IN THE SUPREME COURT OF THE STATE OF DELAWARE
DIAMONTE TAYLOR, §
§ No. 91, 2020
Defendant Below, §
Appellant, § Court Below: Superior Court
§ of the State of Delaware
v. §
§ Cr. ID No. 1605012921A (N)
STATE OF DELAWARE, §
§
Plaintiff Below, §
Appellee. §
Submitted: June 16, 2021
Decided: September 8, 2021
Before SEITZ, Chief Justice; VALIHURA, VAUGHN, TRAYNOR, and
MONTGOMERY-REEVES, Justices, constituting this Court en Banc.
Upon appeal from the Superior Court of the State of Delaware: REVERSED and
REMANDED.
Benjamin S. Gifford IV, Esquire, Law Office of Benjamin S. Gifford IV,
Wilmington, Delaware, for Defendant Below, Appellant Diamonte Taylor.
Elizabeth R. McFarlan, Esquire, Delaware Department of Justice, Wilmington,
Delaware, for Plaintiff Below, Appellee State of Delaware.
SEITZ, Chief Justice, for the majority:
A Superior Court jury convicted Diamonte Taylor for gang-related murder
and violent felonies. On direct appeal, Taylor claims that the Superior Court should
have suppressed evidence from his smartphones collected under an unconstitutional
search warrant. Unlimited in time and scope, the general warrant to search Taylor’s
smartphones violated Taylor’s rights under the Fourth Amendment to the United
States Constitution, Article I, Section 6 of the Delaware Constitution, and the
particularity requirement under Delaware statutory law. The evidence should have
been suppressed and the error was not harmless. We reverse his convictions and
remand to the Superior Court for a new trial without the taint of the improperly
seized evidence.
I.
According to the record on appeal, Taylor was a member of the Wilmington
street gang “Shoot to Kill” or “STK.”1 On January 23, 2015, someone murdered an
STK affiliate, prompting a feud between STK and a rival Wilmington gang known
as “Only My Brothers” or “OMB.”2 Multiple witnesses identified Taylor, who goes
by the nickname “Nice” or “D-Nice,” and other STK members as participants in a
series of violent crimes that occurred throughout New Castle County in May 2016.
1
App to Opening Br. at A0544; A0561; A1054; A1199-1200.
2
Id. at A0544.
2
Kevon Harris-Dickerson is an admitted STK gang member. He was arrested and
pled guilty to several charges related to the May 2016 crime spree. 3 Harris-
Dickerson testified that Taylor and Zaahir Smith were members of STK and
participated in the May 2016 violence.4 We summarize the trial testimony about
each incident below as they relate to Taylor’s charges.
A.
On May 5, 2016, Jonathan Rivera and Gerard McDonald drove to visit Ninti
Johnson at her apartment in Newark. Johnson was running an errand when they
arrived. Johnson’s brother, Smith, who McDonald knew by his nickname “Hotep,”
was at the apartment with Taylor.5 Smith asked Rivera and McDonald to take him
and Taylor to a nearby gas station while they waited for Johnson. On the way back
from the gas station, Smith told Rivera to park behind the apartment complex. Smith
then pointed a gun at Rivera and McDonald and demanded that they “run
everything.”6 Rivera and McDonald understood this to mean that they were being
robbed. They handed over Rivera’s laptop, gold watch, black leather wallet, and
iPhone 5.7 After Smith and Taylor left Rivera’s car, Rivera and McDonald called
the police to report the robbery.
3
Id. at A1195-97.
4
Id. at A1195; A1199-1200.
5
Smith is also known as “Hotep,” “Rango,” “Grimey Savage,” and “Grimey STK.” Id. at A0564;
A0661; A1197.
6
Id. at A0640-41.
7
Id. at A0641; A0650.
3
Investigators searched Johnson’s apartment and found a .38 revolver, a box of
Remington .38 ammunition, credit cards in Jonathan Rivera’s name, and a debit card
in Zaahir Smith’s name.8 Smith’s fingerprints matched fingerprints lifted from the
ammunition box.9 Fingerprints recovered from the rear passenger side of Rivera’s
car matched Taylor’s fingerprints. 10 McDonald identified Smith and Taylor in
separate photo line-ups. McDonald recognized Taylor from the number “302”
tattooed around his eye.11 Rivera did not make an identification from the photo line-
ups but identified Smith in a photo posted to Facebook. 12 An inmate who later
shared a cell with Smith testified that Smith admitted to robbing two men who were
visiting his sister with a .38 revolver.13
B.
On May 16, 2016, Shango Miller, an affiliate of OMB, was shot outside his
grandmother’s house on Lombard Street in Wilmington.14 Miller had been playing
with his infant cousin and aunt who were just inside the screen door. As Miller’s
cousin and aunt began making their way toward the interior of the house, his aunt
heard Miller exclaim, “Grandmom, I got shot.”15 The forensic nurse examiner who
8
Id. at A0663.
9
Id. at A0669.
10
Id. at A0669-70.
11
Id. at A0651.
12
Id. at A0643.
13
Id. at A1193-94.
14
Id. at A0702-03; A0712-13; A1205.
15
Id. at A0712.
