State v. Moore

THE STATE OF SOUTH CAROLINA In The Supreme Court The State, Respondent, v. Robert Lee Moore, Petitioner. Appellate Case No. 2017-002479 ON WRIT OF CERTIORARI TO THE COURT OF APPEALS Appeal From Spartanburg County R. Keith Kelly, Circuit Court Judge Opinion No. 27948 Heard June 11, 2019 – Filed February 19, 2020 AFFIRMED AS MODIFIED Chief Appellate Defender Robert M. Dudek, of Columbia, for Petitioner. Attorney General Alan Wilson and Assistant Attorney General William M. Blitch Jr., both of Columbia, and Seventh Judicial Circuit Solicitor Barry J. Barnette, of Spartanburg, all for Respondent. JUSTICE KITTREDGE: Following a jury trial, Petitioner Robert Moore was sentenced to thirty years' imprisonment for the attempted murder of Travis Hall. Hall was shot in the head and left for dead in a vehicle in a Taco Bell parking lot following a drug deal gone wrong. In the immediate aftermath of the shooting, law enforcement officers found three cell phones, including one later identified as Petitioner's "flip phone," 1 in the area of the driver's floorboard after emergency medical personnel removed Hall from the vehicle.2 Without obtaining a warrant, the officers removed the cell phones' subscriber identity module (SIM) cards to determine ownership. The officers then obtained a warrant to search the contents of Petitioner's flip phone. Petitioner's subsequent motion to suppress all evidence acquired from the flip phone was denied, as the trial court found Petitioner had abandoned his phone. A divided court of appeals' panel affirmed Petitioner's conviction on the basis of inevitable discovery. State v. Moore, 421 S.C. 167, 805 S.E.2d 585 (Ct. App. 2017). We granted a writ of certiorari to review the decision of the court of appeals and now affirm as modified. I. On February 25, 2013, Spartanburg County Sheriff's Office deputies were dispatched to a "shots fired" call at a Taco Bell. The first officer to arrive on the scene found Hall shot in the head, hanging out of his vehicle while partially restrained by the seatbelt. Despite the severity of his injuries, Hall survived. Witnesses told law enforcement that a white Chrysler 300 with "some rather large [and distinctive] rims" fled the scene immediately after the shooting. Deputies at the crime scene recovered three cell phones from Hall's vehicle. The phones were immediately given to an investigator, who removed the SIM cards to obtain the phone number associated with each phone. A Spartanburg County Sheriff's Office database identified one phone number as belonging to Petitioner, who had given law enforcement that number three months prior in connection with obtaining a surety bond. An investigator with the Sheriff's Office then listed (1) the flip phone's phone number obtained from the SIM card; (2) Petitioner's name; and (3) the circumstances under which the phone was found, ultimately securing a 1 While a "smart phone" is "a cell phone with a broad range of other functions based on advanced computing capability, large storage capacity, and Internet connectivity," a flip phone is "a kind of phone that is flipped open for use and that generally has a smaller range of features than a smart phone." Riley v. California, 573 U.S. 373, 379, 380 (2014). 2 The other two cell phones were later identified as Hall's. search warrant to examine the contents of the flip phone. The search revealed that five calls were made from Petitioner's phone to the victim's phone in the hour prior to the shooting. Meanwhile, in a separate portion of the investigation unrelated to the flip phone or search warrant, law enforcement officers identified the getaway vehicle and its two occupants—Petitioner and his co-defendant Tevin Thomas—via eyewitness testimony and video recording. Thomas was subsequently apprehended, initially denying he was present at the scene of the crime. However, after an officer confronted him with the video recording of Thomas and Petitioner at a nearby gas station—driving, within minutes of the shooting, the distinctive getaway car described by witnesses at the crime scene—Thomas made a second statement naming and implicating Petitioner in the shooting. Petitioner was arrested and charged with attempted murder. Pursuant to the Fourth Amendment to the United States Constitution and Riley v. California, 3 Petitioner made a pre-trial motion to suppress any evidence seized from the warrantless examination of his phone's SIM card. Finding Petitioner had abandoned his cell phone, the trial court denied the motion. On appeal, a majority of the court of appeals' panel affirmed on the ground of inevitable discovery. A dissenting member of the panel voted to reverse the trial court, relying on Riley and contending that the warrantless examination of the SIM card constituted a Fourth Amendment violation. We granted a writ of certiorari to review the divided court of appeals' decision. II. On appeals involving a motion to suppress based on Fourth Amendment grounds, appellate courts apply a deferential standard of review and will reverse only in cases of clear error. State v. Cardwell, 425 S.C. 595, 599–600, 824 S.E.2d 451, 453 (2019). The "clear error" standard means appellate courts may not reverse the trial court's findings of fact merely because they would have decided the case differently. State v. Moore, 415 S.C. 245, 251, 781 S.E.2d 897, 900 (2016) (citation omitted). Rather, in reviewing Fourth Amendment cases, appellate courts must affirm the trial court's ruling if there is any evidence to support it. Robinson v. State, 407 S.C. 169, 181, 754 S.E.2d 862, 868 (2014). 