¶17
Siddoway, C.J.(dissenting) — One of the few jealously and carefully drawn exceptions to the warrant requirements of the Fourth Amendment to the United States Constitution and Washington Constitution article I, section 7 is voluntarily abandoned property. State v. Evans, 159 Wn.2d 402, 407, 150 P.3d 105 (2007). The issue is not abandonment in the strict property right sense but, rather, whether the defendant in leaving the property has relinquished his reasonable expectation of privacy so that the search and seizure is valid. Id. (citing State v. Dugas, 109 *232Wn. App. 592, 595, 36 P.3d 577 (2001) (citing United States v. Hoey, 983 F.2d 890, 892-93 (8th Cir. 1993))). Courts ordinarily find that a defendant has relinquished his reasonable expectation of privacy by leaving property behind in an area where the defendant does not have a privacy interest. Id. at 409. “The great majority of the court decisions having to do with the abandonment of effects in a search and seizure context are [those in which] it appears the defendant tried to dispose of certain incriminating objects upon the lawful approach of or pursuit by the police.” 1 Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth Amendment § 2.6(b) at 875 (5th ed. 2012) (footnote omitted).
¶18 By contrast, when a defendant like Adrian Samalia flees the scene of a crime and leaves behind his cell phone, it is reasonable to assume that it is not because he prefers that police recover it outside his possession but is instead through inadvertence or lack of an opportunity to retrieve it. Nonetheless, as observed by Professor LaFave (although not directly addressing cell phones), even an inadvertent leaving of effects in a public place, whether or not an abandonment in the true sense of that word, has historically amounted to a loss of any justified expectation of privacy. Id. But cf. State v. Hamilton, 2003 MT 71, 314 Mont. 507, 67 P.3d 871 (an individual who loses or misplaces property continues to have an expectation of privacy, but it is diminished to the extent that the finder may examine the contents as necessary to identify the owner); Morris v. State, 908 P.2d 931 (Wyo. 1995) (same); State v. Kealey, 80 Wn. App. 162, 175, 907 P.2d 319 (1995) (same).1
¶19 “Involuntary” abandonment has been held to exist only where property is abandoned in response to illegal *233police conduct; that, in turn, requires showing “ ‘(1) unlawful police conduct and (2) a causal nexus between the unlawful conduct and the abandonment/ ” State v. Reynolds, 144 Wn.2d 282, 288, 27 P.3d 200 (2001) (quoting State v. Whitaker, 58 Wn. App. 851, 853, 795 P.2d 182 (1990)). The trial court correctly found that the conduct of Officer Ryan Yates, who recovered Mr. Samalia’s cell phone from the console of the stolen car, was lawful, and from that concluded that Mr. Samalia had not made the showing required for voluntary abandonment.
¶20 Recent search and seizure jurisprudence recognizes that conventional cell phones are fundamentally different from other property and that exceptions to the warrant requirement might not apply or might apply more narrowly where a cell phone or a similar device is at issue. As observed last year by the United States Supreme Court, “Modern cell phones, as a category, implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet, or a purse.” Riley v. California,_ U.S._, 134 S. Ct. 2473, 2488-89,189 L. Ed. 2d 430 (2014). I dissent in this case because I conclude, considering Washington’s search and seizure jurisprudence under article I, section 7 of the Washington Constitution as a whole, that police must generally secure a warrant before conducting a search of data on a cell phone — even one that has been left behind in a place where its owner has no privacy interest.
¶21 In a series of decisions, our Supreme Court has found that certain information revealing intimate aspects of life that citizens have held, and should be entitled to hold safe from government trespass is entitled to protection under article I, section 7 of the Washington Constitution regardless of whether the citizen has a privacy interest in the place where it is found.
¶22 In State v. Gunwall, 106 Wn.2d 54, 65-66, 720 P.2d 808 (1986), the court held that while the United States Supreme Court had found that Fourth Amendment protec*234tion did not extend to telephone toll billing records or pen registers, our state constitution required separate analysis because it “focuses on the protection of a citizen’s private affairs,” justifying a “more expansive interpretation” than under the Fourth Amendment, and because the State of Washington “has a long history of extending strong protections to telephonic and other electronic communications.” The court concluded that when police obtained records of the defendant’s calls without benefit of the issuance of any valid legal process, “they unreasonably intruded into her private affairs without authority of law and in violation of Washington Const, art. [I], § 7.” Id. at 68.
¶23 In State v. Boland, 115 Wn.2d 571, 580, 800 P.2d 1112 (1990), our Supreme Court held that article I, section 7 of our constitution protects garbage cans placed on the curb from warrantless searches by law enforcement, affirming that “the location of a search is indeterminative when inquiring into whether the State has unreasonably intruded into an individual’s private affairs.”