4
treated Miller at the hospital testified that Miller said, “I was outside smoking at my
grandmother’s house. These two kids walked by the house. They didn’t say
anything. They walked by the house again. I heard one shot. They were close,
about arm’s length. I ran inside to my grandmom’s house.”16 Miller told police he
knew the shooter by the name “D-Nice” and identified Taylor in a photo line-up.17
Investigators reviewed surveillance video from the area which showed two
people walking toward the 1000 block of Lombard Street where the shooting
occurred and then fleeing the area immediately after.18 One individual was wearing
a black and gray hat with an emblem on the bill and a hoodie with white strings and
a red stripe.19 Harris-Dickerson testified that Smith and Taylor were the two people
in the video.20 He explained that he recognized Smith because Smith often wore a
black and gray Armani Exchange hat that looked like the one the suspect was
wearing in the video.21 Police recovered a Herter’s 9mm shell casing from the steps
in front of the house where Miller was shot.22
16
Id. at A0730.
17
App. to Answering Br. at B6.
18
App. to Opening Br. at A0706; A0708.
19
Id. at A0706; A0711.
20
Id. at A1205.
21
Id. at A1204-05.
22
Id. at A0987; A0723.
5
C.
Two days later, on May 18, 2016, Temijiun Overby was shot during an
attempted robbery on Thatcher Street in Wilmington. Video surveillance showed
two people, later determined to be Smith and Harris-Dickerson, walking behind
Overby and his friends. 23 Smith approached the group while Harris-Dickerson
lingered about 20-30 feet behind.24 Smith shot Overby because Overby refused to
hand over his property.25
Latasha Pierce was Harris-Dickerson’s girlfriend at the time.26 She lived at
508 Shearman Street in Wilmington, and Harris-Dickerson was “there all the
time.” 27 Two months prior, on March 10, 2016, Harris-Dickerson accompanied
Pierce to Cabela’s Sporting Goods where she purchased a 9mm Canik pistol. 28
Pierce testified that on the night of the attempted robbery of Overby, Harris-
Dickerson was in possession of the 9mm Canik.29 She testified that she drove with
Harris-Dickerson and Smith to Northeast Market Street on the corner of Thatcher
Street and Northeast Boulevard.30 While she was inside shopping, Harris-Dickerson
23
Harris-Dickerson testified that he was able to identify Smith by the same black and gray Armani
Exchange hat. Id. at A1204.
24
Id. at A0700.
25
Id. at A1201.
26
Id. at A1066; A1197.
27
Id. at A1056.
28
Id. at A1054-57. Pierce pled guilty to Giving a Firearm to a Person Prohibited. Id. at 1056.
29
Id. at A1058.
30
Id. at A1057.
6
and Smith observed Overby and his friends exiting the store and decided they wanted
to rob them.31 Pierce testified that Smith asked Harris-Dickerson for the 9mm pistol
before they left the car to follow Overby and his friends.32 Harris-Dickerson testified
that Smith shot Overby with a 9mm pistol.33 Investigators recovered a Herter’s 9mm
shell casing from the scene of Overby’s shooting.34
D.
The next day, on May 19, 2016, high school freshman Brandon Wingo was
shot while walking home from school with a group of classmates. Wingo and a
friend were walking a few paces behind the larger group when Wingo noticed a
person wearing a black jacket walk toward them on Clifford Brown Walk. 35
Wingo’s classmates recalled thinking the jacket was odd because it was hot
outside. 36 Wingo told his classmate, “There goes the opp.” 37 After passing the
larger group, the person in the black jacket reached in his pocket, yelled something,
and pulled out a gun.38 The person fired three shots.39 Wingo’s classmates spread
out and ran. The friend walking with Wingo froze and screamed.40 Wingo also
31
Id. at A1058.
32
Id.
33
Id. at A1201.
34
Id. at A0698; A0958.
35
Id. at A0805.
36
Id. at A0784; A0796; A0801; A0805.
37
Id. at A0805. An “opp” is a member of an opposing gang. Id. at A0772.
38
Id. at A0784-85.
39
Id. at A0785; A0794-95.
40
Id. at A0805-06.
7
began to run, but he was struck in the head and buttocks.41 Wingo died from his
injuries.
Treasure Evans was walking to her grandmother’s house on Clifford Brown
Walk when the shooting occurred. Evans testified that Taylor drove by in a light
blue car minutes before the shooting.42 She recognized Taylor, who was sitting in
the front passenger seat wearing a black hoodie, because she and Taylor had attended
the same middle school. 43 Evans witnessed the shooting. She testified that the
shooter was wearing all black, but she could not see his face. She told police she
“assumed” Taylor was the shooter because the person she recognized in the front
passenger seat of the car was the same person she saw firing shots at Wingo.44 Evans
also identified Taylor in a photo line-up.45
Evans’s mother, Nadana Sullivan, was on Clifford Brown Walk waiting for
her daughter to return home from school at the time of the shooting. Sullivan saw
the shooter run down the street and turn onto Shearman Street with the gun still in
his hand. 46 Sullivan did not see the shooter’s face, but she testified that “the
41
Id. at A1022-23.
42
Id. at A0812.
43
Id.
44
Id. at A0898-99 (“I said it was Diamonte . . . . Because that’s who I seen in the car, and it’s the
same person who shot Brandon . . . . But I know what I seen. And I’m telling you what I seen. If
I actually seen his face, I’m like oh, yeah, that was actually him, but I didn’t see his face. And so
I can’t say that that was actually him, but I assumed it was him.”); id. at A0904-05.
45
Id. at A0918.
46
Id. at A0821.