3 573 U.S. 373 (2014). III. The State primarily contends that the limited warrantless search of Petitioner's cell phone was entirely reasonable under the circumstances. We agree. The Fourth Amendment provides, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated . . . ." U.S. Const. amend. IV (emphasis added). It has long been recognized that the touchstone of the Fourth Amendment is reasonableness. Riley, 573 U.S. at 381–82 (quoting Brigham City v. Stuart, 547 U.S. 398, 403 (2006)); Florida v. Jimeno, 500 U.S. 248, 250 (1991) (citing Katz v. United States, 389 U.S. 347, 360 (1967)). The trial court denied the motion to suppress on the basis of abandonment. Arguably, some evidence supports the trial court's finding that Petitioner abandoned his flip phone. Cf. State v. Brown, 423 S.C. 519, 525, 815 S.E.2d 761, 764–65 (2018) (finding a defendant abandoned his cell phone at the scene of the crime and explaining the defendant made no attempt to call or send text messages to the phone to see if someone would answer; the defendant did not attempt to contact the service provider for information on the whereabouts of the phone; and the defendant did not go back to the scene of the crime to look for the phone or call the police to see if they had it); Robinson, 407 S.C. at 181, 754 S.E.2d at 868 (setting forth the deferential "any evidence" standard of review). Yet we acknowledge a close question is presented on the issue of abandonment. We elect to resolve this appeal on other grounds.4 4 We note the dissent focuses much of its analysis on abandonment, on which we have expressly declined to rule. As a result, we view much of the dissent's analysis as non-responsive. We additionally note it does not appear as simple as the dissent's contention that "Riley created a categorical rule that, absent exigent circumstances, law enforcement must procure a search warrant before searching the data contents of a cell phone." (second emphasis added) (quoting Brown, 423 S.C. at 531, 815 S.E.2d at 767 (Beatty, C.J., dissenting)). Rather, other courts have found the abandonment exception, as well as other exceptions, may continue to justify a warrantless search of a cell phone, even post-Riley. See, e.g., Commonwealth v. Kane, 210 A.3d 324, 329–32 (Pa. Super. Ct. 2019) (affirming the trial court's finding that a cell phone was abandoned and that law enforcement therefore permissibly executed a warrantless search), cert. denied, 218 A.3d 856 (Pa. 2019) (per curiam). The Fourth Amendment, as interpreted, requires that the actions of law enforcement be viewed through a lens of reasonableness. The reasonableness inquiry is fact specific and context dependent. Here, law enforcement limited the warrantless portion of their search of the three phones to the SIM cards alone in an effort to establish ownership, which—as will be explained in more detail below— is a search wholly distinct from examining the contents of the phones. Moreover, at the time of the warrantless portion of the search to discover the identities of the cell phones' owners, law enforcement officers were responding to an active crime scene, not knowing the identity and whereabouts of the shooter. The public safety concerns are self-evident. Under the circumstances presented, we hold the limited search of the SIM cards to identify the phone numbers was reasonable and in no manner constituted an unreasonable search or seizure. A. A SIM card is a small device which contains a customer's basic information, along with encryption data to allow a device to access a particular carrier's mobile network. Thus, in many ways, a SIM card is simply a key to a specific mobile network. However, a SIM card is not part of a phone. This is evidenced by the facts that (1) not all phones have SIM cards; (2) SIM cards may be transferred from one phone to another; and (3) a single phone can utilize a series of SIM cards to easily change the phone's number and subscriber information. See, e.g., United States v. Flores-Lopez, 670 F.3d 803, 810 (7th Cir. 2012) (explaining people may purchase multiple prepaid SIM cards, "each of which assigns a different phone number to the cell phone in which the card is inserted," making it easy for a single phone to be associated with multiple phone numbers), abrogated on other grounds by Riley, 573 U.S. at 400; In re Apple iPhone Antitr. Litig., 874 F. Supp. 2d 889, 892 n.5 (N.D. Cal. 2012) ("A SIM card is a removable card that allows phones to be activated, interchanged, swapped out and upgraded. The SIM card is tied to the phone's network, rather than to the physical phone device itself." (internal citations omitted)). Given its purpose of identifying a phone to a particular mobile network, a SIM card contains limited storage capacity. It therefore never contains the vast majority of the information available on an unlocked cell phone. See Sigram Schindler Beteiligungsgesellschaft mbH v. Cisco Systems, Inc., 726 F. Supp. 2d 396, 413 n.27 (D. Del. 2010) ("Generally, a SIM card is a smart card that encrypts voice and data transmissions and stores data about a user for identification purposes." (emphasis added)); see also United States v. Wicks, 73 M.J. 93, 97 (C.A.A.F. 2014) (explaining that a witness initially attempted to turn over only the SIM card of a suspect's cell phone, but "the SIM card did not contain any [useful] information," so the witness eventually turned over the suspect's entire cell phone, which did contain the incriminating information for which law enforcement was looking).5 According to one witness at trial, the SIM card on this particular type of older model flip phone "primarily contains the assigned cell phone number," but can also contain incomplete records of the contacts stored on the phone as well as partial call and text logs. A SIM card does not store call or text logs in reverse chronological order but, rather, randomly if at all. We conclude searching a SIM card is fundamentally distinct from searching the full contents of an unlocked cell phone, making much of the language in Riley concerning the privacy implications for searching a cell phone inapplicable or, at best, greatly diminished here.6 B. As explained previously, "the ultimate measure of the constitutionality of a government search is reasonableness." Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646, 652 (1995) (internal quotation marks omitted). However, "a warrant is not required to establish the reasonableness of all government searches." Id. at 653. For example, law enforcement officers may search lost property to safeguard the property, protect the police department from false claims, and protect the police 5 The dissent disagrees with our recitation of the functionality of a SIM card, resorting to an internet search well outside the record on appeal and citing to a website from www.wisegeek.com titled "What is a SIM card?" We could similarly surf the internet to find information counter to the dissent, but decline to do so given the functionality of a SIM card is adequately set forth in the case law cited above. 