¶24 In State v. Jackson, 150 Wn.2d 251, 262, 76 P.3d 217 (2003), the court held that a warrant was required in order to install a GPS (global positioning system) device on a vehicle for purposes of tracking it, observing that
the intrusion into private affairs made possible with a GPS device is quite extensive as the information obtained can disclose a great deal about an individual’s life. ... In this age, vehicles are used to take people to a vast number of places that can reveal preferences, alignments, associations, personal ails and foibles. The GPS tracking devices record all of these travels, and thus can provide a detailed picture of one’s life.
¶25 In State v. Jorden, 160 Wn.2d 121, 129, 156 P.3d 893 (2007), the court held that the information contained in a motel registry is a private affair under article I, section 7, reasoning not only that an individual’s very presence in a motel or hotel may be a sensitive piece of information but that the registry may also reveal co-guests in the room; *235individually or collectively, the information may provide intimate details about a person’s activities and associations.
¶26 It was in a different context that our Supreme Court addressed the private character of personal information maintained on a cell phone in State v. Hinton, 179 Wn.2d 862, 319 P.3d 9 (2014), but the court’s discussion of the historically strong protection for the type of information a cell phone can contain compels the conclusion that it, like the information procured by law enforcement in Gunwall, Boland, Jackson, and Jorden, is subject to the warrant requirement regardless of where law enforcement finds the phone. In Hinton, the defendant was not the cell phone owner but an individual who sent inculpatory text messages to a cell phone that police had seized following the arrest of a drug dealer. Armed with the drug dealer’s phone, police responded to at least two incoming texts — one of them, Mr. Hinton’s — by arranging meetings for drug transactions and then arresting the would-be purchasers at the proposed meeting site.
¶27 The court readily concluded that reviewing the cell phone for text messages was an intrusion into private affairs:
Viewing the contents of people’s text messages exposes a “wealth of detail about [a person’s] familial, political, professional, religious, and sexual associations.” United States v. Jones,_U.S._, 132 S. Ct. 945, 955, 181 L. Ed. 2d 911 (2012) (Sotomayor, J., concurring) (discussing GPS (global positioning system) monitoring). Text messages can encompass the same intimate subjects as phone calls, sealed letters, and other traditional forms of communication that have historically been strongly protected under Washington law. Although text message technology rendered Hinton’s communication to Lee more vulnerable to invasion, technological advancements do not extinguish privacy interests that Washington citizens are entitled to hold. The right to privacy under the state constitution is not confined to “a ‘protected places’ analysis” or “to the subjective privacy expectations of modern citizens who, due to well publicized advances in surveillance technology, are learn*236ing to expect diminished privacy in many aspects of their lives.” Myrick, 102 Wn.2d at 513, 511.
Id. at 869-70 (alteration in original).2
¶28 The United States Supreme Court described the uniquely extensive and sensitive character of cell phone data in even greater detail in Riley. What follows is only a portion of its discussion of why a search of data from a cell phone is unlike a search for other property:
The storage capacity of cell phones has several interrelated consequences for privacy. First, a cell phone collects in one place many distinct types of information — an address, a note, a prescription, a bank statement, a video — that reveal much more in combination than any isolated record. Second, a cell phone’s capacity allows even just one type of information to convey far more than previously possible. The sum of an individual’s private life can be reconstructed through a thousand photographs labeled with dates, locations, and descriptions; the same cannot be said of a photograph or two of loved ones tucked into a wallet. Third, the data on a phone can date back to the purchase of the phone, or even earlier. A person might carry in his pocket a slip of paper reminding him to call Mr. Jones; he would not carry a record of all his communications with Mr. Jones for the past several months, as would routinely be kept on a phone.
... [CJertain types of data are also qualitatively different. An Internet search and browsing history, for example, can be found on an Internet-enabled phone and could reveal an individual’s private interests or concerns — perhaps a search for certain symptoms of disease, coupled with frequent visits to WebMD. Data on a cell phone can also reveal where a person has been. Historic location information is a standard feature on many smart phones and can reconstruct someone’s specific move-*237merits down to the minute, not only around town but also within a particular building.
Riley, 134 S. Ct. at 2489-90.
¶29 Summarizing its discussion of the type and volume of personal information found on a cell phone, the Riley Court quoted Learned Hand as having observed in 1926 that “it is ‘a totally different thing to search a man’s pockets and use against him what they contain, from ransacking his house for everything which may incriminate him’ the Court then observed that if the man’s
pockets contain a cell phone, however, that is no longer true. Indeed, a cell phone search would typically expose to the government far more than the most exhaustive search of a house: A phone not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form — unless the phone is.
Id. at 2490-91 (quoting United States v. Kirschenblatt, 16 F.2d 202, 203 (2d Cir. 1926)).