8
children” told her that the shooter’s name was Diamonte.47 Sullivan also testified
that she had seen the person she now knew to be Taylor standing with another
individual “fiddling around with a gun” on the corner of Clifford Brown Walk and
Shearman Street three days before Wingo’s murder.48
Harris-Dickerson testified that he was with Taylor and Smith the day Wingo
was murdered. 49 He explained that Wingo had recently posted something
disrespectful about a deceased STK member on Facebook. Harris-Dickerson,
Taylor, and Smith agreed to shoot Wingo, or any other OMB member, on the spot.50
They knew where Wingo went to school and the routes he walked home.51
Pierce testified that Harris-Dickerson often borrowed her Ford Fusion and that
he and Taylor drove her to work in her car at 2:30 p.m. the day Wingo was shot.52
According to Harris-Dickerson, he and Taylor drove to Clifford Brown Walk after
dropping Pierce off at work.53 They saw Wingo walking with a group of classmates.
Taylor said that he wanted to shoot Wingo from the car.54 Harris-Dickerson said no
and stopped the car.55 Taylor got out of the car and took a gun and his winter coat
47
Id. at A0825-26.
48
Id. at A0826.
49
Id. at A1204.
50
Id.
51
Id.
52
Id. at A1057; A1059.
53
Id. at A1203.
54
Id.
55
Id.
9
with him.56 Harris-Dickerson drove away. Harris-Dickerson said he heard gunshots
a few moments later and began heading back toward Shearman Street.57
Video surveillance from moments after the shooting showed Taylor running
toward 508 Shearman Street just as Harris-Dickerson was parking the Ford Fusion.58
Harris-Dickerson testified that he met Taylor and Smith inside the house at 508
Shearman Street.59 There, Taylor announced that he shot Wingo. The three returned
to the Ford Fusion and drove down Clifford Brown Walk toward where Wingo was
shot. Harris-Dickerson said that Taylor laughed as they passed Wingo’s body lying
between two parked cars.60
Harris-Dickerson, Taylor, and Smith eventually met up with Pierce, and the
four traveled to North Carolina.61 Pierce returned to Delaware immediately, while
Harris-Dickerson, Taylor, and Smith stayed in North Carolina for a few days before
returning to Wilmington. 62 Harris-Dickerson testified that Taylor and Smith
“shared” possession of the 9mm Canik during that time.63
56
Id.
57
Id.
58
Id. at A1206.
59
Id. at A1203.
60
Id. at A1206.
61
Id.
62
Id. at A1060; A1206.
63
Id. at A1206.
10
Investigators collected Herter’s brand 9mm shell casings from the scene of
Wingo’s murder.64 Ballistics analysis revealed that the same gun was used to shoot
Miller, Overby, and Wingo.65
E.
On May 30, 2016, Shawn Garrett and his friend Tiheed Roane were walking
across the 11th Street Bridge in Wilmington. Garrett, who is Brandon Wingo’s first
cousin, noticed that a car had passed them more than once.66 Garrett told Roane to
run.67 As they were running, Roane looked back and saw two people getting out of
the car.68 During a police interview the next day, Roane said he saw Grimey pointing
a gun in their direction and D-Nice sitting in the passenger seat making a shooting
gesture with his hands.69
Also on May 30, 2016, police responded to a 9-1-1 call reporting a person
with a gun near 27th and North Tatnall Streets in Wilmington. The suspect was a
“black male wearing a gray baseball cap, black T-shirt, and blue jeans.”70 The first
officer to arrive observed someone matching that description walking on West 27 th
Street.71 When the responding officer made eye contact with the individual, the
64
Id. at A0779-80.
65
Id. at A0999.
66
Id. at A0965.
67
Id.
68
Id. at A0965; A0974.
69
Id. at A0948; A0974.
70
Id. at A0948.
71
Id.
11
individual grabbed his waistband and started walking quickly down West Street.72
The officer testified that she knew from her training and experience that clenching a
waistband is a characteristic of someone who is armed.73 The officer ordered the
suspect to stop and put his hands in the air.74 As the suspect raised his arms, the
officer noticed a firearm slip from the suspect’s waistband down his pantleg. The
suspect was arrested, and officers seized the gun. The suspect was later identified
as Smith.75
II.
On June 1, 2016, United States Marshals arrested Taylor while a passenger in
a car driven by Latasha Pierce’s sister, Corliss Pierce.76 In a search incident to the
arrest, the Marshals found two smartphones in Taylor’s pants pockets—a white
Samsung and a white Motorola.77 Wilmington Police obtained a search warrant for
the car and recovered two more smartphones—a black ZTE and a second white
Samsung with a pink cover.78 Latasha Pierce told investigators that the smartphone
with the pink cover was her smartphone.79 Wilmington Police executed a search
72
Id.
73
Id. at A0948-49.
74
Id. at A0949.
75
Id. at A0955.
76
Id.
77
Id. at A1043.
78
Id. at A0258.
79
Id.
12
warrant for 508 Shearman Street and found two black coats, a black Canik 9mm gun
case, and a box of Herter’s 9mm ammunition.80
Wilmington Police Detective MacKenzie Kirlin applied for a warrant to
search Taylor’s smartphones. In her supporting affidavit, the Detective recounted
the gang-related shooting incidents, the gang and personal connections among those
involved, the smartphones found in Taylor’s pockets, and the smartphones in Corliss
Pierce’s car. According to the Detective, her training, knowledge, and experience
led her to believe that people involved in criminal acts like those described in her
affidavit use smartphones to communicate about their illegal acts.81 On June 16,
2016, the Justice of the Peace Court approved a warrant to search for:
any/all data stored by whatever means, or through normal course of
business of wireless services, and/or through the forensic examination
of said cellular telephone, to include but not limited to registry entries,
pictures, photographs, images, audio/visual recordings, multi-media
messages, web browsing activities, electronic documents, location
information, text messaging, writings, user names, subscriber
identifiers, buddy names, screen names, calendar information, call logs,
electronic mail, telephone numbers, any similar information/data
indicia of communication, and any other information/data pertinent to
this investigation within said scope.82
80
Id. at A1025-28.
