation permitted
. . . .”114
The Ohio Supreme Court rejected the idea that the Fourth Amendment required a
search warrant to specify restrictive search protocols. But it also recognized “that the
Fourth Amendment does prohibit a ‘sweeping comprehensive search of a computer’s
110
Id.
111
Notably, Castagnola involved a single warrant that was first used to search the defendant’s
house in order to seize the computers. Id. at *15. The warrant was obtained a second time to
search the contents of the defendant’s computers for evidence relating to child pornography. Id.
at *3.
112
Id. at *16.
113
Id. at *17.
114
Id. (citing Guest v. Leis, 255 F.3d 325, 336 (6th Cir. 2001)).
36
hard drive.’”115 The guiding metric applied by the court was that “officers must describe
what they believe will be found on a computer with as much specificity as possible under
the circumstances[,]” and that “[t]his will enable the searcher to narrow his or her search
to only the items to be seized.”116 With this guidance, we turn to the warrants at issue
here.
C. The Witness Tampering Warrants Were General Warrants and Violated the
Particularity Requirement
1. The Witness Tampering Warrants Have No Temporal Limitations, Despite
Relevant Dates Being Available to the Police
A key principle distilled from the jurisprudence in this area is that warrants, in
order to satisfy the particularity requirement, must describe what investigating officers
believe will be found on electronic devices with as much specificity as possible under the
circumstances. That principle simply was not followed here in several respects. One
obvious respect was the failure to limit the search to the relevant time frame. Federal
Courts of Appeals have concluded that warrants lacking temporal constraints, where
relevant dates are available to the police, are insufficiently particular.117 Our sister courts
115
Id. at *18 (citation omitted).
116
Id.
117
See, e.g., United States v. Abboud, 438 F.3d 554, 576 (6th Cir. 2006) (citation omitted)
(stating that a warrant was overbroad because it “[f]ail[ed] to limit broad descriptive terms by
relevant dates, when such dates [were] available to the police”); United States v. Ford, 184 F.3d
566, 576 (6th Cir. 1999) (citations omitted) (“Failure to limit broad descriptive terms by relevant
dates, when such dates are available to the police, will render a warrant overbroad.”), cert.
denied, 528 U.S. 1161 (2000); United States v. Kow, 58 F.3d 423, 427 (9th Cir. 1995)
(admonishing the government for failing to “limit the scope of the seizure to a time frame within
which the suspected criminal activity took place, even though . . . [the supporting] affidavit
indicate[d] that the alleged criminal activity began” at a specified point in time). Cf. United
States v. Karrer, 460 F. App’x 157, 161 (3d Cir. 2012) (citing United States v. Yusuf, 461 F.3d
374, 395 (3d Cir. 2006)) (concluding that a warrant was not a general warrant, as it “sufficiently
37
have similarly considered temporal restrictions in the context of the particularity
requirement.118 Ultimately, “[i]t is settled law that generic classifications in a warrant are
acceptable only when a more precise description is not possible.”119
We hesitate to prescribe rigid rules and instead reiterate that warrants must
designate the things to be searched and seized as particularly as possible. Striking the
correct balance when protecting against generality and overbreadth requires vigilance on
the part of judicial officers who are on the front lines of preserving constitutional rights
while assisting government officials in the legitimate pursuit of prosecuting criminal
activity. Where, as here, the investigators had available to them a more precise
description of the alleged criminal activity that is the subject of the warrant, such
information should be included in the instrument and the search and seizure should be
identified a time period during which the suspected offenses occurred”). But compare Ninety-
Two Thousand, 307 F.3d at 151 (Alito, J.) (“At most, the lack of time restrictions meant that the
warrant was overly broad, not general. . . . In any event, the absence from the warrant of a
provision limiting the search and seizure to documents pertaining to the time period of the
scheme did not make the warrant ‘so facially deficient’ ‘as to render official belief in its
[legality] entirely unreasonable.’”) (internal citation omitted) (alteration in original), with id. at
156 (Ambro, J., dissenting) (arguing that failure to limit the temporal scope of a warrant, when
relevant dates are available to the police, is a “deficiency” that underlies an “unconstitutionally
broad warrant”) (citing Ford, 184 F.3d at 576).