¶30 In this case, Adrian Samalia pulled over and stopped the stolen car he was driving while being followed by Officer Yates. The officer had confirmed the car was stolen and was following Mr. Samalia while awaiting backup. Mr. Samalia’s stop caused Officer Yates to activate his lights. After Mr. Samalia stepped out of his car and saw that Officer Yates had pulled out his service weapon and intended to detain him, Mr. Samalia fled. It is reasonable to assume that he either forgot about his cell phone in the console of the stolen car or decided that if he hoped to escape, retrieving the phone was not an option.
¶31 No reported Washington decision has directly addressed whether a citizen relinquishes his reasonable expectation of privacy in the data on his cell phone by leaving the phone behind at the scene of a crime. In my view, the Gunwall to Jorden line of cases, together with Hinton, collectively compel the conclusion that the voluminous *238private information likely to be found on a cell phone remains protected by article I, section 7 of the Washington Constitution even when the phone is left behind in a place where the defendant has no privacy interest. Requiring a search warrant will assure that there is probable cause to believe that the defendant is involved in criminal activity and that evidence of the criminal activity can be found in the data on the cell phone. In this case, Officer Yates presumably would have been able to demonstrate probable cause to a magistrate as long as he first spoke to the owner of the stolen car and confirmed that the phone did not belong to her or some innocent prior passenger.
¶32 The only other exception to the warrant requirement for the data on Mr. Samalia’s cell phone identified by the majority is the exigency exception that it notes was recognized in Riley. Majority at 231. But Riley holds that obtaining a warrant to search data on a cell phone should be the rule because “data on the phone can endanger no onq.” Riley, 134 S. Ct. at 2485. While recognizing that the exigent circumstances exception will be available in some cases, the Court observed that the exception “requires a court to examine whether an emergency justified a warrantless search in each particular case.” Id. at 2494 (citing Missouri v. McNeely,_U.S._, 133 S. Ct. 1552, 1559, 185 L. Ed. 2d 696 (2013)). Here, the State did not argue that exigent circumstances existed, nor did the trial court find any. See Clerk’s Papers at 11-16 (State’s opposition to motion to suppress), 27-32 (findings and conclusions). The only crime as to which Officer Yates had probable cause was Mr. Samalia’s possession of a stolen car, and the stolen car had been left behind. There was no evidence that Mr. Samalia was armed, was suspected of any other crime, or otherwise presented a danger.
¶33 Finally, the majority concludes that the use of Mr. Samalia’s cell phone was attenuated because officers obtained his name from the phone of Deylene Telles, Mr. Samalia’s former girlfriend. Majority at 231. But the evi*239dence was clear that officers identified Ms. Telles only by searching “contacts” on Mr. Samalia’s cell phone, and that it was only after using Mr. Samalia’s phone to lure her to a meeting at which they arrested her, used Mr. Samalia’s phone to call her, and then took her phone to see who it identified as the caller that they obtained Mr. Samalia’s name.3 Officer Yates thereafter recognized Mr. Samalia as the driver of the stolen car from a photograph that he located using the name from Ms. Telles’s phone. But the officer had no prior knowledge of Mr. Samalia, nor did he have other information connecting Mr. Samalia to the stolen car. The independent source exception to the exclusionary rule does not apply.
¶34 “The attenuation test suggests that where there are intervening independent factors along the chain of causation, the taint of illegally obtained evidence becomes so dissipated as to preclude suppression of derivative evidence as ‘fruit’ of the illegal police action.” Charles W. Johnson & Debra L. Stephens, Survey of Washington Search and Seizure Law: 2013 Update, 36 Seattle U. L. Rev. 1581, 1765 (2013) “Washington courts have not explicitly adopted the attenuation doctrine, but they have applied it.” Id. at 1766 (citing State v. Eserjose, 171 Wn.2d 907, 919, 259 P.3d 172 (2011)). The majority fails to explain any step along the causal chain leading to Officer Yates’s review of Mr. Samalia’s photograph that was independent of use of the cell phone.
¶35 For these reasons, I respectfully dissent.
Review granted at 183 Wn.2d 1017 (2015).
Kealey held that police have a right, if not an obligation, to attempt to identify and notify the owner of lost property. 80 Wn. App. at 175 & n.47 (citing RCW 63.21.060). Here, though, police did not identify themselves to Ms. Telles as law enforcement seeking to return an abandoned telephone, nor, according to the evidence, was that their purpose in searching data on the phone.
A four-member dissent disagreed with the Hinton majority, but on standing grounds; it stated that “[wjhile the constitutionality of a warrantless search of one’s own cell phone is certainly in need of clarification, it is a question for another day.” Hinton, 179 Wn.2d at 882 (J.M. Johnson, J., dissenting).
Ms. Telles’s testimony at Mr. Samalia’s bench trial, at which the trial court revisited its suppression decision following a motion for reconsideration, was as follows:
They were about to handcuff me and right when they — he was like — to walk around me, the other police officer had a phone and they called from that phone to my phone, and that’s when my phone brought up a picture and a phone number and a name. And he took the phone out of my hands and he said, “Who is this?”
Report of Proceedings at 61.