6 Due to the fact that a SIM card's storage is both incomplete and random, we strongly disagree with the dissent's argument that we should view SIM cards as functionally equivalent to flash drives, whose contents are generally protected by the Fourth Amendment. In the case of a flash drive, the user deliberately chooses which information to place on the drive, and destroying the drive destroys access to the information placed on it. In contrast, a cell phone owner does not choose which information is (or is not) stored on his SIM card, and destroying the SIM card does not destroy access to the (incomplete) information stored therein because the full data is duplicated on the phone itself or, at worst, on the provider's servers. Thus, searching the contents of a SIM card is fundamentally distinct from searching either a flash drive or the full contents of an unlocked cell phone. The privacy implications of searching the digital data contained on SIM cards, flash drives, and unlocked cell phones are likewise distinct. from danger. South Dakota v. Opperman, 428 U.S. 364, 369 (1976). Likewise, "[w]hen containers have been turned over to the police, an officer 'may validly search lost property to the extent necessary for identification purposes.'" United States v. Wilson, 984 F. Supp. 2d 676, 683–86 (E.D. Ky. 2013) (quoting State v. Ching, 678 P.2d 1088, 1093 (Haw. 1984)) (holding officers acted reasonably in searching a suitcase and the laptop found inside in order to identify the owner); State v. Polk, 78 N.E.3d 834, 843 (Ohio 2017) ("[A] person retains a reasonable expectation of privacy in a lost item, 'diminished to the extent that the finder may examine the contents of that item as necessary to determine the rightful owner.'" (quoting State v. Hamilton, 67 P.3d 871, 875 (Mont. 2003))); see also People v. Juan, 221 Cal. Rptr. 338, 341 (Ct. App. 1985) (finding law enforcement's search through the pockets of a jacket left hanging on the back of a restaurant chair at an empty table was reasonable because the defendant had no reasonable expectation of privacy under those circumstances, and explaining in part, "Indeed, an individual who leaves behind an article of clothing at a public place most likely hopes that some Good Samaritan will pick up the garment and search for identification in order to return it to the rightful owner."). Here, the Spartanburg County Sheriff's Office investigator conducted a limited search of the cell phones found at the crime scene for the targeted purpose of determining the owner. Importantly, he did so by searching only the phones' SIM cards, not the contents of the phones—despite the fact that the flip phone was not password protected—and the search lasted a single minute.7 Once the investigator identified the owners of the cell phones, a warrant was obtained to search Petitioner's flip phone. Under these circumstances, the limited search of the SIM cards for purposes of identification was reasonable and did not contravene the Fourth Amendment. Cf. State v. Green, 164 So. 3d 331, 344 (La. Ct. App. 2015) (holding an officer's removal of a cell phone's battery to acquire the identifying subscriber number (analogous to a serial number) did not implicate the Fourth Amendment because the subscriber had no "reasonable expectation of privacy in the serial number of his cell phone or other identifying information"). The determination of whether a search is permissible should not be the result of varying 7 Aside from Petitioner's phone number (which was used to obtain his name), the warrantless portion of the search of the flip phone's SIM card revealed thirty-four contacts and three text messages that had been sent in the year prior to the shooting. Petitioner does not argue the contact entries or text messages were relevant to the shooting or otherwise led law enforcement officers to discover his identity or suspect his involvement. frameworks depending on whether the person who lost the item is a criminal hoping to avoid detection or a law-abiding citizen hoping for the return of the lost item. To the extent Petitioner retained an expectation of privacy in his cell phone left next to the victim's body, that expectation of privacy was diminished to the point that the finder could properly examine the item in a manner limited to determining the owner. Cf. State v. Hill, 789 S.E.2d 317, 319 (Ga. Ct. App. 2016) (holding the police properly obtained the defendant's cell phone number and name in a case in which the defendant left his cell phone at the scene of a crime, and the police used the phone to call 911 in order to get the phone number from the 911 dispatcher; and explaining, "While the application of Fourth Amendment law to this precise set of facts appears to be an issue of first impression in Georgia, there are many cases in Georgia and in other jurisdictions supporting the conclusion that a person lacks a legitimate expectation of privacy in identifying information such as name, address, or telephone number that is used to facilitate the routing of communications by methods such as physical mail, e-mail, landline telephone, or cellular telephone." (collecting cases)); id. at 321 ("[W]e do not construe Riley to recognize a legitimate expectation of privacy in identifying noncontent information such as the person's own phone number, address, or birthdate, simply because that information was associated with a cellular phone account rather than a landline phone account or a piece of physical mail."). IV. Of course, we recognize the adage "get a warrant" will always be at play in these Fourth Amendment challenges. We join that chorus as well, as it is always preferable to "get a warrant." However, the question before us is not whether obtaining a warrant would have been preferable; rather, the question here is whether obtaining the phone numbers assigned to the SIM cards without a warrant under these circumstances contravened the Fourth Amendment. As explained previously, we hold law enforcement's identification of the number assigned to the flip phone by examining the SIM card was reasonable and did not violate the Fourth Amendment. Were we, however, to accept the premise of Petitioner's argument regarding a Fourth Amendment violation, his conviction would nevertheless be upheld because the absence of a warrant does not require the categorical suppression of evidence as advocated by Petitioner. See Herring v. United States, 555 U.S. 135, 140 (2009) ("The fact that a Fourth Amendment violation occurred—i.e., that a search or arrest was unreasonable—does not necessarily mean that the exclusionary rule applies."). "Indeed, exclusion has always been our last resort, not our first impulse." Id. (quoting Hudson v. Michigan, 547 U.S. 586, 591 (2006)) (internal quotation marks omitted); see also Davis v United States, 564 U.S. 229, 237 (2011) (explaining suppression can be a harsh sanction, for it "exacts a heavy toll on both the judicial system and