81
Id. at A0256-60.
82
Id. at A0254-55.
13
Using Cellebrite 83 software, police extracted 4,645 pages from the white
Motorola smartphone—data from January 2005 to June 2016.84 This appears to be
the entire digital universe of the smartphone.85 The search yielded data from 23
areas of the phone, including 31 autofill fields, 12 user accounts, 5 passwords, 2,215
contacts, 514 call logs, 4,737 SMS messages, 63 MMS messages, 146 Facebook and
Google+ chats, 611 locations, and 26,792 web browsing entries.86 The search also
produced 17,672 individual audio, video, image, text, configuration, database and
application data files.87 Of the 17,672 data files retrieved, 17,395—or 98 percent—
were included in the final extraction report.88
A New Castle County grand jury indicted Taylor and Smith for Robbery First
Degree, Possession of a Firearm During the Commission of a Felony (“PFDCF”),
Aggravated Menacing, and Conspiracy Second Degree.89 A series of superseding
indictments modified the charges against Taylor and Smith and added Harris-
Dickerson and Pierce as co-defendants. Eventually, the State charged Taylor with
one count of Gang Participation supported by fifteen underlying offenses, one count
83
Id. at A1045-46; About, CELLEBRITE, https://www.cellebrite.com/en/about/.
84
App. to Opening Br. at A0295-96. The search of Taylor’s white Samsung (the other phone
mentioned in the warrant) yielded 388 pages of data. Id. at 0236. The extraction report from the
white Samsung was not admitted at trial.
85
Id. at A1094.
86
Id.
87
Id.
88
Id.
89
Id. at A0023-30.
14
of Robbery First Degree, one count of Attempted Robbery First Degree, four counts
of PFDCF, one count of Assault First Degree, two counts of Reckless Endangering
First Degree, two counts of Aggravated Menacing, one count of Conspiracy Second
Degree, one count of Possession of a Firearm by a Person Prohibited (“PFBPP”),
one count of Conspiracy First Degree, and one count of Murder First Degree.90
Taylor filed a motion to suppress all evidence obtained from a search of his
smartphones.91 He argued that the search warrant was not supported by probable
cause and was an unconstitutional general warrant because it lacked particularity by
failing to specify the places on the smartphone to be searched and a time frame for
the search.92 The Superior Court denied Taylor’s motion. In a transcript ruling, the
court found there was sufficient information for the Magistrate to find probable
cause because Harris-Dickerson communicated with Taylor about gang activity
using smartphones. This fact, according to the court, established a logical nexus
between the alleged criminal activity and the contents of Taylor’s smartphones. The
court further found that the warrant was not a general warrant. As the court
explained, the warrant “specifically limited the officer’s search to the cellphones and
to certain types of data, media and was pertinent to this investigation . . . .” 93 Finally,
90
Id. at A0124-42.
91
Taylor also moved to suppress his June 1, 2016 custodial statement to police. Id. at A0109-23.
The Superior Court granted the motion as unopposed after the State agreed not to admit the
statement during its case-in-chief. Id. at A0013-14; A0276.
92
Id. at A0230-65.
93
Id. at A0302-03.
15
the court found that references in the Detective’s affidavit to the May 16, 2016
shooting, the May 19, 2016 murder, and Taylor’s arrest on June 1, 2016,
demonstrated that the warrant “limit[ed] the search to a narrow time frame.”94 The
court reasoned that “whatever incriminating text messages and photos were found
were within the narrow scope of the digital search that was requested in the
affidavit.”95
Before trial, Harris-Dickerson pled guilty and agreed to testify at trial against
the other defendants.96 The Superior Court granted Taylor’s motion to sever his case
from the other defendants. At trial, the State offered into evidence 95 pages from
the 4,645-page extraction report of Taylor’s white Motorola smartphone.97 The 95-
page excerpt included: 31 autofill fields, 12 user accounts, 82 contacts, 184 call log
entries, 32 thumbnail images, 16 MMS messages and accompanying thumbnail
images, over 200 SMS messages, over 100 Facebook Messenger chats and
attachments, and hundreds of web browsing entries. 98 Full-size versions of 15
thumbnail images from various areas of the phone were introduced as separate
exhibits. 99 The information introduced included photos of Taylor with the gun
94
Id. at A0303.
95
Id. at A0302.
96
Id. at A0448.
97
Id. at A1092-1187.
98
Id. at A1095-1187; A1227-37.
99
Id. at A1104; A1113; A1128; A1130; A1133-34; A1137; A1143; A1167-68; A1170; A1172-
73; A1175-76.
16
linked to the murder, text messages, connections to social media posts, and
statements by Taylor in which he implied he had killed Wingo.
After a ten-day trial, a jury convicted Taylor of Murder First Degree, Gang
Participation, two counts of Reckless Endangerment, two counts of PFDCF, two
counts of Aggravated Menacing, and Assault First Degree. Taylor was found not
guilty of Robbery First Degree, Attempted Robbery First Degree, and the associated
counts of PFDCF. The Conspiracy First Degree, Conspiracy Second Degree, and
the severed PFBPP charges were dismissed.100 The Superior Court denied Taylor’s
motion for a new trial. On January 31, 2020, the Superior Court sentenced Taylor
to a mandatory life sentence for Murder First Degree. The court also sentenced
Taylor to an additional eleven years at Level V incarceration for the remaining
charges.