118
See, e.g., In re Search Warrant, 71 A.3d at 1183-84 (observing that a magistrate may properly
restrict law enforcement’s search to items that meet certain parameters based on, inter alia, dates
and “the known details of the suspected crime such as the time-period”); Commonwealth v.
McDermott, 864 N.E.2d 471, 487 (Mass. 2007) (rejecting an argument that a warrant was
overbroad where the challenged category of items was limited both in time frame and in the
nature of the items that could be seized), cert. denied, 552 U.S. 910 (2007).
119
United States v. Bright, 630 F.2d 804, 812 (5th Cir. 1980) (citing James v. United States, 416
F.2d 467, 473 (5th Cir. 1969), cert. denied, 397 U.S. 907 (1970)).
38
appropriately narrowed to the relevant time period so as to mitigate the potential for
unconstitutional exploratory rummaging.120
The State conceded that nothing relating to NK would be found on Wheeler’s
property identified in the Witness Tampering Warrants. And the Affidavits do not
suggest otherwise. As to the only other potential victims, the W brothers, the Affidavits
indicate that the alleged witness tampering occurred, if it did, in or after July 2013, since
that was when the W brothers renewed contact with Wheeler.121 The Affidavits contain
no facts suggesting that any tampering might have occurred prior to July 2013. Yet, the
Witness Tampering Warrants were boundless as to time. Sergeant Perna testified that
one of the first things he did in executing the search was determine when the iMac was
last used. Proceeding under the Witness Tampering Warrants, he determined that the
computer had last been powered on in September 2012. However, the State
unsystematically sifted through Wheeler’s digital universe, even though the iMac
logically could not have contained material created or recorded during the relevant time
period.
A failure to describe the items to be searched for and seized with as much
particularity as the circumstances reasonably allow offends the constitutional protections
against unreasonable searches and seizures. Because the State was able to more precisely
describe the items to be searched and seized, the Witness Tampering Warrants violated
the particularity requirement.
120
See id.; Ford, 184 F.3d at 576.
121
The State also conceded at oral argument before this Court that the relevant time period
commenced in 2013. See Oral Argument at 40:37.
39
2. The Witness Tampering Warrants Likely Fail the Particularity Requirement for
Other Reasons
The Witness Tampering Warrants likely fail the particularity requirement in other
respects. For example, nothing in the Affidavits supports an inference that evidence may
be found on DVDs or optical cameras. The Affidavits do not allege that Wheeler was
communicating with NK or any of the W brothers through videos or pictures. Nor do the
Affidavits link witness tampering to these types of media. The likely reason that the
Witness Tampering Warrants sought the search for and seizure of devices and items that
cannot lead to evidence of witness tampering based on the Affidavits is that, as the State
conceded, the language was essentially copied and pasted from a search warrant for child
pornography. Although the parties agree that cutting and pasting search warrant
language does not automatically invalidate the resulting instrument, that technique has
led, in the context of this case, to search warrants that do not satisfy the particularity
requirement.122
Further, the Affidavits recite that the State was searching for “evidence of written
communications,” which it believed were relevant to the alleged witness tampering.
Sergeant Perna wrote in his forensic report and testified that he was “looking for any files
created and/or saved as word documents, emails, text messages, pdf [sic] or any other
122
Cf. Massachusetts v. Sheppard, 468 U.S. 981, 986-91 (1984) (scrutinizing police use of a
form warrant pertaining to an unrelated crime and indicating that it might be insufficiently
particular, but ultimately upholding the search based upon the good faith exception to the
exclusionary rule notwithstanding the defect). As noted above, the good faith exception to the
exclusionary rule is not recognized in Delaware. See Dorsey, 761 A.2d at 820-21.
40
related file format.”123 The portions of the Affidavits discussing the items sought refer to
written communications.124 These observations suggest that the items for which there
was probable cause to search and seize were written communications—not DVDs and
123
A191 (Tr. 38:10-19).