society at large"). The purpose of the exclusionary rule is to deter law enforcement officers from committing Fourth Amendment violations. Davis, 564 U.S. at 236–37. As a result, when suppression will fail to yield "appreciable deterrence," exclusion is clearly unwarranted. Id. at 237 (quoting United States v. Janis, 428 U.S. 433, 454 (1976)). "To that end, courts have recognized several exceptions to the exclusionary rule," including, among others, the independent source doctrine, inevitable discovery, and good-faith reliance. See State v. Adams, 409 S.C. 641, 647 & n.3, 763 S.E.2d 341, 345 & n.3 (2014) (collecting cases). We find that— even if law enforcement committed a Fourth Amendment violation by searching the SIM cards for identification purposes—each of these three exceptions applies, rendering the exclusionary rule inappropriate in this instance. A. Previously, this Court explained the independent source exception as follows: The "fruit of the poisonous tree" doctrine provides that evidence must be excluded if it would not have come to light but for the illegal actions of the police, and the evidence has been obtained by the exploitation of that illegality. However, the challenged evidence is admissible if it was obtained from a lawful source independent of the illegal conduct. State v. Copeland, 321 S.C. 318, 323, 468 S.E.2d 620, 624 (1996) (internal citation omitted). Here, in a portion of the investigation wholly unrelated to or affected by the cell phones, law enforcement obtained incriminating video from a nearby gas station located approximately one-and-a-half miles from the Taco Bell where the victim was shot. The video—taken around three to five minutes after the shooting— showed Petitioner and Thomas driving the distinctive getaway vehicle into the parking lot and loitering around the car for several minutes while police cars drove past the gas station with their blue lights flashing and sirens blaring. Petitioner and Thomas then grabbed a bag from the car and threw it in the trash before entering the gas station. Inside, Petitioner bought a package of cigarettes, which caused him to have to give his (real) date of birth, and the sales clerk dutifully noted the birthdate on a receipt that was later introduced at trial. Other video recordings introduced at trial showed Petitioner and Thomas in the getaway vehicle driving it towards the location where it was subsequently found by law enforcement that same night—the house of a relative of Petitioner. The Sheriff's Office investigators could not recall exactly when they identified Thomas as the second man in the video recordings; however, they located and arrested him on February 26, one day after the shooting.8 Thomas initially denied being at the Taco Bell at all on February 25. However, an investigator confronted Thomas with a picture of Thomas at the gas station after the shooting, and Thomas recanted his non-involvement, giving a second written statement. In this second statement, Thomas named Petitioner as the second man involved. At trial, Thomas testified Petitioner had called Hall, the victim, multiple times directly before the shooting in order to set up a meeting (a drug deal). 9 However, Thomas and Petitioner had prearranged to rob Hall at the meeting and armed themselves accordingly. Thomas stated that as soon as Petitioner climbed into Hall's car for the drug deal, Petitioner pulled out a gun, and the two men started "tussling real heavy." Eventually, Petitioner shot Hall, jumped back into the getaway vehicle, and drove off against traffic and over the median, nearly hitting a pedestrian on the way out of the parking lot. We conclude that none of this evidence "has been come at by exploitation of [any possible] violation of [Petitioner's] Fourth Amendment rights." See United States v. Crews, 445 U.S. 463, 471 (1980) (quoting Wong Sun v. United States, 371 U.S. 471, 488 (1963)) (internal quotation marks omitted). We find Petitioner's identity and the possible presence of incriminating call logs on Hall's and Petitioner's cell phones came from an independent source in the investigation untainted by any alleged Fourth Amendment violation. Cf. id. at 474 ("Insofar as respondent challenges his own presence at trial, he cannot claim immunity from prosecution simply because his appearance in court was precipitated by [a Fourth Amendment violation]. [A Fourth Amendment violation], without more, has never been viewed as a bar to subsequent prosecution, nor as a defense to a valid conviction. The 8 This is the same day the magistrate signed the warrant allowing the investigators to examine the contents of Petitioner's flip phone. 9 At least one other witness confirmed Hall had received a series of phone calls attempting to set up a meeting with him before the shooting. That witness was of the impression that Hall knew the person calling him. While Petitioner and Hall were longstanding friends, Hall was not acquainted with Thomas. exclusionary principle of Wong Sun and Silverthorne Lumber Co.[10] delimits what proof the Government may offer against the accused at trial, closing the courtroom door to evidence secured by official lawlessness. Respondent is not himself a suppressible 'fruit,' and the illegality of his detention [due to a Fourth Amendment violation] cannot deprive the Government of the opportunity to prove his guilt through the introduction of evidence wholly untainted by the police misconduct." (footnote omitted) (internal citations omitted)); id. at 478–79 & n.* (White, J., concurring) (rejecting, in a portion of his concurrence that received a majority vote of the Justices on the United States Supreme Court, the notion that a defendant's face or identity can be considered evidence suppressible for no other reason than the defendant's presence in the courtroom is the fruit of a Fourth Amendment violation (citing Frisbie v. Collins, 342 U.S. 519, 522 (1952))).11 B. "[T]he inevitable discovery doctrine provides that illegally obtained information may nevertheless be admissible if the prosecution can establish by a preponderance of the evidence that the information would have ultimately been discovered by lawful means." Cardwell, 425 S.C. at 601, 824 S.E.2d at 454 (citing Nix v. Williams, 467 U.S. 431, 444 (1984)). Here, after receiving a "shots fired" call, law enforcement officers found Hall shot in the head and three cell phones on the floorboard at his feet. Correctly suspecting that it would have been highly unusual for all three phones to belong to Hall, investigators took action to identify the cell phones' owners and determine if there was a connection between the phones, first by searching the SIM cards and then by obtaining a warrant to examine the contents of the phones. While the officers obtained the call logs between the two phones by executing the warrant on Petitioner's flip phone, they could have also obtained the same information by searching Hall's phones, which they had in their lawful possession. Particularly given the fact that other portions of the investigation revealed that, prior to driving to the Taco Bell, Hall had been phoned 10 Silverthorne Lumber Co. v. United States, 251 U.S. 385 (1920). 