III.
Although Taylor raises several arguments on appeal, we focus on one
argument that is dispositive—whether the warrant to search his smartphones was a
general warrant, prohibited by the Fourth Amendment of the United States
Constitution, Article I, Section 6 of the Delaware Constitution, and statutory law.
Taylor argues that the warrant was a general warrant, as it authorized a search for
“any/all data” stored on his two smartphones and was not limited to specific files or
100
App. to Opening Br. at A0017.
17
file types. 101 The warrant also placed no time limit on the data searched and
collected.102 Given the importance of the smartphone data to the prosecution’s trial
strategy, Taylor claims that the Superior Court’s error was not harmless. 103 He
points to the prosecutor’s closing argument, which contained many references to
evidence taken from one of the smartphones, including photographs, text messages,
and other admissions of criminal activity.104
The State responds that the warrant was not a general warrant because the
search warrant application contained the dates of events relevant to the investigation
which could be used as time limitations.105 Although the State concedes the warrant
was “not as specific as it could have been,” it also claims that this shortcoming was
“remedied by limiting the State’s evidence to the timeframe for which the warrant
provided probable cause.”106 Finally, the State claims that any error in admitting the
evidence seized from Taylor’s smartphones was harmless because the other
admissible evidence of his guilt was “overwhelming,” citing Facebook posts,
witnesses, and ballistics reports, among other evidence.107
101
Opening Br. at 35-36; App. to Opening Br. at A0254.
102
Opening Br. at 38-39.
103
Reply Br. at 14-19.
104
Id.
105
Answering Br. at 34.
106
Oral Argument at 23:57 (June 16, 2021), https://livestream.com/delawaresupremecourt/events
/9697320/videos/222453600; Answering Br. at 36-37.
107
Id. at 42-43; Oral Argument at 31:55 (June 16, 2021), https://livestream.com/delaware
18
This Court reviews alleged constitutional violations de novo. 108 We also
apply a de novo standard of review to the Superior Court’s legal conclusions
regarding the denial of a motion to suppress.109 “We review the trial judge’s factual
findings [on a motion to suppress] to determine whether there was sufficient
evidence to support the findings and whether those findings were clearly
erroneous.”110
A.
The Fourth Amendment to the United States Constitution provides:
The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the place
to be searched, and the persons or things to be seized.
Article I, Section 6 of the Delaware Constitution also protects individuals
from unreasonable searches and seizures:
The people shall be secure in their persons, houses, papers and
possessions, from unreasonable searches and seizures; and no warrant
to search any place, or to seize any person or thing, shall issue without
describing them as particularly as may be; nor then, unless there be
probable cause supported by oath or affirmation.
supremecourt/events/9697320/videos/222453600 (“There was video, there was [sic] 911 calls,
there was [sic] guns, there were ballistics, palm prints, there were witnesses that placed Taylor at
various crime scenes.”).
108
Bradley v. State, 51 A.3d 421, 433 (Del. 2012).
109
Id. (citing Lopez-Vazquez v. State, 956 A.2d 1280, 1284-85 (Del. 2008)).
110
West v. State, 143 A.3d 712, 715 (Del. 2016) (citing Lopez-Vazquez, 956 A.2d at 1285).
19
Under Delaware statutory law, which sets forth the specific requirements for
warrant applications,111 the search warrant must state with particularity the person
or place to be searched and the items sought in as much detail as possible:
If the judge, justice of the peace or other magistrate finds that the facts
recited in the complaint constitute probable cause for the search, that
person may direct a warrant to any proper officer or to any other person
by name for service. The warrant shall designate the house, place,
conveyance or person to be searched, and shall describe the things or
persons sought as particularly as possible.112
As is apparent from the foregoing constitutional and statutory requirements, a
search warrant must be supported by probable cause, and be as particular as possible.
In our recent decision in Buckham v. State,113 we summarized the constitutional and
statutory standards governing search warrants:
For a search warrant to issue, there must be more than just probable
cause that a crime has been committed; there must also be, “within the
four corners of the affidavit, . . . facts adequate for a judicial officer to
form a reasonable belief that . . . the property to be seized will be found
in a particular place.” The constitutional requirement that there be a
nexus between the crime and the place to be searched is also enshrined
in Delaware law, which requires the warrant application to not only
“describe the things . . . sought as particularly as may be,” but also to
“state that . . . such things are concealed in the house, place,
conveyance or person designated and . . . recite the facts upon which
such suspicion is founded.”114
111
11 Del. C. § 2306.
112
Id. at § 2307(a).
113
185 A.3d 1 (Del. 2018).
114
Id. at 16 (internal citations omitted) (first quoting Sisson v. State, 903 A.2d 288, 296 (Del.
2006), then quoting 11 Del. C. § 2306).
20
Like the appeal in Buckham, we are again confronted with a warrant to search
a smartphone. We use the word smartphone, as the term “cell phone” does not
describe adequately the scope and intimacy of the information contained in these
devices. As the United States Supreme Court observed in Riley v. California,115 a
smartphone search “typically expose[s] to the government far more than the most
exhaustive search of a house,”116 including “a broad array of private information
never found in a home in any form.”117 People now “keep on their person a digital
record of nearly every aspect of their lives—from the mundane to the intimate.”118
Smartphones “have become [a] pervasive and insistent . . . part of daily life” and “an
important feature of human anatomy.”119 They “collect[] in one place many distinct
types of information—an address, a note, a prescription, a bank statement, a video—
that reveal much more in combination than any isolated record.” 120 Smartphone
searches “implicate privacy concerns far beyond those implicated” by other searches
121
and, accordingly, receive heightened constitutional scrutiny. Given the
“substantial” risk that “warrants for digital and electronic devices [may] take on the
character of ‘general warrants,’” “[t]his reality necessitates heightened vigilance, at
115
573 U.S. 373 (2014).
116
Id. at 396-397 (emphasis in original).