124
At oral argument before this Court, the State asserted that it was not relying on incorporation
of the Affidavits into the Witness Tampering Warrants for the latter to satisfy the particularity
requirement. Oral Argument at 31:50. In Groh v. Ramirez, 540 U.S. 551 (2004), the United
States Supreme Court observed that, although supporting documentation adequately describes
the things to be searched for and seized, such description does not necessarily save a warrant
from its facial invalidity. Id. at 557. The Supreme Court noted that: “The Fourth Amendment
by its terms requires particularity in the warrant, not in the supporting documents.” Id. (citations
omitted) (emphasis added). It also stated the following: “We do not say that the Fourth
Amendment prohibits a warrant from cross-referencing other documents. Indeed, most [Federal]
Courts of Appeals have held that a court may construe a warrant with reference to a supporting
application or affidavit if the warrant uses appropriate words of incorporation, and if the
supporting document accompanies the warrant.” Id. at 557-58 (citations omitted).
Some Federal Courts of Appeals have limited Groh’s import to establishing that an
unconstitutional warrant can be saved by its supporting documentation only if the warrant
appropriately references the supporting document through “clear” language of incorporation and
the supporting document accompanies the warrant. See, e.g., United States v. Perez, 2015 WL
6405695, at *3 (6th Cir. Oct. 23, 2015) (citing Groh, 540 U.S. at 557-58); Tracey, 597 F.3d at
146-48 (citations omitted) (“Along with other Courts of Appeals, we have held that an affidavit
may be used in determining the scope of a warrant that lacks particularity if the warrant is
‘accompanied by an affidavit that is incorporated by reference.’”); United States v. Waker, 534
F.3d 168, 172-73 (2d Cir. 2008). Others have held that, for an unconstitutional warrant to be
cured through incorporation by reference to an affidavit, the affidavit must not be filed under
seal. See, e.g., Bartholomew v. Pennsylvania, 221 F.3d 425, 429-30 (3d Cir. 2000) (“We now
make clear . . . and hold that, generally speaking, where the list of items to be seized does not
appear on the face of the warrant, sealing that list, even though it is ‘incorporated’ in the warrant,
would violate the Fourth Amendment.”). Here, the Applications and Affidavits indicate that they
were filed under seal.
Although the Witness Tampering Warrants, under “ITEMS TO BE SEARCHED FOR
AND SEIZED[,]” state in paragraph 1, “[e]nter and search the residence [or office] as
completely described herein [sic] the application and affidavit for evidence of the
aforementioned crime(s)[,]” it is not clear that the broad lists of items in the Witness Tampering
Warrants are necessarily limited by the Affidavits and, if so, in what fashion. A19 (Warrant 1 ¶
1); A31 (Warrant 2 ¶ 1). This is true particularly in view of the fact that the Affidavits contain
sweeping, boilerplate language concerning digital data and the ability of forensic experts to
recover it for lengthy periods of time, including “years after it [i]s written.” Thus, even
assuming, arguendo, that the Affidavits are fairly incorporated, they fail to cure the
constitutional defects, as they lack temporal restraints as to all potential victims and fail to guide
the executing officers as to the limits of the search and seizure.
41
optical cameras. Yet, by their terms, the Witness Tampering Warrants permitted the
State to search for anything—from child pornography to medical records to consumer
information to tax returns. In short, they permitted the species of wide-ranging,
exploratory searches the Framers intended to prohibit. Because the lack of temporal
limitations is sufficient to invalidate the Witness Tampering Warrants, we need not reach
these other potential substantive challenges. Instead, we caution that the risk that
warrants for digital and electronic devices take on the character of “general warrants” is
substantial. This reality necessitates heightened vigilance, at the outset, on the part of
judicial officers to guard against unjustified invasions of privacy.
III. CONCLUSION
The subject of this prosecution is an unsympathetic figure. And the sexual
exploitation of children is a dreadful scourge in our society. But “[t]he principles laid
down in this [O]pinion affect the very essence of constitutional liberty and security.
They reach further than the concrete form of the case before the court . . .; they apply to
all invasions on the part of the government and its employe[e]s of the sanctity of a
[person’s] home and the privacies of life.”125 “There is always a temptation in criminal
cases to let the end justify the means, but as guardians of the Constitution, we must resist
that temptation.”126
The United States Constitution and the Delaware Constitution both mandate that
the decision of the Superior Court with respect to the Motion to Suppress be reversed.
125
Boyd, 116 U.S. at 630.
126
Castagnola, 2015 WL 1934723, at *20 (citation omitted) (internal quotation marks omitted).
42
Accordingly, the judgments of conviction are REVERSED. This matter is remanded for
further proceedings in accordance with this Opinion.
43