11 In focusing on the abandonment issue, the dissent does not address all of the bases we discuss in reaching our decision, namely, the independent source doctrine. In fact, the gas station video and Thomas's confession were the key pieces of evidence against Petitioner, not the flip phone or its call logs. While the testimony about the phone helped confirm various aspects of some witnesses' testimony, the phone's call logs and its role in revealing Petitioner's involvement in the crime were purely cumulative. multiple times in the presence of witnesses and seemed to be setting up a meeting in the hour prior to his shooting, we find the State established that law enforcement was keyed into and actively investigating Hall's phone records and would have obtained the call logs regardless of the search of Petitioner's phone. Obtaining the call logs—including Petitioner's five calls to Hall in the hour prior to the shooting—would have allowed the investigators to obtain Petitioner's phone number and run it through their internal database (as actually occurred), thus giving them Petitioner's name. As a result, we find the evidence Petitioner seeks to have suppressed would have been inevitably discovered, and we therefore find the exclusionary rule inapplicable here because it would not sufficiently deter police conduct in the future. See Nix, 467 U.S. at 444 ("If the prosecution can establish by a preponderance of the evidence that the information ultimately or inevitably would have been discovered by lawful means . . . then the deterrence rationale has so little basis that the evidence should be received. Anything less would reject logic, experience, and common sense." (footnote omitted)). C. Finally, it is beyond dispute that law enforcement in this case acted in good faith. Even accepting the premise of Petitioner's Fourth Amendment challenge, none of the purposes served by the exclusionary rule would be achieved by suppressing any of the evidence obtained from searching his cell phone. See United States v. Leon, 468 U.S. 897, 907–08 (1984) ("The substantial social costs exacted by the exclusionary rule for the vindication of Fourth Amendment rights have long been a source of concern. Our cases have consistently recognized that unbending application of the exclusionary sanction to enforce ideals of governmental rectitude would impede unacceptably the truth-finding functions of judge and jury. An objectionable collateral consequence of this interference with the criminal justice system's truth-finding function is that some guilty defendants may go free or receive reduced sentences as a result of favorable plea bargains. Particularly when law enforcement officers have acted in objective good faith or their transgressions have been minor, the magnitude of the benefit conferred on such guilty defendants offends basic concepts of the criminal justice system." (emphasis added) (footnote omitted) (internal citations omitted) (internal quotation marks omitted)). Petitioner, as did the dissenting opinion in the court of appeals, relies principally on the United States Supreme Court's Riley v. California decision from 2014, which emphasized the degree of governmental intrusion resulting from warrantless searches of cell phones incident to an arrest due to the wealth of private information contained within modern cell phones. Notably, when law enforcement responded to the Taco Bell in Spartanburg County on February 25, 2013, Riley had not yet been decided. At the time, the law was far from settled in terms of the necessity of obtaining a warrant to search a cell phone, much less a SIM card alone. 12 See id. at 919 ("If the purpose of the exclusionary rule is to deter unlawful police conduct, then evidence obtained from a search should be suppressed only if it can be said that the law enforcement officer had knowledge, or may properly be charged with knowledge, that the search was unconstitutional under the Fourth Amendment." (emphasis added) (quoting United States v. Peltier, 422 U.S. 531, 542 (1975))). Finally, it must be remembered that law enforcement did obtain a warrant to search Petitioner's phone once his identity as owner was determined. IV. For the foregoing reasons, the judgment of the court of appeals is affirmed as modified. AFFIRMED AS MODIFIED. FEW and JAMES, JJ., concur. HEARN, J., concurring in part and dissenting in part in a separate opinion. BEATTY, C.J., dissenting in a separate opinion. 12 In fact, the law is still far from settled regarding the propriety of searching a SIM card alone, rather than the full contents of a cell phone. We have found little case law on the constitutionality of such searches, as much of the relevant case law either (1) appears to have been decided post-Riley; (2) is distinguishable because it involves searches of cell phone contents and not SIM card contents; or (3) more commonly, reflects both of these problems. JUSTICE HEARN: I concur with the majority to affirm Moore's conviction based upon the inevitable discovery and independent source doctrines. Thus, regardless of whether there was a Fourth Amendment search—which I believe there was—the exclusionary rule would not apply. However, even though Moore cannot avail himself of this remedy, I part company with the majority's discussion of the good- faith exception as a basis for declining to apply the exclusionary rule. The good-faith exception ensures that evidence will not be suppressed when law enforcement acts in an objectively reasonable manner. The purpose of the exclusionary rule is deterrence, and this consideration must be weighed against the social costs of excluding relevant, incriminating evidence. Hudson v. Michigan, 547 U.S. 586, 599 (2006) (noting the "substantial social costs" of the exclusionary rule). We have previously addressed this exception in analyzing whether binding precedent supported law