117
Id. at 397.
118
Id. at 386, 395 (citing Ontario v. Quon, 560 U.S. 746, 760 (2010)).
119
Id. at 385.
120
Id. at 394.
121
Id. at 393.
21
the outset, on the part of judicial officers to guard against unjustified invasions of
privacy.”122
In Buckham, the police obtained a search warrant for smartphone data to track
the defendant’s whereabouts in the six weeks prior to his arrest.123 The Buckham
search warrant, however, went beyond that specific need, and authorized the police
to search the smartphone for not just GPS data, but “[a]ny and all store[d] data
contained within the internal memory of the cellular phones [sic], including but not
limited to, incoming/outgoing calls, missed calls, contact history, images,
photographs and SMS (text) messages” for evidence of “Attempted Murder 1 st
Degree.” 124 At trial, prosecutors introduced incriminating Facebook exchanges
recovered from the search. We held, as a matter of plain error, that the warrant
application allegations were “too vague and too general to connect [Buckham’s] cell
phone to the shooting,” undermining the finding of probable cause by the trial
court.125
We also held that a warrant must “describe the items to be searched for and
seized with as much particularity as the circumstances reasonably allow” and be “no
122
Wheeler, 135 A.3d at 307.
123
185 A.3d at 6.
124
Id. at 15 (alterations in original).
125
Id. at 17.
22
broader than the probable cause on which it is based.” 126 The search warrant in
Buckham failed both requirements because:
the warrant did not limit the search of Buckham’s cell phone to any
relevant time frame and authorized the search of any data on the phone.
Worse still, it authorized law enforcement to search categories of data
that had nothing to do with GPS location information, like
“incoming/outgoing calls, missed calls, contact history, images,
photographs and SMS (text) messages.” So this warrant was both
vague about the information sought—despite the fact that a far more
particularized description could have been provided—and expressly
authorized the search of materials there was no probable cause to
search, like the contents of all of the Facebook messages Buckham
sent.127
Our ruling in Buckham relied on another of our recent search warrant
decisions, Wheeler v. State. 128 In Wheeler we recognized that, after Riley v.
California, electronic devices require greater protections than other forms of
property, given the “enormous potential for privacy violations” that “unconstrained
searches” of these devices pose.129 We again held that a warrant has to “describe the
things to be searched with sufficient particularity and be no broader than the probable
cause on which it is based.”130 Those requirements serve the Fourth Amendment’s
particularity and narrowness objectives—ensuring that “those searches deemed
126
Id. at 18 (quoting Wheeler, 135 A.3d at 299).
127
Id. at 19.
128
135 A.3d 282.
129
Id. at 299.
130
Id.
23
necessary [are] as limited as possible” and eliminating “exploratory rummaging in a
person’s belongings.”131
The warrants in Wheeler failed to limit the search to any time frame, when the
relevant dates were available to police. And the police had a more precise
description of where evidence of criminal activity might be found that could have
been included in the warrants. We determined the Wheeler search warrants were
general warrants and violated the particularity requirement of constitutional and state
law. It was also apparent from the language cut and pasted from a child pornography
warrant into the Wheeler warrant that the State was interested in finding evidence of
child pornography and not evidence of witness tampering. Although the State
claimed it was searching for “evidence of written communications” related to
witness tampering, the places it searched—DVDs and optical cameras—were
unlikely to contain those types of communications. 132 In the end, the Wheeler
warrants’ lack of particularity “permitted the species of wide-ranging, exploratory
searches the Framers intended to prohibit.”133
B.
We pass over the probable cause requirement and go straight to whether the
Taylor search warrant satisfies the constitutional and statutory requirements that it
131
Id. (alteration in original) (citations omitted) (quoting Coolidge, 403 U.S. at 467); id. at 296.
132
Wheeler, 135 A.3d at 306.
133
Id. at 307.
24
describe the items to be searched for and seized with as much particularity as the
circumstances reasonably allow and is no broader than the probable cause on which
it is based.134 It does not. Like the warrant struck down in Buckham, the Taylor
warrant authorized “a top-to-bottom search” of “[a]ny and all store[d] data” of the
digital contents of the devices.135 The Taylor warrant also “did not limit the search
of [the] cell phone to any relevant time frame . . . .” 136 And like the warrants in
Buckham and Wheeler, the Taylor warrant used the open-ended language “including
but not limited to” to describe the places to be searched. 137 The Taylor search
warrant allowed investigators to conduct an unconstitutional rummaging through all
of the contents of Taylor’s smartphones to find whatever they decided might be of
interest to their investigation.
134
The Superior Court found that there was a logical nexus between the items sought and the place
to be searched based on the two incidents identified in the Kirlin affidavit, a gang rivalry motive,
the smartphones found in Taylor’s pockets, and Taylor and Harris-Dickerson’s likely
communication by smartphone. App. to Opening Br. at A0302. Given our conclusion that the
warrant fails the particularity requirement, we need not address whether the search warrant
satisfied the probable cause requirement.
135
Buckham, 185 A.3d at 18; see also Wheeler, 135 A.3d at 289 (authorizing a search of “[a]ny
and all data, and the forensic examination thereof, stored by whatever means on any [electronic
device] seized . . . .” (emphasis omitted)).