enforcement's warrantless search. State v. Adams, 409 S.C. 641, 652, 763 S.E.2d 341, 347 (2014). In Adams, police attached a GPS device to the defendant's vehicle and monitored his movements, suspecting he was transporting drugs. Police tracked Adam's vehicle and conducted a stop on the interstate, where an officer discovered cocaine. Adams filed a motion to suppress the evidence, which the trial court denied. We reversed, and in doing so, rejected the contention that law enforcement acted in good faith based on purported precedent supporting the warrantless search. The State relied on two cases—United States v. Knotts, 460 U.S. 276, 281 (1983) (holding law enforcement's placement of a beeper in a container of chloroform with the seller's consent and their subsequent monitoring did not constitute a search under the Fourth Amendment because individuals do not possess a reasonable expectation of privacy in traveling on public highways), and United States v. Karo, 468 U.S. 705, 713 (1984) (holding the placement of an electronic beeper in a container with the owner's consent before being sold did not constitute a search because the buyer's privacy interests were not infringed when he received possession of the container). We also noted a statute required police to procure a warrant before installing and monitoring a GPS device. S.C. Code Ann. § 17-30-140 (2014). In addressing the good-faith exception, we rejected the State's argument that Knotts and Karo constituted binding precedent that permitted law enforcement to install and monitor GPS devices without a warrant. Our focus in Adams concerned whether binding precedent supported the warrantless search. That made sense because the default is that a search without a warrant is unreasonable. State v. Weaver, 374 S.C. 313, 319, 649 S.E.2d 479, 482 (2007) ("Generally, a warrantless search is per se unreasonable and violates the Fourth Amendment prohibition against unreasonable searches and seizures."). While we will not penalize law enforcement by suppressing evidence obtained when police follow precedent, that is not the case here. Indeed, even the majority characterizes the state of the law as "far from settled," which obviously is short of controlling precedent. In light of the unsettled nature of our case law, I believe our Fourth Amendment jurisprudence requires this fact to militate in favor of requiring a warrant. Nevertheless, because I agree that the inevitable discovery and independent source doctrines apply, the exclusionary rule has no bearing in this case. CHIEF JUSTICE BEATTY: I respectfully dissent. I would reverse the decision of the court of appeals and remand Moore's case for a new trial. In my view, the warrantless removal of the SIM card and forensic examination of its digital contents constituted a search in violation of the Fourth Amendment. Accordingly, I would find the trial court erred in denying Moore's motion to suppress. I. The Fourth Amendment to the United States Constitution protects a person's right to be free from unreasonable searches and seizures. U.S. Const. amend. IV. "Warrantless searches and seizures are unreasonable absent a recognized exception to the warrant requirement." State v. Brown, 401 S.C. 82, 89, 736 S.E.2d 263, 266 (2012) (citation omitted). The State bears the burden of establishing "the existence of circumstances constituting an exception to the general prohibition against warrantless searches and seizures." State v. Gamble, 405 S.C. 409, 416, 747 S.E.2d 784, 787 (2013). "The touchtone of Fourth Amendment analysis is whether a person has a 'constitutionally protected reasonable expectation of privacy.'" California v. Ciraolo, 476 U.S. 207, 211 (1986) (quoting Katz v. United States, 389 U.S. 347, 360 (1967) (Harlan, J., concurring)). "Katz posits a two-part inquiry: first, has the individual manifested a subjective expectation of privacy in the object of the challenged search? Second, is society willing to recognize that expectation as reasonable?" Id. In determining whether the expectation of privacy is reasonable, "'[t]he test of legitimacy is not whether the individual chooses to conceal assertedly 'private' activity,' but instead 'whether the government's intrusion infringes upon the personal and societal values protected by the Fourth Amendment.'" Ciraolo, 476 U.S. at 212 (quoting Oliver v. United States, 466 U.S. 170, 182–83 (1984)). Here, the object of the challenged search is the SIM card in Moore's cell phone found at the crime scene.13 The majority holds "the limited search of the SIM cards 13 A SIM card is defined as follows: A Subscriber Identity Module (SIM) card is a portable memory chip used mostly in cell phones that operate on the Global System for Mobile Communications (GSM) network. These cards hold the personal information of the account holder, including his or her phone number, address book, text messages, and other data. When a user wants to to identify the phone numbers was reasonable and in no manner constituted an unreasonable search or seizure." In so holding, the majority explains that "searching a SIM card is fundamentally distinct from searching the full contents of an unlocked cell phone, making much of the language in Riley concerning the privacy implications for searching a cell phone inapplicable or, at best, greatly diminished here." For several reasons, I disagree with the majority's conclusion. Initially, I disagree with the majority's apparent dismissal of the import of Riley v. California, 134 S. Ct. 2473 (2014). As I stated in my dissent in Brown, "Riley creates a categorical rule that, absent exigent circumstances, law enforcement must procure a search warrant before searching the data contents of a cell phone." State v. Brown, 423 S.C. 519, 531, 815 S.E.2d 761, 767 (2018) (Beatty, C.J., dissenting). I believe the circumstances of the instant case fall within this rule. Moore had a reasonable expectation of privacy in the digital contents of the SIM card.14 See Riley, 134 S. Ct. at 2473 (concluding society is willing to recognize an expectation of privacy in the digital information on a cell phone). In my view, there is no distinction between the digital contents of a SIM card and the full contents of a cell phone. At issue is the digital data, not the type of device or the amount of storage capacity. While the SIM card has limited storage capacity, it contains significant personal information about the cell phone account holder, including the phone number, call logs, address books, text messages, and other data. 15 Thus, even change phones, he or she can usually easily remove the card from one handset and insert it into another. SIM cards are convenient and popular with many users, and are a key part of developing cell phone technology. https://www.wisegeek.com/what-is-a-sim-card.htm (last visited Dec. 10, 2019 (emphasis added). 