136
Buckham, 185 A.3d at 19; see also Wheeler, 135 A.3d at 304 (describing the warrant’s
shortcomings under the particularity requirement and noting “the failure to limit the search to the
relevant time frame.”).
137
Buckham, 185 A.3d at 15; see also Wheeler, 135 A.3d at 289 (listing the areas of the phone to
be searched “to include but not limited to: registry entries, pictures, images, temporary internet
files, internet history files, chat logs, writings, passwords, user names, buddy names, screen names,
email, connection logs, or other evidence.”).
25
The Superior Court found that the Taylor warrant was not a general warrant
for several reasons:
--the warrant “specifically limited the officer’s search to the
cellphones and to certain types of data, media and was pertinent to this
investigation;”
--“the State’s response was that the -- whatever incriminating
text messages and photos were found were within the narrow scope of
the digital search that was requested in the affidavit;” and
--“the warrant here does limit the search to a relevant time
frame,” “a narrow time frame,” and it was limited to “the evidence that
will be requested to be presented in this case.”138
None of these reasons withstand scrutiny. 139 First, the fact that the
investigator identified the smartphones as the object of the search and the data on
the smartphones as the things to be searched does not satisfy the particularity
requirement. The warrant was not limited. It authorized a search of “any and all
data” on the smartphones. The search could have been limited to smartphone data
tied specifically to the probable cause supporting the warrant. We held in Buckham
that the warrant failed constitutional review because it “did not limit the search of
Buckham’s cell phone to any relevant time frame and authorized the search of any
138
App. to Opening Br. at A302-03.
139
We appreciate that the Superior Court did not have the benefit of our Buckham decision at the
time it decided the motion to suppress. Wheeler and Buckham were our Court’s first opportunity
to consider the United States Supreme Court’s Riley decision and the evolving jurisprudence for
search warrants and electronic information. See State v. Reese, 2019 WL 1277390 at *5-7 (Del.
Super. Ct. Mar. 18, 2019) (recognizing that search warrants for electronic devices are held to a
higher standard after Wheeler and Buckham).
26
data on the phone.”140 The same is true here. While we are reluctant to make specific
pronouncements about what is required in a search warrant for electronic devices for
fear that we might tie the hands of investigators, we can say for certain that more
specificity was possible and required than simply identifying the smartphones to be
searched and all of their data.141
Second, a warrant that allows investigators to search for “any and all data”
“pertinent to the criminal investigation” is unlimited in scope. To find information
pertinent to the investigation, investigators were authorized, in general warrant
fashion, to rummage through all of the smartphones’ contents. The free-ranging
search for anything “pertinent to the investigation” undermines the essential
protections of the Fourth Amendment—that a neutral magistrate approve in advance,
based on probable cause, the places to be searched and the parameters of the search.
Although the record is not entirely clear, investigators apparently extracted almost
all data from Taylor’s smartphones from an eleven-year time span, and then searched
without restriction for evidence of criminal conduct.
Third, the Superior Court erred when it found that investigators searched for
and found evidence “within the narrow scope of the search requested in the
140
185 A.3d at 19.
141
See Wheeler, 135 A.3d at 306-07 (pointing out the warrants did not restrict the search to places
likely to contain evidence of written witness tampering); Buckham, 185 A.3d at 19 (holding a
warrant was not particular in part because it “authorized law enforcement to search categories of
data that had nothing to do with GPS location information.”).
27
affidavit.” This finding is circular. The affidavit contains essentially the same all-
encompassing language of the search warrant, with the “any and all data” and
“including but not limited to” language.142
The Superior Court relied on our decision in Starkey v. State.143 In Starkey,
we upheld two cellphone warrants that used language similar to the warrant at issue
here.144 We found that the Starkey warrants “limit[ed] the officer’s search of the cell
phones to certain types of data, media, and files that were ‘pertinent to th[e]
investigation.’”145 That language, we reasoned, “effectively limited the scope of the
warrants, and prevented a boundless search of the cell phones.”146
Our Starkey decision predates Riley, Wheeler, and Buckham. The
constitutional landscape—as well as the technological one—has changed. Starkey
does not reflect the United States Supreme Court’s or this Court’s current view on
142
App. to Opening Br. at A0259, ¶ 25.
143
2013 WL 4858988 (Del. Sept. 10, 2013).
144
Id. at *4. In Starkey, the warrant for the defendant’s LG cell phone read as follows:
[A]ny and all data stored by whatever means, or through normal course of business
of Verizon Wireless services, and/or through the forensic examination of said
telephone, to include but not limited to registry entries, pictures, photographs,
images, audio/visual recordings, multi-media messages, web user names,
subscriber identifiers, buddy names, screen names, calendar information, call logs,
electronic mail, telephone numbers, any similar information/data indicia of
communication, any other information/data [sic] pertinent to this investigation
within said scope.
Id. The warrant for the second cell phone was almost identical, but it reflected a different cell
phone carrier and listed two additional categories of data. Id.
145
Id.
146
Id.
28
warrants seeking evidence from electronic devices. After our recent decisions, a
search warrant for electronic devices must contain more than a general authorization
to search all the contents of electronic devices for evidence of criminal conduct.