14 Given the trial court ruled that Moore abandoned his cell phone, the court implicitly found Moore had an expectation of privacy in the cell phone, which included the SIM card. 15 The majority minimizes the privacy implication of the digital data because the SIM card is "simply a key to a specific mobile network" and "not part of a phone." If this analysis is taken to its logical extreme, one would have no expectation of privacy in the digital contents of a flash drive given (1) not all computers have USB ports; (2) flash drives may be transferred from one computer to another; and (3) a if law enforcement claims to confine their search to identify the phone number, the search nevertheless provides law enforcement access to all of the information stored on the SIM card. I do not believe one can dissect digital data to determine what information is afforded Fourth Amendment protection. Once law enforcement removes a SIM card in order to conduct a forensic examination, it has unrestricted access to personal information that is protected by the Fourth Amendment. See Riley, 134 S. Ct. at 2492 (rejecting proposed rule that would restrict the scope of a cell phone search to those areas of the phone where an officer reasonably believes there would be information relevant to a crime such as the arrestee's identity and stating, "[t]his approach would sweep in a great deal of information, and officers would not always be able to discern in advance what information would be found where"). Further, law enforcement recognized the amount of information that was accessible as Detective McGraw explained the SIM card "primarily contains the assigned cell phone number[,]. . . continuing call logs, stored contacts, things of that nature." During the warrantless search, Detective McGraw recovered the cell phone number, thirty-four contact entries, and three text messages. Therefore, despite the claim that the scope of the search was limited, the search provided access to and ultimately yielded much more than a phone number. Contrary to the majority's characterization, such a search cannot be deemed reasonable. Because Moore had a reasonable expectation of privacy in the digital contents of the SIM card, I would hold the warrantless search violated the Fourth Amendment's prohibition against unreasonable searches and seizures. See Carpenter v. United States, 138 S. Ct. 2206, 2213 (2018) ("When an individual seeks to preserve something as private, and his expectation of privacy is one that society is prepared to recognize as reasonable, we have held that official intrusion into that private sphere generally qualifies as a search and requires a warrant supported by probable cause." (internal quotation marks omitted)). II. Even if Moore had a reasonable expectation of privacy in the digital contents of the SIM card, the State argued and the trial court found Moore divested himself of the Fourth Amendment protection by abandoning the cell phone. In my view, the State failed to establish the abandonment exception to the Fourth Amendment warrant requirement. See State v. Dupree, 319 S.C. 454, 457, single computer can utilize a series of flash drives. 462 S.E.2d 279, 281 (1995) (recognizing the doctrine of abandonment as an exception to the Fourth Amendment warrant requirement). When determining whether a defendant abandoned property for Fourth Amendment purposes, "the question is whether the defendant has, in discarding the property, relinquished his reasonable expectation of privacy so that its seizure and search is reasonable within the limits of the Fourth Amendment." Id. at 457, 462 S.E.2d at 281 (quoting City of St. Paul v. Vaughn, 237 N.W.2d 365, 370–71 (Minn. 1975)). "[A]bandonment is a question of intent and exists only if property has been voluntarily discarded under circumstances indicating no future expectation of privacy with regard to it." 68 Am. Jur. 2d Searches and Seizures § 23, at 135 (2010). In the context of abandonment, intent is "inferred from words, acts, and other objective facts." 79 C.J.S. Searches § 43, at 70 (2017). In this case, the objective facts known to law enforcement at the time of the search were as follows. The phone was found on the floorboard of the victim's vehicle. Although the vehicle was clearly a crime scene, law enforcement did not see Moore in possession of the phone, did not see him throw the phone in an effort to evade police, and did not know when the phone was left. Additionally, the record shows no denial of ownership by Moore, nor was there any evidence showing Moore had intentionally discarded the cell phone. In fact, Investigator Clark testified: "I'm sure [the flip phone] was left by mistake." At trial, Detective McGraw testified he received the flip phone within two hours of the shooting. The two-hour period was in the afternoon (approximately 2:00 p.m. to 4:00 p.m.), 16 and there was no report that the phone was lost or stolen 16 Unlike the situation where an officer needs to make an instant decision to determine whether a suspect is reaching for identification or a weapon, no such exigencies existed. See Riley, 134 S. Ct. at 2485 ("Once an officer has secured a phone and eliminated any potential physical threats, however, data on a phone can endanger no one."). At trial, Investigator Lorin Williams testified: "[T]he quicker we can get our hands on those phones . . . the quicker it helps us with the investigation." However, there is no testimony in the record that the officers believed Moore posed an imminent threat to law enforcement. See Harris v. O'Hare, 770 F.3d 224, 235 (2d Cir. 2014) (stating "general knowledge, without more, cannot support a finding of exigency"); cf. Barton v. State, 237 So. 3d 378, 381 (Fla. Dist. Ct. App. 2018) (holding that defense counsel was not ineffective for failing to file a motion to suppress evidence discovered from the warrantless search of Barton's abandoned cell phone where the following exigent circumstances existed: "police knew the gunman fired several bullets towards fifteen to twenty-five students at a prior to the first search. Notably, the record is unclear as to whether the screen was locked.17 Next, I note, by law enforcement's own admission, the phone was left by