Finally, even though the search warrant was, in the State’s words, “not as
specific as it could have been,” the State claims that the Superior Court held correctly
that defects in the warrant “could be remedied by limiting the State’s evidence to the
timeframe for which the warrant provided probable cause.”147
There is no room, however, for limited suppression of evidence seized under
a general warrant. As the Third Circuit has explained:
There is a legal distinction between a general warrant, which is
invalid because it vests the executing officers with unbridled discretion
to conduct an exploratory rummaging through [the defendant’s] papers
in search of criminal evidence, and an overly broad warrant, which
“‘describe[s] in both specific and inclusive general terms what is to be
seized,’ but ‘authorizes the seizure of items as to which there is no
probable cause . . . .’” [A]n overly broad warrant can be redacted to
strike out those portions of the warrant that are invalid for lack of
probable cause, maintaining the remainder of the warrant that satisfies
the Fourth Amendment. In contrast, the only remedy for a general
warrant is to suppress all evidence obtained thereby.148
The Taylor warrant and its supporting affidavit did not describe “in both
specific and inclusive general terms what is to be seized.” Instead, it “vest[ed] the
147
Oral Argument at 23:57 (June 16, 2021), https://livestream.com/delawaresupremecourt/events/
9697320/videos/222453600; Answering Br. at 36-37.
148
United States v. Yusuf, 461 F.3d 374, 393 n.19 (3rd Cir. 2006) (internal citations omitted). See
also Coolidge v. New Hampshire, 403 U.S. 443 (1971) (a general warrant permits “a general
exploratory rummaging in a person’s belongings.”).
29
executing officers with unbridled discretion to conduct an exploratory rummaging
through [the defendant’s] papers in search of criminal evidence.” Thus, the
constitutional violation cannot be cured by limited suppression.149
C.
As a final matter, we turn to whether the admission of the illegally obtained
evidence was harmless error. When evidence has been admitted erroneously, we
first distinguish between ordinary evidentiary missteps and errors of constitutional
magnitude. When the error does not implicate constitutional rights, “[t]he well-
established rule is that where the evidence exclusive of the improperly admitted
evidence is sufficient to sustain a conviction, error in admitting the evidence is
harmless.”150 But when, as here, the error violated the defendant’s constitutional
rights, an error is harmless only if the State proves “beyond a reasonable doubt that
the error complained of did not contribute to the verdict obtained.”151
149
Because the Taylor warrant is a general warrant not subject to limited suppression, the State’s
reliance on State v. Rizzo, 2018 WL 566794 (Del. Super. Ct. Jan. 26, 2018) and State v. Anderson,
2018 WL 6177176 (Del. Super. Ct. Nov. 5, 2018) is misplaced. In Rizzo, the court relied on our
decision in Starkey, which after Buckham and Wheeler no longer reflects our Court’s stance on
search warrants for electronic devices. In Anderson, the court relied upon the Superior Court’s
decision in this case, which we reverse. We note that, in State v. Waters, 2020 WL 507703 (Del.
Super. Ct. Jan. 30, 2020), another case cited by the State, the Superior Court distinguished between
an overbroad warrant (where limited suppression can be used) and a general one (which is facially
invalid).
150
Johnson v. State, 587 A.2d 444, 451 (Del. 1991).
151
Dawson v. State, 608 A.2d 1201, 1204 (Del. 1992); Johnson, 587 A.2d at 451; Delaware v.
Van Arsdall, 475 U.S. 673 (1986).
30
We cannot conclude beyond a reasonable doubt that the jury’s verdict would
have been the same without illegally seized smartphone evidence. The State charged
Taylor with crimes related to four separate incidents: the armed robbery of Rivera
and McDonald, Miller’s shooting, Wingo’s murder, and the aggravated menacing of
Garrett and Roane. The evidence introduced from the cell phone extraction report
implicated Taylor in the shooting, murder, and aggravated menacing, but not the
armed robbery. Specifically, the State offered several text messages where Taylor
insinuated that he shot Miller and Wingo.152 The State also introduced text messages
where Taylor wrote that he and Smith were tailing Garrett and Roane the night that
the aggravated menacing occurred.153 Finally, the State admitted photos of Taylor
with a gun and photos showing Taylor wearing a hat matching one visible in the
security camera footage of some of the incidents.154 The jury convicted Taylor on
all charges related to the crimes where the State presented evidence from the
extraction report. Taylor was acquitted on all charges stemming from the incidents
absent from the extraction report, namely the armed robbery of Rivera and
McDonald.155 The smartphone evidence was critical to the State’s case and Taylor’s
convictions, and its admission was not harmless error beyond a reasonable doubt.
152
App. to Opening Br. at A1236.
153
Id.
154
Id. at A1278.
155
Opening Br. at 5-6; Reply Br. at 14-19.
31
IV.
“[T]he warrant requirement is ‘an important working part of our machinery of
government,’ not merely ‘an inconvenience to be somehow “weighed” against the
claims of police efficiency.’”156 Indeed, “[t]he occasional suppression of illegally
obtained yet probative evidence has long been considered a necessary cost of
preserving overriding constitutional values.” 157 The Superior Court should have
granted Taylor’s motion to suppress all evidence from the search of his smartphones.
We reverse the Superior Court’s judgment, vacate Taylor’s convictions, and remand
for a new trial consistent with this opinion.
156
Riley, 573 U.S. at 401 (quoting Coolidge, 403 U.S. at 481).
157
James v. Illinois, 493 U.S. 307, 311 (1990) (citing Arizona v. Hicks, 480 U.S. 321, 329 (1987)).
32
VAUGHN, Justice, concurring:
I agree that the warrant here, which authorizes a seizure of “any/all . . .
information pertinent to the investigation within said scope,” does not limit itself to
the seizure of things which have been described with particularity. I concur in the
judgment of the Court.
33