mistake. The record does not reveal a single instance in which officers referred to the phone as "abandoned." Furthermore, law enforcement's actions and testimony clearly indicate an intent to identify the owner. Had the flip phone not contained calls to the victim, law enforcement likely would have interviewed Moore and returned the phone. In my view, considered as a whole, the objective facts known to the officer at the time of the initial search do not satisfy the State's burden to show Moore abandoned his phone. My conclusion, however, in no way limits law enforcement's ability to investigate an active crime scene. When law enforcement finds a phone, they have several less intrusive options at their disposal to identify the owner of the phone. These options include examining the exterior of the phone, using the emergency dialer to call 911 so that the dispatcher may identify the number associated with the phone, or contacting the phone's wireless service provider to determine the owner. See Mikah Sargent, How to Find the Owner of a Lost or Stolen iPhone, iMore (Dec. 28, 2016), https://www.imore.com/how-find-owner-lost-or-stolen-iphone. Ultimately, the protection of privacy must keep up with technological advances. bus stop near an elementary school; a student was seriously injured; the gunman had not been detained; and the gun had not been located"). 17 From the record, it is not clear if the flip phone was password protected. The State claims it was not password protected; however, from my reading, it appears the officer did not know, and the report makes no comment on whether or not a password was required. [Defense Counsel:] This phone was password protected, wasn't it? [Investigator Williams:] I could not answer that. [Defense Counsel:] [I]n [Detective McGraw's] report, does he say it was password [protected]? [Investigator Williams:] I don't see that it was. III. Finally, I do not believe the warrantless search can be cured through the inevitable discovery doctrine. "[T]he inevitable discovery doctrine provides that illegally obtained information may nevertheless be admissible if the prosecution can establish by a preponderance of the evidence that the information would have ultimately been discovered by lawful means." State v. Cardwell, 425 S.C. 595, 601, 824 S.E.2d 451, 454 (2019) (citing Nix v. Williams, 467 U.S. 431, 444 (1984)). Here, Detective McGraw testified he performed a limited forensic examination of all three phones found at the scene of the shooting prior to the issuance of a warrant. From this search, law enforcement retrieved cell phone numbers associated with each of the phones and, through their database, determined that one of the phones did not belong to the victim but, instead, belonged to Moore. After obtaining the search warrant, Detective McGraw determined the flip phone was used to make five phone calls to one of the victim's phones shortly before the shooting occurred. The State maintains this evidence would have been inevitably discovered because law enforcement "had the victim's phone in their possession[,]" and they "had every right to search the victim's phone." However, nowhere in the record does the State claim law enforcement pulled call logs from any of the victim's phones, or even if law enforcement's forensic examination equipment was capable of accessing the victim's iPhones' call logs.18 "The independent source doctrine allows admission of evidence that has been discovered by means wholly independent of any constitutional violation." Nix, 467 U.S. at 443 (emphasis added). Without the illegal search, the officers had no evidence connecting the phone to Moore. It was only through the unlawful action of the officers—accessing Moore's cell phone without a warrant—that the officers were able to connect Moore to the flip phone and the flip phone to the victim. 18 Detective McGraw recalled that he pulled the SIM card from the iPhone 4 to identify the number and, also, identified the number associated with the iPhone 3. However, he testified the extraction of call logs and text messages from the flip phone was not supported by the equipment and, thus, he had to take pictures of the call log on the flip phone. Detective McGraw also noted the victim's iPhone 4 "was damaged." Based on the flip phone's call log, he was ultimately able to determine the flip phone communicated with the iPhone 3 prior to the shooting. While the State claims the information was available from the victim's cell phone, it cannot point to any place in the record to substantiate that claim. Therefore, without assuming, this Court cannot conclude Moore's phone number, and the call log implicating Moore, would have been inevitably discovered. As a result, I would find the information was inadmissible. See id. at 449–50 (holding the inevitable discovery doctrine applied when searchers were approaching the location of a victim's body and would have discovered it without information obtained from the defendant's unlawful interrogation). 19 IV. Based on the foregoing, I would find the warrantless search violated Moore's rights under the Fourth Amendment. In reaching this conclusion, I adhere to my dissent in Brown as I believe Riley gave a clear directive that law enforcement, absent exigent circumstances, must obtain a warrant prior to searching the digital contents of a cell phone. Accordingly, I would reverse the decision of the court of appeals and remand for a new trial. 19 Additionally, the State—without citing support—asks the Court to redact the information obtained through the illegal search and find the warrant valid. However, the redaction principle applies when the defendant seeks to challenge false statements in a search warrant affidavit. See Franks v. Delaware, 438 U.S. 154 (1978) (holding a defendant has the right to challenge misstatements in a search warrant affidavit); State v. Robinson, 415 S.C. 600, 606–08, 785 S.E.2d 355, 358– 59 (2016) (finding probable cause no longer existed after redacting misstatements in the search warrant affidavit and considering the remaining content). Most importantly, I believe the purpose of the exclusionary rule is defeated if a court applies the redaction principle to a search that violates the Fourth Amendment. If law enforcement obtains evidence by means of an illegal search and then belatedly obtains a search warrant based, in part, on the evidence, it is self-evident that applying the redaction principle to the search warrant on judicial review should not serve to cure the constitutional defect.